https://cis.temple.edu/~latecki/Courses/CIS2033-Spring12/ElementaryProbabilityforApplications/ch2.pdf
To work up to the solution we begin with something that is obvious but is a key step in some of the reasoning to follow.
https://cis.temple.edu/~wu/research/publications/Publication_files/ICDE2024_Xu.pdf
Abstract—In this paper, we investigate the competitive content placement problem in Mobile Edge Caching (MEC) systems, where Edge Data Providers (EDPs) cache appropriate contents and trade them with requesters at a suitable price. Most of the existing works ignore the complicated strategic and economic interplay between content caching, pricing, and content sharing. Therefore, we propose a ...
https://www.fox.temple.edu/sites/fox/files/ISR-delayed-effects.pdf
Can location-based mobile promotion (LMP) trigger contemporaneous and delayed sales purchases? As mobile technologies can reach users anywhere and anytime, LMP becomes a promising new channel. We unravel the dynamic sales impact of LMP on the basis of a randomized field experiment with 22,000 mobile users sponsored by one of the largest mobile service providers in the world. Our identification ...
https://www.fox.temple.edu/sites/fox/files/Frontiers-Machines-versus-Humans-The-Impact-of-Artificial-Intelligence-Chatbot-Disclosure-on-Customer-Purchases.pdf
Frontiers: Machines vs. Humans: The Impact of Artificial Intelligence Chatbot Disclosure on Customer Purchases Xueming Luo,aSiliang Tong,aZheng Fang,bZhe Quc
https://cis.temple.edu/~latecki/Papers/SDM09_Final.pdf
Outlier detection techniques can be categorized into several groups: (1) statistical or distribution-based ap-proaches; (2) geometric-based approaches; (3) pro ̄ling methods; and (4) model-based approaches. In statisti-cal techniques [2, 3], the data points are typically mod-eled using a data distribution, and points are labeled as outliers depending on their relationship with the dis ...
https://cis.temple.edu/~wu/research/publications/Publication_files/10_bare_jrnl_compsoc.pdf
1.1 Motivation and Challenges Service provisioning and updating refers to the decision-making process of the locations of services within a specific edge computing network to balance the interests of service providers and consumers to achieve the greatest eficiency possible [7]. Numerous mobile devices and sensors in edge networks need to interface with services and exchange data in real-time ...
https://cis.temple.edu/~wu/research/publications/Publication_files/Topology-Aware_Scheduling_Framework_for_Microservice_Applications_in_Cloud.pdf
Abstract—Loosely coupled and highly cohesived microservices running in containers are becoming the new paradigm for application development. Compared with monolithic applications, applications built on microservices architecture can be deployed and scaled independently, which promises to simplify software development and operation. However, the dramatic increase in the scale of microservices ...
https://cis.temple.edu/~jiewu/research/publications/Publication_files/Distributed_Deep_Multi-Agent_Reinforcement_Learning_for_Cooperative_Edge_Caching_in_Internet-of-Vehicles.pdf
Abstract—Edge caching is a promising approach to reduce duplicate content transmission in Internet-of-Vehicles (IoVs). Sev-eral Reinforcement Learning (RL) based edge caching methods have been proposed to improve the resource utilization and reduce the backhaul trafic load. However, they only obtain the local sub-optimal solution, as they neglect the influence from environments by other ...