Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 3,370

OSB_ICDM07_v2.dvi - Temple University

https://cis.temple.edu/~latecki/Papers/OSB_ICDM07.pdf

The goal of this section is to test OSB’s ability as a mea-sure for partial sequence similarity. Our query sequences represent significant contour parts of shapes in the MPEG-7 Shape 1 Part B dataset [11].

Boosting Chamfer Matching by Learning Chamfer Distance Normalization

https://cis.temple.edu/~latecki/Papers/ChamferECCVFinal.pdf

2 Related work There is a large number of applications of chamfer matching in computer vision and in medical image analysis. Chamfer distance was first introduced by Barrow et al. [2] in 1977 with a goal of matching two collections of contour fragments. Until today chamfer matching is widely used in object detection and classifica-tion task due to its tolerance to misalignment in position ...

Section 8.3 Representing Graphs and Graph Isomorphism

https://cis.temple.edu/~latecki/Courses/CIS166-Spring06/Lectures/ch8.3.pdf

Discrete Mathematics by Section 8.3 and Its Applications 4/E Kenneth Rosen TP 1

Physics PhD - Temple University

https://www.temple.edu/academics/degree-programs/physics-phd-st-phys-phd

Gain an understanding of physics sufficiently broad to form a basis for independent research, as well as the experience of doing significant research under the guidance of a mature scientist. Focus on atomic physics, condensed matter physics or particle physics with a theoretical or an experimental approach.

Nutrition Counseling for Obesity Prevention in Children: A HANDBOOK FOR ...

https://dentistry.temple.edu/sites/dentistry/files/NCOP_Handbook.pdf

Obesity is among the leading public health concerns affecting populations around the world. The unfortunate reality is that most children and adolescents with obesity will remain obese as adults. As a result, they will remain at heightened risk for morbidity and premature mortality. In addition to having an individual impact on health and longevity, obesity has economic and societal ...

Joint Optimization of DNN Partition and Scheduling for Mobile Cloud ...

https://cis.temple.edu/~jiewu/research/publications/Publication_files/ICPP_2021_Duan.pdf

ABSTRACT Reducing the inference time of Deep Neural Networks (DNNs) is critical when running time sensitive applications on mobile devices. Existing research has shown that partitioning a DNN and ofloading a part of its computation to cloud servers can reduce the inference time. The single DNN partition problem has been extensively in-vestigated recently. However, in real-world applications, a ...

Meet Temple’s new associate professors in the Department of Africology ...

https://news.temple.edu/news/2021-12-14/meet-temple-s-new-associate-professors-department-africology-and-african-american

Learn about Temple University’s new associate professors in the Department of Africology and African American Studies.

The OpenNARS implementation of the Non-Axiomatic Reasoning System

https://cis.temple.edu/~pwang/Publication/OpenNARS.pdf

Abstract. This paper describes the implementation of a Non-Axiomatic Reasoning System (NARS), a uni ed AGI system which works under the assumption of insu cient knowledge and resources (AIKR). The system's architecture, memory structure, inference engine, and control mechanism are described in detail.

DeepIDPS: An Adaptive DRL-based Intrusion Detection and Prevention ...

https://cis.temple.edu/~jiewu/research/publications/Publication_files/ICC2024.pdf

Abstract—Most intrusion detection systems (IDS) are vul-nerable to novel attacks and struggle to maintain a balance between high accuracy and a low false positive rate. Furthermore, the relevant features of Distributed Denial of Service (DDoS) attacks in conventional networks may not necessarily apply to the Software-defined network (SDN) environment. Additionally, weak feature selection ...

Time-Based Proxy Re-encryption Scheme for Secure Data Sharing in a ...

https://www.cis.temple.edu/~jiewu/research/publications/Publication_files/INS-Time-Based%20Proxy%20Re-encryption%20Scheme%20for%20Secure%20Data%20Sharing%20in%20a%20Cloud%20Environment.pdf

Abstract A fundamental approach for secure data sharing in a cloud environment is to let the data owner encrypt data before outsouring. To simultaneously achieve fine-grained access control on encrypted data and scalable user revo-cation, existing work combines attribute-based encryption (ABE) and proxy re-encryption (PRE) to delegate the cloud service provider (CSP) to execute re-encryption ...