https://sites.temple.edu/dwolf/files/2020/06/Interpreting.pdf
have argued, following Allen, that the Socrates of these dialogues is a metaphysician, an ontologist, as well as a moral philosopher. The ontology of the elenctic dialogues differs from that of the middle dialogues only in a single respect: separation. This is a huge difference, and it is, strictly, an incompatibility. Thus, the ontology of the elenctic dialogues is in this one respect ...
https://cis.temple.edu/~latecki/Courses/CIS2033-Spring12/ElementaryProbabilityforApplications/ch3.pdf
Consider the following hypothetical joint distribution of X, a person’s grade on the AP calculus exam (a number between 1 and 5), and their grade Y in their high school calculus course, which we assume was A = 4,
https://cis.temple.edu/tagit/
April 24, 2024: Audiobook: Defining AI to Ensure Effective Research and Policymaking April 4, 2024: News: AP News: Tech companies want to build artificial general intelligence.
https://cis.temple.edu/~pwang/Publication/TheoriesOfAI.pdf
This chapter addresses several central meta-theoretical issues of AI and AGI. After ana-lyzing the nature of the field, three criteria for desired theories are proposed: correctness, concreteness, and compactness. The criteria are clarified in the AI context, and using them, the current situation in the field is evaluated.
https://cis.temple.edu/~latecki/Papers/ChamferECCVFinal.pdf
2 Related work There is a large number of applications of chamfer matching in computer vision and in medical image analysis. Chamfer distance was first introduced by Barrow et al. [2] in 1977 with a goal of matching two collections of contour fragments. Until today chamfer matching is widely used in object detection and classifica-tion task due to its tolerance to misalignment in position ...
https://cis.temple.edu/~tug29203/18spring-3329/reading/hw4a.pdf
c. Suppose that different VC numbers are permitted in each link along a VC’s path. During connection setup, after an end-to-end path is determined, describe how the links can choose their VC numbers and configure their for-warding tables in a decentralized manner, without reliance on a central node. P3. A bare-bones forwarding table in a VC network has four columns. What is the meaning of ...
https://sites.temple.edu/ticlj/files/2017/02/30.1.Meier-TICLJ.pdf
Humanity by Human Rights Watch, lethal autonomous weapons systems (LAWS) have become an issue of national and international attention. With almost daily articles and commentary, including letters by notable scientists, debating the advantages and disadvantages of developing and fielding these systems, the public has become generally more aware of the issues related to autonomy, but it has ...
https://cis.temple.edu/~tug29203/20-5590/lectures/central-control.pdf
If a Switch finds a shorter path to the Controller, way authentication with it before advertising route. Therefore, the minimum spanning the Controller, hop-by-hop as each Switch Authentication is done using the preconfigured sure that a misbehaving node cannot masquerade or another Switch. If authentication is successful, ates an encrypted connection with the Controller communication between ...
https://cis.temple.edu/~qzeng/papers/deobfuscation-icics2017.pdf
Abstract. Virtualization-obfuscation replaces native code in a binary with semantically equivalent and self-de ned bytecode, which, upon ex-ecution, is interpreted by a custom virtual machine. It makes the code very di cult to analyze and is thus widely used in malware. How to deobfuscate such virtualization obfuscated code has been an important and challenging problem. We approach the problem ...
https://cis.temple.edu/~wangp/5603-AI/Project/2022S/pattersonblaker/Ward_Patterson_Final_Report.pdf
1 Abstract Minecraft has been the focus of much AI research in past years. Most recently, interest has risen in procedural generation of settlements in Minecraft, largely due to a annual competition established in 2018 called the Generative Design in Minecraft Competition. Inspired by this recent research, we aim to develop a set of algorithms that are capable of building a realistic ...