https://cis.temple.edu/~wu/research/publications/Publication_files/Social-Aware%20DT-Assisted%20Service%20Provisioning%20in%20Serverless%20Edge%20Computing.pdf
Social-Aware DT-Assisted Service Provisioning in Serverless Edge Computing Jing Li†, Jianping Wang†, Weifa Liang†, Jie Wu¶, Quan Chen§, and Zichuan Xu$ † Department of Computer Science, City University of Hong Kong, Hong Kong, P. R. China ¶ Department of Computer and Information Sciences, Temple University, Philadelphia, USA
https://cis.temple.edu/~wu/teaching/Spring%202013/handoff.pdf
1.1 INTRODUCTION Mobility is the most important feature of a wireless cellular communication system. Usu-ally, continuous service is achieved by supporting handoff (or handover) from one cell to another. Handoff is the process of changing the channel (frequency, time slot, spreading code, or combination of them) associated with the current connection while a call is in progress. It is often ...
https://cis.temple.edu/~wu/hoc4667-liu.pdf
ABSTRACT The non-existence of an end-to-end path poses a challenge in adapting the traditional routing algorithms to delay tolerant networks (DTNs). Previous works include centralized rout-ing approaches based on deterministic mobility, ferry-based routing with deterministic or semi-deterministic mobility, °ooding-based approaches for networks with general mo-bility, and probability-based ...
https://cis.temple.edu/~jiewu/teaching/Spring%202013/01-savvides-localization-wireless-sensor-networks-fine-grained.pdf
A. Sensor Networks and Location Discovery Nowadays, wireless devices enjoy widespread use in many different settings and the spectrum of applications is rapidly expanding. Ubiquitous connectivity becomes possible by net-working these devices together. The exciting new field of wire-less sensor networks breaks away from the traditional end-to-end communication of voice and data systems, and ...
https://cis.temple.edu/~jiewu/research/publications/Publication_files/jiang_www_2020.pdf
ABSTRACT Serendipity recommendation has attracted more and more atten-tion in recent years; it is committed to providing recommendations which could not only cater to users’ demands but also broaden their horizons. However, existing approaches usually measure user-item relevance with a scalar instead of a vector, ignoring user preference direction, which increases the risk of unrelated ...
https://www.fox.temple.edu/sites/fox/files/documents/Cummins%20Conference%202022/RILA_Moenig_JRI_final.pdf
Registered index-linked annuities (RILAs) are increasingly popular equity-based re-tirement savings products o ered by U.S. life insurance companies. They combine features of xed-index annuities and traditional variable annuities (TVAs), o ering in-vestors equity exposure with downside protection in a tax-deferred setting. This article introduces RILAs to the academic literature by describing ...
https://cis.temple.edu/~jiewu/research/publications/Publication_files/ICC2024.pdf
The incorporation of LSTM is especially pertinent to net-work trafic analysis. This is due to the temporal characteristics of the data, which give rise to sequential trafic patterns that LSTM-based models excel in comprehending and processing.
https://sites.temple.edu/xifanwu/files/2020/10/PhysRevLett.125.156803.pdf
We report a joint study using surface-specific sum-frequency vibrational spectroscopy and ab initio molecular dynamics simulations, respectively, on a pristine hydrophobic (sub)monolayer hexane-water interface, namely, the hexane/water interface with varied vapor pressures of hexane and different pHs in water. We show clear evidence that hexane on water revises the interfacial water structure ...
https://sites.temple.edu/ticlj/files/2017/02/30.1.Crootof-TICLJ.pdf
it is grounded in the idea that all weaponry should be subject to ―meaningful human control.‖ This ―intuitively appealing‖ principle is immensely popular,
https://cis.temple.edu/~wu/research/publications/Publication_files/handbook-part1.pdf
The 19 chapters in this section cover a wide range of topics across multiple layers: MAC (part of the data link layer), network, and applications. One chapter is devoted to the cross-layer architecture for ad hoc wireless networks. Several chapters deal with various efficient and scalable routing, including multicasting and geocasting, in ad hoc wireless networks. One chapter discusses routing ...