https://cis.temple.edu/~latecki/Papers/CSD_CVPR10.pdf
Abstract In this paper, we propose a new shape decomposition method, called convex shape decomposition. We formal-ize the convex decomposition problem as an integer linear programming problem, and obtain approximate optimal so-lution by minimizing the total cost of decomposition under some concavity constraints. Our method is based on Morse theory and combines information from multiple Morse ...
https://ronlevygroup.cst.temple.edu/courses/2017_spring/chem5412/lectures/Lecture4_SBII_2017.pdf
Using Protein-sequence-variation profitably Correlated Mutations and Structural Contacts
https://cis.temple.edu/~giorgio/cis587/readings/rete.html
The Rete Algorithm The Rete algorithm uses a rooted acyclic directed graph, the Rete, where the nodes, with the exception of the root, represent patterns, and paths from the root to the leaves represent left-hand sides of rules. At each node is stored information about the facts satisfied by the patterns of the nodes in the paths from the root up to and including this node. This information is ...
https://cis-linux1.temple.edu/~tug29203/25fall-2033/lectures/ch1-1.pdf
To stress the point of switching, consider a generalization of the problem: suppose there are 10 000 doors, behind one is a car and behind the rest, goats. After you make your choice, the host will open 9998 doors with goats, and offers you the option to switch. To change or not to change, that’s the question!
https://cis.temple.edu/~jiewu/research/publications/Publication_files/Paper%206750%20Camera%20Ready%20Version.pdf
Abstract Federated learning is vulnerable to model poison-ing attacks in which malicious participants com-promise the global model by altering the model up-dates. Current defense strategies are divided into three types: aggregation-based methods, validation dataset-based methods, and update distance-based methods. However, these techniques often neglect the challenges posed by device ...
https://cis.temple.edu/~jiewu/research/publications/Publication_files/Distributed_Deep_Multi-Agent_Reinforcement_Learning_for_Cooperative_Edge_Caching_in_Internet-of-Vehicles.pdf
Abstract—Edge caching is a promising approach to reduce duplicate content transmission in Internet-of-Vehicles (IoVs). Sev-eral Reinforcement Learning (RL) based edge caching methods have been proposed to improve the resource utilization and reduce the backhaul trafic load. However, they only obtain the local sub-optimal solution, as they neglect the influence from environments by other ...
https://sites.temple.edu/wwei/files/2020/08/books.pdf
Many research studies involve multivariate time series. For example, a study of monthly cancer rates in the United States during the past ten years can involve fifty or many hundred or thousand time series depending on whether we investigate the cancer rates for states, cities or counties, and a study of the quarterly sales performance of one company’s different branches in the country or ...
https://cst.temple.edu/sites/cst/files/theses1/bao.pdf
tween Hecke eigenforms, we give another proof that the j-function is algebraic
https://cis.temple.edu/~giorgio/old/cis67s05/bookslides.html
Slides from Koffman-Wolz TextbookChapter 1
https://education.temple.edu/help/microsoft
Microsoft Office 365 is available for current Temple students, faculty and staff for free. The software is available for download on up to five PCs or Macs via the Microsoft Download link under TUapplications on TUportal. Along with all the familiar tools, like Word, Excel, and PowerPoint, your Temple license includes access to Microsoft's powerful sharing and collaboration tools: Outlook ...