Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 6

Mobile First - Information Technology Services

https://its.temple.edu/owlcard/mobile-first

Mobile First Campus Identification Temple University has implemented a “Mobile First” strategy for campus identification and building access. All university students and employees are expected to download the OWLcard Mobile credential to their Apple or Android devices, which will serve as their primary form of identification on campus. Physical OWLcards will only be provided when a mobile ...

Application Security Verification Standard 4.0

https://community.mis.temple.edu/mis5214sec001spring2025/files/2025/01/OWASP-Application-Security-Verification-Standard-4.0.3-en-3.pdf

V2.2 General Authenticator Security ity is essential to future-proof applications. Refactor application verifiers to allow additional authenticators as per user preferences, as well as allowing retiring deprecated

FedHAN: A Cache-Based Semi-Asynchronous Federated Learning Framework ...

https://cis.temple.edu/~jiewu/research/publications/Publication_files/FedHAN.pdf

In three poisoning attack scenar-ios, including backdoor attacks, its detection and recovery outperformed leading methods by 12% and 7.16%, demon-strating the robustness of FedHAN in complex real-world set-tings.

NARS Introduction - Temple University

https://cis.temple.edu/~pwang/NARS-Intro.html

Intelligence: From Definition to Design, Proceedings of the Third International Workshop on Self-Supervised Learning, PMLR 192:35-47, 2022 From NARS to a thinking machine, Advance of Artificial General Intelligence, Pages 75-93, IOS Press, Amsterdam, 2007 Comprehensive descriptions:

Joint Mobile Edge Caching and Pricing: A Mean-Field Game Approach

https://cis.temple.edu/~wu/research/publications/Publication_files/ICDE2024_Xu.pdf

For example, in the same geographical area, there are two edge video providers (Alice and Bob) offering video services {v1, v2} to requesters. Here, the popularity of v1 is higher than v2, and Alice (or Bob) is capable of only caching one video due to the limited storage resources.

Online Federated Learning on Distributed Unknown Data Using UAVs

https://cis.temple.edu/~jiewu/research/publications/Publication_files/ICDE2024_Online_Federated_Learning_on_Distributed_Unknown_Data_Using_UAVs.pdf

The total energy consumption for UAV n in round r can be expressed as En(r) = Etravel + Etrain. Similar to [25], when a UAV is flying at a fixed speed v, the power can be given by the expression: TABLE I: Description of major notations ... 3v2 s v4 v2 Pfly = p1(1 + ) + p2 (1 + )1/2 − 4v2 2v2