Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 15

CIS587: The RETE Algorithm - Temple University

https://cis.temple.edu/~ingargio/cis587/readings/rete.html

The Rete Algorithm The Rete algorithm uses a rooted acyclic directed graph, the Rete, where the nodes, with the exception of the root, represent patterns, and paths from the root to the leaves represent left-hand sides of rules. At each node is stored information about the facts satisfied by the patterns of the nodes in the paths from the root up to and including this node. This information is ...

PRESENTATION TITLE - Office of the Vice President for Research

https://research.temple.edu/sites/research/files/media/document/Temple%20University%20Export%20Control%20Introduction%20.pdf

EXPORT To send or take controlled tangible items, software, or information out of the United States in any manner (including hand-carried), to transfer ownership or control of controlled tangible items, software, or information to a foreign person, or to disclose information about controlled items, software, or information to a foreign government or foreign person. The controlled tangible item ...

Online Federated Learning on Distributed Unknown Data Using UAVs

https://cis.temple.edu/~jiewu/research/publications/Publication_files/ICDE2024_Online_Federated_Learning_on_Distributed_Unknown_Data_Using_UAVs.pdf

Abstract—Along with the advance of low-altitude economy, a variety of applications based on Unmanned Aerial Vehicles (UAVs) have been developed to accomplish diverse tasks. In this paper, we focus on the scenario of multiple UAVs performing Federated Learning (FL) tasks. Specifically, a group of UAVs is scheduled to repeatedly visit some Points of Interest (PoIs), collect the data produced ...

Privacy-Preserving Federated Neural Architecture Search With Enhanced ...

https://cis.temple.edu/~jiewu/research/publications/Publication_files/Privacy-Preserving_Federated_Neural_Architecture_Search_With_Enhanced_Robustness_for_Edge_Computing.pdf

Abstract—With the development of large-scale artificial intelli-gence services, edge devices are becoming essential providers of data and computing power. However, these edge devices are not immune to malicious attacks. Federated learning (FL), while pro-tecting privacy of decentralized data through secure aggregation, struggles to trace adversaries and lacks optimization for hetero-geneity ...

Modeling Infiltration with Approximate Solutions to Richard s Equation

https://sites.temple.edu/sserrano/files/2020/08/12-Modeling-Infiltration-with-Approximate-Solutions-of-Richards-Equation.pdf

Sergio E. Serrano1 Abstract: Using approximate analytical solutions of the nonlinear Richard’s equation, simple models for the simulation of water content, pressure head, hydraulic head, and infiltration rate profiles, subject to either constant conditions, time-variable rainfall, or redistribution, are developed. New practical expressions for the time to ponding and infiltration rate at the ...