Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 1,110

2.3A.ppt - Temple University

https://cis.temple.edu/~latecki/Courses/RobotFall08/Talks/LinearProgramming.pdf

3 man-hours for finishing while a pair of cross-country skis requires 2 man-hours for cutting, 2 man-hours for shaping and 1 man-hour for finishing. Each day the company has available 140 man-hours for cutting, 120 man-hours for shaping and 150 man-hours for finishing. How many pairs of each type of ski should the company manufacture each day in order to maximize profit if a pair of downhill ...

ja9b13273 1. - sites.temple.edu

https://sites.temple.edu/borguet/files/2025/01/Borguet_Gaigeot_SiO2_jacs.9b13273_2020.pdf

INTRODUCTION Water is critical to sustaining life on Earth, and knowledge about its chemistry and physics is central to a vast range of subjects.1−11 However, the organization of water in inhomoge-neous environments remains controversial, owing to water’s many anomalous properties.12 A simple question such as how far away ions can a ffect the physical and the chemical properties of water ...

CoursePack.book - Temple University

https://cis.temple.edu/~latecki/Courses/CIS750-03/Papers/KalmanFilterSIGGRAPH2001.pdf

The good news is you don’t have to be a mathematical genius to understand and effectively use Kalman filters. This tutorial is designed to provide developers of graphical systems with a basic understanding of this important mathematical tool.

Adaptive Procedural Generation in Minecraft - Temple University

https://cis.temple.edu/~wangp/5603-AI/Project/2022S/pattersonblaker/Ward_Patterson_Final_Report.pdf

1 Abstract Minecraft has been the focus of much AI research in past years. Most recently, interest has risen in procedural generation of settlements in Minecraft, largely due to a annual competition established in 2018 called the Generative Design in Minecraft Competition. Inspired by this recent research, we aim to develop a set of algorithms that are capable of building a realistic ...

Scalable Routing in Delay Tolerant Networks

https://cis.temple.edu/~wu/hoc4667-liu.pdf

ABSTRACT The non-existence of an end-to-end path poses a challenge in adapting the traditional routing algorithms to delay tolerant networks (DTNs). Previous works include centralized rout-ing approaches based on deterministic mobility, ferry-based routing with deterministic or semi-deterministic mobility, °ooding-based approaches for networks with general mo-bility, and probability-based ...

Mathematical Tools for Multivariate Character Analysis

https://cis.temple.edu/~latecki/Courses/AI-Fall12/Lectures/GreatMatrixIntro.pdf

There are numerous excellent texts on matrix algebra, so we will make little ef- fort to prove most of the results given below. For statistical applications, concise introductions can be found in the chapters on matrix methods in Johnson and Wichern (1988) and Morrison (1976), while Dhrymes (1978) and Searle (1982) pro- vide a more extended treatment. Wilf’s (1978) short chapter on matrix ...

The Fuzzy-IAVOA Energy-Aware Routing Algorithm for SDN-based IoT Networks

https://cis.temple.edu/~jiewu/research/publications/Publication_files/AVOA_Fuzzy.pdf

Abstract—The Internet of Things (IoT) has rapidly grown in the past decade as an emerging technology. Due to the heterogeneity and energy limitations of IoT devices, adopting eficient management practices for developing IoT applications and managing IoT networks is a challenging task. One of the most critical IoT challenges that needs to be considered is routing due to its significant impact ...

Balancing Privacy and Accuracy using Significant Gradient Protection in ...

https://cis.temple.edu/~wu/research/publications/Publication_files/J-CT-2024-Balancing%20Privacy%20and%20Accuracy%20using%20Siginificant%20Gradient%20Protection%20in%20Federated%20Learning.pdf

Abstract—Previous state-of-the-art studies have demonstrated that adversaries can access sensitive user data by membership inference attacks (MIAs) in Federated Learning (FL). Intro-ducing differential privacy (DP) into the FL framework is an effective way to enhance the privacy of FL. Nevertheless, in differentially private federated learning (DP-FL), local gradients become excessively ...

Graphical Models - Temple University

https://cis.temple.edu/~latecki/Courses/RobotFall08/BishopBook/Pages_from_PatternRecognitionAndMachineLearning-2.pdf

Probabilities play a central role in modern pattern recognition. We have seen in Chapter 1 that probability theory can be expressed in terms of two simple equations corresponding to the sum rule and the product rule. All of the probabilistic infer-ence and learning manipulations discussed in this book, no matter how complex, amount to repeated application of these two equations. We could ...

FISSIONE: A Scalable Constant Degree and Low ... - Temple University

https://cis.temple.edu/~jiewu/research/publications/Publication_files/FissionE_infocom%20t2.pdf

In recent years, peer-to-peer (P2P) computing has attracted significant attention from both industry and academic re-search [1], [2]. Applications of peer-to-peer networks vary among file sharing, persistent data storage, cooperative web-caching, DNS, and application level multicast. Many peer-to-peer systems have been deployed on the Internet, and some of them have become popular Internet ...