https://cis.temple.edu/tagit/presentations/Hopfield%20Networks%20is%20all%20you%20need.pdf
Classical Binary Hopfield Networks More complicated, patterns like (binary) images can be learned.
https://cis.temple.edu/~apal/npa.pdf
Abstract Recent advances in radio and embedded systems have enabled the proliferation of wireless sensor networks. Wireless sensor networks are tremendously being used in different environments to perform various monitoring tasks such as search, rescue, disaster relief, target tracking and a number of tasks in smart environments. In many such tasks, node localization is inherently one of the ...
https://cis.temple.edu/~jiewu/research/publications/Publication_files/DiVE.pdf
Abstract—Ensuring stable and high-quality real-time video an-alytics for computationally constrained mobile agents is essential. However, limited computing resources and network bandwidth present significant challenges in meeting the objective of low response time and high inference accuracy. In this paper, we present DiVE, an edge-assisted video analytics system that utilizes motion vectors ...
https://sites.temple.edu/sserrano/files/2020/08/12-Modeling-Infiltration-with-Approximate-Solutions-of-Richards-Equation.pdf
Sergio E. Serrano1 Abstract: Using approximate analytical solutions of the nonlinear Richard’s equation, simple models for the simulation of water content, pressure head, hydraulic head, and infiltration rate profiles, subject to either constant conditions, time-variable rainfall, or redistribution, are developed. New practical expressions for the time to ponding and infiltration rate at the ...
https://community.mis.temple.edu/mis5203sec951spring2022/files/2019/01/COBIT5-Ver2-enabling.pdf
Disclaimer ISACA has designed this publication, COBIT® 5: Enabling Processes (the ‘Work’), primarily as an educational resource for governance of enterprise IT (GEIT), assurance, risk and security professionals. ISACA makes no claim that use of any of the Work will assure a successful outcome. The Work should not be considered inclusive of all proper information, procedures and tests or ...
https://sites.temple.edu/ticlj/files/2017/02/30.1.Crootof-TICLJ.pdf
―[p]redictable, reliable and transparent technology‖; ―[a]ccurate information for the user on the outcome sought, the technology, and the context of use‖; ―[t]imely human judgement and action, and a potential for timely intervention‖; and ―[a]ccountability to a certain standard.‖
https://cis.temple.edu/~latecki//Courses/CIS166-Spring07/Lectures/ch7.4.pdf
Section 7.4 Closures of Relations Definition: The closure of a R relation with respect property P is the relation number of ordered R to obtain pairs property to
https://cis.temple.edu/~apal/ccgrid_iot.pdf
Abstract—In this paper we examine the problem of conflict detection and mitigation across multiple independently designed IoT subsystems deployed in a shared environment. The desired behavior of the system is codified in terms of predefined “safety properties”. We allow both the operational rules and safety properties to include time and temporal logic operations and detect their ...
https://sites.temple.edu/pdames/files/2019/03/ChungEtAlTRO2018.pdf
Abstract—The use of aerial swarms to solve real-world prob-lems has been increasing steadily, accompanied by falling prices and improving performance of communication, sensing, and pro-cessing hardware. The commoditization of hardware has reduced unit costs, thereby lowering the barriers to entry to the field of aerial swarm robotics. A key enabling technology for swarms is the family of ...
https://cis.temple.edu/~wu/research/publications/Publication_files/ICDE2024_Xu.pdf
Abstract—In this paper, we investigate the competitive content placement problem in Mobile Edge Caching (MEC) systems, where Edge Data Providers (EDPs) cache appropriate contents and trade them with requesters at a suitable price. Most of the existing works ignore the complicated strategic and economic interplay between content caching, pricing, and content sharing. Therefore, we propose a ...