Sciweavers

3758 search results - page 88 / 752
» A Complete Subsumption Algorithm
Sort
View
AAAI
2010
13 years 11 months ago
Bypassing Combinatorial Protections: Polynomial-Time Algorithms for Single-Peaked Electorates
For many election systems, bribery (and related) attacks have been shown NP-hard using constructions on combinatorially rich structures such as partitions and covers. It is import...
Felix Brandt, Markus Brill, Edith Hemaspaandra, La...
FPGA
1998
ACM
160views FPGA» more  FPGA 1998»
14 years 1 months ago
A New Retiming-Based Technology Mapping Algorithm for LUT-based FPGAs
In this paper, we present a new retiming-based technology mapping algorithm for look-up table-based eld programmable gate arrays. The algorithm is based on a novel iterative proce...
Peichen Pan, Chih-Chang Lin
SIMPAR
2010
97views Robotics» more  SIMPAR 2010»
13 years 7 months ago
A Parameterless Biologically Inspired Control Algorithm Robust to Nonlinearities, Dead-Times and Low-Pass Filtering Effects
A biologically inspired control algorithm for robot control was introduced in a previous work. The algorithm is robust to noisy sensor information and hardware failures. In this pa...
Fabio Dalla Libera, Shuhei Ikemoto, Takashi Minato...
ICCSA
2005
Springer
14 years 3 months ago
Fault Attack on the DVB Common Scrambling Algorithm
Abstract. The Common Scrambling Algorithm (CSA) is used to encrypt streams of video data in the Digital Video Broadcasting (DVB) system. The algorithm uses a combination of a strea...
Kai Wirt
VLSID
1996
IEEE
133views VLSI» more  VLSID 1996»
14 years 1 months ago
Allocation and Binding in Data Path Synthesis Using a Genetic Algorithm Approach
A technique for allocatzon and binding for data path synthesis (DPS) using a Genetic Algorithm (GA) approach has been developed. The proposed genetic algorithm uses a non-conventi...
Chittaranjan A. Mandal, P. P. Chakrabarti, Sujoy G...