Sciweavers

828 search results - page 110 / 166
» Bounded Hairpin Completion
Sort
View
DATE
2009
IEEE
90views Hardware» more  DATE 2009»
14 years 4 months ago
Property analysis and design understanding
—Verification is a major issue in circuit and system design. Formal methods like bounded model checking (BMC) can guarantee a high quality of the verification. There are severa...
Ulrich Kühne, Daniel Große, Rolf Drechs...
DATE
2009
IEEE
89views Hardware» more  DATE 2009»
14 years 4 months ago
Robust non-preemptive hard real-time scheduling for clustered multicore platforms
—Scheduling task graphs under hard (end-to-end) timing constraints is an extensively studied NP-hard problem of critical importance for predictable software mapping on Multiproce...
Michele Lombardi, Michela Milano, Luca Benini
GLVLSI
2009
IEEE
122views VLSI» more  GLVLSI 2009»
14 years 4 months ago
Enhancing SAT-based sequential depth computation by pruning search space
The sequential depth determines the completeness of bounded model checking in design verification. Recently, a SATbased method is proposed to compute the sequential depth of a de...
Yung-Chih Chen, Chun-Yao Wang
AMMA
2009
Springer
14 years 4 months ago
A Market-Based Approach to Multi-factory Scheduling
Abstract. In this paper, we report on the design of a novel market-based approach for decentralised scheduling across multiple factories. Specifically, because of the limitations ...
Perukrishnen Vytelingum, Alex Rogers, Douglas K. M...
CRYPTO
2009
Springer
150views Cryptology» more  CRYPTO 2009»
14 years 4 months ago
Improving the Security of Quantum Protocols via Commit-and-Open
We consider two-party quantum protocols starting with a transmission of some random BB84 qubits followed by classical messages. We show a general “compiler” improving the secur...
Ivan Damgård, Serge Fehr, Carolin Lunemann, ...