Sciweavers

828 search results - page 62 / 166
» Bounded Hairpin Completion
Sort
View
TCAD
2008
124views more  TCAD 2008»
13 years 10 months ago
An Anytime Algorithm for Generalized Symmetry Detection in ROBDDs
Detecting symmetries has many applications in logic synthesis that include, amongst other things, technology mapping, deciding equivalence of Boolean functions when the input corre...
Neil Kettle, Andy King
HICSS
2008
IEEE
90views Biometrics» more  HICSS 2008»
14 years 4 months ago
Power System Extreme Event Detection: The Vulnerability Frontier
In this work we apply graph theoretic tools to provide a close bound on a frontier relating the number of line outages in a grid to the power disrupted by the outages. This fronti...
Bernard C. Lesieutre, Ali Pinar, Sandip Roy
ISCAS
2007
IEEE
126views Hardware» more  ISCAS 2007»
14 years 4 months ago
Theory and Implementation of an Analog-to-Information Converter using Random Demodulation
— The new theory of compressive sensing enables direct analog-to-information conversion of compressible signals at subNyquist acquisition rates. We develop new theory, algorithms...
Jason N. Laska, Sami Kirolos, Marco F. Duarte, Tam...
AI
2007
Springer
14 years 4 months ago
Multiagent Constraint Satisfaction with Multiply Sectioned Constraint Networks
Abstract. Variables and constraints in problem domains are often distributed. These distributed constraint satisfaction problems (DCSPs) lend themselves to multiagent solutions. Mo...
Yang Xiang, Wanling Zhang
CIE
2007
Springer
14 years 4 months ago
Circuit Complexity of Regular Languages
We survey our current knowledge of circuit complexity of regular languages and we prove that regular languages that are in AC0 and ACC0 are all computable by almost linear size ci...
Michal Koucký