Sciweavers

58 search results - page 7 / 12
» Characterizing Linear Size Circuits in Terms of Privacy
Sort
View
DAC
2006
ACM
14 years 8 months ago
Optimal cell flipping in placement and floorplanning
In a placed circuit, there are a lot of movable cells that can be flipped to further reduce the total wirelength, without affecting the original placement solution. We aim at solv...
Chiu-Wing Sham, Evangeline F. Y. Young, Chris C. N...
MM
2010
ACM
202views Multimedia» more  MM 2010»
13 years 6 months ago
Accelerated IPTV channel change with transcoded unicast bursting
We study video transcoding for accelerated channel changes in IPTV systems. Video transcoding at the Retransmission Server not only reduces the channel change latency, but also re...
Zhi Li, Ali C. Begen, Xiaoqing Zhu, Bernd Girod
CCS
2007
ACM
13 years 11 months ago
Efficient policy analysis for administrative role based access control
Administrative RBAC (ARBAC) policies specify how Role-Based Access Control (RBAC) policies may be changed by each administrator. It is often difficult to fully understand the effe...
Scott D. Stoller, Ping Yang, C. R. Ramakrishnan, M...
ECCC
2011
223views ECommerce» more  ECCC 2011»
13 years 2 months ago
A Case of Depth-3 Identity Testing, Sparse Factorization and Duality
Polynomial identity testing (PIT) problem is known to be challenging even for constant depth arithmetic circuits. In this work, we study the complexity of two special but natural ...
Chandan Saha, Ramprasad Saptharishi, Nitin Saxena
ICCAD
2007
IEEE
113views Hardware» more  ICCAD 2007»
14 years 4 months ago
Combinational and sequential mapping with priority cuts
An algorithm for technology mapping of combinational and sequential logic networks is proposed and applied to mapping into K-input lookup-tables (K-LUTs). The new algorithm avoids...
Alan Mishchenko, Sungmin Cho, Satrajit Chatterjee,...