Sciweavers

1639 search results - page 292 / 328
» Degree-constrained network flows
Sort
View
POPL
2008
ACM
14 years 10 months ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk
ICCAD
2006
IEEE
123views Hardware» more  ICCAD 2006»
14 years 6 months ago
A network-flow approach to timing-driven incremental placement for ASICs
We present a novel incremental placement methodology called FlowPlace for significantly reducing critical path delays of placed standard-cell circuits. FlowPlace includes: a) a t...
Shantanu Dutt, Huan Ren, Fenghua Yuan, Vishal Suth...
HICSS
2003
IEEE
136views Biometrics» more  HICSS 2003»
14 years 3 months ago
Value Positions for Financial Institutions in Electronic Bill Presentment and Payment (EBPP)
Business to consumer (B2C) electronic commerce has led to new relationships connecting various supply chain partners via the Internet, significantly increasing the quantity and qu...
Alea M. Fairchild
ICCAD
1994
IEEE
131views Hardware» more  ICCAD 1994»
14 years 2 months ago
Edge-map: optimal performance driven technology mapping for iterative LUT based FPGA designs
We consider the problem of performance driven lookup-table (LUT) based technology mapping for FPGAs using a general delay model. In the general delay model, each interconnection e...
Hannah Honghua Yang, D. F. Wong
CORR
2010
Springer
188views Education» more  CORR 2010»
13 years 10 months ago
A physically-based particle model of emergent crowd behaviors
This paper presents a modeling process in order to produce a realistic simulation of crowds in the ancient Greek agora of Argos. This place was a social theater in which two kinds...
Laure Heïgéas, Annie Luciani, Joë...