Sciweavers

647 search results - page 57 / 130
» Generation of BDDs from hardware algorithm descriptions
Sort
View
SAT
2005
Springer
138views Hardware» more  SAT 2005»
14 years 1 months ago
On Applying Cutting Planes in DLL-Based Algorithms for Pseudo-Boolean Optimization
The utilization of cutting planes is a key technique in Integer Linear Programming (ILP). However, cutting planes have seldom been applied in Pseudo-Boolean Optimization (PBO) algo...
Vasco M. Manquinho, João P. Marques Silva
CMMR
2007
Springer
121views Music» more  CMMR 2007»
14 years 2 months ago
A Real-Time Genetic Algorithm in Human-Robot Musical Improvisation
The paper describes an interactive musical system that utilizes a genetic algorithm in an effort to create inspiring collaborations between human musicians and an improvisatory ro...
Gil Weinberg, Mark Godfrey, Alex Rae, John Rhoads
FSE
2001
Springer
116views Cryptology» more  FSE 2001»
14 years 15 days ago
NESSIE: A European Approach to Evaluate Cryptographic Algorithms
The NESSIE project (New European Schemes for Signature, Integrity and Encryption) intends to put forward a portfolio containing the next generation of cryptographic primitives. The...
Bart Preneel
DATE
2006
IEEE
118views Hardware» more  DATE 2006»
14 years 2 months ago
Design and implementation of a modular and portable IEEE 754 compliant floating-point unit
Multimedia and communication algorithms from embedded system domain often make extensive use of floating-point arithmetic. Due to the complexity and expense of the floating-poin...
Kingshuk Karuri, Rainer Leupers, Gerd Ascheid, Hei...
ICCAD
2005
IEEE
121views Hardware» more  ICCAD 2005»
14 years 4 months ago
Transition-by-transition FSM traversal for reachability analysis in bounded model checking
Abstract— In bounded model checking (BMC)-based verification flows lack of reachability constraints often leads to false negatives. At present, it is daily practice of a veri...
Minh D. Nguyen, Dominik Stoffel, Markus Wedler, Wo...