Sciweavers

4335 search results - page 13 / 867
» Privatizing Constraint Optimization
Sort
View
ISQED
2011
IEEE
230views Hardware» more  ISQED 2011»
12 years 11 months ago
Constraint generation for software-based post-silicon bug masking with scalable resynthesis technique for constraint optimizatio
Due to the dramatic increase in design complexity, verifying the functional correctness of a circuit is becoming more difficult. Therefore, bugs may escape all verification effo...
Chia-Wei Chang, Hong-Zu Chou, Kai-Hui Chang, Jie-H...
CORR
2010
Springer
141views Education» more  CORR 2010»
13 years 7 months ago
Full vectoring optimal power allocation in xDSL channels under per-modem power constraints and spectral mask constraints
In xDSL systems, crosstalk can be separated into two categories, namely in-domain crosstalk and out-of-domain crosstalk. Indomain crosstalk is also refered to as self crosstalk. Ou...
Vincent Le Nir, Marc Moonen, Jan Verlinden, Mamoun...
AAAI
2008
13 years 10 months ago
Efficient Metadeliberation Auctions
Imagine a resource allocation scenario in which the interested parties can, at a cost, individually research ways of using the resource to be allocated, potentially increasing the...
Ruggiero Cavallo, David C. Parkes