Sciweavers

451 search results - page 31 / 91
» Relationless Completeness and Separations
Sort
View
128
Voted
ICCAD
2006
IEEE
190views Hardware» more  ICCAD 2006»
16 years 12 days ago
Factor cuts
Enumeration of bounded size cuts is an important step in several logic synthesis algorithms such as technology mapping and re-writing. The standard algorithm does not scale beyond...
Satrajit Chatterjee, Alan Mishchenko, Robert K. Br...
139
Voted
CGF
2007
98views more  CGF 2007»
15 years 3 months ago
Distance-Ranked Connectivity Compression of Triangle Meshes
We present a new, single-rate method for compressing the connectivity information of a connected 2-manifold triangle mesh with or without boundary. Traditional compression schemes...
Patrick Marais, James E. Gain, D. Shreiner
ICA
2010
Springer
15 years 4 months ago
Adaptive Underdetermined ICA for Handling an Unknown Number of Sources
Independent Component Analysis is the best known method for solving blind source separation problems. In general, the number of sources must be known in advance. In many cases, pre...
Andreas Sandmair, Alam Zaib, Fernando Puente Le&oa...
149
Voted
LICS
1990
IEEE
15 years 7 months ago
The Dynamic Logic of Permission
Reasoning about permissions and obligations sometimes requires to distinguish more than one level of permission: certain actions are preferable to others, or one has more confiden...
Ron van der Meyden
90
Voted
CORR
2010
Springer
138views Education» more  CORR 2010»
15 years 3 months ago
The Digital Signature Scheme MQQ-SIG
Abstract: This document contains the Intellectual Property Statement and the technical description of the MQQ-SIG - a new public key digital signature scheme. The complete scientif...
Danilo Gligoroski, Svein Johan Knapskog, Smile Mar...