Sciweavers

1210 search results - page 11 / 242
» Secure Logic Synthesis
Sort
View
FOSAD
2000
Springer
13 years 11 months ago
The Logic of Authentication Protocols
Paul F. Syverson, Iliano Cervesato
LOPSTR
2000
Springer
13 years 11 months ago
A formal framework for synthesis and verification of logic programs
In this paper we will present a formal framework, based on the notion of extraction calculus, which has been successfully applied to define procedures for extracting information fr...
Alessandro Avellone, Mauro Ferrari, Camillo Fioren...
GLVLSI
2008
IEEE
117views VLSI» more  GLVLSI 2008»
14 years 2 months ago
Delay driven AIG restructuring using slack budget management
Timing optimizations during logic synthesis has become a necessary step to achieve timing closure in VLSI designs. This often involves “shortening” all paths found in the circ...
Andrew C. Ling, Jianwen Zhu, Stephen Dean Brown
DATE
2010
IEEE
136views Hardware» more  DATE 2010»
14 years 19 days ago
Reversible logic synthesis through ant colony optimization
Abstract—We propose a novel synthesis technique for reversible logic based on ant colony optimization (ACO). In our ACO-based approach, reversible logic synthesis is formulated a...
Min Li, Yexin Zheng, Michael S. Hsiao, Chao Huang