Sciweavers

1210 search results - page 48 / 242
» Secure Logic Synthesis
Sort
View
ACL2
2006
ACM
14 years 4 months ago
An embedding of the ACL2 logic in HOL
We describe an embedding of the ACL2 logic into higherorder logic. An implementation of this embedding allows ACL2 to be used as an oracle for higher-order logic provers. Categori...
Michael J. C. Gordon, Warren A. Hunt Jr., Matt Kau...
SASP
2009
IEEE
222views Hardware» more  SASP 2009»
14 years 4 months ago
Arithmetic optimization for custom instruction set synthesis
Abstract—One of the ways that custom instruction set extensions can improve over software execution is through the use of hardware structures that have been optimized at the arit...
Ajay K. Verma, Yi Zhu, Philip Brisk, Paolo Ienne
DAC
1999
ACM
14 years 2 months ago
Automated Phase Assignment for the Synthesis of Low Power Domino Circuits
High performance circuit techniques such as domino logic have migrated from the microprocessor world into more mainstream ASIC designs. The problem is that domino logic comes at a...
Priyadarshan Patra, Unni Narayanan
ICCAD
1999
IEEE
119views Hardware» more  ICCAD 1999»
14 years 2 months ago
Factoring logic functions using graph partitioning
Algorithmic logic synthesis is usually carried out in two stages, the independent stage where logic minimization is performed on the Boolean equations with no regard to physical p...
Martin Charles Golumbic, Aviad Mintz
ENTCS
2007
87views more  ENTCS 2007»
13 years 10 months ago
Temporal Logics of Knowledge and their Applications in Security
Temporal logics of knowledge are useful for reasoning about situations where the knowledge of an agent or component is important, and where change in this knowledge may occur over...
Clare Dixon, M. Carmen Fernández Gago, Mich...