Sciweavers

4903 search results - page 845 / 981
» The Set Covering Machine
Sort
View
ICCAD
1994
IEEE
134views Hardware» more  ICCAD 1994»
14 years 1 months ago
Boolean constrained encoding: a new formulation and a case study
1 This paper provides a new, generalized approach to the problem of encoding information as vectors of binary digits. We furnish a formal definition for the Boolean constrained enc...
Ney Laert Vilar Calazans
SIGGRAPH
2010
ACM
14 years 1 months ago
Fabricating spatially-varying subsurface scattering
Many real world surfaces exhibit translucent appearance due to subsurface scattering. Although various methods exists to measure, edit and render subsurface scattering effects, no...
Yue Dong, Jiaping Wang, Fabio Pellacini, Xin Tong,...
CCS
1994
ACM
14 years 1 months ago
The Design and Implementation of Tripwire: A File System Integrity Checker
At the heart of most computer systems is a file system. The file system contains user data, executable programs, configuration and authorization information, and (usually) the bas...
Gene H. Kim, Eugene H. Spafford
SC
1994
ACM
14 years 1 months ago
Run-time and compile-time support for adaptive irregular problems
In adaptive irregular problems the data arrays are accessed via indirection arrays, and data access patterns change during computation. Implementingsuch problems ondistributed mem...
Shamik D. Sharma, Ravi Ponnusamy, Bongki Moon, Yua...
STACS
1994
Springer
14 years 1 months ago
Reachability and the Power of Local Ordering
The L ? = NL question remains one of the major unresolved problems in complexity theory. Both L and NL have logical characterizations as the sets of totally ordered ( ) structures...
Kousha Etessami, Neil Immerman