Sciweavers

2181 search results - page 13 / 437
» The restriction scaffold problem
Sort
View
ASPDAC
2009
ACM
144views Hardware» more  ASPDAC 2009»
14 years 1 months ago
Complete-k-distinguishability for retiming and resynthesis equivalence checking without restricting synthesis
Iterative retiming and resynthesis is a powerful way to optimize sequential circuits but its massive adoption has been hampered by the hardness of verification. This paper tackle...
Nikolaos D. Liveris, Hai Zhou, Prithviraj Banerjee
FSS
2002
83views more  FSS 2002»
13 years 8 months ago
Flexible linear programs with a restricted overall flexibility level
It is usually supposed that tolerance levels are determined by the decision maker a priori in flexible linear programming (FLP) problems. In this paper we shall suppose that the d...
Robert Fullér, Margit Kovács, Gy&oum...
FOCM
2007
48views more  FOCM 2007»
13 years 8 months ago
Integration and Optimization of Multivariate Polynomials by Restriction onto a Random Subspace
Abstract. We consider the problem of efficient integration of an n-variate polynomial with respect to the Gaussian measure in Rn and related problems of complex integration and opt...
Alexander I. Barvinok
PVLDB
2010
146views more  PVLDB 2010»
13 years 7 months ago
Graph Indexing of Road Networks for Shortest Path Queries with Label Restrictions
The current widespread use of location-based services and GPS technologies has revived interest in very fast and scalable shortest path queries. We introduce a new shortest path q...
Michael Rice, Vassilis J. Tsotras
ACSAC
2001
IEEE
14 years 7 days ago
Restricting Access with Certificate Attributes in Multiple Root Environments-A Recipe for Certificate Masquerading
The issue of certificate masquerading against the SSL protocol is pointed out in [4]. In [4], various forms of server certificate masquerading are identified. It should also be no...
James M. Hayes