Sciweavers

55 search results - page 2 / 11
» Bounds on pseudoexhaustive test lengths
Sort
View
COMGEO
2012
ACM
12 years 1 months ago
Algorithms for the edge-width of an embedded graph
Let G be an unweighted graph of complexity n embedded in a surface of genus g, orientable or not. We describe improved algorithms to compute a shortest non-contractible and a shor...
Sergio Cabello, Éric Colin de Verdiè...
SAT
2005
Springer
124views Hardware» more  SAT 2005»
13 years 10 months ago
An Improved Upper Bound for SAT
We give a randomized algorithm for testing satisfiability of Boolean formulas in conjunctive normal form with no restriction on clause length. Its running time is at most 2n(1−1...
Evgeny Dantsin, Alexander Wolpert
ATS
2005
IEEE
100views Hardware» more  ATS 2005»
13 years 11 months ago
A Methodology to Compute Bounds on Crosstalk Effects in Arbitrary Interconnects
In this paper, we present a methodology that uses the moments of a generic crosstalk pulse signal to derive upper bounds on the amplitude of crosstalk pulse in arbitrary interconn...
Wichian Sirisaengtaksin, Sandeep K. Gupta
JCS
2008
109views more  JCS 2008»
13 years 5 months ago
Secrecy for bounded security protocols with freshness check is NEXPTIME-complete
The secrecy problem for security protocols is the problem to decide whether or not a given security protocol has leaky runs. In this paper, the (initial) secrecy problem for bound...
Ferucio Laurentiu Tiplea, Catalin V. Birjoveanu, C...
ENTCS
2006
134views more  ENTCS 2006»
13 years 5 months ago
Computing Over-Approximations with Bounded Model Checking
Bounded Model Checking (BMC) searches for counterexamples to a property with a bounded length k. If no such counterexample is found, k is increased. This process terminates when ...
Daniel Kroening