Sciweavers

TCAD
2008
92views more  TCAD 2008»
13 years 4 months ago
IP Watermarking Using Incremental Technology Mapping at Logic Synthesis Level
Abstract--This paper proposes an adaptive watermarking technique by modulating some closed cones in an originally optimized logic network (master design) for technology mapping. Th...
Aijiao Cui, Chip-Hong Chang, Sofiène Tahar
OL
2008
54views more  OL 2008»
13 years 4 months ago
On hyperbolicity cones associated with elementary symmetric polynomials
Elementary symmetric polynomials can be thought of as derivative polynomials of En(x) = i=1,...,n xi. Their associated hyperbolicity cones give a natural sequence of relaxations f...
Yuriy Zinchenko
MP
2008
92views more  MP 2008»
13 years 4 months ago
Invariance and efficiency of convex representations
We consider two notions for the representations of convex cones: G-representation and liftedG-representation. The former represents a convex cone as a slice of another; the latter...
Chek Beng Chua, Levent Tunçel
FMSD
2006
103views more  FMSD 2006»
13 years 4 months ago
Cones and foci: A mechanical framework for protocol verification
We define a cones and foci proof method, which rephrases the question whether two system specifications are branching bisimilar in terms of proof obligations on relations between ...
Wan Fokkink, Jun Pang, Jaco van de Pol
CCCG
2008
13 years 6 months ago
On a Cone Covering Problem
Given a set of polyhedral cones C1,
Khaled M. Elbassioni, Hans Raj Tiwary