Sciweavers

2911 search results - page 481 / 583
» A Logic of Graph Constraints
Sort
View
105
Voted
ICCD
2002
IEEE
101views Hardware» more  ICCD 2002»
15 years 9 months ago
Improving the Efficiency of Circuit-to-BDD Conversion by Gate and Input Ordering
Boolean functions are fundamental to synthesis and verification of digital logic, and compact representations of Boolean functions have great practical significance. Popular repre...
Fadi A. Aloul, Igor L. Markov, Karem A. Sakallah
86
Voted
NDSS
2009
IEEE
15 years 7 months ago
Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems
Host compromise is a serious computer security problem today. To better protect hosts, several Mandatory Access Control systems, such as Security Enhanced Linux (SELinux) and AppA...
Hong Chen, Ninghui Li, Ziqing Mao
102
Voted
FSKD
2009
Springer
145views Fuzzy Logic» more  FSKD 2009»
15 years 7 months ago
Chinese Web Comments Clustering Analysis with a Two-phase Method
Usually a meaningful web topic has tens of thousands of comments, especially the hot topics. It is valuable if we congregate the comments into clusters and find out the mainstrea...
Yexin Wang, Li Zhao, Yan Zhang
106
Voted
FSTTCS
2009
Springer
15 years 7 months ago
Modelchecking counting properties of 1-safe nets with buffers in paraPSPACE
ABSTRACT. We consider concurrent systems that can be modelled as 1-safe Petri nets communicating through a fixed set of buffers (modelled as unbounded places). We identify a param...
M. Praveen, Kamal Lodaya
94
Voted
SLIP
2009
ACM
15 years 7 months ago
Honeycomb-structured computational interconnects and their scalable extension to spherical domains
The present paper is part of a larger effort to redesign, from the ground up, the best possible interconnect topologies for switchless multiprocessor computer systems. We focus he...
Joseph B. Cessna, Thomas R. Bewley