Sciweavers

3820 search results - page 570 / 764
» Bounded Model Debugging
Sort
View
143
Voted
CSFW
1999
IEEE
15 years 7 months ago
A Meta-Notation for Protocol Analysis
Most formal approaches to security protocol analysis are based on a set of assumptions commonly referred to as the "Dolev-Yao model." In this paper, we use a multiset re...
Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln...
107
Voted
ISPD
1999
ACM
79views Hardware» more  ISPD 1999»
15 years 7 months ago
Partitioning with terminals: a "new" problem and new benchmarks
The presence of fixed terminals in hypergraph partitioning instances arising in top-down standard-cell placement makes such instances qualitatively different from the free hyperg...
Charles J. Alpert, Andrew E. Caldwell, Andrew B. K...
97
Voted
MM
1999
ACM
175views Multimedia» more  MM 1999»
15 years 7 months ago
A cross-media adaptation strategy for multimedia presentations
Adaptation techniques for multimedia presentations are mainly concerned with switching between different qualities of single media elements to reduce the data volume and by this ...
Susanne Boll, Wolfgang Klas, Jochen Wandel
120
Voted
ESA
1998
Springer
154views Algorithms» more  ESA 1998»
15 years 7 months ago
A Functional Approach to External Graph Algorithms
We present a new approach for designing external graph algorithms and use it to design simple, deterministic and randomized external algorithms for computing connected components, ...
James Abello, Adam L. Buchsbaum, Jeffery Westbrook
125
Voted
ICCD
1997
IEEE
100views Hardware» more  ICCD 1997»
15 years 7 months ago
Optimal Clock Period Clustering for Sequential Circuits with Retiming
Abstract— In this paper we consider the problem of clustering sequential circuits subject to a bound on the area of each cluster, with the objective of minimizing the clock perio...
Arvind K. Karandikar, Peichen Pan, C. L. Liu