Sciweavers

55 search results - page 2 / 11
» Bounds on pseudoexhaustive test lengths
Sort
View
COMGEO
2012
ACM
13 years 7 months ago
Algorithms for the edge-width of an embedded graph
Let G be an unweighted graph of complexity n embedded in a surface of genus g, orientable or not. We describe improved algorithms to compute a shortest non-contractible and a shor...
Sergio Cabello, Éric Colin de Verdiè...
SAT
2005
Springer
124views Hardware» more  SAT 2005»
15 years 5 months ago
An Improved Upper Bound for SAT
We give a randomized algorithm for testing satisfiability of Boolean formulas in conjunctive normal form with no restriction on clause length. Its running time is at most 2n(1−1...
Evgeny Dantsin, Alexander Wolpert
ATS
2005
IEEE
100views Hardware» more  ATS 2005»
15 years 5 months ago
A Methodology to Compute Bounds on Crosstalk Effects in Arbitrary Interconnects
In this paper, we present a methodology that uses the moments of a generic crosstalk pulse signal to derive upper bounds on the amplitude of crosstalk pulse in arbitrary interconn...
Wichian Sirisaengtaksin, Sandeep K. Gupta
JCS
2008
109views more  JCS 2008»
14 years 11 months ago
Secrecy for bounded security protocols with freshness check is NEXPTIME-complete
The secrecy problem for security protocols is the problem to decide whether or not a given security protocol has leaky runs. In this paper, the (initial) secrecy problem for bound...
Ferucio Laurentiu Tiplea, Catalin V. Birjoveanu, C...
ENTCS
2006
134views more  ENTCS 2006»
14 years 11 months ago
Computing Over-Approximations with Bounded Model Checking
Bounded Model Checking (BMC) searches for counterexamples to a property with a bounded length k. If no such counterexample is found, k is increased. This process terminates when ...
Daniel Kroening