Sciweavers

589 search results - page 24 / 118
» Generalized Dominators and Post-Dominators
Sort
View
83
Voted
STOC
2003
ACM
95views Algorithms» more  STOC 2003»
16 years 1 months ago
Random knapsack in expected polynomial time
In this paper, we present the first average-case analysis proving an expected polynomial running time for an exact algorithm for the 0/1 knapsack problem. In particular, we prove,...
René Beier, Berthold Vöcking
84
Voted
ICCAD
1996
IEEE
114views Hardware» more  ICCAD 1996»
15 years 4 months ago
An efficient approach to simultaneous transistor and interconnect sizing
In this paper, we study the simultaneous transistor and interconnect sizing (STIS) problem. We de ne a class of optimization problems as CH-posynomial programs and reveal a genera...
Jason Cong, Lei He
84
Voted
FS
2006
66views more  FS 2006»
15 years 21 days ago
Generalized deviations in risk analysis
General deviation measures are introduced and studied systematically for their potential applications to risk management in areas like portfolio optimization and engineering. Such...
R. Tyrrell Rockafellar, Stan Uryasev, Michael Zaba...
105
Voted
DATE
1997
IEEE
75views Hardware» more  DATE 1997»
15 years 4 months ago
Using constraint logic programming in memory synthesis for general purpose computers
In modern computer systems the performance is dominated by the memory performance. Currently, there is neither a systematic design methodology nor a tool for the design of memory ...
Renate Beckmann, Jürgen Herrmann
100
Voted
LATIN
2004
Springer
15 years 6 months ago
Bidimensional Parameters and Local Treewidth
For several graph-theoretic parameters such as vertex cover and dominating set, it is known that if their sizes are bounded by k then the treewidth of the graph is bounded by some ...
Erik D. Demaine, Fedor V. Fomin, Mohammad Taghi Ha...