Sciweavers

2006 search results - page 124 / 402
» Heuristic Security-Testing Methods
Sort
View
ISPD
2009
ACM
126views Hardware» more  ISPD 2009»
15 years 7 months ago
A new algorithm for simultaneous gate sizing and threshold voltage assignment
Gate sizing and threshold voltage (Vt) assignment are popular techniques for circuit timing and power optimization. Existing methods, by and large, are either sensitivity-driven h...
Yifang Liu, Jiang Hu
SAC
2009
ACM
15 years 7 months ago
Exploiting weak dependencies in tree-based search
In this work, our objective is to heuristically discover a simplified form of functional dependencies between variables called weak dependencies. Once discovered, these relations...
Alejandro Arbelaez, Youssef Hamadi
ICC
2007
IEEE
15 years 7 months ago
IPACT with Smallest Available Report First: A New DBA Algorithm for EPON
—Dynamic Bandwidth allocation in Ethernet Passive Optical Networks (EPONs) has been an area of intense research in recent years. Most of the proposed solutions offer clever metho...
Swapnil Bhatia, Radim Bartos
106
Voted
IEEEPACT
2007
IEEE
15 years 7 months ago
Automatic Correction of Loop Transformations
Loop nest optimization is a combinatorial problem. Due to the growing complexity of modern architectures, it involves two increasingly difficult tasks: (1) analyzing the profita...
Nicolas Vasilache, Albert Cohen, Louis-Noël P...
88
Voted
ATAL
2007
Springer
15 years 7 months ago
A Q-decomposition and bounded RTDP approach to resource allocation
This paper contributes to solve effectively stochastic resource allocation problems known to be NP-Complete. To address this complex resource management problem, a Qdecomposition...
Pierrick Plamondon, Brahim Chaib-draa, Abder Rezak...