Sciweavers

658 search results - page 57 / 132
» Partially Ordered Constraint Optimization Problems
Sort
View
ISPD
1997
ACM
186views Hardware» more  ISPD 1997»
15 years 1 months ago
EWA: exact wiring-sizing algorithm
The wire sizing problem under inequality Elmore delay constraints is known to be posynomial, hence convex under an exponential variable-transformation. There are formal methods fo...
Rony Kay, Gennady Bucheuv, Lawrence T. Pileggi
CORR
2010
Springer
76views Education» more  CORR 2010»
14 years 4 months ago
Power Control with Imperfect Exchanges and Applications to Spectrum Sharing
In various applications, the effect of errors in gradient-based iterations is of particular importance when seeking saddle points of the Lagrangian function associated with constra...
Nikolaos Gatsis, Georgios B. Giannakis
DATE
2000
IEEE
88views Hardware» more  DATE 2000»
15 years 2 months ago
Free MDD-Based Software Optimization Techniques for Embedded Systems
Embedded systems make a heavy use of software to perform Real-Time embedded control tasks. Embedded software is characterized by a relatively long lifetime and by tight cost, perf...
Chunghee Kim, Luciano Lavagno, Alberto L. Sangiova...
MP
2002
195views more  MP 2002»
14 years 9 months ago
Nonlinear rescaling vs. smoothing technique in convex optimization
We introduce an alternative to the smoothing technique approach for constrained optimization. As it turns out for any given smoothing function there exists a modification with part...
Roman A. Polyak
SAC
2010
ACM
15 years 4 months ago
A simple role mining algorithm
Complex organizations need to establish access control policies in order to manage access to restricted resources. Role Based Access Control paradigm has been introduced in ’90 ...
Carlo Blundo, Stelvio Cimato