Sciweavers

5344 search results - page 361 / 1069
» Privacy-Preserving Set Operations
Sort
View
ICSE
2003
IEEE-ACM
16 years 4 months ago
Embedded Architect: A Tool for Early Performance Evaluation of Embedded Software
Embedded Architect is a design automation tool that embodies a static performance evaluation technique to support early, architecture-level design space exploration for component-...
Jeffry T. Russell, Margarida F. Jacome
ICCD
2003
IEEE
177views Hardware» more  ICCD 2003»
16 years 1 months ago
SAT-Based Algorithms for Logic Minimization
This paper introduces a new method for two-level logic minimization. Unlike previous approaches, the new method uses a SAT solver as an underlying engine. While the overall minimi...
Samir Sapra, Michael Theobald, Edmund M. Clarke
ICCAD
2006
IEEE
96views Hardware» more  ICCAD 2006»
16 years 1 months ago
Loop pipelining for high-throughput stream computation using self-timed rings
We present a technique for increasing the throughput of stream processing architectures by removing the bottlenecks caused by loop structures. We implement loops as self-timed pip...
Gennette Gill, John Hansen, Montek Singh
SAC
2010
ACM
15 years 11 months ago
Relational consistency by constraint filtering
In this paper, we propose a new algorithm for enforcing relational consistency on every set of k constraints of a finite Constraint Satisfaction Problem (CSP). This algorithm ope...
Shant Karakashian, Robert J. Woodward, Berthe Y. C...
IAT
2009
IEEE
15 years 11 months ago
Awareness and Forgetting of Facts and Agents
—We propose various logical semantics for change of awareness. The setting is that of multiple agents that may become aware of facts or other agents, or forget about them. We mod...
Hans P. van Ditmarsch, Tim French