Sciweavers

2652 search results - page 233 / 531
» Privacy-preserving linear programming
Sort
View
STOC
2001
ACM
116views Algorithms» more  STOC 2001»
16 years 4 months ago
One line and n points
: We analyze a randomized pivoting process involving one line and n points in the plane. The process models the behavior of the RANDOM-EDGE simplex algorithm on simple polytopes wi...
Bernd Gärtner, József Solymosi, Falk T...
113
Voted
ICCD
2004
IEEE
106views Hardware» more  ICCD 2004»
16 years 21 days ago
A New Statistical Optimization Algorithm for Gate Sizing
— In this paper, we approach the gate sizing problem in VLSI circuits in the context of increasing variability of process and circuit parameters as technology scales into the nan...
Murari Mani, Michael Orshansky
121
Voted
ICCD
2004
IEEE
148views Hardware» more  ICCD 2004»
16 years 21 days ago
Many-to-Many Core-Switch Mapping in 2-D Mesh NoC Architectures
In this paper, we investigate the core-switch mapping(CSM) problem that optimally maps cores onto an NoC architecture such that either the energy consumption or the congestion is ...
Chan-Eun Rhee, Han-You Jeong, Soonhoi Ha
118
Voted
ICCAD
2008
IEEE
98views Hardware» more  ICCAD 2008»
16 years 20 days ago
Performance optimization of elastic systems using buffer resizing and buffer insertion
Abstract—Buffer resizing and buffer insertion are two transformation techniques for the performance optimization of elastic systems. Different approaches for each technique have ...
Dmitry Bufistov, Jorge Júlvez, Jordi Cortad...
TACAS
2010
Springer
146views Algorithms» more  TACAS 2010»
15 years 10 months ago
Ranking Function Synthesis for Bit-Vector Relations
Ranking function synthesis is a key aspect to the success of modern termination provers for imperative programs. While it is wellknown how to generate linear ranking functions for ...
Byron Cook, Daniel Kroening, Philipp Rümmer, ...