Sciweavers

2652 search results - page 324 / 531
» Privacy-preserving linear programming
Sort
View
FPL
2005
Springer
100views Hardware» more  FPL 2005»
15 years 8 months ago
Power and Area Optimization for Multiple Restricted Multiplication
This paper presents a design and optimization technique for the Multiple Restricted Multiplication problem [1]. This refers to a situation where a single variable is multiplied by...
Nalin Sidahao, George A. Constantinides, Peter Y. ...
ICCS
2005
Springer
15 years 8 months ago
Phasing and Missing Data Recovery in Family Trios
Although there exist many phasing methods for unrelated adults or pedigrees, phasing and missing data recovery for data representing family trios is lagging behind. This paper is a...
Dumitru Brinza, Jingwu He, Weidong Mao, Alexander ...
IFIP
2005
Springer
15 years 8 months ago
Numerical Approximation of a Control Problem for Advection-Diffusion Processes
Two different approaches are proposed to enhance the efficiency of the numerical resolution of optimal control problems governed by a linear advection– diffusion equation. In ...
Alfio Quarteroni, Gianluigi Rozza, L. Dedè,...
SAS
2005
Springer
132views Formal Methods» more  SAS 2005»
15 years 8 months ago
Generation of Basic Semi-algebraic Invariants Using Convex Polyhedra
A technique for generating invariant polynomial inequalities of bounded degree is presented using the abstract interpretation framework. It is based on overapproximating basic semi...
Roberto Bagnara, Enric Rodríguez-Carbonell,...
SAT
2005
Springer
138views Hardware» more  SAT 2005»
15 years 8 months ago
On Applying Cutting Planes in DLL-Based Algorithms for Pseudo-Boolean Optimization
The utilization of cutting planes is a key technique in Integer Linear Programming (ILP). However, cutting planes have seldom been applied in Pseudo-Boolean Optimization (PBO) algo...
Vasco M. Manquinho, João P. Marques Silva