Sciweavers

4335 search results - page 13 / 867
» Privatizing Constraint Optimization
Sort
View
ISQED
2011
IEEE
230views Hardware» more  ISQED 2011»
14 years 3 months ago
Constraint generation for software-based post-silicon bug masking with scalable resynthesis technique for constraint optimizatio
Due to the dramatic increase in design complexity, verifying the functional correctness of a circuit is becoming more difficult. Therefore, bugs may escape all verification effo...
Chia-Wei Chang, Hong-Zu Chou, Kai-Hui Chang, Jie-H...
CORR
2010
Springer
141views Education» more  CORR 2010»
14 years 12 months ago
Full vectoring optimal power allocation in xDSL channels under per-modem power constraints and spectral mask constraints
In xDSL systems, crosstalk can be separated into two categories, namely in-domain crosstalk and out-of-domain crosstalk. Indomain crosstalk is also refered to as self crosstalk. Ou...
Vincent Le Nir, Marc Moonen, Jan Verlinden, Mamoun...
AAAI
2008
15 years 2 months ago
Efficient Metadeliberation Auctions
Imagine a resource allocation scenario in which the interested parties can, at a cost, individually research ways of using the resource to be allocated, potentially increasing the...
Ruggiero Cavallo, David C. Parkes