Sciweavers

8503 search results - page 1328 / 1701
» Secure Software Architectures
Sort
View
DAC
2005
ACM
15 years 5 months ago
Prime clauses for fast enumeration of satisfying assignments to boolean circuits
Finding all satisfying assignments of a propositional formula has many applications in the design of hardware and software. An approach to this problem augments a clause-recording...
HoonSang Jin, Fabio Somenzi
131
Voted
DAC
2005
ACM
15 years 5 months ago
Timing-driven placement by grid-warping
Grid-warping is a recent placement strategy based on a novel physical analogy: rather than move the gates to optimize their location, it elastically deforms a model of the 2-D chi...
Zhong Xiu, Rob A. Rutenbar
DALT
2008
Springer
15 years 5 months ago
Leveraging New Plans in AgentSpeak(PL)
Abstract. In order to facilitate the development of agent-based software, several agent programming languages and architectures, have been created. Plans in these architectures are...
Felipe Rech Meneguzzi, Michael Luck
117
Voted
FPL
2008
Springer
111views Hardware» more  FPL 2008»
15 years 5 months ago
Sampling from the exponential distribution using independent Bernoulli variates
The exponential distribution is a key distribution in many event-driven Monte-Carlo simulations, where it is used to model the time between random events in the system. This paper...
David B. Thomas, Wayne Luk
115
Voted
CIDR
2007
105views Algorithms» more  CIDR 2007»
15 years 5 months ago
Turning Cluster Management into Data Management; A System Overview
This paper introduces the CondorJ2 cluster management system. Traditionally, cluster management systems such as Condor employ a process-oriented approach with little or no use of ...
Eric Robinson, David J. DeWitt
« Prev « First page 1328 / 1701 Last » Next »