Sciweavers

575 search results - page 6 / 115
» constraints 2011
Sort
View
ISQED
2011
IEEE
230views Hardware» more  ISQED 2011»
14 years 1 months ago
Constraint generation for software-based post-silicon bug masking with scalable resynthesis technique for constraint optimizatio
Due to the dramatic increase in design complexity, verifying the functional correctness of a circuit is becoming more difficult. Therefore, bugs may escape all verification effo...
Chia-Wei Chang, Hong-Zu Chou, Kai-Hui Chang, Jie-H...
ORL
2011
14 years 8 days ago
A note on the MIR closure and basic relaxations of polyhedra
Anderson, Cornu´ejols and Li (2005) show that for a polyhedral mixed integer set defined by a constraint system
Sanjeeb Dash, Oktay Günlük, Christian Ra...
IJSSE
2011
127views more  IJSSE 2011»
14 years 4 months ago
A Formal Language for XML Authorisations Based on Answer Set Programming and Temporal Interval Logic Constraints
The Extensible Markup Language is susceptible to security breaches because it does not incorporate methods to protect the information it encodes. Our work presented in this paper f...
Sean Policarpio, Yan Zhang
DLOG
2011
14 years 28 days ago
On P/NP Dichotomies for EL Subsumption under Relational Constraints
Abstract. We consider the problem of characterising relational constraints under which TBox reasoning in EL is tractable. We obtain P vs. coNP-hardness dichotomies for tabular cons...
Agi Kurucz, Frank Wolter, Michael Zakharyaschev
TIT
2011
116views more  TIT 2011»
14 years 4 months ago
Convex Programming Upper Bounds on the Capacity of 2-D Constraints
—The capacity of 1-D constraints is given by the entropy of a corresponding stationary maxentropic Markov chain. Namely, the entropy is maximized over a set of probability distri...
Ido Tal, Ron M. Roth