Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
We present a new algorithm for k-layer straightline crossing minimization which is based on sifting that is a heuristic for dynamic reordering of decision diagrams used during logic synthesis and formal verification of logic circuits. The... more
    • by 
    • Logic Synthesis
We present a method computing a minimum sized partition of the van'ables of an incompletely specified Boolean function into symmetric groups. The method can be used during minimization of ROBDDS
    • by 
    •   15  
      Computer ScienceGroup TheoryField-Programmable Gate ArraysDirected graphs
The two most important frontend components of the VLSI design system CADIC are presented. The first one allows graphical specification of recursively defined circuits. The other one allows the designer to navigate across the synthesized... more
    • by 
    •   12  
      Vlsi DesignStatisticsRoutingScheduling
We present a performance driven generator for integer adders which has the following interesting feature: The generator is parametrized in the operands' bitlength n, the delay of the addition tn, and the fault model FM. FM may in... more
    • by 
    •   10  
      Computer ScienceLogicDynamic programmingFault Detection
We present an algebraic approach to hierarchical design of integrated circuits. This approach is based on a "calculus of nets" which includes topological as well as behavioural aspects of integrated circuits. We have developed a... more
    • by 
    •   9  
      CalculusDistributed ComputingMicroelectronicsBoolean Algebra
In this paper we study the effect of using information about (partial) symmetries for the minimization of reduced ordered binary decision diagrams (ROBDD's). The influence of symmetries for the integration in dynamic variable ordering is... more
    • by 
    •   6  
      Computer Aided DesignComputer HardwareDecision TreePoint of View
    • by 
    • Boolean function
This paper addresses the problem of establishing the unknown correspondence for the latch variables of two sequential circuits which have the same state encoding. This has direct application in flnite state machine veriflcation: If a... more
    • by 
    •   11  
      AutomataComputer HardwareIntegrationData Structures
This paper addresses problems that arise while checking the equivalence of two Boolean functions under arbitrary input permutations. The permutation problem has several applications in the synthesis and verification of combinational... more
    • by 
    •   9  
      Distributed ComputingComputer SoftwareLogic DesignLogic Synthesis
In this paper we deal with sensitivity analysis of combinatorial optimization problems and its fundamental term, the tolerance. For three classes of objective functions ( $\Sigma, \Pi, {\mbox{MAX}}$ ) we give some basic properties on... more
    • by 
    •   4  
      Combinatorial OptimizationSensitivity AnalysisAlgorithmicsObjective function
In this paper we deal with sensitivity analysis of combinatorial optimization problems and its fundamental term, the tolerance. For three classes of objective functions (Σ, Π, MAX) we give some basic properties on upper and lower... more
    • by 
    •   3  
      Computer ScienceCombinatorial OptimizationSensitivity Analysis
Discrete wavelet transformations (DWT) followed by embedded zerotree encoding is a very efficient technique for image compression . However, the algorithms proposed in literature assume random access to the whole image. This makes the... more
    • by 
    •   9  
      ArchitectureFPGAField-Programmable Gate ArraysImage compression
In this paper we present an efficient FPGA implementation of the 'Set Partitioning in Hierarchical Trees' (SPIHT) algorithm of Said and Pearlman [1] in combination with an arithmetic coder. The FPGA implementation is applied within a... more
    • by 
    •   6  
      Data CompressionField-Programmable Gate ArraysImage compressionFPGA implementation
Discrete wavelet transformations (DWT) followed by embedded zerotree encoding (EZT) is a very efficient technique for image compression. However, the algorithms proposed in the literature assume random access to the whole image. This... more
    • by 
    •   13  
      Computer ScienceData CompressionParallel ProcessingField-Programmable Gate Arrays
    • by 
    • Simulated Annealing
Until recently verifying multipliers with formal methods was not feasible, even for small input word sizes. About two years ago, a new data structure, called Multiplicative Binary Moment Diagram (*BMD), was introduced for representing... more
    • by 
    •   10  
      Distributed ComputingData StructureComputer SoftwareVerification
The contact minimization problem is the problem of determining which layers should be used for wiring the signal nets of a circuit, such that the total number of layer changes (called contacts or via holes) is minimized. In this paper we... more
    • by 
One of the crucial problems multi-level logic synthesis techniques for multi-output boolean functions f = (f1; . . . ; fm) : f0; 1g n ! f0;1g m have to deal with is nding sublogic which can be shared by di erent outputs, i.e., nding... more
    • by 
    • Boolean function
Due to progress in VLSI technology, algorithm-oriented array architectures such as systolic arrays or bit-slice structures appear to be effective, feasible, and economic. The constrained-via-minimization problem for circuits composed of... more
    • by 
    •   18  
      Computer ScienceComputer ArchitectureArchitectureRouting
This paper investigates reduced ordered binary decision diagrams (OBDD) of partially symmetric Boolean functions when using variable orders where symmetric variables are adjacent. We prove upper bounds for the size of such symmetry... more
    • by 
    •   7  
      Distributed ComputingComputer HardwareComputer SoftwareData Structures