Skip to content
Open Access
  • Home
  • Collections
    • High Impact Articles
    • Jawi Collection
    • Malay Medicine
    • Forensic
  • Search Options
    • UiTM Open Access
    • Search by UiTM Scopus
    • Advanced Search
    • Search by Category
  • Discovery Service
    • Sources
    • UiTM Journals
    • List UiTM Journal in IR
    • Statistic
  • About
    • Open Access
    • Creative Commons Licenses
    • COKI | Malaysia Open Access
    • User Guide
    • Contact Us
    • Search Tips
    • FAQs
Advanced
  • Behavioral Signature-based Fra...
  • Cite this
  • Text this
  • Email this
  • Print
  • Export Record
    • Export to RefWorks
    • Export to EndNoteWeb
    • Export to EndNote
  • Permanent link
Behavioral Signature-based Framework for Identifying Unsatisfiable Variable Mappings between Digital Designs

Behavioral Signature-based Framework for Identifying Unsatisfiable Variable Mappings between Digital Designs

Bibliographic Details
Main Author: Tendulkar, Vaibhav Uday
Language:English
Published: Wright State University / OhioLINK 2012
Subjects:
Computer Engineering
Computer Science
Electrical Engineering
Boolean Matching
Formal Equivalence Checking
Boolean Signatures
Behavioral Signatures
Formal Verification
Online Access:http://rave.ohiolink.edu/etdc/view?acc_num=wright1334687848
  • Holdings
  • Description
  • Similar Items
  • Staff View

Internet

http://rave.ohiolink.edu/etdc/view?acc_num=wright1334687848

Similar Items

  • Sequential Equivalence Checking with Efficient Filtering Strategies for Inductive Invariants
    by: Nguyen, Huy
    Published: (2014)
  • A Canonical-Based NPN Boolean Matching Algorithm Utilizing Boolean Difference and Cofactor Signature
    by: Juling Zhang, et al.
    Published: (2017-01-01)
  • Selection of search strategies for solving 3-SAT problems
    by: Pułka Andrzej
    Published: (2014-06-01)
  • A New Pairwise NPN Boolean Matching Algorithm Based on Structural Difference Signature
    by: Juling Zhang, et al.
    Published: (2018-12-01)
  • A Novel Authenticity of an Image Using Visual Cryptography
    by: Koshta, Prashant Kumar, et al.
    Published: (2012)

© 2020 | Services hosted by the Perpustakaan Tun Abdul Razak, | Universiti Teknologi MARA | Disclaimer


Loading...