SHARAD

Results: 175



#Item
1Computational complexity theory / Theoretical computer science / Logic in computer science / Boolean algebra / Circuit complexity / Complexity classes / Electronic design automation / True quantified Boolean formula / Satisfiability modulo theories / NC / FO / Boolean circuit

Template-based circuit understanding Adri`a Gasc´on∗ , Pramod Subramanyan† , Bruno Dutertre∗ , Ashish Tiwari∗ Dejan Jovanovi´c∗ , Sharad Malik† ∗ SRI International , ,

Add to Reading List

Source URL: csl.sri.com

Language: English - Date: 2014-08-26 19:53:27
2Theoretical computer science / Logic in computer science / Formal methods / Computational complexity theory / Mathematics / Electronic design automation / NP-complete problems / Constraint programming / Satisfiability modulo theories / Boolean satisfiability problem / Z3 / Solver

Solving Constraints over Bit-Vectors with SAT-based Model Checking Extended Abstract Yakir Vizel1 , Alexander Nadel2 , and Sharad Malik1 2

Add to Reading List

Source URL: smt-workshop.cs.uiowa.edu

Language: English - Date: 2017-09-02 14:08:49
3

Boolean Satisfiability Solvers: Techniques and Extensions Georg WEISSENBACHER a and Sharad MALIK a a Princeton University Abstract. Contemporary satisfiability solvers are the corner-stone of many successful applications

Add to Reading List

Source URL: www.georg.weissenbacher.science

Language: English - Date: 2012-02-28 17:50:50
    4

    1 AFR HIGH COURT OF CHHATTISGARH, BILASPUR CRR No. 748 of 2006  Sharad Gupta ---- Applicant

    Add to Reading List

    Source URL: highcourt.cg.gov.in

    Language: English - Date: 2018-04-07 03:42:54
      5

      Change of Guard: The Next Generation of Social Graph De-anonymization Attacks Kumar Sharad University of Cambridge

      Add to Reading List

      Source URL: ksharad.com

      Language: English
        6

        American Economic Review: Papers & Proceedings 2016, 106(5): 119–123 http://dx.doi.orgaer.p20161028 Personalized Risk Assessments in the Criminal Justice System† By Sharad Goel, Justin M. Rao, and Ravi Shrof

        Add to Reading List

        Source URL: www.rshroff.com

        Language: English - Date: 2016-05-12 13:12:49
          7

          Poster Misleading Metrics: On Evaluating ML for Malware with Confidence Roberto Jordaney, Zhi Wang, Davide Papini, Ilia Nouretdinov, Kumar Sharad, and Lorenzo Cavallaro Royal Holloway, University of London Malware poses

          Add to Reading List

          Source URL: ksharad.com

          Language: English - Date: 2018-05-17 15:33:22
            8

            Coverage-based Trace Signal Selection for Fault Localisation in Post-Silicon Validation Charlie Shucheng Zhu1? , Georg Weissenbacher2?? , and Sharad Malik1 1 2

            Add to Reading List

            Source URL: www.georg.weissenbacher.science

            Language: English - Date: 2013-01-16 06:44:48
              9

              Got control ? AutoControl: Automated Control of MultipleVirtualized Resources Pradeep Padala, Karen Hou, Xiaoyun Zhu*, Mustfa Uysal†, Zhikui Wang†, Sharad Singhal†, Arif Merchant†, Kang G. Shin

              Add to Reading List

              Source URL: eurosys2009.informatik.uni-erlangen.de

              Language: English - Date: 2009-04-19 11:57:08
                UPDATE