EMOTIONALLY INTELLIGENT ALGORITHMS DEALING SOME PRACTICAL COMBINATORIAL PROBLEMS
暂无分享,去创建一个
[1] K. Sörensen,et al. AN ALGORITHM TO GENERATE ALL SPANNING TREES OF A GRAPH IN ORDER OF INCREASING COST , 2005 .
[2] N.R. Malik,et al. Graph theory with applications to engineering and computer science , 1975, Proceedings of the IEEE.
[3] Sofiène Tahar,et al. A public-key watermarking technique for IP designs , 2005, Design, Automation and Test in Europe.
[4] Samar Sen Sarma,et al. Generation of All Spanning Trees of a Simple, Symmetric Connected Graph , 2009 .
[5] Miodrag Potkonjak,et al. Localized watermarking: methodology and application to template mapping , 2000, 2000 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.00CH37100).
[6] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[7] Richard W. Hamming,et al. Coding and Information Theory , 1980 .
[8] Frank Harary,et al. A survey of the reconstruction conjecture , 1974 .
[9] D. Lipman,et al. The multiple sequence alignment problem in biology , 1988 .
[10] Xin-She Yang,et al. Introduction to Algorithms , 2021, Nature-Inspired Optimization Algorithms.
[11] Behrouz A. Forouzan,et al. Cryptography and network security , 1998 .
[12] Ralph C. Merkle,et al. Secrecy, authentication, and public key systems , 1979 .
[13] E. J. Farrell,et al. On the reconstraction of the matching polynomial and the reconstruction conjecture , 1987 .
[14] W. Mayeda,et al. Generation of Trees without Duplications , 1965 .
[15] Gary Chartrand,et al. Graphs & Digraphs: Third Edition , 1996 .
[16] Subhashis Banerjee,et al. The Reconstruction Conjecture , 2012 .
[17] I. Torunoglu,et al. Watermarking-based copyright protection of sequential functions , 2000, IEEE Journal of Solid-State Circuits.
[18] Yung-Sheng Chen,et al. A communication system model for digital image watermarking problems , 2007 .
[19] E. J. Farrell,et al. An introduction to matching polynomials , 1979, J. Comb. Theory, Ser. B.
[20] M. Potkonjak,et al. FPGA fingerprinting techniques for protecting intellectual property , 1998, Proceedings of the IEEE 1998 Custom Integrated Circuits Conference (Cat. No.98CH36143).
[21] John Clark,et al. A First Look at Graph Theory , 1991 .
[22] Antonio García,et al. IPP Watermarking Technique for IP Core Protection on FPL Devices , 2006, 2006 International Conference on Field Programmable Logic and Applications.
[23] H. Trent. A NOTE ON THE ENUMERATION AND LISTING OF ALL POSSIBLE TREES IN A CONNECTED LINEAR GRAPH. , 1954, Proceedings of the National Academy of Sciences of the United States of America.
[24] Donald Ervin Knuth,et al. The Art of Computer Programming, Volume II: Seminumerical Algorithms , 1970 .
[25] Ujjwal Maulik,et al. Probabilistic Analysis of Cellular Automata Rules and its Application in Pseudo Random Pattern Generation , 2008 .
[26] Ulrich Storz,et al. Intellectual property protection , 2011, mAbs.
[27] Edith Hemaspaandra,et al. Complexity results in graph reconstruction , 2004, Discret. Appl. Math..
[28] Hen-Wai Tsao,et al. Watermarking for intellectual property protection , 2003 .
[29] Sundaram Seshu,et al. Linear Graphs and Electrical Networks , 1961 .
[30] Fred Piper,et al. Stream Ciphers , 1982, EUROCRYPT.
[31] Arlindo L. Oliveira. Robust techniques for watermarking sequential circuit designs , 1999, DAC '99.
[32] Edoardo Charbon. Hierarchical watermarking in IC design , 1998, Proceedings of the IEEE 1998 Custom Integrated Circuits Conference (Cat. No.98CH36143).
[33] Anthony J. G. Hey,et al. Feynman Lectures on Computation , 1996 .
[34] ENUMERATION OF SPANNING TREES OF GRAPHS , 1994 .
[35] M. Jerrum. Two-dimensional monomer-dimer systems are computationally intractable , 1987 .
[36] Gang Qu,et al. Publicly detectable watermarking for intellectual property authentication in VLSI design , 2002, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..
[37] M. Piekarski. Listing of All Possible Trees of a Linear Graph , 1965 .
[38] Charles J. Alpert,et al. The ISPD98 circuit benchmark suite , 1998, ISPD '98.
[39] Susmita Sur-Kolay,et al. Encoding of Floorplans through Deterministic Perturbation , 2009, 2009 22nd International Conference on VLSI Design.
[40] E. Reingold,et al. Combinatorial Algorithms: Theory and Practice , 1977 .
[41] Parthasarathi Dasgupta,et al. An internet-based IP protection scheme for circuit designs using linear feedback shift register (LFSR)-based locking , 2009, SBCCI.
[42] M. Aswatha Kumar,et al. Symmetric Key Image Encryption Scheme with Key Sequences Derived from Random Sequence of Cyclic Elliptic Curve Points. , 2011 .
[44] Miodrag Potkonjak,et al. Constraint-based watermarking techniques for design IP protection , 2001, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..
[45] S. L. Hakimi,et al. On trees of a graph and their generation , 1961 .
[46] Franklin M. Ingels. Information and coding theory , 1971 .
[47] Susmita Sur-Kolay,et al. A Novel Scheme for Encoding and Watermark Embedding in VLSI Physical Design for IP Protection , 2007, 2007 International Conference on Computing: Theory and Applications (ICCTA'07).