BEARdocs

Browsing Department of Computer Science by Title

DSpace/Manakin Repository

Browsing Department of Computer Science by Title

Sort by: Order: Results:

  • Maurer, Peter M.
    This technical report lists all 4x4 matrices over GF(2). Each matrix is listed along with its order and its inverse. At the end is a summary of the number of matrices belonging to each order.
  • Maurer, Peter M.
    There are nine conjugacy classes of faithful representations of S4 in the general linear group of 4x4 matrices. This report gives generator matrices for one group in each class. These generator pairs allow each of the ...
  • Maurer, Peter M.
    This report contains some data about the General Linear Groups of GF(2) for dimensions 2, 3, 4, and 5. These groups are groups of matrices over GF(2), the integers modulo 2. The General Linear Group of order is the set ...
  • Maurer, Peter M.
    This is the software described in the technical report “The GF2Matrices Classes: A Programming Package for Mathematical Research.” Over the past few years I have been engaged in an intense study of GF(2) matrices, especially ...
  • Maurer, Peter M.
    Over the past few years I have been engaged in an intense study of GF(2) matrices, especially of dimensions 2, 3, 4, and 5. The software I used for this study was mostly a bunch of ad-hoc subroutines scattered over numerous ...
  • Maurer, Peter M.
    The Hyper-Linear package is the core of the hyper-linear simulation technique described in Reference 1. Given the specification of a Boolean function, the package will detect all partial and total symmetries and return the ...
  • HyperSim 
    Maurer, Peter M.
    This software package implements the simulation algorithm described in the tech report “Using GF(2) matrices in Simulation and Logic Synthesis” found in this archive. (http://hdl.handle.net/2104/5263). This package is part ...
  • Montañez, George D. (, )
    To accurately measure the amount of information a genetic algorithm can generate, we must first measure the amount of information one can store, using a fitness map. The amount of information generated, minus the storage ...
  • Maurer, Peter M.
    The Inversion Algorithm is an event-driven algorithm, whose performance rivals or exceeds that of Levelized Compiled code simulation, even at activity rates of 50% or more. The Inversion Algorithm has several unique ...
  • Maurer, Peter M.
    The software in this package implements four versions of the Inversion algorithm. Four executable files are produced.These executables are used in much the same way as the FHDL package, but only AND, OR, NAND, NOR, NOT, ...
  • Maurer, Peter M.
    The three files that constitute this tech report are ISCAS85.fhdl.zip, ISCAS85.InputVectors.zip, and ISCAS85.VectorGenerators.zip. The first file contains the 10 ISCAS85 benchmarks in FHDL format, plus the smoke-test circuit ...
  • Maurer, Peter M.
    The .zip file contains each of the ISCAS89 Benchmarks in FHDL format. Also included is a random vector generator file for each circuit. (For what it’s worth.) The generators are written in the DGL language.
  • Arte, Ashish.
    Automated reasoning systems are powerful computer programs capable of solving complex problems. They are characterized as computationally intensive having high performance requirements. Very few reasoning systems have ...
  • Maurer, Peter M.
    We show that any non-singular nxn matrix of order p[superscript n]-1 over GF(p) is a generator of a matrix representation of GF(p[superscript n]). We also determine the number of matrix representations of GF(p[superscript ...
  • Maurer, Peter M.
    Metamorphic programming is an effective tool for creating efficient and elegant solutions to many programming problems, at least once you get over the shock of seeing code that violates many of the accepted rules of good ...
  • Maurer, Peter M.
    Although compiler keywords can be recognized directly in LEX (or flex) these tools are rather slow. MKWHAT is a tool that can be used to generate a keyword recognizer that will recognize key words using a minimal number ...
  • Yao, Yao
    The detailed design document covers the basic theory, related technique, and implementation details of the MovieOracle system. It first provides a high-level system overview. Then it discusses the usage of Twitter API, ...
  • Allen, Jon D. (Jon Douglas) (, )
    Participant-based technologies enable users to contribute resources to a shared pool that in the aggregate provides valuable services, such as social networks, massive multiplayer online games, file exchange, etc. Such ...
  • Maurer, Peter M.
    This report determines the normalizer of the standard representation of Sn in the general linear group of nxn matrices over GF(2). The size of the normalizer is then used to determine the number of classes of conjugate ...
  • Sun, Wuliang.
    There is a need for more rigorous analysis techniques that developers can use for verifying the critical properties in UML models. The UML-based Specification Environment (USE) tool supports verification of invariants, ...

Search BEARdocs


Advanced Search

Browse

My Account

Statistics