19 papers:
- LATA-2014-GwynneK #constraints #on the #satisfiability
- On SAT Representations of XOR Constraints (MG, OK), pp. 409–420.
- DATE-2013-AmaruGM #canonical #logic #novel #synthesis
- Biconditional BDD: a novel canonical BDD for logic synthesis targeting XOR-rich circuits (LGA, PEG, GDM), pp. 1014–1017.
- ICALP-v1-2012-AmbainisBBKOSV #game studies #quantum
- Quantum Strategies Are Better Than Classical in Almost Any XOR Game (AA, AB, KB, DK, RO, JS, MV), pp. 25–37.
- SAT-2012-LaitinenJN #learning
- Conflict-Driven XOR-Clause Learning (TL, TAJ, IN), pp. 383–396.
- CADE-2011-LiuL #morphism #performance #unification
- Efficient General Unification for XOR with Homomorphism (ZL, CL), pp. 407–421.
- CIAA-2009-VuilleminG #automaton #normalisation #regular expression
- Compact Normal Form for Regular Languages as Xor Automata (JV, NG), pp. 24–33.
- RTA-2009-SeidlV #protocol
- Flat and One-Variable Clauses for Single Blind Copying Protocols: The XOR Case (HS, KNV), pp. 118–132.
- SAT-2009-Chen #hybrid #reasoning #satisfiability
- Building a Hybrid SAT Solver via Conflict-Driven, Look-Ahead and XOR Reasoning Techniques (JC), pp. 298–311.
- DATE-2008-PlazaMB #constraints #generative #random #using
- Random Stimulus Generation using Entropy and XOR Constraints (SP, ILM, VB), pp. 664–669.
- ICALP-C-2008-KolesnikovS
- Improved Garbled Circuit: Free XOR Gates and Applications (VK, TS), pp. 486–498.
- TACAS-2007-CortierKS #analysis #automation #security
- Automatic Analysis of the Security of XOR-Based Key Management Schemes (VC, GK, GS), pp. 538–552.
- SAT-2007-GomesHSS #theory and practice
- Short XORs for Model Counting: From Theory to Practice (CPG, JH, AS, BS), pp. 100–106.
- DATE-2006-VandierendonckML #configuration management
- Application-specific reconfigurable XOR-indexing to eliminate cache conflict misses (HV, PM, JDL), pp. 357–362.
- CADE-2005-Steel #api #constraints #deduction #modelling #security
- Deduction with XOR Constraints in Security API Modelling (GS), pp. 322–336.
- LICS-2003-ChevalierKRT #protocol
- An NP Decision Procedure for Protocol Insecurity with XOR (YC, RK, MR, MT), pp. 261–270.
- STOC-1999-SudanTV #generative #pseudo
- Pseudorandom Generators Without the XOR Lemma (Extended Abstract) (MS, LT, SPV), pp. 537–546.
- DAC-1997-YeR #algorithm #graph #network #synthesis
- A Graph-Based Synthesis Algorithm for AND/XOR Networks (YY, KR), pp. 107–112.
- STOC-1997-ImpagliazzoW #exponential
- P = BPP if E Requires Exponential Circuits: Derandomizing the XOR Lemma (RI, AW), pp. 220–229.
- DAC-1992-SarabiP #canonical #network #performance
- Fast Exact and Quasi-Minimal Minimization of Highly Testable Fixed-Polarity AND/XOR Canonical Networks (AS, MAP), pp. 30–35.