#### Filter Results:

#### Publication Year

1997

2012

#### Publication Type

#### Co-author

#### Publication Venue

#### Key Phrases

Learn More

For several NP-complete problems, there have been a progression of better but still exponential algorithms. In this paper, we address the relative likelihood of sub-exponential algorithms for these problems. We introduce a generalized reduction that we call Sub-exponential Reduction Family (SERF) that preserves sub-exponential complexity. We show that… (More)

We propose and analyze a simple new randomized algorithm, called ResolveSat, for finding satisfying assignments of Boolean formulas in conjunctive normal form. The algorithm consists of two stages: a preprocessing stage in which resolution is applied to enlarge the set of clauses of the formula, followed by a search stage that uses a simple randomized… (More)

— Ternary Content-Addressable Memories (TCAMs) are becoming very popular for designing high-throughput forwarding engines on routers: they are fast, cost-effective and simple to manage. However, a major drawback of TCAMs is their high power consumption. This paper presents architectures and algorithms for making TCAM-based routing tables more power… (More)

We present and analyze two simple algorithms for finding satisfying assignments of k-CNFs (Boolean formu-lae in conjunctive normal form with at most k liter-als per clause). The first is a randomized algorithm which, with probability approaching 1, finds a satisfying assignment of a satisfiable k-CNF formula F in time O(n2 IF12"-"lk). The second algorithm… (More)

In this paper, we examine algorithms and data structures for the longest prefix match operation required for routing IP packets. Previous work, aimed at hardware implementations, has focused on quantifying worst case lookup time and memory usage. With the advent of fast programmable platforms, whether network processor or PC-based, metrics which look… (More)

A projection is a subset of {0, 1} n given by equations of the form x i = x j , x i = ¯ x j , x i = 0, and x i = 1, where for 1 ≤ i ≤ n, x i are Boolean variables and ¯ x i are their complements. We study monochromatic projections in 2-colorings of an n-dimensional Boolean cube. We also study the dimension of the largest projection contained in a set… (More)

The Optical Transpose Interconnection System (OTIS) proposed by Marsden et al. makes use of free-space optical interconnects to augment an electronic system by adding non-local interconnections. In this paper, we show how these connections can be used to implement a large-scale system with a given network topology using small copies of a similar topology.… (More)

UCSD 5 and InterTrust STAR Lab 2 In digital watermarking also called digital ngerprinting, extra information is embedded imperceptibly into digital content such as an audio track, a still image, or a movie. This extra information can be read by authorized parties, and other users attempting to remove the watermark cannot do so without destroying the value… (More)

— We consider the problem of client assignment in a distributed system of content servers. We present a system called Webmapper for clustering IP addresses and assigning each cluster to an optimal content server. The system is passive in that the only information it uses comes from monitoring the TCP connections between the clients and the servers. It is… (More)