2012 IEEE 42nd International Symposium on Multiple-Valued Logic

14-16 May 2012

Filter Results

Displaying Results 1 - 25 of 73
  • ISMVL 2012. IEEE 42nd International Symposium on Multiple-Valued Logic [Cover Art]

    Publication Year: 2012, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (457 KB)
    Freely Available from IEEE
  • Proceedings, IEEE 42nd International Symposium on Multiple-Valued Logic. ISMVL 2012 [Title page i]

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (78 KB)
    Freely Available from IEEE
  • Proceedings. IEEE 42nd International Symposium on Multiple-Valued Logic [Title Page iii]

    Publication Year: 2012, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (142 KB)
    Freely Available from IEEE
  • Copyright (c) 2012 by The Institute of Electrical and Electronics Engineers, Inc. All rights reserved. [Copyright notice]

    Publication Year: 2012, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (120 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (158 KB)
    Freely Available from IEEE
  • Welcome from the ISMVL-2012 Symposium Chair

    Publication Year: 2012, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (37 KB) | HTML iconHTML
    Freely Available from IEEE
  • Welcome from the ISMVL-2012 Program Chair

    Publication Year: 2012, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (99 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2012, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (33 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2012, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (31 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2012, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (31 KB)
    Freely Available from IEEE
  • Multiple-Valued Time-Based Architecture for Serial Communication Links

    Publication Year: 2012, Page(s):1 - 6
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (675 KB) | HTML iconHTML

    A new multi-level differential-time-signaling (DTS) architecture for serial communication links is presented in this paper. The proposed system concentrates the transmitted signal energy in a smaller bandwidth than conventional architectures, allowing higher data rates for a given channel, and uses simple circuitry compared to other serial links, resulting in less power consumption and chip area. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Data Transmission Using Multiple-Valued Pulse-Position Modulation

    Publication Year: 2012, Page(s):7 - 12
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2305 KB) | HTML iconHTML

    This paper proposes multiple-valued pulse position modulation (MVPPM) techniques to achieve highly efficient data transmission in VLSI systems. The MVPPM coding employs 2-dimensional information representation in both time and amplitude domain to increase data rates. This time-domain information processing uses timing resolution, and therefore fits well with advanced high-speed low-voltage CMOS pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Systematic Coding Schemes for Low-Power Multiple-Valued Current-Mode Asynchronous Communication Links

    Publication Year: 2012, Page(s):13 - 18
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (251 KB) | HTML iconHTML

    In this paper, we propose two systematic coding schemes for a low-power multiple-valued current-mode (MVCM) asynchronous communication link. The goal of the proposed coding schemes is to realize a low power MVCM asynchronous communication link by reducing the summation of values in codeword which is corresponding to the summation of static current flows in the circuits. The summation of values of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Global Multiple-Valued Clock Approach for High- Performance Multi-phase Clock Integrated Circuits

    Publication Year: 2012, Page(s):19 - 24
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (833 KB) | HTML iconHTML

    Some high performance digital integrated circuits use multi-phase clock distribution systems with level-sensitive latches as clocked storage elements. A set of N periodic non-overlapping binary clock signals propagate over each of the clock phase distribution networks and drive disjoint subsets of level-sensitive latches providing enhanced throughput and performance. This performance enhancement c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building Automated Theorem Provers for Infinitely-Valued Logics with Satisfiability Modulo Theory Solvers

    Publication Year: 2012, Page(s):25 - 30
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (191 KB) | HTML iconHTML

    There is a relatively large number of papers dealing with complexity and proof theory issues of infinitely-valued logics. Nevertheless, little attention has been paid so far to the development of efficient solvers for such logics. In this paper we show how the technology of Satisfiability Modulo Theories (SMT) can be used to build efficient automated theorem provers for relevant infinitely-valued ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Greedy Algorithms, Ordering of Variables, and d-degenerate Instances

    Publication Year: 2012, Page(s):31 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (198 KB) | HTML iconHTML

    We consider the MAX-2-SAT problem on d-degenerate formulas. This class of 2-CNFs is a generalization of 2-CNFs of bounded tree width. We first show that the class of d-degenerate formulas is very broad, since random formulas can be shown to be d-degenerate for an appropriate d. Then we test several heuristic algorithms on random d-degenerate formulas and compare results against similar tests on re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extremely Complex 4-Colored Rectangle-Free Grids: Solution of Open Multiple-Valued Problems

    Publication Year: 2012, Page(s):37 - 44
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (207 KB) | HTML iconHTML

    This paper aims at the rectangle-free coloring of grids using four colors. It has been proven in a well developed theory that there is an upper bound of rectangle-free 4-colorable grids as well as a lower bound of grids for which no rectangle-free color pattern of four colors exist. Between these tight bounds the grids of the size 17×17, 17×18, 18 × 17, and 18 ×18 are l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Formal Verification and Robotic Evolution Techniques to Find Contradictions in Laws Concerning Police Rules of Engagement

    Publication Year: 2012, Page(s):45 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (166 KB) | HTML iconHTML

    There are thousands of laws and regulations in the United States, ranging from the local to the state to the federal level. The sheer number of laws increases the probability that some of these laws may contradict each other. In recent years in the City of Portland, many controversial instances of police officers using force have occurred. In this project we used formal verification and robot prog... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Synthesis of Permutative Quantum Circuits with Toffoli and TISC Gates

    Publication Year: 2012, Page(s):50 - 56
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (382 KB) | HTML iconHTML

    We present a new concept of TISC (2-interval symmetric controlled) quantum per mutative gates and how per mutative quantum circuits with no ancilla bits can be built using a combination of Toffoli and TISC gates. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ESOP-Inspired Synthesis Method for Ternary Permutative Quantum Circuits

    Publication Year: 2012, Page(s):57 - 62
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1697 KB) | HTML iconHTML

    The goal of this paper is to improve synthesis of ternary-input, ternary-output quantum per mutative circuits realized with Muthukrishnan-Stroud (M-S) gates. In [1], quantum ternary circuits are designed based on DSOP (Disjoint Sum of Products) cascades of General Ternary Gates (GTGs). Here, we develop an approach to synthesize quantum ternary circuits that uses non-disjoint groups. Our CAD tool, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Hasse Diagrams to Synthesize Ternary Quantum Circuits

    Publication Year: 2012, Page(s):63 - 68
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (359 KB) | HTML iconHTML

    We present the results of application of Hasse diagrams to the problem of synthesizing ternary quantum circuits represented as input-output mapping vectors. The paper specifically focuses on ternary quantum circuits with relatively large number of variables where valid solutions exist in an exponentially expanding search space. Valid solutions represent the set of all input vector permutations (ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exact Synthesis of Toffoli Gate Circuits with Negative Control Lines

    Publication Year: 2012, Page(s):69 - 74
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (331 KB) | HTML iconHTML

    The development of synthesis approaches for reversible circuits is an active research area. Besides heuristic methods, also exact synthesis received significant attention. Here, circuits realizing the desired functions e.g. with a minimal number of gates are determined. However, so far exact synthesis considering Toffoli gate circuits with positive control lines only has been considered. In this p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two new classification theorems on residuated monoids

    Publication Year: 2012, Page(s):75 - 78
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (163 KB) | HTML iconHTML

    We present two very recent Mostert-Shields style classification theorems on residuated l-monoids along with some related results in sub structural logics. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Non-deterministic Matrices for Semi-canonical Deduction Systems

    Publication Year: 2012, Page(s):79 - 84
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB) | HTML iconHTML

    We use non-deterministic finite-valued matrices to provide uniform effective semantics for a large family of logics, emerging from "well-behaved" sequent systems in which the cut rule and/or the identity-axiom are not present. We exploit this semantics to obtain important proof-theoretic properties of systems of this kind, such as cut-admissibility. Non-determinism is shown to be essential for the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modal Operators on Non-commutative Residuated Lattices

    Publication Year: 2012, Page(s):85 - 88
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (163 KB) | HTML iconHTML

    We prove some fundamental properties of monotone modal operators on (non-commutative) residuated lattices (RL). Moreover we give a simple characterization of pseudo MV-algebras in terms of residuated lattices. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.