33rd International Symposium on Multiple-Valued Logic, 2003. Proceedings.
DOI: 10.1109/ismvl.2003.1201426
|View full text |Cite
|
Sign up to set email alerts
|

Fast algorithm for computing spectral transforms of Boolean and multiple-valued functions on circuit representation

Abstract: In this paper we present a fast algorithm for computing the value of a spectral transform of Boolean or multiplevalued functions for a given assignment of input variables. Our current implementation is for arithmetic transform, because our work is primarily aimed at optimizing the performance of probabilistic verification methods. However, the presented technique is equally applicable for other discrete transforms, e.g. Walsh or Reed-Muller transforms. Previous methods for computing spectral transforms used tr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(17 citation statements)
references
References 20 publications
0
17
0
Order By: Relevance
“…As discussed above, the brute-for Parker and McCluskey [12] genera polynomial, which might grow expo as shown in [16], by using effic packages to represent the Boole medium size circuits, this approac complete BDD-based circuit repres that every BDD-path is evaluated in signal probability of the circuit, th simply added.…”
Section: A Related Workmentioning
confidence: 99%
“…As discussed above, the brute-for Parker and McCluskey [12] genera polynomial, which might grow expo as shown in [16], by using effic packages to represent the Boole medium size circuits, this approac complete BDD-based circuit repres that every BDD-path is evaluated in signal probability of the circuit, th simply added.…”
Section: A Related Workmentioning
confidence: 99%
“…As an alternative, in 21 an algorithm for computing the arithmetic transform directly on a circuit representation was presented. This algorithm uses an extension of the classical Lengauer-Tarjan algorithm for finding dominators 22 to determine correlations between nodes of the circuit due to re-convergent fan-outs.…”
Section: Computing Arithmetic Transformmentioning
confidence: 99%
“…We get It is important to point out that, during the computation of hash values, e.g. by the algorithm, 21 the intermediate results will be hash values of some functions of up to n variables computed for the perfect input assignment. Therefore, the intermediate results can only be multiples of δ n and can be represented as k · δ n as well, where k ∈ {0, 1,...,2 2 n − 1}.…”
Section: Proof: By Induction On Nmentioning
confidence: 99%
“…Past work in the direct computation of a spectrum from a netlist includes that reported in [10] [11]. In [10] a method was described that allowed for a single spectral coefficient to be obtained but required augmenting the structure of a netlist and then traversing it for each spectral coefficient.…”
Section: Introductionmentioning
confidence: 99%
“…In [10] a method was described that allowed for a single spectral coefficient to be obtained but required augmenting the structure of a netlist and then traversing it for each spectral coefficient. In [11] a method was described where spectral coefficients can be obtained directly from a netlist, however the resulting coefficients are based upon a specific variable assignment. Here, a method for computation of the spectrum by traversing a structural netlist representation without modifying the netlist or performing a specific variable assignment is developed.…”
Section: Introductionmentioning
confidence: 99%