Results 1  10
of
43
Symbolic Boolean manipulation with ordered binarydecision diagrams
 ACM Computing Surveys
, 1992
"... Ordered BinaryDecision Diagrams (OBDDS) represent Boolean functions as directed acyclic graphs. They form a canonical representation, making testing of functional properties such as satmfiability and equivalence straightforward. A number of operations on Boolean functions can be implemented as grap ..."
Abstract

Cited by 894 (13 self)
 Add to MetaCart
Ordered BinaryDecision Diagrams (OBDDS) represent Boolean functions as directed acyclic graphs. They form a canonical representation, making testing of functional properties such as satmfiability and equivalence straightforward. A number of operations on Boolean functions can be implemented as graph algorithms on OBDD
On the complexity of VLSI implementations and graph representations of Boolean functions with application to integer multiplication
 IEEE Transactions on Computers
, 1991
"... ..."
Lower Bounds for Deterministic and Nondeterministic Branching Programs
 in Proceedings of the FCT'91, Lecture Notes in Computer Science
, 1991
"... We survey lower bounds established for the complexity of computing explicitly given Boolean functions by switchingandrectifier networks, branching programs and switching networks. We first consider the unrestricted case and then proceed to various restricted models. Among these are monotone networ ..."
Abstract

Cited by 57 (4 self)
 Add to MetaCart
We survey lower bounds established for the complexity of computing explicitly given Boolean functions by switchingandrectifier networks, branching programs and switching networks. We first consider the unrestricted case and then proceed to various restricted models. Among these are monotone networks, boundedwidth devices , oblivious devices and readk times only devices. 1 Introduction The main goal of the Boolean complexity theory is to prove lower bounds on the complexity of computing "explicitly given" Boolean functions in interesting computational models. By "explicitly given" researchers usually mean "belonging to the class NP ". This is a very plausible interpretation since on the one hand this class contains the overwhelming majority of interesting Boolean functions and on the other hand it is small enough to prevent us from the necessity to take into account counting arguments. To illustrate the second point, let me remind the reader that already the class \Delta p 2 ,...
Boolean Expression Diagrams
, 1997
"... This paper presents a new data structure called Boolean Expression Diagrams (BEDs) for representing and manipulating Boolean functions. BEDs are a generalization of Binary Decision Diagrams (BDDs) which can represent any Boolean circuit in linear space and still maintain many of the desirable proper ..."
Abstract

Cited by 46 (5 self)
 Add to MetaCart
This paper presents a new data structure called Boolean Expression Diagrams (BEDs) for representing and manipulating Boolean functions. BEDs are a generalization of Binary Decision Diagrams (BDDs) which can represent any Boolean circuit in linear space and still maintain many of the desirable properties of BDDs. Two algorithms are described for transforming a BED into a reduced ordered BDD. One is a generalized version of the BDD applyoperator while the other can exploit the structural information of the Boolean expression. This ability is demonstrated by verifying that two di erent circuit implementations of a 16bit multiplier implement the same Boolean function. Using BEDs, this veri cation problem is solved in less than a second, while using standard BDD techniques this problem is infeasible. Generally, BEDs are useful in applications, for example tautology checking, where the endresult as a reduced ordered BDD is small.
TimeSpace Tradeoffs for Branching Programs
, 1999
"... We obtain the first nontrivial timespace tradeoff lower bound for functions f : {0, 1}^n → {0, 1} on general branching programs by exhibiting a Boolean function f that requires exponential size to be computed by any branching program of length (1 + ε)n, for some constant & ..."
Abstract

Cited by 43 (2 self)
 Add to MetaCart
We obtain the first nontrivial timespace tradeoff lower bound for functions f : {0, 1}^n &rarr; {0, 1} on general branching programs by exhibiting a Boolean function f that requires exponential size to be computed by any branching program of length (1 + &epsilon;)n, for some constant &epsilon; > 0. We also give the first separation result between the syntactic and semantic readk models [BRS93] for k > 1 by showing that polynomialsize semantic readtwice branching programs can compute functions that require exponential size on any syntactic readk branching program. We also show...
How Many Decomposition Types Do We Need
 In European Design and Test Conference (EDTC
, 1995
"... Decision Diagrams (DDs) are used in many applications in CAD. Various types of DDs, e.g. BDDs, FDDs, KFDDs, di er by their decomposition types. In this paper we investigate the di erent decomposition types and prove that there are only three that really help to reduce the size of DDs. 1 ..."
Abstract

Cited by 22 (6 self)
 Add to MetaCart
Decision Diagrams (DDs) are used in many applications in CAD. Various types of DDs, e.g. BDDs, FDDs, KFDDs, di er by their decomposition types. In this paper we investigate the di erent decomposition types and prove that there are only three that really help to reduce the size of DDs. 1
Two lower bounds for branching programs
, 1986
"... The first result concerns branching programs having width (log n) °{*). We give an fl(n log n ~ log log n) lower bound for the size of such branching programs computing almost any symmetric Boolean function and in particular the following explicit function: "the sum of the input variables is a ..."
Abstract

Cited by 19 (1 self)
 Add to MetaCart
The first result concerns branching programs having width (log n) °{*). We give an fl(n log n ~ log log n) lower bound for the size of such branching programs computing almost any symmetric Boolean function and in particular the following explicit function: "the sum of the input variables is a quadratic residue mod p " where p is any given prime between n 1/4 and n 1/3. This is a strengthening of previous nonlinear lower bounds obtained by Chandra, Furst, Lipton and by Pudlak. We mention that by iterating our method the result can be further strengthened to lfl(nlog n). The second result is a C " lower bound for readonceonly branching programs computing an explicit Boolean function. For n = (~), the function computes the parity of the number of triangles in a graph on v vertices. This improves previous exp(cx/n) lower bounds for other graph functions by Wegener and Z£k. The result implies a linear lower bound for the space complexity of this Boolean function on "eraser machines", i.e. machines that erase each input bit immediately after having read it.
Neither Reading Few Bits Twice nor Reading Illegaly Helps Much
 Discrete Appl. Math
, 1996
"... We first consider socalled (1; +s)branching programs in which along every consistent path at most s variables are tested more than once. We prove that any such program computing a characteristic function of a linear code C has size at least 2\Omega\Gamma2/1 , where d 1 and d 2 are the minim ..."
Abstract

Cited by 19 (7 self)
 Add to MetaCart
We first consider socalled (1; +s)branching programs in which along every consistent path at most s variables are tested more than once. We prove that any such program computing a characteristic function of a linear code C has size at least 2\Omega\Gamma2/1 , where d 1 and d 2 are the minimal distances of C and its dual C : We apply this criterion to explicit linear codes and obtain a superpolynomial lower bound for s = o(n= log n): Then we introduce a natural generalization of readktimes and (1; +s) branching programs that we call semantic branching programs. These programs correspond to corrupting Turing machines which, unlike eraser machines, are allowed to read input bits even illegally, i.e. in excess of their quota on multiple readings, but in that case they receive in response an unpredictably corrupted value. We generalize the abovementioned bound to the semantic case, and also prove exponential lower bounds for semantic readonce nondeterministic branching programs.
Compilation for Critically Constrained Knowledge Bases
 In Proc. of the 13 th National Conference on Artificial Intelligence (AAAI’96
, 1996
"... We show that many "critically constrained" Random 3SAT knowledge bases (KBs) can be compiled into disjunctive normal form easily by using a variant of the "DavisPutnam" proof procedure. From these compiled KBs we can answer all queries about entailment of conjunctive normal form ..."
Abstract

Cited by 16 (0 self)
 Add to MetaCart
We show that many "critically constrained" Random 3SAT knowledge bases (KBs) can be compiled into disjunctive normal form easily by using a variant of the "DavisPutnam" proof procedure. From these compiled KBs we can answer all queries about entailment of conjunctive normal formulas, also easily  compared to a "bruteforce " approach to approximate knowledge compilation into unit clauses for the same KBs. We exploit this fact to develop an aggressive hybrid approach which attempts to compile a KB exactly until a given resource limit is reached, then falls back to approximate compilation into unit clauses. The resulting approach handles all of the critically constrained Random 3SAT KBs with average savings of an order of magnitude over the bruteforce approach. Introduction Consider the task of reasoning from a propositional knowledge base (KB) F which is expressed as a conjunctive normal formula (CNF). We are given other, query CNFs Q 1 ; Q 2 ; : : : ; QN and asked, for each Q i ,...
A Large Lower Bound For 1Branching Programs
, 1996
"... Branching programs (b. p.'s) or decision diagrams are a general graphbased model of sequential computation. B.p.'s of polynomial size are a nonuniform counterpart of LOG. ..."
Abstract

Cited by 12 (2 self)
 Add to MetaCart
Branching programs (b. p.'s) or decision diagrams are a general graphbased model of sequential computation. B.p.'s of polynomial size are a nonuniform counterpart of LOG.