Author:
Qin Ying,Shen Xiao Yang,Du Zhen Yue
Publisher
Springer International Publishing
Reference27 articles.
1. Davis, M., Putnam, H.: A computing procedure for quantification theory. J. ACM 7(3), 201–215 (1960)
2. Hachtel, G., Somenzi, F.: Logic Synthesis and Verification Algorithms, vol. I-XXIII, pp. 1–564. Springer, Heidelberg (2006)
3. Lecture Notes in Computer Science;E Clarke,2000
4. Lecture Notes in Computer Science;M Soos,2009
5. Lecture Notes in Computer Science;AEJ Hyvärinen,2011
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Attack on a Scheme for Obfuscating and Outsourcing SAT Computations to the Cloud;Proceedings of the 16th International Joint Conference on e-Business and Telecommunications;2019
2. Solution Space Adjustable CNF Obfuscation for Privacy-Preserving SAT Solving;2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications (ISPA/IUCC/BDCloud/SocialCom/SustainCom);2018-12