### Table 2. Number of connected components of G with a given number of vertices, after the divide- and-conquer approach has been applied. A size of 0 means that the component is a forced on.

"... In PAGE 13: ...sed in Blanchette et al. 3. Our algorithm first breaks the problem into independent subproblems using the exact algorithm of section 8. As can be seen in Table2 , the original problems are broken into a large number of components, most of which are small enough to be solved by our fractional relaxation procedure. In practice, lpsolve can solve our fractional LPs for connected components of up to 3000 vertices.... ..."

### Table 2: Average performance comparison with [1] algorithm in [1] gate replacement divide-and-conquer

2005

"... In PAGE 4: ... Be- cause their detailed results are not available and to make a fair com- parison, we can only compare the average performance and leakage reduction over the average leakage current of 1,000 random vec- tors. Table2 summerizes the performance improvement in the con- trol point insertion approach [1], our gate replacement algorithm, and the divide-and-conquer approach. Table 2: Average performance comparison with [1] algorithm in [1] gate replacement divide-and-conquer... ..."

Cited by 3

### Table 6. Performance of Divide-and-Conquer Version of Critical POSes Criterion Texts CE_01 CE_02 CE_03 CE_04 CE_05 CE_06 CE_07 CE_08 CE_09 CE_10 Total

"... In PAGE 6: ... The various experimental results are shown in Tables 6-9. From Table6 , we may find the divide-and- conquer approach produces good recall (0.870) and good precision (0.... ..."

### Table 10. Performance of IBM User Manual by Divide-and-Conquer Texts IBM_01 IBM_02 IBM_03 IBM_04 IBM_05 Total

"... In PAGE 8: ... Both divide-and-conquer and simulated annealing are applied. Table10 and Table 11 show the results of these two approaches. Table 10.... In PAGE 9: ... The last two experiments are conducted on different register texts and used to compare with the first four experiments. In general, the proposed critical POSes criterion is independent of search strategies (compare the Table 8 and Table 9) and independent of different register texts (demonstrated by Table10 and Table 11). The proposed criterion is more significant than the length- based criterion (compare Table 7 and Table 8).... ..."

### Table 1. The divide-and-conquer coloring

"... In PAGE 2: ... Note that the colors used in supernodes 00 and 11 could be the same, but cannot be colors A and B. As an example, Table1 shows how this algorithm solves the coloring problem on dB(8, 2) recursively. A node v2v1 represented by the intersection of row v2 and column v1, and the symbol on the intersection is the color of that node.... ..."

### Table 2. The divide-and-conquer algorithms that atsl uses.

"... In PAGE 12: ....5. The Repertoire of Building Blocks. Tables 1 and 2 list the sorting al- gorithms that atsl currently uses as building blocks. Table 1 lists leaf algorithm, and Table2 lists divide-and-conquer compositions. Many of these building blocks are based on existing publicly-available codes.... ..."

### Table 1: Perfomance Results for divide-and-conquer example

1993

"... In PAGE 11: ... We sought a bound on the execution time of the program in a maximally parallel setting given durations for the fork and computation times. Table1 shows the performance of the toolset on several sizes of this example. The columns of the table give the size of the example, the number of tasks, the time required to generate the system of inequalities from the specification, the time to solve the system, the total time, and the size of the system of inequalities (all times are in seconds on a DECstation 5000/125).... ..."

Cited by 6

### Table 8: Statistics for 2D divide-and-conquer Delaunay triangulation of several point sets.

1997

"... In PAGE 48: ... (I have also tried perfect lattices with 53-bit integer coordinates, but ORIENT3D and INSPHERE never pass stage B; the perturbed lattices are preferred here because they occasionally force the predicates into stage C or D.) The results for 2D, which appear in Table8 , indicate that the four-stage predicates add about 8% to the total running time for randomly distributed input points, mainly because of the error bound tests. For the more difficult point sets, the penalty may be as great as 30%.... ..."

Cited by 86

### Table 8: Statistics for 2D divide-and-conquer Delaunay triangulation of several point sets. Timings are

1997

"... In PAGE 50: ... (I have also tried perfect lattices with 53-bit integer coordinates, but ORIENT3D and INSPHERE never pass stage B; the perturbed lattices are preferred here because they occasionally force the predicates into stage C or D.) The results for 2D, which appear in Table8 , indicate that the four-stage predicates add about 8% to the total running time for randomly distributed input points, mainly because of the error bound tests. For the more difficult point sets, the penalty may be as great as 30%.... ..."

Cited by 86

### Table 8: Statistics for 2D divide-and-conquer Delaunay triangulation of several point sets.

1997

"... In PAGE 48: ... (I have also tried perfect lattices with 53-bit integer coordinates, but ORIENT3D and INSPHERE never pass stage B; the perturbed lattices are preferred here because they occasionally force the predicates into stage C or D.) The results for 2D, which appear in Table8 , indicate that the four-stage predicates add about 8% to the total running time for randomly distributed input points, mainly because of the error bound tests. For the more difficult point sets, the penalty may be as great as 30%.... ..."

Cited by 86