[PDF][PDF] SymPy: symbolic computing in Python

A Meurer, CP Smith, M Paprocki, O Čertík… - PeerJ Computer …, 2017‏ - peerj.com
SymPy is an open source computer algebra system written in pure Python. It is built with a
focus on extensibility and ease of use, through both interactive and programmatic …

[HTML][HTML] Explainable AI insights for symbolic computation: a case study on selecting the variable ordering for cylindrical algebraic decomposition

L Pickering, T del Río Almajano, M England… - Journal of Symbolic …, 2024‏ - Elsevier
In recent years there has been increased use of machine learning (ML) techniques within
mathematics, including symbolic computation where it may be applied safely to optimise or …

Closed forms: what they are and why we care

JM Borwein, RE Crandall - Notices of the AMS, 2013‏ - ams.org
Closed Forms: What They Are Mathematics abounds in terms that are in frequent use yet are
rarely made precise. Two such are rigorous proof and closed form (absent the technical use …

RTLRewriter: Methodologies for Large Models aided RTL Code Optimization

X Yao, Y Wang, X Li, Y Lian, R Chen, L Chen… - arxiv preprint arxiv …, 2024‏ - arxiv.org
Register Transfer Level (RTL) code optimization is crucial for enhancing the efficiency and
performance of digital circuits during early synthesis stages. Currently, optimization relies …

Applying machine learning to the problem of choosing a heuristic to select the variable ordering for cylindrical algebraic decomposition

Z Huang, M England, D Wilson, JH Davenport… - … Conference, CICM 2014 …, 2014‏ - Springer
Cylindrical algebraic decomposition (CAD) is a key tool in computational algebraic
geometry, particularly for quantifier elimination over real-closed fields. When using CAD …

Defeating mba-based obfuscation

N Eyrolles, L Goubin, M Videau - … of the 2016 ACM Workshop on …, 2016‏ - dl.acm.org
Mixed Boolean-Arithmetic expressions are presented as a strong protection in the context of
data flow obfuscation. As there is very little literature on the analysis of such obfuscated …

Obfuscation with Mixed Boolean-Arithmetic Expressions: reconstruction, analysis and simplification tools

N Eyrolles - 2017‏ - theses.hal.science
Software obfuscation is a software protection technique thattransforms code in order to make
its analysis more difficult. MixedBoolean-Arithmetic (MBA) expressions are presented as a …

Algorithmically generating new algebraic features of polynomial systems for machine learning

D Florescu, M England - arxiv preprint arxiv:1906.01455, 2019‏ - arxiv.org
There are a variety of choices to be made in both computer algebra systems (CASs) and
satisfiability modulo theory (SMT) solvers which can impact performance without affecting …

Using machine learning to improve cylindrical algebraic decomposition

Z Huang, M England, DJ Wilson, J Bridge… - … in Computer Science, 2019‏ - Springer
Abstract Cylindrical Algebraic Decomposition (CAD) is a key tool in computational algebraic
geometry, best known as a procedure to enable Quantifier Elimination over real-closed …

Constrained neural networks for interpretable heuristic creation to optimise computer algebra systems

D Florescu, M England - International Congress on Mathematical Software, 2024‏ - Springer
We present a new methodology for utilising machine learning technology in symbolic
computation research. We explain how a well known human-designed heuristic to make the …