Browsing Division of Electrical, Electronics, and Computer Science (EECS) by thesis submitted date"2017"
Now showing items 21-40 of 70
-
Efficient Whole Program Path Tracing
(2018-06-14)Obtaining an accurate whole program path (WPP) that captures a program’s runtime behaviour in terms of a control-flow trace has a number of well-known benefits, including opportunities for code optimization, bug detection, ... -
Falcon : A Graph Manipulation Language for Distributed Heterogeneous Systems
(2018-08-20)Graphs model relationships across real-world entities in web graphs, social network graphs, and road network graphs. Graph algorithms analyze and transform a graph to discover graph properties or to apply a computation. ... -
Fast Actively Secure OT Extension for Short Secrets
(2018-05-25)Oblivious Transfer (OT) is one of the most fundamental cryptographic primitives with wide-spread application in general secure multi-party computation (MPC) as well as in a number of tailored and special-purpose problems ... -
Feature Selection under Multicollinearity & Causal Inference on Time Series
(2018-08-20)In this work, we study and extend algorithms for Sparse Regression and Causal Inference problems. Both the problems are fundamental in the area of Data Science. The goal of regression problem is to nd out the \best" ... -
FEM Based Stochastic Analysis of Tolerance in Electromagnetic Periodic Structures
Solution of Maxwell's equations is required to model and analyse electromagnetic behaviour of circuits, components and systems. These equations being partial differ finial equations of vector field quantities with spatial ... -
Fiber Bragg Grating Sensor Based Devices for Novel Biomedical Applications
The present thesis work comprises of design and development of devices based on Fiber Bragg Grating (FBG) sensors for novel biomedical applications. Here, novel packaging methodologies have been utilized for transduction ... -
A Fine-Grained Dynamic Information Flow Analysis for Android Apps
(2018-08-20)Android has been steadily gaining popularity ever since its launch in 2008. One of the major factors for this is the easy availability of a large variety of apps. They range from simple apps such as calculator apps to apps ... -
Frequency Synthesis for Cognitive Radio Receivers and Other Wideband Applications
(2018-05-25)The radio frequency (RF) spectrum as a natural resource is severely under-utilized over time and space due to an inefficient licensing framework. As a result, in-creasing cellular and wireless network usage is placing ... -
Fully Integrated CMOS Transmitter and Power Amplifier for Software-Defined Radios and Cognitive Radios
(2018-05-18)Software Defined Radios (SDRs) and Cognitive Radios (CRs) pave the way for next-generation radio technology. They promise versatility, flexibility and cognition which can revolutionize communications systems. However they ... -
Generalization of Hitting, Covering and Packing Problems on Intervals
(2018-05-29)Interval graphs are well studied structures. Intervals can represent resources like jobs to be sched-uled. Finding maximum independent set in interval graphs would correspond to scheduling maximum number of non-conflicting ... -
Grobuer Basis Algorithms for Polynomial Ideal Theory over Noetherian Commutative Rings
(2018-05-14)One of the fundamental problems in commutative algebra and algebraic geometry is to understand the nature of the solution space of a system of multivariate polynomial equations over a field k, such as real or complex ... -
Heterogeneity Aware Shared DRAM Cache for Integrated Heterogeneous Architectures
Integrated Heterogeneous System (IHS) processors pack throughput-oriented GPGPUs along-side latency-oriented CPUs on the same die sharing certain resources, e.g., shared last level cache, network-on-chip (NoC), and the ... -
High-rate MSR Codes, Interior-point Regenerating Codes, and Codes with Hierarchical Locality
Given the breath-taking pace at which the amount of data being generated on a daily basis is growing, and the keen desire to extract information from this data, there is strong interest within the storage industry, at ... -
An Improved Lower Bound for Depth four Arithmetic Circuits
(2018-05-29)We study the problem of proving lower bounds for depth four arithmetic circuits. Depth four circuits have been receiving much attraction when it comes to recent circuit lower bound results, as a result of the series of ... -
An Improved Lower Bound for Multi-r-ic Depth Four Circuits as a Function of the Number of Input Variables
In this work we study the multi-r-ic formula model introduced by [KS15c] and improve upon the lower bound for multi-r-ic depth four circuits given in [KST16b], when viewed as a function of the number of input variables ... -
Incentive Design for Crowdfunding and Crowdsourcing Markets
(2018-05-23)With the ever-increasing trend in the number of social interactions getting intermediated by technology (the world wide web) as the backdrop, this thesis focuses on the design of mechanisms for online communities (crowds) ... -
Integrated Optic Microring Resonator based Sub-μN force and Force and Acceleration Sensors
Microring resonators have rapidly emerged in the past few years as a new sensing platform for miniaturization of modern integrated optical devices. Ring resonator are having advantages of compactness, stability with ... -
Joint Spectro-Temporal Analysis of Moving Acoustic Sources
Signals generated by fast moving acoustic sources are both challenging for analysis as well as rich in information. The motion is conceptually relative between the source and receiver i.e., either one of them is moving or ... -
Large Scale Graph Processing in a Distributed Environment
(2018-05-25)Graph algorithms are ubiquitously used across domains. They exhibit parallelism, which can be exploited on parallel architectures, such as multi-core processors and accelerators. However, real world graphs are massive in ... -
Lattice Codes for Secure Communication and Secret Key Generation
(2018-05-22)In this work, we study two problems in information-theoretic security. Firstly, we study a wireless network where two nodes want to securely exchange messages via an honest-but-curious bidirectional relay. There is no ...