• Login
    Search 
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Search
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 31-40 of 76

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100

    Construction of Secure and Efficient Private Set Intersection Protocol 

    Kumar, Vikas (2018-03-17)
    Private set intersection(PSI) is a two party protocol where both parties possess a private set and at the end of the protocol, one party (client) learns the intersection while other party (server) learns nothing. Motivated ...

    Improving the Precision of a Scalable Demand-Driven Null- Dereference Verification for Java 

    Margoor, Amogh (2018-03-19)
    The problem addressed in this thesis is sound, scalable, demand-driven null-dereference verification for Java programs via over-approximated weakest preconditions analysis. The base version of this analysis having been ...

    Parameterized Complexity of Maximum Edge Coloring in Graphs 

    Goyal, Prachi (2018-03-09)
    The classical graph edge coloring problem deals in coloring the edges of a given graph with minimum number of colors such that no two adjacent edges in the graph, get the same color in the proposed coloring. In the following ...

    An Optimizing Code Generator for a Class of Lattice-Boltzmann Computations 

    Pananilath, Irshad Muhammed (2018-03-09)
    Lattice-Boltzmann method(LBM), a promising new particle-based simulation technique for complex and multiscale fluid flows, has seen tremendous adoption in recent years in computational fluid dynamics. Even with a ...

    Optimization Algorithms for Deterministic, Stochastic and Reinforcement Learning Settings 

    Joseph, Ajin George (2018-05-30)
    Optimization is a very important field with diverse applications in physical, social and biological sciences and in various areas of engineering. It appears widely in ma-chine learning, information retrieval, regression, ...

    Incentive Design for Crowdfunding and Crowdsourcing Markets 

    Praphul Chandra, * (2018-05-23)
    With the ever-increasing trend in the number of social interactions getting intermediated by technology (the world wide web) as the backdrop, this thesis focuses on the design of mechanisms for online communities (crowds) ...

    A Refinement-Based Methodology for Verifying Abstract Data Type Implementations 

    Divakaran, Sumesh (2018-06-21)
    This thesis is about techniques for proving the functional correctness of Abstract Data Type (ADT) implementations. We provide a framework for proving the functional correctness of imperative language implementations of ...

    NoC Design & Optimization of Multicore Media Processors 

    Basavaraj, T (2018-03-22)
    Network on Chips[1][2][3][4] are critical elements of modern System on Chip(SoC) as well as Chip Multiprocessor(CMP)designs. Network on Chips (NoCs) help manage high complexity of designing large chips by decoupling ...

    Role of Nonlocality and Counterfactuality in Quantum Cryptography 

    Akshatha Shenoy, H (2018-01-09)
    Quantum cryptography is arguably the most successfully applied area of quantum information theory. In this work, We invsetigate the role of quantum indistinguishability in random number generation, quantum temporal ...

    Fast Actively Secure OT Extension for Short Secrets 

    Ajith, S (2018-05-25)
    Oblivious Transfer (OT) is one of the most fundamental cryptographic primitives with wide-spread application in general secure multi-party computation (MPC) as well as in a number of tailored and special-purpose problems ...
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • . . .
    • 8

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV
     

     

    Browse

    All of etd@IIScCommunities & CollectionsTitlesAuthorsAdvisorsSubjectsBy Thesis Submission DateThis CommunityTitlesAuthorsAdvisorsSubjectsBy Thesis Submission Date

    My Account

    LoginRegister

    Discover

    AuthorAcharya, Aravind N (1)Ajith, S (1)Akshatha Shenoy, H (1)Babu, Jasine (1)Balamurugan, P (1)Balasubramanyam, Rashmi (1)Basavaraj, T (1)Bharadwaj, Subramanya B V (1)Bharat, Patil Tejas (1)Bhaskaracharya, Somashekaracharya G (1)... View MoreSubject
    Computer Science (76)
    Crowdsourcing (4)Graph Algorithms (4)Graph Theory (4)Machine Learning (4)Game Theory (3)Hypergraphs (3)Supervised Learning (3)Bulk Synchronous Parallel (BSP) Model (2)Combinatorial Geometry (2)... View MoreDate Issued
    2018 (76)
    Has File(s)Yes (76)

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV