Search
Now showing items 71-80 of 1709
Impact Of Body Center Potential On The Electrostatics Of Undoped Body Multi Gate Transistors : A Modeling Perspective
(2010-07-09)
Undoped body multi gate (MG) Metal Oxide Semiconductor Field Effect Transistors (MOSFET) are appearing as replacements for single gate bulk MOSFET in forthcoming sub-45nm technology nodes. It is therefore extremely necessary ...
Joint Congestion Control, Routing And Distributed Link Scheduling In Power Constrained Wireless Mesh Networks
(2010-07-29)
We study the problem of joint congestion control, routing and MAC layer scheduling in multi-hop wireless mesh networks, where the nodes in the network are subjected to energy expenditure rate constraints. As wireless ...
Sub-Threshold Slope Modeling & Gate Alignment Issues In Tunnel Field Effect Transistor
(2010-07-26)
The Tunnel Field Effect Transistor (TFET) with sub-60mV/decade Sub-threshold slope and extremely high ION/IOFF ratio has attracted enough attention for low standby power (LSTP) applications where the battery life is very ...
Resource Allocation in Wireless Networks for Secure Transmission and Utility Maximization
(2018-02-16)
Resource allocation in wireless networks is one of the most studied class of problems. Generally, these problems are formulated as utility maximization problems under relevant constraints. The challenges posed by these ...
Investigation of Electro-thermal and Thermoelectric Properties of Carbon Nanomaterials
(2018-04-06)
Due to the aggressive downscaling of the CMOS technology, power and current densities are increasing inside the chip. The limiting current conduction capacity(106 Acm−2)and thermal conductivity(201Wm−1K−1 for Al and 400 ...
Scaling Context-Sensitive Points-To Analysis
(2014-05-06)
Pointer analysis is one of the key static analyses during compilation. The efficiency of several compiler optimizations and transformations depends directly on the scalability and precision of the underlying pointer analysis. ...
Algorithms For Stochastic Games And Service Systems
(2014-04-23)
This thesis is organized into two parts, one for my main area of research in the field of stochastic games, and the other for my contributions in the area of service systems. We first provide an abstract for my work in ...
Language Support for Exploiting Software Structure Specifications
(Indian Institute of Science, 2005-02-16)
Precise specification of the architecture and design of software is a good practice. Such
specifications contain a lot of information about the software that can potentially be exploited by
tools, to reduce redundancy ...
Image Structures For Steganalysis And Encryption
(2013-10-21)
In this work we study two aspects of image security: improper usage and illegal access of images. In the first part we present our results on steganalysis – protection against improper usage of images. In the second part ...

