• Login
    Search 
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Search
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 51-60 of 189

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100

    Two Player Game Variant Of The Erdos Szekeres Problem 

    Parikshit, K (2014-08-01)
    The following problem has been known for its beauty and elementary character. The Erd˝os Szekeres problem[7]: For any integer k ≥ 3, determine if there exists a smallest positive integer N(k) such that any set of atleast ...

    Feature Adaptation Algorithms for Reinforcement Learning with Applications to Wireless Sensor Networks And Road Traffic Control 

    Prabuchandran, K J (2017-09-20)
    Many sequential decision making problems under uncertainty arising in engineering, science and economics are often modelled as Markov Decision Processes (MDPs). In the setting of MDPs, the goal is to and a state dependent ...

    Weighted Average Based Clock Synchronization Protocols For Wireless Sensor Networks 

    Swain, Amulya Ratna (2016-07-12)
    Wireless Sensor Networks (WSNs) consist of a large number of resource constrained sensor nodes equipped with various sensing devices which can monitor events in the real world. There are various applications such as ...

    Model-Checking Infinite-State Systems For Information Flow Security Properties 

    Raghavendra, K R (2017-02-16)
    Information flow properties are away of specifying security properties of systems ,dating back to the work of Goguen and Meseguer in the eighties. In this framework ,a system is modeled as having high-level (or confidential)events ...

    Access Path Based Dataflow Analysis For Sequential And Concurrent Programs 

    Arnab De, * (2016-09-14)
    In this thesis, we have developed a flow-sensitive data flow analysis framework for value set analyses for Java-like languages. Our analysis frame work is based on access paths—a variable followed by zero or more field ...

    Automatic Data Allocation, Buffer Management And Data Movement For Multi-GPU Machines 

    Ramashekar, Thejas (2017-05-24)
    Multi-GPU machines are being increasingly used in high performance computing. These machines are being used both as standalone work stations to run computations on medium to large data sizes (tens of gigabytes) and as a ...

    Multi-label Classification with Multiple Label Correlation Orders And Structures 

    Posinasetty, Anusha (2018-06-18)
    Multilabel classification has attracted much interest in recent times due to the wide applicability of the problem and the challenges involved in learning a classifier for multilabeled data. A crucial aspect of multilabel ...

    Computational And Combinatorial Problems On Some Geometric Proximity Graphs 

    Khopkar, Abhijeet (2017-05-24)
    In this thesis, we focus on the study of computational and combinatorial problems on various geometric proximity graphs. Delaunay and Gabriel graphs are widely studied geometric proximity structures. These graphs have been ...

    Retweet Profiling - Study Dissemination of Twitter Messages 

    Rangnani, Soniya (2017-09-23)
    Social media has become an important means of everyday communication. It is a mechanism for “sharing” and “resharing” of information. While social network platforms provide the means to users for resharing/reblogging (aka ...

    Provable Methods for Non-negative Matrix Factorization 

    Pani, Jagdeep (2017-10-31)
    Nonnegative matrix factorization (NMF) is an important data-analysis problem which concerns factoring a given d n matrix A with nonnegative entries into matrices B and C where B and C are d k and k n with nonnegative ...
    • 1
    • . . .
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • . . .
    • 19

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV
     

     

    Browse

    All of etd@IIScCommunities & CollectionsTitlesAuthorsAdvisorsSubjectsBy Thesis Submission DateThis CollectionTitlesAuthorsAdvisorsSubjectsBy Thesis Submission Date

    My Account

    LoginRegister

    Discover

    AuthorArun, R (2)Bharadwaj, Subramanya B V (2)Ranganath, B N (2)Ravindar, Archana (2)Srikanth, Cherukupally (2)Tudu, Jaynarayan Thakurdas (2)Abdulla, Mohammed Shahid (1)Acharya, Aravind N (1)Adiga, Abhijin (1)Agrawal, Akanksha (1)... View MoreSubjectComputer Science (158)Machine Learning (14)Game Theory (9)Graph Theory (8)Algorithms (6)Computational Geometry (6)Crowdsourcing (6)Cubicity (5)Reinforcement Learning (5)Boxicity (4)... View MoreDate Issued2018 (76)2017 (22)2011 (20)2013 (18)2012 (16)2010 (15)2014 (14)2015 (5)2016 (3)Has File(s)Yes (189)

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV