• Login
    Search 
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Search
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 11-20 of 22

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100

    Learning with Complex Performance Measures : Theory, Algorithms and Applications 

    Narasimhan, Harikrishna (2017-12-07)
    We consider supervised learning problems, where one is given objects with labels, and the goal is to learn a model that can make accurate predictions on new objects. These problems abound in applications, ranging from ...

    Efficient Key Management, and Intrusion Detection Protocols for Enhancing Security in Mobile Ad Hoc Networks 

    Maity, Soumyadev (2017-11-24)
    Security of communications is a major requirement for Mobile Adhoc NETworks(MANETs) since they use wireless channel for communications which can be easily tapped, and physical capture of MANET nodes is also quite easy. ...

    Identifying Method Memoization Opportunities in Java Programs 

    Chugh, Pallavi (2017-12-13)
    Memorization of a method is a commonly used re-factoring wherein developer modules the code of a method to save return values for some or all incoming parameter values. Whenever a parameter-tuple is received for the second ...

    Resolving the Complexity of Some Fundamental Problems in Computational Social Choice 

    Dey, Palash (2017-12-16)
    In many real world situations, especially involving multiagent systems and artificial intelligence, participating agents often need to agree upon a common alternative even if they have differing preferences over the available ...

    Semantic Analysis of Web Pages for Task-based Personal Web Interactions 

    Manjunath, Geetha (2017-11-27)
    Mobile widgets now form a new paradigm of simplified web. Probably, the best experience of the Web is when a user has a widget for every frequently executed task, and can execute it anytime, anywhere on any device. However, ...

    Precise Analysis of Private And Shared Caches for Tight WCET Estimates 

    Nagar, Kartik (2017-10-31)
    Worst Case Execution Time (WCET) is an important metric for programs running on real-time systems, and finding precise estimates of a program’s WCET is crucial to avoid over-allocation and wastage of hardware resources and ...

    Plan Bouquets : An Exploratory Approach to Robust Query Processing 

    Dutt, Anshuman (2017-09-26)
    Over the last four decades, relational database systems, with their mathematical basis in first-order logic, have provided a congenial and efficient environment to handle enterprise data during its entire life cycle of ...

    Variants of Hegselmann-Krause Model 

    Shiragur, Kirankumar Shivanand (2017-12-04)
    The Hegselmann-Krause system (HK system for short) is one of the most popular models for the dynamics of opinion formation in multi agent systems. Agents are modeled as points in opinion space, and at every time step, each ...

    Delaunay Graphs for Various Geometric Objects 

    Agrawal, Akanksha (2017-12-12)
    Given a set of n points P ⊂ R2, the Delaunay graph of P for a family of geometric objects C is a graph defined as follows: the vertex set is P and two points p, p' ∈ P are connected by an edge if and only if there exists ...

    A GPU Accelerated Tensor Spectral Method for Subspace Clustering 

    Pai, Nithish (2017-11-30)
    In this thesis we consider the problem of clustering the data lying in a union of subspaces using spectral methods. Though the data generated may have high dimensionality, in many of the applications, such as motion ...
    • 1
    • 2
    • 3

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV
     

     

    Browse

    All of etd@IIScCommunities & CollectionsTitlesAuthorsAdvisorsSubjectsBy Thesis Submission DateThis CollectionTitlesAuthorsAdvisorsSubjectsBy Thesis Submission Date

    My Account

    LoginRegister

    Discover

    AuthorAgrawal, Akanksha (1)Bandishti, Vinayaka Prakasha (1)Chugh, Pallavi (1)Dey, Palash (1)Dutt, Anshuman (1)Kamala, R (1)Khopkar, Abhijeet (1)Laha, Anirban (1)Maity, Soumyadev (1)Manjunath, Geetha (1)... View MoreSubjectComputer Science (18)Computational Geometry (3)Bipartite Ranking (2)Geometric Objects (2)Reinforcement Learning (2)Sensor Networks (2)Access Control Models (1)Adaptive Labor Staffing (1)Adaptive Sleep–wake Control (1)Affine Loop Nests (1)... View MoreDate Issued
    2017 (22)
    Has File(s)
    Yes (22)

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV