• Login
    Search 
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Search
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 271-280 of 559

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100

    IO Pattern Aware Methods to Improve the Performance and Lifetime of NAND SSD 

    Arpith, K
    Modern SSDs can store multiple bits per transistor which enables it to have higher storage capacities. Low cost per bit of such SSDs has made it a commercial success. As of 2018, cells with an ability to store three bits ...

    Algorithms for Multilingual IR in Low Resource Languages using Weakly Aligned Corpora 

    Tholpadi, Goutham
    Multilingual information retrieval (MLIR) methods generally rely on linguistic resources such as dictionaries, parallel corpora, etc., to overcome the language barrier. For low resource languages without these resources, ...

    Integrating Read-Copy-Update Synchronization and Memory Allocation 

    Prasad, Aravinda
    The evolution of multicore systems with thousands of cores has led to the exploration of non-traditional procrastination-based synchronization techniques such as Read-Copy- Update (RCU). Deferred destruction is the ...

    Optimizing Dense Matrix Computations with PolyMage 

    Kumudha, K N
    Linear algebra computations and other arbitrary affine accesses are ubiquitous in applications from domains like scientific computing, digital signal processing (DSP), and deep neural networks. Libraries such as OpenBLAS, ...

    Algorithms for Fair Clustering 

    Allabadi, Swati
    Many decisions today are taken by various machine learning algorithms, hence it is crucial to accommodate fairness in such algorithms to remove/reduce any kind of bias in the decision. We incorporate fairness in the ...

    Neural Models for Personalized Recommendation Systems with External Information 

    Vijaikumar, M
    Personalized recommendation systems use the data generated by user-item interactions (for example, in the form of ratings) to predict different users interests in available items and recommend a set of items or products ...

    On symmetries of and equivalence tests for two polynomial families and a circuit class 

    Gupta, Nikhil
    Two polynomials f, g ∈ F[x1, . . . , xn] over a field F are said to be equivalent if there exists an n×n invertible matrix A over F such that g = f(Ax), where x = (x1 · · · xn)T . The equivalence test (in short, ET) for ...

    Neural Approaches for Natural Language Query Answering over Source Code 

    Mandal, Madhurima
    During software development, developers need to ensure that the developed code is bug-free and the best coding practices are followed during the code development process. To guarantee this, the developers require answers ...

    Model-based Safe Deep Reinforcement Learning and Empirical Analysis of Safety via Attribution 

    Jayant, Ashish
    During initial iterations of training in most Reinforcement Learning (RL) algorithms, agents perform a significant number of random exploratory steps, which in the real-world limit the practicality of these algorithms ...

    An Evaluation of Basic Protection Mechanisms in Financial Apps on Mobile Devices 

    Agrawal, Nikhil
    This thesis concerns the robustness of security checks in financial mobile applications (or simply financial apps). The best practices recommended by OWASP for developing such apps demand that developers include several ...
    • 1
    • . . .
    • 25
    • 26
    • 27
    • 28
    • 29
    • 30
    • 31
    • . . .
    • 56

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV
     

     

    Browse

    All of etd@IIScCommunities & CollectionsTitlesAuthorsAdvisorsSubjectsBy Thesis Submission DateThis CollectionTitlesAuthorsAdvisorsSubjectsBy Thesis Submission Date

    My Account

    LoginRegister

    Discover

    AuthorAjith, S (2)Arun, R (2)Babu, T Ravindra (2)Bharadwaj, Subramanya B V (2)Dayama, Pankaj (2)Deodhare, Dipti (2)Dubey, Abhishek (2)Dukkipati, Ambedkar (2)Goswami, Asis K (2)Gupta, Nikhil (2)... View MoreSubjectComputer Science (195)TECHNOLOGY (135)Computer and Information Science (28)Machine Learning (24)Game Theory (15)Reinforcement Learning (15)Cryptography (14)Graph Theory (10)Deep Learning (9)Markov Decision Processes (9)... View MoreDate Issued2010 - 2018 (189)2005 - 2009 (49)Has File(s)
    Yes (559)

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV