• Login
    Search 
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Search
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 321-330 of 559

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100

    MPCLeague: Robust MPC Platform for Privacy-Preserving Machine Learning 

    Ajith, S
    In the modern era of computing, machine learning tools have demonstrated their potential in vital sectors, such as healthcare and finance, to derive proper inferences. The sensitive and confidential nature of the data in ...

    Quantum-Safe Identity-Based Signature Scheme in Multivariate Quadratic Setting 

    Dimri, Akansha
    Cryptographic techniques are essential for the security of communication in modern society. Today, nearly all public key cryptographic schemes used in practice are based on the two problems of factoring large integers and ...

    Enhancing Coverage and Robustness of Database Generators 

    Rajkumar, S
    Generating synthetic databases that capture essential data characteristics of client databases is a common requirement for enterprise database vendors. This need stems from a variety of use-cases, such as application testing ...

    A Syntactic Neural Model For Question Decomposition 

    Gupta, Suman
    Question decomposition along with single-hop Question Answering (QA) system serve as useful modules in developing multi-hop Question Answering systems, mainly because the resulting QA system is interpretable and has been ...

    Learning Invariants for Verification of Programs and Control Systems 

    Ezudheen, P
    Deductive verification techniques in the style of Floyd and Hoare have the potential to give us concise, compositional, and scalable proofs of the correctness of various kinds of software systems like programs and control ...

    On Learning and Lower Bound Problems Related to the Iterated Matrix Multiplication Polynomial 

    Nair, Vineet
    The iterated matrix multiplication polynomial (IMM) of width w and length d is the 1x1 entry in the product of d square matrices of size w. The w^2d entries in the d matrices are distinct variables. In this thesis, we study ...

    Algorithms for Fair Decision Making: Provable Guarantees and Applications 

    Biswas, Arpita
    The topic of fair allocation of indivisible items has received significant attention because of its applicability in several real-world settings. This has led to a vast body of work focusing on defining appropriate fairness ...

    Representing Networks: Centrality, Node Embeddings, Community Outliers and Graph Representation 

    Bandyopadhyay, Sambaran
    Networks are ubiquitous. We start our technical work in this thesis by exploring the classical concept of node centrality (also known as influence measure) in information networks. Like clustering, node centrality is also ...

    Algorithms for Stochastic Optimization, Statistical Estimation and Markov Decision Processes 

    Kamanchi, Chandramouli
    Stochastic approximation deals with the problem of finding zeros of a function expressed as an expectation of a random variable. In this thesis we propose convergent algorithms for problems in optimization, statistical ...

    Embedding Networks: Node and Graph Level Representations 

    Aggarwal, Manasvi
    Graph neural networks gained significant attention for graph representation and classification in the machine learning community. For graph classification, different pooling techniques are introduced, but none of them has ...
    • 1
    • . . .
    • 30
    • 31
    • 32
    • 33
    • 34
    • 35
    • 36
    • . . .
    • 56

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV
     

     

    Browse

    All of etd@IIScCommunities & CollectionsTitlesAuthorsAdvisorsSubjectsBy Thesis Submission DateThis CollectionTitlesAuthorsAdvisorsSubjectsBy Thesis Submission Date

    My Account

    LoginRegister

    Discover

    AuthorAjith, S (2)Arun, R (2)Babu, T Ravindra (2)Bharadwaj, Subramanya B V (2)Dayama, Pankaj (2)Deodhare, Dipti (2)Dubey, Abhishek (2)Dukkipati, Ambedkar (2)Goswami, Asis K (2)Gupta, Nikhil (2)... View MoreSubjectComputer Science (195)TECHNOLOGY (135)Computer and Information Science (28)Machine Learning (24)Game Theory (15)Reinforcement Learning (15)Cryptography (14)Graph Theory (10)Deep Learning (9)Markov Decision Processes (9)... View MoreDate Issued2010 - 2018 (189)2005 - 2009 (49)Has File(s)
    Yes (559)

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV