• Login
    Search 
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Search
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 1-10 of 15

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100

    Compiler-Assisted Energy Optimization For Clustered VLIW Processors 

    Nagpal, Rahul (2010-04-13)
    Clustered architecture processors are preferred for embedded systems because centralized register file architectures scale poorly in terms of clock rate, chip area, and power consumption. Although clustering helps by ...

    Computational Protein Structure Analysis : Kernel And Spectral Methods 

    Bhattacharya, Sourangshu (2010-08-24)
    The focus of this thesis is to develop computational techniques for analysis of protein structures. We model protein structures as points in 3-dimensional space which in turn are modeled as weighted graphs. The problem of ...

    Conflict-Tolerant Features 

    Gopinathan, Madhu (2010-12-07)
    Large, software intensive systems are typically developed using a feature oriented development paradigm in which feature specifications are derived from domain requirements and features are implemented to satisfy such ...

    Compiler Assisted Energy Management For Sensor Network Nodes 

    Jindal, Prachee (2010-08-16)
    Emerging low power, embedded, wireless sensor devices are useful for wide range of applications, yet have very limited processing storage and especially energy resources. Sensor networks have a wide variety of applications ...

    Efficient Frequent Closed Itemset Algorithms With Applications To Stream Mining And Classification 

    Ranganath, B N (2010-08-24)
    Data mining is an area to find valid, novel, potentially useful, and ultimately understandable abstractions in a data. Frequent itemset mining is one of the important data mining approaches to find those abstractions in ...

    The Isoperimetric Problem On Trees And Bounded Tree Width Graphs 

    Bharadwaj, Subramanya B V (2010-08-26)
    In this thesis we study the isoperimetric problem on trees and graphs with bounded treewidth. Let G = (V,E) be a finite, simple and undirected graph. For let δ(S,G)= {(u,v) ε E : u ε S and v ε V – S }be the edge boundary ...

    Large Scale Implementation Of The Block Lanczos Algorithm 

    Srikanth, Cherukupally (2010-08-16)
    Large sparse matrices arise in many applications, especially in the major problems of Cryptography of factoring integers and computing discrete logarithms. We focus attention on such matrices called sieve matrices generated ...

    Simulation Based Algorithms For Markov Decision Process And Stochastic Optimization 

    Abdulla, Mohammed Shahid (2010-08-06)
    In Chapter 2, we propose several two-timescale simulation-based actor-critic algorithms for solution of infinite horizon Markov Decision Processes (MDPs) with finite state-space under the average cost criterion. On the ...

    Recovery From DoS Attacks In MIPv6 : Modelling And Validation 

    Kumar, Manish C (2010-07-26)
    Denial-of-Service (DoS) attacks form a very important category of security threats that are possible in MIPv6 (Mobile Internet Protocol version 6). This thesis proposes a scheme for participants (Mobile Node, Home Agent, ...

    Using Explicit State Space Enumeration For Specification Based Regression Testing 

    Chakrabarti, Sujit Kumar (2010-07-08)
    Regression testing of an evolving software system may involve significant challenges. While, there would be a requirement of maximising the probability of finding out if the latest changes to the system has broken some ...
    • 1
    • 2

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV
     

     

    Browse

    All of etd@IIScCommunities & CollectionsTitlesAuthorsAdvisorsSubjectsBy Thesis Submission DateThis CollectionTitlesAuthorsAdvisorsSubjectsBy Thesis Submission Date

    My Account

    LoginRegister

    Discover

    AuthorAbdulla, Mohammed Shahid (1)Bharadwaj, Subramanya B V (1)Bhattacharya, Sourangshu (1)Chakrabarti, Sujit Kumar (1)Gopinathan, Madhu (1)Jagarlapudi, Saketha Nath (1)Jindal, Prachee (1)Kodancha, A Hariprasad (1)Kumar, Manish C (1)Nagpal, Rahul (1)... View MoreSubjectComputer Science (12)Algorithms (2)Classification - Algorithms (2)Energy Optimization (2)Machine Learning (2)Accelerators (1)Algorithms (Computer Science) (1)API Libraries - Regression Testing (1)Application Programming Interface (1)ARINC-653 (1)... View MoreDate Issued
    2010 (15)
    Has File(s)Yes (15)

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV