Browsing by Title
Now showing items 4850-4869 of 8778
-
Near Optimal Non-malleable Codes and Leakage Resilient Secret Sharing Schemes
A well-studied class of attacks on cryptosystems called "side-channel attacks", stems from the additional access that an adversary can get due to the susceptibility of the hardware on which the cryptosystem (e.g., digital ... -
Near-Duplicate Detection Using Instance Level Constraints
(2011-08-09)For the task of near-duplicate document detection, comparison approaches based on bag-of-words used in information retrieval community are not sufficiently accurate. This work presents novel approach when instance-level ... -
Nega-base computer arithemetic-theory and applications
This dissertation presents a detailed study of negative base number representation—the theory as well as the development of suitable algorithms for building the arithmetic unit of a digital computer. The idea of negative ... -
Negotiator Initiated Connectivity Restoration in Partitioned Wireless Sensor Networks
Wireless Sensor Networks (WSN) are groups of sensors, connected by communication links, spread over the area of interest, to perform a specific task. The network may get partitioned into clusters due to unanticipated ... -
Neighborhood based algorithms for network problems
This thesis presents novel techniques for designing efficient algorithms to solve various graph problems, with a focus on both sequential and parallel computation models. The key contributions include: An O(dm)O(dm)O(dm) ... -
Network Centrality Measures And Their Applications
(2014-03-03)Study of complex networks by researchers from many disciplines has provided penetrating insights on various complex systems. A study of the world wide web from a network theoretic perspective has led to the design of new ... -
Network Coding for Wirless Relaying and Wireline Networks
(2017-12-10)Network coding has emerged as an attractive alternative to routing because of the through put improvement it provides by reducing the number of channel uses. In a wireless scenario, in addition, further improvement can be ... -
Network Heterogeneities, Intrinsic Plasticity and Decorrelation in the Dentate Gyrus
A central premise for research in neuroscience is to mechanistically decipher the physiological roles of the brain in effectuating learning and memory. The tripartite framework that is at the core of learning and memory ... -
Network models uncover key molecular perturbations in complex human diseases
Biological systems are complex networks of molecular components that function in a tightly controlled manner. Any form of perturbation in these components or their associated interactions affects the normal physiology of ... -
A Networked Control Systems Framework for Smart Grids with Integrated Communication
(2018-02-28)Over the last decade, power systems have evolved dramatically around the world, owing to higher demand, stringent requirements on quality and environmental concerns that are becoming increasingly critical. With the ... -
Networked information discovery and retrieval on the ERNET
Networked Information Discovery and Retrieval (NIDR) is the problem of locating information that is present on a network and making use of the located information. With the increase in volume and kind of information on ... -
Neural Approaches for Natural Language Query Answering over Source Code
During software development, developers need to ensure that the developed code is bug-free and the best coding practices are followed during the code development process. To guarantee this, the developers require answers ... -
Neural Architectures For Active Contour Modelling And For Pulse-Encoded Shape Recognition
(2014-09-12)An innate desire of many vision researchers IS to unravel the mystery of human visual perception Such an endeavor, even ~f it were not wholly successful, is expected to yield byproducts of considerable significance to ... -
Neural computations underlying attention and expectation
Our senses are inundated with an abundance of information at each instant. Attention and expectation are two cognitive processes that enable filtering this information to better navigate our environment. Importantly, ... -
Neural Correlates and Behavioral Underpinnings of Remote Memories during Systems Consolidation
Remote retrieval of declarative memories has been under investigation for a long time. After acquisition, long-term encoding of memories happens through crosstalk across multiple brain regions. Through systems consolidation, ... -
Neural Mechanisms underlying the planning of sequential saccades
Saccades are rapid eye movements that we continually make (about 2-3 times per second) to look around and scan our visual environment. Though we effortlessly execute saccadic eye movements all the time, they are not just ... -
Neural Models for Personalized Recommendation Systems with External Information
Personalized recommendation systems use the data generated by user-item interactions (for example, in the form of ratings) to predict different users interests in available items and recommend a set of items or products ...

