Division of Electrical, Electronics, and Computer Science (EECS)
Collections in this community
Recent Submissions
-
Parallel Algorithms for Efficient Utilization of Multiprocessor Architectures for Transient Stability
Computer hardware capabilities have been enormously increasing over the years. Multicore processors, graphic processing units (GPUs), and field programmable gate array (FPGA) accelerators have grown significantly recently. ... -
Fault Creation, Detection and Classification Systems for Modern Power Grids
The power grid is changing with the exponentially growing penetration of inverter-based resources (IBRs). Keeping the power grid stable, reliable, and secure, and delivering quality power has become increasingly important ... -
Modulating Waveform Generation for Split-Phase Induction Motor Drives and Discrete Modelling of Switched Reluctance Motor Drives
The thesis focuses on the areas for improvement in non-permanent magnet-based electric drives, such as the asymmetrical six-phase (or split-phase) induction motor and the switched reluctance motor drives. In the first ... -
GPU-Accelerated Quantum Transport Solver to Explore 2D Material Space for Transistor Operation
For decades, silicon has been the mainstay of the semiconductor industry. However, to preserve the electrostatic integrity of MOSFETs (metal oxide semiconductor field effect transistors), technology downscaling necessitates ... -
Infimal convolution approaches for image recovery
The quality of image captured by acquisition devices has increased drastically over the years largely due to a revolution in imaging sensor capability. But, image acquisition under low illumination continues to be a ... -
Loop Transformations for Multi-/Many-Core Architectures using Machine Learning
Loop transformation techniques such as loop tiling, loop interchange and unroll-and-jam help expose better coarse-grain and fine-grain data-level parallelisms as well as exploit data locality. These transformations are ... -
Learning with Multi-domain and Multi-view Graph Data
In many applications, we observe large volumes of data supported on irregular (non-Euclidean) domains. In graph signal processing (GSP) and graph machine learning (GML), data is indexed using the nodes of a graph and ... -
Sequential Transfer in Multi-Armed Bandits using Reward Samples
We consider a sequential multi-task problem, where each task is modeled as a stochastic multi-armed bandit with K arms. We study the problem of transfer learning in this setting and propose algorithms based on UCB to ... -
Fair and Efficient Dynamic Memory De-bloating
The virtual memory abstraction simplifies programming and enhances portability but requires the processor to translate virtual addresses to physical addresses which can be expensive. To speed up the virtual-to-physical ... -
Developing Experimental Approaches to Gain Physical Insights into High Electric Field and Hot Electron Reliability of AlGaN/GaN HEMTs
Next-generation power conversion systems, designed to achieve environmental and economic sustainability, are required to be efficient and smaller in size. Advances in silicon-based power devices, which are the major driving ... -
PyGraph: Compiler Support for Efficient and Transparent Use of CUDA Graphs
CUDA Graphs --- a recent hardware feature introduced for NVIDIA GPUs --- aim to reduce CPU launch overhead by capturing and launching a series of GPU tasks (kernels) as a DAG. However, deploying CUDA Graphs faces several ... -
Integrated Nanophotonic Devices Based on Van der Waals materials for Applications in Nonlinear and Quantum Photonics
Integrated photonics is a promising technology for realizing miniaturized optical systems with enhanced stability and performance for applications in light-based communication, sensing, imaging, biomedical diagnostics etc. ... -
ESD Design for Advanced CMOS and Analog nodes
The study of Electrostatic Discharge (ESD) reliability within Integrated Circuits (IC) is crucial due to its direct influence on electronic device performance, longevity, and functionality. As semiconductor technology ... -
Delivery Strategies for Dynamic Contents in Edge Caching Systems
In today's digital age, multimedia consumption is pervasive, driven by video-on-demand platforms, online social networks, and sensor networks. Whether it is the latest blockbuster movie on a streaming service or real-time ... -
Coding Schemes and Converse Bounds for Secure, Multi-Access, and Multi-Antenna Coded Caching Problems
With rapid advancements in technology, there is an increase in the adoption of data-hungry applications, especially entertainment services like on-demand music and video streaming and download. The high temporal variability ... -
Group Testing: A Probably Approximately Correct Analysis and Recovery Algorithms for pooled RT-qPCR
The goal of group testing, also called pool testing, is to successfully identify a set of k defectives from a population of n items using only m (< n) group tests. In each group test, a subset of the n items is tested ... -
Label Efficient and Generalizable No-reference Video Quality Assessment
No-reference (NR) video quality assessment (VQA) refers to the study of the quality of degraded videos without the need for reference pristine videos. The problem has wide applications ranging from the quality assessment ... -
Design of Placement Delivery Arrays for Shared Cache and Multi-antenna Coded Caching Problems
Caching has been considered as a promising technique to handle the exponential growth of wireless data traffic. The caches distributed across the network are utilized to shift some of the peak-hour traffic to off-peak ... -
Towards Practical High Throughput Laser-based Indoor Optical Wireless Communication Systems
Wireless communication has become an essential necessity in our day-to-day life with majority of these systems currently use radio frequency (RF) technology to transmit information. To meet the high end requirements, new ... -
Advancing the Communication Complexity Landscape of Perfectly Secure Multiparty Computation
Secure multiparty computation (MPC) allows n distrustful parties to jointly compute a function on their inputs while keeping their inputs private. The distrust is modelled as an adversary that controls up to t parties and ...