Browsing Division of Electrical, Electronics, and Computer Science (EECS) by Title
Now showing items 1033-1052 of 1262
-
Scaling Blockchains Using Coding Theory and Verifiable Computing
The issue of scalability has been restricting blockchain from its widespread adoption. The current transaction rate of bitcoin is around seven transactions/second while its size has crossed the 300 GB mark. Although many ... -
Scaling Context-Sensitive Points-To Analysis
(2014-05-06)Pointer analysis is one of the key static analyses during compilation. The efficiency of several compiler optimizations and transformations depends directly on the scalability and precision of the underlying pointer analysis. ... -
Scheduling Algorithms for Wireless Networks and Cloud Computing Platforms
This thesis focuses on designing scheduling algorithms for wireless communication networks, FMCW radar networks, and cloud computing platforms. In each case, the algorithms aim at efficient utilization of resources, e.g., ... -
Scheduling For Stable And Reliable Communication Over Multiaccess Channels And Degraded Broadcast Channels
(2008-09-26)Information-theoretic arguments focus on modeling the reliability of information transmission, assuming availability of infinite data at sources, thus ignoring randomness in message generation times at the respective ... -
Secret Key Generation in the Multiterminal Source Model : Communication and Other Aspects
(2018-07-04)This dissertation is primarily concerned with the communication required to achieve secret key (SK) capacity in a multiterminal source model. The multiterminal source model introduced by Csiszár and Narayan consists of a ... -
Secure Computation Protocol Suite for Privacy-Conscious Applications
As an alternative to performing analytics in the clear, there is an increasing demand for developing privacy-preserving solutions that aim to protect sensitive data while still allowing for its efficient analysis. Among ... -
Secure Routing Schemes In Mobile Ad Hoc Networks
(2011-09-09) -
Securing Multiprocessor Systems-on-Chip
(2016)With Multiprocessor Systems-on-Chips (MPSoCs) pervading our lives, security issues are emerging as a serious problem and attacks against these systems are becoming more critical and sophisticated. We have designed and ... -
Security of Post-Quantum Multivariate Blind Signature Scheme: Revisited and Improved
Current cryptosystems face an imminent threat from quantum algorithms like Shor's and Grover's, leading us to post-quantum cryptography. Multivariate signatures are prominent in post-quantum cryptography due to their fast, ... -
Segmentation Strategies for Scene Word Images
(2017-12-10) -
Semantic Analysis of Web Pages for Task-based Personal Web Interactions
(2017-11-27)Mobile widgets now form a new paradigm of simplified web. Probably, the best experience of the Web is when a user has a widget for every frequently executed task, and can execute it anytime, anywhere on any device. However, ... -
Semi-Supervised Classification Using Gaussian Processes
(2010-03-26)Gaussian Processes (GPs) are promising Bayesian methods for classification and regression problems. They have also been used for semi-supervised classification tasks. In this thesis, we propose new algorithms for solving ... -
Sentiment-Driven Topic Analysis Of Song Lyrics
(2015-08-17)Sentiment Analysis is an area of Computer Science that deals with the impact a document makes on a user. The very field is further sub-divided into Opinion Mining and Emotion Analysis, the latter of which is the basis for ... -
Sequential Controlled Sensing to Detect an Anomalous Process
In this thesis, we study the problem of identifying an anomalous arm in a multi-armed bandit as quickly as possible, subject to an upper bound on the error probability. Also known as odd arm identification, this problem ... -
Sequential Detection Based Cooperative Spectrum Sensing Algorithms For Cognitive Radio
(2011-07-11)Cognitive radios are the radios which use spectrum licensed to other users. For this, they perform Radio Environment Analysis, identify the Spectral holes and then operate in those holes. We consider the problem of Spectrum ... -
Service scheduling with Service, Waiting and Dissatisfaction costs
Service or job scheduling problems arise in many contexts such as cloud computing, task scheduling in CPUs, traffic routing and scheduling, production scheduling in plants, scheduling charging of electric vehicles (EVs), ... -
Shape From Shading Analysis By Synthesis
(2011-05-06) -
Shape-constrained Biomedical Image Segmentation and Applications
The detection, segmentation, and delineation of the targeted regions of interest in biomedical images are fundamental steps for computer-aided assessment and prescreening. In this thesis, we focus on shape-constrained ...