Browsing Division of Electrical, Electronics, and Computer Science (EECS) by Title
Now showing items 254-273 of 1709
-
Computing Contour Tress for 2D Piecewise Polynomial Functions
Contour trees are extensively used in scalar field analysis. The contour tree is a data structure that tracks the evolution of level set topology in a scalar field. Scalar fields are typically available as samples at ... -
Concurrency Analysis and Mining Techniques for APIs
(2018-06-13)Software components expose Application Programming Interfaces (APIs) as a means to access their functionality, and facilitate reuse. Developers use APIs supplied by programming languages to access the core data structures ... -
Concurrency control algorithms for database systems exploiting the semantics of read-only transactions.
This thesis proposes new locking-based concurrency control algorithms for both centralized and distributed databases. The concurrency control algorithms proposed exploit the semantics of read-only transactions to improve ... -
Conflict-Tolerant Features
(2010-12-07)Large, software intensive systems are typically developed using a feature oriented development paradigm in which feature specifications are derived from domain requirements and features are implemented to satisfy such ... -
Conformal Active Sheets
(2017-12-16)Stretchable Electronics is an emerging class of electronics that allow electronics to be bent, conform, ex and stretch while still retaining its full functionality. Other than bending, existing and conforming, adding ... -
Conformal Thermal Models for Optimal Loading and Elapsed Life Estimation of Power Transformers
(Indian Institute of Science, 2005-04-18)Power and Generator Transformers are important and expensive elements of a power system. Inadvertent failure of Power Transformers would cause long interruption in power supply with consequent loss of reliability and revenue ... -
Consistency of Spectral Algorithms for Hypergraphs under Planted Partition Model
(2018-01-01)Hypergraph partitioning lies at the heart of a number of problems in machine learning as well as other engineering disciplines. While partitioning uniform hypergraphs is often required in computer vision problems that ... -
A Constant Frequency Resonant Transition Converter
(2012-03-28) -
Constant-rate Non-malleable Codes and their Applications
Non-malleable codes(NMC) introduced by Dziembowski, Pietrzak and Wichs in ITCS 2010, provide powerful security guarantees where error-correcting codes can not provide any guarantee: a decoding of tampered codeword is ... -
Constellation Constrained Capacity For Two-User Broadcast Channels
(2011-07-12)A Broadcast Channel is a communication path between a single source and two or more receivers or users. The source intends to communicate independent information to the users. A particular case of interest is the Gaussian ... -
Constrained virtual path routing algorithms in packet networks
We presented a new algorithm for on-line routing of Virtual Paths in a packet network. The main application of the algorithm is in explicit routing o f LSPs in MPLS networks. We modeled the routing problem as a mixed ... -
Constructing Provably Secure Identity-Based Signature Schemes
(2018-04-03)An identity-based cryptosystem (IBC) is a public-key system where the public key can be represented by any arbitrary string such as an e-mail address. The notion was introduced by Shamir with the primary goal of simplifying ... -
Construction Of Equivalent Circuit Of A Single Isolated Transformer Winding From Frequency Response
(2013-06-14)Frequency response analysis (FRA) of transformers is universally accepted as a highly sensitive tool to detect deformations in its windings. This is evident from the fact that customized commercial equipment (popularly ... -
Construction Of High-Rate, Reliable Space-Time Codes
(2011-09-09) -
Construction of Secure and Efficient Private Set Intersection Protocol
(2018-03-17)Private set intersection(PSI) is a two party protocol where both parties possess a private set and at the end of the protocol, one party (client) learns the intersection while other party (server) learns nothing. Motivated ... -
Content Dissemination in Mobile Ad Hoc Networks
(2018-06-26)In this thesis, we are concerned with content dissemination in mobile ad hoc networks. The scope of content dissemination is limited by network capacity, and sometimes the price to be paid for securing faster delivery. In ... -
Content Distribution in Social Groups
(2018-01-29)We study Social Groups consisting of self-interested inter-connected nodes looking for common content. We can observe Social Groups in various socio-technological networks, such as Cellular Network assisted Device-to-Device ... -
Content-Based Texture Analysis and Synthesis for Low Bit-Rate Video Coding Using Perceptual Models
Determining perceptually irrelevant and redundant information from human point of view is one of the fundamental problems today that is limiting the performance of current video compression algorithms. The performance of ... -
A Context-Aware Neural Approach for Explainable Citation Link Prediction
Citations have become an integral part of scientific publications. They play a crucial role in supporting authors’ claims throughout a scientific paper. However, citing related work is a challenging and laborious task, ...

