Browsing Division of Electrical, Electronics, and Computer Science (EECS) by thesis submitted date"2021"
Now showing items 41-60 of 85
-
Locally Reconstructable Non-malleable Secret Sharing
Non-malleable secret sharing (NMSS) schemes, introduced by Goyal and Kumar (STOC 2018), ensure that a secret m can be distributed into shares m1,...,mn (for some n), such that any t (a parameter <= n) shares can be ... -
Low Power Machine Learning Systems for Energy Efficient Edge Devices
Energy-efficient devices are essential in the world of edge computing and the tiny Machine Learning (tinyML) paradigm. Edge devices are often constrained by the available compu- tational power and hardware resource. To ... -
Microengineered Force Sensors and Haptic Feedback System for Catheter Contact Force
Minimally Invasive Surgery (MIS) pursues the highest attention in various medical procedures globally because of the reduced complicated process compared with traditional surgery, short postprocedural convalescence, and ... -
Modeling and verification of database-accessing applications
Databases are central to the functioning of most IT-enabled processes and services. In many domains, databases are accessed and updated via applications written in general-purpose lan- guages, as such applications need ... -
Modeling of Permittivity Variations in Stochastic Computational Electromagnetics
With the evolution of 5G systems offering high data rates, major changes are required in the design approach of the components of communication systems. Furthermore, building complex electromagnetic systems at the terahertz ... -
MPCLeague: Robust MPC Platform for Privacy-Preserving Machine Learning
In the modern era of computing, machine learning tools have demonstrated their potential in vital sectors, such as healthcare and finance, to derive proper inferences. The sensitive and confidential nature of the data in ... -
Neural Models for Personalized Recommendation Systems with External Information
Personalized recommendation systems use the data generated by user-item interactions (for example, in the form of ratings) to predict different users interests in available items and recommend a set of items or products ... -
New Algorithmic and Hardness Results in Learning, Error Correcting Codes and Constraint Satisfaction Problems
Approximation algorithms are a natural way to deal with the intractability barrier that is inherent in many naturally arising computational problems. However, it is often the case that the task of solving the approximation ... -
Novel First-order Algorithms for Non-smooth Optimization Problems in Machine Learning
This thesis is devoted to designing efficient optimization algorithms for machine learning (ML) problems where the underlying objective function to be optimized is convex but not necessarily differentiable. Such non-smooth ... -
A Novel Neural Network Architecture for Sentiment-oriented Aspect-Opinion Pair Extraction
Over the years, fine-grained opinion mining in online reviews has received great attention from the NLP research community. It involves different tasks such as Aspect Term Extraction (ATE), Opinion Term Extraction (OTE), ... -
Novel Regularized Image Reconstruction Algorithms for Sparse Photoacoustic Tomography
Among all tissue imaging modalities, photo-acoustic tomography (PAT), has been getting increasing attention in the recent past due to the fact that it has high contrast, high penetrability, and has capability of retrieving ... -
Novel Reinforcement Learning Algorithms and Applications to Hybrid Control Design Problems
The thesis is a compilation of two independent works. In the first work, we develop novel weight assignment procedure, which helps us develop several schedule based algorithms. Learning the value function of a given policy ... -
nuKSM: NUMA-aware Memory De-duplication for Multi-socket Servers
An operating system's memory management has multiple goals, e.g. reducing memory access latencies, reducing memory footprint. These goals can conflict with each other when independent subsystems optimize them in silos. ... -
Optimal Redundancy in Distributed Systems for Latency and Repair
Distributed systems are employed in many modern storage and computing architecture for greater reliability and cost-efficiency. There are several important considerations in the design and implementation of such distributed ... -
OTFS Transceivers Design using Deep Neural Networks
Next generation wireless systems are envisioned to provide a variety of services with a wide range of performance requirements. Particularly, demand for high-mobility use cases involving high-speed trains, UAVs/drones, and ... -
Performance improvement of meshless methods for practical time domain electromagnetic analyses.
Solution of Maxwell's equations for practical antennas, filters, waveguides and other microwave devices requires use of numerical methods. Popular numerical methods include the finite difference time domain method (FDTD), ... -
Physics Based Design & Development of Gallium Nitride High Electron Mobility Transistors (HEMTs) & Schottky Barrier Diodes for Power and RF Applications
Silicon-based transistors such as MOSFETs have been the preferred choice for decades now for both power as well as high-frequency device applications. The meteoric rise of Silicon was fuelled by the quest for a highly ... -
Plasma catalysis of diesel exhaust using industrial wastes: a study on NOX and THC removal
Air pollution, caused by large scale consumption of fossil fuels such as diesel, has been the leading cause of several adverse environmental effects such as global warming, higher acidity in rainwater, lower yield ... -
Probabilistic Forwarding of Coded Packets for Broadcasting over Networks
Motivated by applications in sensor networks and the Internet of Things (IoT), in this dissertation, we consider the problem of energy-efficient broadcasting from a source node in a large dense network. Flooding, as a ... -
Quantum-Safe Identity-Based Signature Scheme in Multivariate Quadratic Setting
Cryptographic techniques are essential for the security of communication in modern society. Today, nearly all public key cryptographic schemes used in practice are based on the two problems of factoring large integers and ...