Browsing Division of Electrical, Electronics, and Computer Science (EECS) by Title
Now showing items 941-960 of 1263
-
Price of Privacy of Smart Meter Data
Smart meter data can be used by the utility for billing the consumers timely along with power theft detection, demand side management, distribution network planning, consumer segmentation, load forecasting, fault detection, ... -
Pricing Network Resources : A New Perspective
(2011-02-25)The aim of the work is to examine the issue of pricing network resources so as to ensure fair and efficient resource-sharing among users. The basic question we address is: Do there exist simple pricing schemes such that ... -
Privacy in Information Retrieval, Delivery and Distributed Computing
The aim of our work is to address the challenges of privacy in information retrieval, information delivery, and in distributed computing systems. We focus on reducing the download and upload costs and decreasing the ... -
Privadome: A System for Citizen Privacy in the Delivery Drone Era
E-commerce companies are actively considering the use of delivery drones for customer fulfillment, leading to growing concerns around citizen privacy. Drones are equipped with cameras, and the video feed from these cameras ... -
Probabilistic Forwarding of Coded Packets for Broadcasting over Networks
Motivated by applications in sensor networks and the Internet of Things (IoT), in this dissertation, we consider the problem of energy-efficient broadcasting from a source node in a large dense network. Flooding, as a ... -
Probabilistic source-filter model of speech
The human respiratory system plays a crucial role in breathing and swallow ing. However, it also plays an essential role in speech production, which is unique to humans. Speech production involves expelling air from the ... -
Problems on bend-number, circular separation dimension and maximum edge 2-colouring
Representation of graphs as the intersection graphs of geometric objects has a long history. The objective is to a nd a collection of \simple" sets S such that a given graph G is its intersection graph. We are interested ... -
Process Variability-Aware Performance Modeling In 65 nm CMOS
(2011-02-25)With the continued and successful scaling of CMOS, process, voltage, and temperature (PVT), variations are increasing with each technology generation. The process variability impacts all design goals like performance, ... -
Procurement Network Formation : A Cooperative Game Theoretic Approach
(2009-04-16)Complex economic activity often involves inter-relationships at several levels of production, often referred to as supply chains or procurement networks. In this thesis we address the problem of forming procurement networks ... -
Program Analyses to Support Memory-saving Refactorings in Java Programs
Software commonly consumes unexpectedly high amounts of memory, frequently due to programming idioms that are used to make software more reliable, maintainable and understandable. In the case of modern object-oriented ... -
Program Repair by Automated Generation of Hints
Programming has become an important skill in today's technology-driven world. It is a complex activity because of which programmers make mistakes in their software. Student programmers make mistakes in their programs due ... -
Pronunciation assessment and semi-supervised feedback prediction for spoken English tutoring
Spoken English pronunciation quality is often influenced by the nativity of a learner, for whom English is the second language. Typically, the pronunciation quality of a learner depends on the degree of the following four ... -
Protection Schemes for Maintaining the Coordination Time Interval Between the Relays in Micro-grid
Conventional power system alone cannot meet the ever growing needs of electrical power in the world in a reliable manner. Under these circumstances, large penetration of Dis- tributed generators in the distribution level ... -
Protocols for quantum information processing on graph states
Quantum entanglement is a unique phenomenon that occurs in quantum systems and ensures the feasibility of tasks considered impossible in the classical world. Two such important tasks are superdense coding and quantum ... -
Provable Methods for Non-negative Matrix Factorization
(2017-10-31)Nonnegative matrix factorization (NMF) is an important data-analysis problem which concerns factoring a given d n matrix A with nonnegative entries into matrices B and C where B and C are d k and k n with nonnegative ... -
Provably Convergent Algorithms for Denoiser-Driven Image Regularization
Some fundamental reconstruction tasks in image processing can be posed as an inverse problem where we are required to invert a given forward model. For example, in deblurring and superresolution, the ground-truth image ... -
Providing QoS To Real-time And Data Applications In 3G Wireless Systems
(2010-07-29)In this thesis we address the problem of providing end-to-end quality of service (QoS) to real-time and data connections in a third generation (3G) cellular network based on the Universal Mobile Telecommunication System ... -
Pulse Width Modulation Techniques of Two-level Inverter Fed Asymmetrical Six-phase Machine Drive in Linear and Overmodulation Regions
Multi-phase machines (MPMs) have more than three windings in their stator, rotor, or both. With the broader adoption of power-electronic converters for efficient driving of the machines, MPMs are gaining attention in ... -
PWM Techniques for Split-Phase Induction Motor Drive
(2018-02-18)A split-phase induction motor (SPIM) is obtained by splitting each of the three-phase stator windings of an induction motor into two equal halves. This results in two sets of three-phase windings with a spatial angle ...