• Login
    Browsing Division of Electrical, Electronics, and Computer Science (EECS) by Title 
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Browsing Division of Electrical, Electronics, and Computer Science (EECS) by Title
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Browsing Division of Electrical, Electronics, and Computer Science (EECS) by Title
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browsing Division of Electrical, Electronics, and Computer Science (EECS) by Title

    • 0-9
    • A
    • B
    • C
    • D
    • E
    • F
    • G
    • H
    • I
    • J
    • K
    • L
    • M
    • N
    • O
    • P
    • Q
    • R
    • S
    • T
    • U
    • V
    • W
    • X
    • Y
    • Z

    Sort by:

    Order:

    Results:

    Now showing items 669-688 of 1313

    • title
    • xmlui.ArtifactBrowser.ConfigurableBrowse.sort_by.datesubmitted
    • issue date
    • ascending
    • descending
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
      • Kernel Methods Fast Algorithms and real life applications 

        Vishwanathan, S V N (Indian Institute of Science, 2005-02-08)
        Support Vector Machines (SVM) have recently gained prominence in the field of machine learning and pattern classification (Vapnik, 1995, Herbrich, 2002, Scholkopf and Smola, 2002). Classification is achieved by finding a ...
      • Kernel-Based Image Filtering: Fast Algorithms and Applications 

        Ghosh, Sanjay
        Image filtering is a fundamental preprocessing task in computer vision and image processing. Various linear and nonlinear filters are routinely used for enhancement, upsampling, sharpening, reconstruction, etc. The focus ...
      • Key Distribution In Wireless Sensor Networks 

        Gupta, Abhishek (2010-06-09)
        In the last few years, wireless sensor networks (WSNs) have become a very actively researched area. The impetus for this spurt of interest were developments in wireless technologies and low-cost VLSI, that made it possible ...
      • Knowledge Representation Framework For A Web-based Intelligent Tutoring System For Engineering Courses 

        Bhaskerray, Bhatt Chetan (2010-10-08)
        Tutoring is one of the most effective instruction methods. Computer as an Intelligent Tutor is an area of research since many decades. Technology advancement in Information and Communication Technology (ICT) can be used ...
      • A Knowledge-Based Approach To Pattern Clustering 

        Shekar, B (Indian Institute of Science, 2005-03-11)
        The primary objective of this thesis is to develop a methodology for clustering of objects based on their functionality typified by the notion of concept. We begin by giving a formal definition of concept. By assigning a ...
      • Knowledge-driven training of deep models for better reconstruction and recognition 

        Pandey, Ram Krishna
        This thesis aims to efficiently solve many interesting and challenging problems by incorporating appropriate image processing techniques in a deep learning framework. We have proposed, implemented and tested efficient ...
      • Label Efficient and Generalizable No-reference Video Quality Assessment 

        Mitra, Shankhanil
        No-reference (NR) video quality assessment (VQA) refers to the study of the quality of degraded videos without the need for reference pristine videos. The problem has wide applications ranging from the quality assessment ...
      • Lambda Bipolar Transistor (LBT) in Static Random Access Memory Cell 

        Sarkar, Manju (Indian Institute of Science, 2005-07-07)
        With a view to reduce the number of components in a Static Random Access Memory (SRAM) cell, the feasibility of use of Lambda Bipolar Transistor (LBT)in the bistable element of the cell has been explored under the present ...
      • Language Identification Through Acoustic Sub-Word Units 

        Sai Jayram, A K V (2011-09-26)
      • Language Support for Exploiting Software Structure Specifications 

        Kumar, Bharath M (Indian Institute of Science, 2005-02-16)
        Precise specification of the architecture and design of software is a good practice. Such specifications contain a lot of information about the software that can potentially be exploited by tools, to reduce redundancy ...
      • Language Support For Testing CORBA Based Applications 

        Vardhan, K Ananda (Indian Institute of Science, 2005-12-07)
        Component Based Development has emerged as economical, reusable, scalable way of developing enterprise as well as embedded software applications. Testing distributed component based systems is difficult when third party ...
      • Large Data Clustering And Classification Schemes For Data Mining 

        Babu, T Ravindra (2009-03-20)
        Data Mining deals with extracting valid, novel, easily understood by humans, potentially useful and general abstractions from large data. A data is large when number of patterns, number of features per pattern or both are ...
      • Large Scale Graph Processing in a Distributed Environment 

        Upadhyay, Nitesh (2018-05-25)
        Graph algorithms are ubiquitously used across domains. They exhibit parallelism, which can be exploited on parallel architectures, such as multi-core processors and accelerators. However, real world graphs are massive in ...
      • Large Scale Implementation Of The Block Lanczos Algorithm 

        Srikanth, Cherukupally (2010-08-16)
        Large sparse matrices arise in many applications, especially in the major problems of Cryptography of factoring integers and computing discrete logarithms. We focus attention on such matrices called sieve matrices generated ...
      • Large Time Behaviour and Metastability in Mean-Field Interacting Particle Systems 

        Yasodharan, Sarath Ampadi
        This thesis studies the large time behaviour and metastability in weakly interacting Markov processes with jumps. Our motivation is to quantify the large time behaviour of various networked systems that arise in practice. The ...
      • Large-Scale Integer And Polynomial Computations : Efficient Implementation And Applications 

        Amberker, B B (2012-05-03)
      • Lattice Codes for Secure Communication and Secret Key Generation 

        Vatedka, Shashank (2018-05-22)
        In this work, we study two problems in information-theoretic security. Firstly, we study a wireless network where two nodes want to securely exchange messages via an honest-but-curious bidirectional relay. There is no ...
      • A Learnable Distillation Approach For Model-agnostic Explainability With Multimodal Applications 

        Bhattacharya, Debarpan
        Deep neural networks are the most widely used examples of sophisticated mapping functions from feature space to class labels. In the recent years, several high impact decisions in domains such as finance, healthcare, law ...
      • Learning Algorithms Using Chance-Constrained Programs 

        Jagarlapudi, Saketha Nath (2010-07-08)
        This thesis explores Chance-Constrained Programming (CCP) in the context of learning. It is shown that chance-constraint approaches lead to improved algorithms for three important learning problems — classification with ...
      • Learning Decentralized Goal-Based Vector Quantization 

        Gupta, Piyush (2012-05-04)

        etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
        Contact Us | Send Feedback | Thesis Templates
        Theme by 
        Atmire NV
         

         

        Browse

        All of etd@IIScCommunities & CollectionsTitlesAuthorsAdvisorsSubjectsBy Thesis Submission DateThis CommunityTitlesAuthorsAdvisorsSubjectsBy Thesis Submission Date

        My Account

        LoginRegister

        etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
        Contact Us | Send Feedback | Thesis Templates
        Theme by 
        Atmire NV