• Login
    Browsing Division of Electrical, Electronics, and Computer Science (EECS) by Title 
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Browsing Division of Electrical, Electronics, and Computer Science (EECS) by Title
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Browsing Division of Electrical, Electronics, and Computer Science (EECS) by Title
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browsing Division of Electrical, Electronics, and Computer Science (EECS) by Title

    • 0-9
    • A
    • B
    • C
    • D
    • E
    • F
    • G
    • H
    • I
    • J
    • K
    • L
    • M
    • N
    • O
    • P
    • Q
    • R
    • S
    • T
    • U
    • V
    • W
    • X
    • Y
    • Z

    Sort by:

    Order:

    Results:

    Now showing items 792-811 of 1531

    • title
    • xmlui.ArtifactBrowser.ConfigurableBrowse.sort_by.datesubmitted
    • issue date
    • ascending
    • descending
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
      • Label Efficient and Generalizable No-reference Video Quality Assessment 

        Mitra, Shankhanil
        No-reference (NR) video quality assessment (VQA) refers to the study of the quality of degraded videos without the need for reference pristine videos. The problem has wide applications ranging from the quality assessment ...
      • Labelled clustering and its applications 

        Sridhar, V
        Clustering is a process of grouping a collection of objects. Clustering approaches can be broadly categorized into conventional and knowledge-based approaches. In a conventional approach, objects are typically represented ...
      • Lambda Bipolar Transistor (LBT) in Static Random Access Memory Cell 

        Sarkar, Manju (Indian Institute of Science, 2005-07-07)
        With a view to reduce the number of components in a Static Random Access Memory (SRAM) cell, the feasibility of use of Lambda Bipolar Transistor (LBT)in the bistable element of the cell has been explored under the present ...
      • Language Identification Through Acoustic Sub-Word Units 

        Sai Jayram, A K V (2011-09-26)
      • Language Support for Exploiting Software Structure Specifications 

        Kumar, Bharath M (Indian Institute of Science, 2005-02-16)
        Precise specification of the architecture and design of software is a good practice. Such specifications contain a lot of information about the software that can potentially be exploited by tools, to reduce redundancy ...
      • Language Support for Exploiting Software Structure Specifications  

        Kumar, Bharath M
        Precise specification of the architecture and design of software is a good practice. Such specifications contain a lot of information about the software that can potentially be exploited by tools to reduce redundancy in ...
      • Language Support For Testing CORBA Based Applications 

        Vardhan, K Ananda (Indian Institute of Science, 2005-12-07)
        Component Based Development has emerged as economical, reusable, scalable way of developing enterprise as well as embedded software applications. Testing distributed component based systems is difficult when third party ...
      • Large Data Clustering And Classification Schemes For Data Mining 

        Babu, T Ravindra (2009-03-20)
        Data Mining deals with extracting valid, novel, easily understood by humans, potentially useful and general abstractions from large data. A data is large when number of patterns, number of features per pattern or both are ...
      • Large Scale Graph Processing in a Distributed Environment 

        Upadhyay, Nitesh (2018-05-25)
        Graph algorithms are ubiquitously used across domains. They exhibit parallelism, which can be exploited on parallel architectures, such as multi-core processors and accelerators. However, real world graphs are massive in ...
      • Large Scale Implementation Of The Block Lanczos Algorithm 

        Srikanth, Cherukupally (2010-08-16)
        Large sparse matrices arise in many applications, especially in the major problems of Cryptography of factoring integers and computing discrete logarithms. We focus attention on such matrices called sieve matrices generated ...
      • Large Time Behaviour and Metastability in Mean-Field Interacting Particle Systems 

        Yasodharan, Sarath Ampadi
        This thesis studies the large time behaviour and metastability in weakly interacting Markov processes with jumps. Our motivation is to quantify the large time behaviour of various networked systems that arise in practice. The ...
      • Large-Scale Integer And Polynomial Computations : Efficient Implementation And Applications 

        Amberker, B B (2012-05-03)
      • Lattice Codes for Secure Communication and Secret Key Generation 

        Vatedka, Shashank (2018-05-22)
        In this work, we study two problems in information-theoretic security. Firstly, we study a wireless network where two nodes want to securely exchange messages via an honest-but-curious bidirectional relay. There is no ...
      • A Learnable Distillation Approach For Model-agnostic Explainability With Multimodal Applications 

        Bhattacharya, Debarpan
        Deep neural networks are the most widely used examples of sophisticated mapping functions from feature space to class labels. In the recent years, several high impact decisions in domains such as finance, healthcare, law ...
      • Learning Algorithms Using Chance-Constrained Programs 

        Jagarlapudi, Saketha Nath (2010-07-08)
        This thesis explores Chance-Constrained Programming (CCP) in the context of learning. It is shown that chance-constraint approaches lead to improved algorithms for three important learning problems — classification with ...
      • Learning Decentralized Goal-Based Vector Quantization 

        Gupta, Piyush (2012-05-04)
      • Learning Dynamic Prices In Electronic Markets 

        Venkata Lakshmipathi Raju, CH (2011-04-19)
      • Learning From Examples Using Hierarchical Counterfactual Expressions 

        Bhandaru, Malini Krishnan
        In this study, we develop algorithms for learning concepts from examples. Learning is the capability that allows a system to improve its performance. It involves the ability to correct errors, learn domain knowledge, ...
      • Learning Invariants for Verification of Programs and Control Systems 

        Ezudheen, P
        Deductive verification techniques in the style of Floyd and Hoare have the potential to give us concise, compositional, and scalable proofs of the correctness of various kinds of software systems like programs and control ...
      • Learning Non-linear Mappings from Data with Applications to Priority-based Clustering, Prediction, and Detection 

        Machireddy, Amrutha
        With the volume of data generated in today's internet-of-things, learning algorithms to extract and understand the underlying relations between the various attributes of data have gained momentum. This thesis is focused ...

        etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
        Contact Us | Send Feedback | Thesis Templates
        Theme by 
        Atmire NV
         

         

        Browse

        All of etd@IIScCommunities & CollectionsTitlesAuthorsAdvisorsSubjectsBy Thesis Submission DateThis CommunityTitlesAuthorsAdvisorsSubjectsBy Thesis Submission Date

        My Account

        LoginRegister

        etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
        Contact Us | Send Feedback | Thesis Templates
        Theme by 
        Atmire NV