• Login
    Browsing Division of Electrical, Electronics, and Computer Science (EECS) by Title 
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Browsing Division of Electrical, Electronics, and Computer Science (EECS) by Title
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Browsing Division of Electrical, Electronics, and Computer Science (EECS) by Title
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browsing Division of Electrical, Electronics, and Computer Science (EECS) by Title

    • 0-9
    • A
    • B
    • C
    • D
    • E
    • F
    • G
    • H
    • I
    • J
    • K
    • L
    • M
    • N
    • O
    • P
    • Q
    • R
    • S
    • T
    • U
    • V
    • W
    • X
    • Y
    • Z

    Sort by:

    Order:

    Results:

    Now showing items 1073-1092 of 1315

    • title
    • xmlui.ArtifactBrowser.ConfigurableBrowse.sort_by.datesubmitted
    • issue date
    • ascending
    • descending
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
      • Safe Operating Area Reliability of AlGaN/GaN High Electron Mobility Transistors (HEMTs) 

        Shankar, Bhawani
        Gallium Nitride (GaN) based high electron mobility transistors (HEMTs) are extensively considered for power switching and RF applications by the virtue of their unique properties. However, despite of its attractive ...
      • Sampling of Structured Signals: Techniques and Imaging Applications 

        Rudresh, Sunil
        The celebrated Shannon sampling theorem is a key mathematical tool that allows one to seamlessly switch between the continuous-time and discrete-time representations of bandlimited signals. Sampling and reconstruction of ...
      • Savitzky-Golay Filters and Application to Image and Signal Denoising 

        Menon, Seeram V (2018-07-18)
        We explore the applicability of local polynomial approximation of signals for noise suppression. In the context of data regression, Savitzky and Golay showed that least-squares approximation of data with a polynomial of ...
      • Scalable Low Power Issue Queue And Store Queue Design For Superscalar Processors 

        Vivekanandham, Rajesh (2009-03-09)
        A Large instruction window is a key requirement to exploit greater Instruction Level Parallelism in out-of-order superscalar processors. Along with the instruction window size, the size of various other structures including ...
      • Scalable Sprase Bayesian Nonparametric and Matrix Tri-factorization Models for Text Mining Applications 

        Ranganath, B N (2018-05-23)
        Hierarchical Bayesian Models and Matrix factorization methods provide an unsupervised way to learn latent components of data from the grouped or sequence data. For example, in document data, latent component corn-responds ...
      • Scaling Blockchains Using Coding Theory and Verifiable Computing 

        Rathi, Nilesh
        The issue of scalability has been restricting blockchain from its widespread adoption. The current transaction rate of bitcoin is around seven transactions/second while its size has crossed the 300 GB mark. Although many ...
      • Scaling Context-Sensitive Points-To Analysis 

        Nasre, Rupesh (2014-05-06)
        Pointer analysis is one of the key static analyses during compilation. The efficiency of several compiler optimizations and transformations depends directly on the scalability and precision of the underlying pointer analysis. ...
      • Scheduling Algorithms for Wireless Networks and Cloud Computing Platforms 

        Haritha, K
        This thesis focuses on designing scheduling algorithms for wireless communication networks, FMCW radar networks, and cloud computing platforms. In each case, the algorithms aim at efficient utilization of resources, e.g., ...
      • Scheduling For Stable And Reliable Communication Over Multiaccess Channels And Degraded Broadcast Channels 

        Kalyanarama Sesha Sayee, KCV (2008-09-26)
        Information-theoretic arguments focus on modeling the reliability of information transmission, assuming availability of infinite data at sources, thus ignoring randomness in message generation times at the respective ...
      • Secret Key Generation in the Multiterminal Source Model : Communication and Other Aspects 

        Mukherjee, Manuj (2018-07-04)
        This dissertation is primarily concerned with the communication required to achieve secret key (SK) capacity in a multiterminal source model. The multiterminal source model introduced by Csiszár and Narayan consists of a ...
      • Secure Computation Protocol Suite for Privacy-Conscious Applications 

        Saipanmuluk, Koti Nishat
        As an alternative to performing analytics in the clear, there is an increasing demand for developing privacy-preserving solutions that aim to protect sensitive data while still allowing for its efficient analysis. Among ...
      • Secure Routing Schemes In Mobile Ad Hoc Networks 

        Prashant, Dixit Pratik (2011-09-09)
      • Securing Multiprocessor Systems-on-Chip 

        Biswas, Arnab Kumar (2016)
        With Multiprocessor Systems-on-Chips (MPSoCs) pervading our lives, security issues are emerging as a serious problem and attacks against these systems are becoming more critical and sophisticated. We have designed and ...
      • Security of Post-Quantum Multivariate Blind Signature Scheme: Revisited and Improved 

        Majumdar, Aalo
        Current cryptosystems face an imminent threat from quantum algorithms like Shor's and Grover's, leading us to post-quantum cryptography. Multivariate signatures are prominent in post-quantum cryptography due to their fast, ...
      • Segmentation Strategies for Scene Word Images 

        Anil Prasad, M N (2017-12-10)
      • Self Commissioning, Parameter Adaptation And Sensorless Operation Of Vector Controlled Induction Motor Drives 

        Palani Vel, S (2012-05-24)
      • Semantic Analysis of Web Pages for Task-based Personal Web Interactions 

        Manjunath, Geetha (2017-11-27)
        Mobile widgets now form a new paradigm of simplified web. Probably, the best experience of the Web is when a user has a widget for every frequently executed task, and can execute it anytime, anywhere on any device. However, ...
      • Semi-Supervised Classification Using Gaussian Processes 

        Patel, Amrish (2010-03-26)
        Gaussian Processes (GPs) are promising Bayesian methods for classification and regression problems. They have also been used for semi-supervised classification tasks. In this thesis, we propose new algorithms for solving ...
      • Sentiment-Driven Topic Analysis Of Song Lyrics 

        Sharma, Govind (2015-08-17)
        Sentiment Analysis is an area of Computer Science that deals with the impact a document makes on a user. The very field is further sub-divided into Opinion Mining and Emotion Analysis, the latter of which is the basis for ...
      • Sequential Controlled Sensing to Detect an Anomalous Process 

        Narayanaprasad, Karthik Periyapattana
        In this thesis, we study the problem of identifying an anomalous arm in a multi-armed bandit as quickly as possible, subject to an upper bound on the error probability. Also known as odd arm identification, this problem ...

        etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
        Contact Us | Send Feedback | Thesis Templates
        Theme by 
        Atmire NV
         

         

        Browse

        All of etd@IIScCommunities & CollectionsTitlesAuthorsAdvisorsSubjectsBy Thesis Submission DateThis CommunityTitlesAuthorsAdvisorsSubjectsBy Thesis Submission Date

        My Account

        LoginRegister

        etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
        Contact Us | Send Feedback | Thesis Templates
        Theme by 
        Atmire NV