• Login
    Search 
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Search
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 131-140 of 247

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100

    Improving Last-Level Cache Performance in Single and Multi-Core Processsors 

    Manikanth, R (2018-04-23)
    With off-chip memory access taking 100's of processor cycles, getting data to the processor in a timely fashion remains one of the key performance bottlenecks in current systems. With increasing core counts, this problem ...

    Rainbow Colouring and Some Dimensional Problems in Graph Theory 

    Rajendraprasad, Deepak (2018-04-05)
    This thesis touches three different topics in graph theory, namely, rainbow colouring, product dimension and boxicity. Rainbow colouring An edge colouring of a graph is called a rainbow colouring, if every pair of vertices ...

    Outlier Detection with Applications in Graph Data Mining 

    Ranga Suri, N N R (2018-04-24)
    Outlier detection is an important data mining task due to its applicability in many contemporary applications such as fraud detection and anomaly detection in networks, etc. It assumes significance due to the general ...

    Constructing Provably Secure Identity-Based Signature Schemes 

    Chethan Kamath, H (2018-04-03)
    An identity-based cryptosystem (IBC) is a public-key system where the public key can be represented by any arbitrary string such as an e-mail address. The notion was introduced by Shamir with the primary goal of simplifying ...

    A Theoretical Study of the Synergy and Lazy Annotation Algorithms 

    Jayaram, Sampath (2018-04-03)
    Given a program with assertions, the assertion checking problem is to tell whether there is an execution of the program that violates one of the assertions. One approach to this problem is to explore different paths towards ...

    Model-Checking in Presburger Counter Systems using Accelerations 

    Acharya, Aravind N (2018-04-18)
    Model checking is a powerful technique for analyzing reach ability and temporal properties of finite state systems. Model-checking finite state systems has been well-studied and there are well known efficient algorithms ...

    Transducer-based Algorithmic Verification of Retransmission Protocols over Noisy Channels 

    Thakkar, Jay (2018-04-05)
    Unreliable communication channels are a practical reality. They add to the complexity of protocol design and verification. In this work, we consider noisy channels which can corrupt messages. We present an approach to model ...

    Non-Parametric Clustering of Multivariate Count Data 

    Tekumalla, Lavanya Sita (2018-05-23)
    The focus of this thesis is models for non-parametric clustering of multivariate count data. While there has been significant work in Bayesian non-parametric modelling in the last decade, in the context of mixture models ...

    Design of Quality Assuring Mechanisms with Learning for Strategic Crowds 

    Satyanath Bhat, K (2018-05-23)
    In this thesis, we address several generic problems concerned with procurement of tasks from a crowd that consists of strategic workers with uncertainty in their qualities. These problems assume importance as the quality ...

    Scalable Sprase Bayesian Nonparametric and Matrix Tri-factorization Models for Text Mining Applications 

    Ranganath, B N (2018-05-23)
    Hierarchical Bayesian Models and Matrix factorization methods provide an unsupervised way to learn latent components of data from the grouped or sequence data. For example, in document data, latent component corn-responds ...
    • 1
    • . . .
    • 11
    • 12
    • 13
    • 14
    • 15
    • 16
    • 17
    • . . .
    • 25

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV
     

     

    Browse

    All of etd@IIScCommunities & CollectionsTitlesAuthorsAdvisorsSubjectsBy Thesis Submission DateThis CommunityTitlesAuthorsAdvisorsSubjectsBy Thesis Submission Date

    My Account

    LoginRegister

    Discover

    AuthorBharadwaj, Subramanya B V (2)Ranganath, B N (2)Ravindar, Archana (2)Shivaleela, E S (2)Srikanth, Cherukupally (2)Tudu, Jaynarayan Thakurdas (2)Achar, Avinash (1)Acharya, Aravind N (1)Afraz, Mohammed (1)Agrawal, Akanksha (1)... View MoreSubject
    Computer Science (247)
    Machine Learning (15)Game Theory (8)Coding Theory (7)Graph Theory (7)Computer Networks (6)Cryptography (6)Compilers (5)Computer Architecture (5)Crowdsourcing (5)... View MoreDate Issued2010 - 2018 (203)2006 - 2009 (24)Has File(s)Yes (247)

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV