Search
Now showing items 51-60 of 107
Efficient and Secure Search over Encrypted Data
Due to a variety of crucial bene fits, enterprises outsource their data to cloud resident storage. The
outsourced data needs to be stored in encrypted form on remote untrusted servers to preserve privacy.
However, if the ...
Cross-Modal Retrieval and Hashing
The objective of cross-modal retrieval is to retrieve relevant items from one modality (say image), given a query from another modality (say textual document). Cross-modal retrieval has various applications like matching ...
Algorithms for Stochastic Optimization, Statistical Estimation and Markov Decision Processes
Stochastic approximation deals with the problem of finding zeros of a function expressed as an expectation
of a random variable. In this thesis we propose convergent algorithms for problems in
optimization, statistical ...
Hypergraph Network Models: Learning, Prediction, and Representation in the Presence of Higher-Order Relations
The very thought about “relating” objects makes us assume the relation would be “pairwise”, and
not of a “higher-order” — involving possibly more than two of them at a time. Yet in reality,
higher-order relations do exist ...
Constant-rate Non-malleable Codes and their Applications
Non-malleable codes(NMC) introduced by Dziembowski, Pietrzak and Wichs in ITCS 2010,
provide powerful security guarantees where error-correcting codes can not provide any guarantee: a decoding of tampered codeword is ...
Model Checking Temporal Properties of Presburger Counter Systems
Counter systems are a well-known and powerful modeling notation for specifying infnite state systems. In this thesis we target the problem of checking temporal properties of
counter systems. We address three predominant ...
FA RCU: Fault Aware Read-Copy-Update
Deferred freeing is the fundamental technique used in Read-Copy-Update (RCU) synchronization technique where reclamation of resources is deferred until the completion of all active RCU read-side critical sections. We observe ...
Dynamics of a Stratified Population of Optimum Seeking Agents on a Network
Very large scale multi-agent systems occur both naturally and in engineering applications. In many of these systems, the agents are either selfish or act with varying levels of coordination. Understanding the evolution of ...
Novel Reinforcement Learning Algorithms and Applications to Hybrid Control Design Problems
The thesis is a compilation of two independent works.
In the first work, we develop novel weight assignment procedure, which helps us develop several schedule based algorithms. Learning the value function of a given policy ...
Towards Effcient Privacy-Preserving Two-Party k-Means Clustering Protocol
Two-party data mining is a win-win game if played with a guarantee of data privacy from each other.
This guarantee is provided by the use of cryptographic techniques in designing the two-party protocol.
The need to ...