• Login
    Search 
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Search
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 81-90 of 142

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100

    Extending Program Analysis Techniques to Web Applications and Distributed Systems 

    Athaiya, Snigdha
    Web-based applications and distributed systems are ubiquitous and indispensable today. These systems use multiple parallel machines for greater functionality, and efficient and reliable computation. At the same time they ...

    Problems on bend-number, circular separation dimension and maximum edge 2-colouring 

    Lahiri, Abhiruk
    Representation of graphs as the intersection graphs of geometric objects has a long history. The objective is to a nd a collection of \simple" sets S such that a given graph G is its intersection graph. We are interested ...

    Structured Regularization Through Convex Relaxations Of Discrete Penalties 

    Sankaran, Raman
    Motivation. Empirical risk minimization(ERM) is a popular framework for learning predictive models from data, which has been used in various domains such as computer vision, text processing, bioinformatics, neuro-biology, ...

    Adaptively Secure Primitives in the Random Oracle Model 

    Sarkar, Pratik
    Adaptive security embodies one of the strongest notions of security that allows an adversary to corrupt parties at any point during protocol execution and gain access to its internal state. Since it models reallife situations ...

    Guarding Terrain using k-Watchtowers 

    Tripathi, Nitesh
    The discrete k-watchtower problem for a polyhedral terrain T in R3 with n vertices is to nd k vertical segments, called watchtowers, of smallest height, whose bottom end-points (bases) lie on some vertices of T, and ...

    Dynamics of a Stratified Population of Optimum Seeking Agents on a Network 

    Mandal, Nirabhra
    Very large scale multi-agent systems occur both naturally and in engineering applications. In many of these systems, the agents are either selfish or act with varying levels of coordination. Understanding the evolution of ...

    Novel Reinforcement Learning Algorithms and Applications to Hybrid Control Design Problems 

    Gandhi, Meet
    The thesis is a compilation of two independent works. In the first work, we develop novel weight assignment procedure, which helps us develop several schedule based algorithms. Learning the value function of a given policy ...

    Towards Effcient Privacy-Preserving Two-Party k-Means Clustering Protocol 

    Chim, Sonali
    Two-party data mining is a win-win game if played with a guarantee of data privacy from each other. This guarantee is provided by the use of cryptographic techniques in designing the two-party protocol. The need to ...

    Revisiting Statistical Techniques for Result Cardinality Estimation 

    Shah, Dhrumilkumar
    The Relational Database Management Systems (RDBMS) constitute the backbone of today's information-rich society, providing a congenial environment for handling enterprise data during its entire life cycle of generation, ...

    Honest Majority and Beyond: Efficient Secure Computation over Small Population 

    Singla, Swati
    Secure Multi-Party Computation for small population has witnessed notable practically-efficient works in the setting of both honest majority and dishonest majority. While honest majority provides the promise of stronger ...
    • 1
    • . . .
    • 6
    • 7
    • 8
    • 9
    • 10
    • 11
    • 12
    • . . .
    • 15

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV
     

     

    Browse

    All of etd@IIScCommunities & CollectionsTitlesAuthorsAdvisorsSubjectsBy Thesis Submission DateThis CommunityTitlesAuthorsAdvisorsSubjectsBy Thesis Submission Date

    My Account

    LoginRegister

    Discover

    AuthorAfreen, Ahmad (1)Agarwal, Siddharth (1)Aggarwal, Manasvi (1)Agrawal, Nikhil (1)Ajith, S (1)Allabadi, Swati (1)Anand, Abhinav (1)Arora, Himanshu (1)Arote, Prerna (1)Arpith, K (1)... View MoreSubject
    TECHNOLOGY (142)
    Deep Learning (10)Reinforcement Learning (10)Machine Learning (9)Cryptography (6)Markov Decision Processes (5)Natural Language Processing (5)algorithms (4)Artificial Intelligence (4)Graphs (4)... View MoreHas File(s)
    Yes (142)

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV