Search
Now showing items 101-110 of 382
Error Correction in Index Coding And Coded Caching
In an index coding problem, there is a sender which has a set of messages and there
are multiple receivers demanding possibly different subsets of these messages and
possessing some other subsets of these messages as ...
Signcryption in a Quantum World
With recent advancements and research on quantum computers, it is conjectured that in the foreseeable
future, sufficiently large quantum computers will be built to break essentially all public key
cryptosystems currently ...
Synthesis of Conformal Antenna Arrays on Polygonal Cross-Sectional Cylindrical Conductors for 360 Degree Azimuth Coverage Applications
Antenna arrays are one of the most important part of any RF communications system nowadays.
Ranging from military to communication applications, the versatility they provide in selectively
enhancing and rejecting signals ...
Disruptive Approaches to Address Performance & Reliability Challenges in 2-Dimentional (2D) Material Based Transistors & Memories
In 2020, Apple introduced its most advanced laptop that has the A14 Bionic processor. The very first processor, Intel’s 4004, was launched in 1971 and had a transistor (the basic building block of a processor) density of ...
Price of Privacy of Smart Meter Data
Smart meter data can be used by the utility for billing the consumers timely along with power theft detection, demand side management, distribution network planning, consumer segmentation, load forecasting, fault detection, ...
Checking Observational Purity of Procedures
We provide two static analysis approaches(using theorem proving) that check if a given (recursive)
procedure behaves as if it were stateless, even when it maintains state in global variables.
In other words, we check if ...
Designing Solutions to Counter the Attacks in Mobile Ad hoc Networks
The open medium, dynamic topology and distributed operation in Mobile Ad hoc Networks
(MANET) leads to high risks. Many solutions are proposed to protect a MANET from attacks,
ranging from attack identification to ...
Novel First-order Algorithms for Non-smooth Optimization Problems in Machine Learning
This thesis is devoted to designing efficient optimization algorithms for machine learning (ML) problems where the underlying objective function to be optimized is convex but not necessarily differentiable. Such non-smooth ...
Low Power Machine Learning Systems for Energy Efficient Edge Devices
Energy-efficient devices are essential in the world of edge computing and the tiny Machine
Learning (tinyML) paradigm. Edge devices are often constrained by the available compu-
tational power and hardware resource. To ...
Nature-inspired Algorithms for Automated Deployment of Outdoor IoT Networks
A vast majority of the Internet of Things (IoT) devices will be connected in a topology where the edge-devices push data to a local gateway, which forwards the data to a cloud for further processing. In sizeable outdoor ...