Search
Now showing items 151-160 of 382
Verification of a Generative Separation Kernel
A Separation Kernel is a small specialized microkernel that provides a sand-boxed execution environment
for a given set of processes (also called \subjects"). The subjects may communicate
only via declared memory channels, ...
Deep Learning Models for Few-shot and Metric Learning
Deep neural network-based models have achieved unprecedented performance levels over many tasks in the traditional supervised setting and scale well with large quantities of data. On the other hand, improving performance ...
Geometric and Topological Methods for Biomolecular Visualization
Biomolecules like proteins are the basic building blocks of living systems. It has been observed that the structure of a biomolecule plays an important role in defining its function. In this thesis, we describe novel ...
Fast High-Dimensional Filtering
Smoothing (diffusion) is a fundamental task in low-level vision and image processing. In the context of natural images, where edges (sharp discontinuities) play an important psychovisual role, the smoothing process needs ...
Deep Learning for Bug Localization and Program Repair
In this thesis, we focus on the problem of program debugging and present novel deep learning
based techniques for bug-localization and program repair. Deep learning techniques have been
successfully applied to a variety ...
Fully Resilient Non-Interactive ID-Based Hierarchical Key Agreement
Non-Interactive Key Agreement (NIKA) is a cryptographic primitive which allows two parties
to agree on a shared secret key without any interaction. Identity-based Non-Interactive Key
Agreement (ID-NIKA) allows each party ...
Quantum-Drift-Diffusion Formalism Based Compact Model For Low Effective Mass Channel MOSFET
With the passage of time the semiconductor research community around the globe has progressed from a nearly four decades of dominating Silicon research to look for newer transistor materials, in the pursuit of more operating ...
Efficient and Secure Search over Encrypted Data
Due to a variety of crucial bene fits, enterprises outsource their data to cloud resident storage. The
outsourced data needs to be stored in encrypted form on remote untrusted servers to preserve privacy.
However, if the ...
Towards Secure and Efficient Realization of Pairing-Based Signatures from Static Assumptions.
Bilinear pairing defined over elliptic curve group was first used to design novel cryptosystem in 2000. Since then a large number of cryptosystems has been proposed in pairing-based cryptography (PBC). The main tool for ...
Codes for distributed storage, private information retrieval and low-latency streaming
This thesis presents results on error correcting codes for settings such as: (a) distributed storage, (b) private information retrieval, and (c) low-latency streaming. It also presents two new decoding algorithms for Polar ...