• Login
    Search 
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Search
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 121-130 of 203

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100

    Outlier Detection with Applications in Graph Data Mining 

    Ranga Suri, N N R (2018-04-24)
    Outlier detection is an important data mining task due to its applicability in many contemporary applications such as fraud detection and anomaly detection in networks, etc. It assumes significance due to the general ...

    Constructing Provably Secure Identity-Based Signature Schemes 

    Chethan Kamath, H (2018-04-03)
    An identity-based cryptosystem (IBC) is a public-key system where the public key can be represented by any arbitrary string such as an e-mail address. The notion was introduced by Shamir with the primary goal of simplifying ...

    A Theoretical Study of the Synergy and Lazy Annotation Algorithms 

    Jayaram, Sampath (2018-04-03)
    Given a program with assertions, the assertion checking problem is to tell whether there is an execution of the program that violates one of the assertions. One approach to this problem is to explore different paths towards ...

    Model-Checking in Presburger Counter Systems using Accelerations 

    Acharya, Aravind N (2018-04-18)
    Model checking is a powerful technique for analyzing reach ability and temporal properties of finite state systems. Model-checking finite state systems has been well-studied and there are well known efficient algorithms ...

    Transducer-based Algorithmic Verification of Retransmission Protocols over Noisy Channels 

    Thakkar, Jay (2018-04-05)
    Unreliable communication channels are a practical reality. They add to the complexity of protocol design and verification. In this work, we consider noisy channels which can corrupt messages. We present an approach to model ...

    Non-Parametric Clustering of Multivariate Count Data 

    Tekumalla, Lavanya Sita (2018-05-23)
    The focus of this thesis is models for non-parametric clustering of multivariate count data. While there has been significant work in Bayesian non-parametric modelling in the last decade, in the context of mixture models ...

    Design of Quality Assuring Mechanisms with Learning for Strategic Crowds 

    Satyanath Bhat, K (2018-05-23)
    In this thesis, we address several generic problems concerned with procurement of tasks from a crowd that consists of strategic workers with uncertainty in their qualities. These problems assume importance as the quality ...

    Scalable Sprase Bayesian Nonparametric and Matrix Tri-factorization Models for Text Mining Applications 

    Ranganath, B N (2018-05-23)
    Hierarchical Bayesian Models and Matrix factorization methods provide an unsupervised way to learn latent components of data from the grouped or sequence data. For example, in document data, latent component corn-responds ...

    CLUSTER AND COLLECT : Compile Time Optimization For Effective Garbage Collection 

    Ravindar, Archana (2011-09-26)

    Hard Drive Failure Prediction : A Rule Based Approach 

    Agrawal, Vipul (2011-07-12)
    The ability to accurately predict an impending hard disk failure is important for reliable storage system design. The facility provided by most hard drive manufacturers, called S.M.A.R.T. (self-monitoring, analysis and ...
    • 1
    • . . .
    • 10
    • 11
    • 12
    • 13
    • 14
    • 15
    • 16
    • . . .
    • 21

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV
     

     

    Browse

    All of etd@IIScCommunities & CollectionsTitlesAuthorsAdvisorsSubjectsBy Thesis Submission DateThis CommunityTitlesAuthorsAdvisorsSubjectsBy Thesis Submission Date

    My Account

    LoginRegister

    Discover

    AuthorBharadwaj, Subramanya B V (2)Ranganath, B N (2)Ravindar, Archana (2)Srikanth, Cherukupally (2)Tudu, Jaynarayan Thakurdas (2)Achar, Avinash (1)Acharya, Aravind N (1)Agrawal, Akanksha (1)Agrawal, Vipul (1)Ajith, S (1)... View MoreSubject
    Computer Science (203)
    Machine Learning (14)Coding Theory (6)Game Theory (6)Graph Theory (6)Cryptography (5)Compilers (4)Computational Geometry (4)Computer Architecture (4)Computer Networks (4)... View MoreDate Issued2018 (76)2011 (28)2017 (24)2013 (22)2012 (18)2010 (14)2014 (14)2015 (5)2016 (2)Has File(s)
    Yes (203)

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV