Search
Now showing items 121-130 of 203
Outlier Detection with Applications in Graph Data Mining
(2018-04-24)
Outlier detection is an important data mining task due to its applicability in many contemporary applications such as fraud detection and anomaly detection in networks, etc. It assumes significance due to the general ...
Constructing Provably Secure Identity-Based Signature Schemes
(2018-04-03)
An identity-based cryptosystem (IBC) is a public-key system where the public key can be represented by any arbitrary string such as an e-mail address. The notion was introduced by Shamir with the primary goal of simplifying ...
A Theoretical Study of the Synergy and Lazy Annotation Algorithms
(2018-04-03)
Given a program with assertions, the assertion checking problem is to tell whether there is an execution of the program that violates one of the assertions. One approach to this problem is to explore different paths towards ...
Model-Checking in Presburger Counter Systems using Accelerations
(2018-04-18)
Model checking is a powerful technique for analyzing reach ability and temporal properties of finite state systems. Model-checking finite state systems has been well-studied and there are well known efficient algorithms ...
Transducer-based Algorithmic Verification of Retransmission Protocols over Noisy Channels
(2018-04-05)
Unreliable communication channels are a practical reality. They add to the complexity of protocol design and verification. In this work, we consider noisy channels which can corrupt messages. We present an approach to model ...
Non-Parametric Clustering of Multivariate Count Data
(2018-05-23)
The focus of this thesis is models for non-parametric clustering of multivariate count data. While there has been significant work in Bayesian non-parametric modelling in the last decade, in the context of mixture models ...
Design of Quality Assuring Mechanisms with Learning for Strategic Crowds
(2018-05-23)
In this thesis, we address several generic problems concerned with procurement of tasks from a crowd that consists of strategic workers with uncertainty in their qualities. These problems assume importance as the quality ...
Scalable Sprase Bayesian Nonparametric and Matrix Tri-factorization Models for Text Mining Applications
(2018-05-23)
Hierarchical Bayesian Models and Matrix factorization methods provide an unsupervised way to learn latent components of data from the grouped or sequence data. For example, in document data, latent component corn-responds ...
Hard Drive Failure Prediction : A Rule Based Approach
(2011-07-12)
The ability to accurately predict an impending hard disk failure is important for reliable storage system design. The facility provided by most hard drive manufacturers, called S.M.A.R.T. (self-monitoring, analysis and ...

