• Login
    Search 
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Search
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 171-180 of 203

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100

    Boxicity, Cubicity And Vertex Cover 

    Shah, Chintan D (2010-09-28)
    The boxicity of a graph G, denoted as box(G), is the minimum dimension d for which each vertex of G can be mapped to a d-dimensional axis-parallel box in Rd such that two boxes intersect if and only if the corresponding ...

    Supervised Classification of Missense Mutations as Pathogenic or Tolerated using Ensemble Learning Methods 

    Balasubramanyam, Rashmi (2018-07-09)
    Missense mutations account for more than 50% of the mutations known to be involved in human inherited diseases. Missense classification is a challenging task that involves sequencing of the genome, identifying the variations, ...

    Ranking from Pairwise Comparisons : The Role of the Pairwise Preference Matrix 

    Rajkumar, Arun (2018-07-05)
    Ranking a set of candidates or items from pair-wise comparisons is a fundamental problem that arises in many settings such as elections, recommendation systems, sports team rankings, document rankings and so on. Indeed it ...

    Number Theoretic, Computational and Cryptographic Aspects of a Certain Sequence of Arithmetic Progressions 

    Srikanth, Cherukupally (2018-06-21)
    This thesis introduces a new mathematical object: collection of arithmetic progressions with elements satisfying the inverse property, \j-th terms of i-th and (i+1)-th progressions are multiplicative inverses of each other ...

    Stochastic Approximation Algorithms with Set-valued Dynamics : Theory and Applications 

    Ramaswamy, Arunselvan (2018-07-05)
    Stochastic approximation algorithms encompass a class of iterative schemes that converge to a sought value through a series of successive approximations. Such algorithms converge even when the observations are erroneous. ...

    Efficient Static Analyses for Concurrent Programs 

    Mukherjee, Suvam (2018-06-29)
    Concurrent programs are pervasive owing to the increasing adoption of multi-core systems across the entire computing spectrum. However, the large set of possible program behaviors make it difficult to write correct and ...

    A Static Slicing Tool for Sequential Java Programs 

    Devaraj, Arvind (2018-07-28)
    A program slice consists of a subset of the statements of a program that can potentially affect values computed at some point of interest. Such a point of interest along with a set of variables is called a slicing criterion. ...

    Semantic Analysis of Web Pages for Task-based Personal Web Interactions 

    Manjunath, Geetha (2017-11-27)
    Mobile widgets now form a new paradigm of simplified web. Probably, the best experience of the Web is when a user has a widget for every frequently executed task, and can execute it anytime, anywhere on any device. However, ...

    Precise Analysis of Private And Shared Caches for Tight WCET Estimates 

    Nagar, Kartik (2017-10-31)
    Worst Case Execution Time (WCET) is an important metric for programs running on real-time systems, and finding precise estimates of a program’s WCET is crucial to avoid over-allocation and wastage of hardware resources and ...

    Plan Bouquets : An Exploratory Approach to Robust Query Processing 

    Dutt, Anshuman (2017-09-26)
    Over the last four decades, relational database systems, with their mathematical basis in first-order logic, have provided a congenial and efficient environment to handle enterprise data during its entire life cycle of ...
    • 1
    • . . .
    • 15
    • 16
    • 17
    • 18
    • 19
    • 20
    • 21

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV
     

     

    Browse

    All of etd@IIScCommunities & CollectionsTitlesAuthorsAdvisorsSubjectsBy Thesis Submission DateThis CommunityTitlesAuthorsAdvisorsSubjectsBy Thesis Submission Date

    My Account

    LoginRegister

    Discover

    AuthorBharadwaj, Subramanya B V (2)Ranganath, B N (2)Ravindar, Archana (2)Srikanth, Cherukupally (2)Tudu, Jaynarayan Thakurdas (2)Achar, Avinash (1)Acharya, Aravind N (1)Agrawal, Akanksha (1)Agrawal, Vipul (1)Ajith, S (1)... View MoreSubject
    Computer Science (203)
    Machine Learning (14)Coding Theory (6)Game Theory (6)Graph Theory (6)Cryptography (5)Compilers (4)Computational Geometry (4)Computer Architecture (4)Computer Networks (4)... View MoreDate Issued2018 (76)2011 (28)2017 (24)2013 (22)2012 (18)2010 (14)2014 (14)2015 (5)2016 (2)Has File(s)
    Yes (203)

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV