• Login
    Search 
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Search
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 1-10 of 24

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100

    Discovering Frequent Episodes : Fast Algorithms, Connections With HMMs And Generalizations 

    Laxman, Srivatsan (2008-10-13)
    Temporal data mining is concerned with the exploration of large sequential (or temporally ordered) data sets to discover some nontrivial information that was previously unknown to the data owner. Sequential data sets come ...

    A Peer To Peer Web Proxy Cache For Enterprise Networks 

    Ravindranath, C K (2009-09-10)
    In this thesis, we propose a decentralized peer-to-peer (P2P) Web proxy cache for enterprise networks (ENs). Currently, enterprises use a centralized proxy-based Web cache, where a dedicated proxy server does the caching. ...

    Efficient Online Path Profiling 

    Vaswani, Kapil (2009-06-05)
    Most dynamic program analysis techniques such as profile-driven compiler optimizations, software testing and runtime property checking infer program properties by profiling one or more executions of a program. Unfortunately, ...

    Bounds On Augmented Automata And Quantum Adiabatic Optimization 

    Rao, M V Panduranga (2009-05-25)
    Quantum computing has generated a lot of interested in the past two decades. Research into powerful models of quantum computation has yielded important and elegant results like an efficient algorithm for factoring and a ...

    Caching Techniques For Dynamic Web Servers 

    Suresha, * (2009-03-20)
    Websites are shifting from static model to dynamic model, in order to deliver their users with dynamic, interactive, and personalized experiences. However, dynamic content generation comes at a cost – each request ...

    Spill Code Minimization And Buffer And Code Size Aware Instruction Scheduling Techniques 

    Nagarakatte, Santosh G (2009-05-19)
    Instruction scheduling and Software pipelining are important compilation techniques which reorder instructions in a program to exploit instruction level parallelism. They are essential for enhancing instruction level ...

    Optimizations In Storage Area Networks And Direct Attached Storage 

    Dharmadeep, M C (2009-07-23)
    The thesis consists of three parts. In the first part, we introduce the notion of device-cache-aware schedulers. Modern disk subsystems have many megabytes of memory for various purposes such as prefetching and caching. ...

    Design Of Incentive Compatible Mechanisms For Ticket Allocation In Software Maintenance Services 

    Subbian, Karthik (2009-05-28)
    Software Maintenance is becoming more and more challenging due to rapidly changing customer needs, technologies and need for highly skilled labor. Many problems that existed a decade ago continue to exist or have even ...

    Experimental Studies On A New Class Of Combinatorial LDPC Codes 

    Dang, Rajdeep Singh (2009-06-05)
    We implement a package for the construction of a new class of Low Density Parity Check (LDPC) codes based on a new random high girth graph construction technique, and study the performance of the codes so constructed on ...

    Electronic Access Control Systems: A New Approach 

    Janardhana Swamy, V C (Indian Institute of Science, 2006-08-30)
    Security systems are gaining increasing importance in recent times to protect life and valuable resources. Many advanced methods of providing security have been developed and are in use in the last few decades. Of these, ...
    • 1
    • 2
    • 3

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV
     

     

    Browse

    All of etd@IIScCommunities & CollectionsTitlesAuthorsAdvisorsSubjectsBy Thesis Submission DateThis CommunityTitlesAuthorsAdvisorsSubjectsBy Thesis Submission Date

    My Account

    LoginRegister

    Discover

    AuthorAnanthakrishnan, G (1)Babu, T Ravindra (1)Bharath Kumar, M (1)Dang, Rajdeep Singh (1)Darera, Vivek N (1)Dharmadeep, M C (1)Dukkipati, Ambedkar (1)Hadimani, Vijayalakshmi (1)Janardhana Swamy, V C (1)Joseph, P J (1)... View MoreSubject
    Computer Science (24)
    Data Mining (3)Computer Networks (2)Hidden Markov Models (2)LDPC Codes (2)Speech Recognition (2)Access Control Systems (ACS) (1)Adaptive Caching Algorithms (1)Additive White Gaussian Noise (AWGN) (1)Allocation Decreasing Algorithm (1)... View MoreDate Issued2009 (18)2008 (3)2007 (2)2006 (1)Has File(s)Yes (24)

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV