• Login
    Search 
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Search
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 1-10 of 247

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100

    New Models and Methods for Formation and Analysis of Social Networks 

    Dhamal, Swapnil
    Social networks are an inseparable part of human lives, and play a major role in a wide range of activities in our day-to-day as well as long-term lives. The rapid growth of online social networks has enabled people to ...
    Thumbnail

    New Techniques for Automatic Short Answer Grading 

    Roy, Shourya
    Assessing acquired knowledge by students is one of the key aspects of the pedagogical ecosystem. A significant part of a teacher’s time is spent towards grading responses of students to questions given in assignments and ...

    Heterogeneity Aware Shared DRAM Cache for Integrated Heterogeneous Architectures 

    Patil, Adarsh
    Integrated Heterogeneous System (IHS) processors pack throughput-oriented GPGPUs along-side latency-oriented CPUs on the same die sharing certain resources, e.g., shared last level cache, network-on-chip (NoC), and the ...

    A Nash Bargaining Based Bid Optimizer for Sponsored Search Auctions 

    Kannan, Ramakrishnan
    The on-line advertising market involving displaying of Ads against search results by a search engine is growing at a fast rate. A majority of the search engine companies sell their advertising space through auctions which ...

    Efficient Key Management Protocols for Secure Routing and End-to-End Key Establishment with Enhanced Security in Mobile Ad hoc Networks 

    Talawar, Shrikant
    There is a need to protect mobile ad hoc network (MANET) from external attackers as well as internal attackers during route discovery and end-to-end key establishment. During route discovery, the external attackers can be ...

    Learning Tournament Solutions from Preference-based Multi-Armed Bandits 

    Siddartha, Y R
    We consider the dueling bandits problem, a sequential decision task where the goal is to learn to pick `good' arms out of an available pool by actively querying for and observing relative preferences between selected pairs ...

    An Improved Lower Bound for Multi-r-ic Depth Four Circuits as a Function of the Number of Input Variables 

    Hegde, Sumant
    In this work we study the multi-r-ic formula model introduced by [KS15c] and improve upon the lower bound for multi-r-ic depth four circuits given in [KST16b], when viewed as a function of the number of input variables ...

    Deep Learning with Minimal Supervision 

    Pandey, Gaurav
    Abstract In recent years, deep neural networks have achieved extraordinary performance on supervised learning tasks. Convolutional neural networks (CNN) have vastly improved the state of the art for most computer vision ...
    Thumbnail

    Program Repair by Automated Generation of Hints 

    Kaleeswaran, Shalini
    Programming has become an important skill in today's technology-driven world. It is a complex activity because of which programmers make mistakes in their software. Student programmers make mistakes in their programs due ...

    Computing Contour Tress for 2D Piecewise Polynomial Functions 

    Nucha, Girijanandan
    Contour trees are extensively used in scalar field analysis. The contour tree is a data structure that tracks the evolution of level set topology in a scalar field. Scalar fields are typically available as samples at ...
    • 1
    • 2
    • 3
    • 4
    • . . .
    • 25

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV
     

     

    Browse

    All of etd@IIScCommunities & CollectionsTitlesAuthorsAdvisorsSubjectsBy Thesis Submission DateThis CommunityTitlesAuthorsAdvisorsSubjectsBy Thesis Submission Date

    My Account

    LoginRegister

    Discover

    AuthorBharadwaj, Subramanya B V (2)Ranganath, B N (2)Ravindar, Archana (2)Shivaleela, E S (2)Srikanth, Cherukupally (2)Tudu, Jaynarayan Thakurdas (2)Achar, Avinash (1)Acharya, Aravind N (1)Afraz, Mohammed (1)Agrawal, Akanksha (1)... View MoreSubject
    Computer Science (247)
    Machine Learning (15)Game Theory (8)Coding Theory (7)Graph Theory (7)Computer Networks (6)Cryptography (6)Compilers (5)Computer Architecture (5)Crowdsourcing (5)... View MoreDate Issued2010 - 2018 (203)2006 - 2009 (24)Has File(s)
    Yes (247)

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV