Division of Electrical, Electronics, and Computer Science (EECS): Recent submissions
Now showing items 121-140 of 1577
-
Modeling, Design and Control of Power-Electronic-Actuated Electromagnetic Bearings
Many practical electrical machines, turbines, and compressors operate in speeds ranging from tens of thousands of rpm to hundreds of thousands of rpm, also handling a significant amount of power. While high-speed operation ... -
Security, Secrecy, and Privacy in Hotplug and Multi-Access Coded Caching Problems
With the rapid growth in data consumption, efficient content delivery has become a key challenge in modern communication networks. Coded caching offers a powerful solution by leveraging storage at the users to reduce peak ... -
Studies in learning and representation in connectionist networks
This work deals with questions related to learning and representation in connectionist networks. The main issue taken up in learning is the convergence of local learning rules for feedforward networks. We ask the following ... -
Evolutionary design of plan based pattern recognition systems in complex domains
Many real-life Pattern Recognition (PR) problems do not fit into the classical PR paradigms. Such systems are currently being implemented using knowledge-based approaches. Designing such systems is an involved, evolutionary ... -
Referral reward embedded bi-phase information diffusion technique for social networks
Social networks provide an effective marketing platform to enhance the visibility of a business by reaching out to a wide base of potential customers cutting across gaps of geographic locations, age groups, and socio-economic ... -
Hadwiger number and the cartesian product operation on graphs
Abstract page scanned and attached as separate attachment -
Towards complete automatic code generation
A compiler consists of two phases: source program analysis and object program synthesis. The problem of compilation has been tackled in depth, and many tools and techniques exist for building the analysis phase. Similar ... -
LiWA : a lightweight agent framework for distributed systems
In the world of mobile computing, agent-based systems present one of the most promising areas of research in distributed systems. Component-based architecture is a new paradigm that is ideal for developing agent frameworks, ... -
Formal tools for specification-driven protocol design of distributed computing systems
The widespread use of Distributed Computing Systems (DCSs) is due to the advantages of better performance, improved reliability, efficient resource sharing and easy upgradability. In order to realize the advantages of a ... -
Effective optimization techniques for a parallel file system
Effective Optimization Techniques for a Parallel File System by Raghvendran M Significant work has been done in evolving parallel I/O architectures, I/O interfaces, and other programming techniques. However, only a few ... -
Design and implementation of a multidimensional multilink multicomputer hardware and software
In this thesis, we propose and implement a multidimensional multilink system (MMS) architecture which uses message passing paradigm between computing elements (CEs). The merits of this architecture are its simplicity, regularity ... -
SAFIUS - A secure accountable filesystem over untrusted storage
With storage data requirements growing at around 40% every year, the entities that control the data are different from entities that consume the data. The drastic growth in storage requirements and the ubiquitous accessibility ... -
Bimodal Projections Based Features for High Dimensional Pattern Classification
Classification tasks involving high-dimensional vectors are affected by the curse of dimensionality requiring large amount of training data. This is because a high dimensional space with a modest number of samples is ... -
Instruction scheduling for RISC processors
Instruction scheduling is the process of reordering instructions (whether assembly code or code in some other form) so as to make fuller use of the resources provided by the processor. In the case of RISC processors, ... -
Wavelets for volume graphics
In recent years, there has been a shift in the paradigm from surface-based graphics to volume graphics. Volume graphics uses a three-dimensional unit cube, known as a voxel, as its primitive, whereas surface-based graphics ... -
Counting number of points on elliptic curves over F2m fields : An implementation study
Hasse’s theorem states that:ifE {W g) Then |i| < 2y/q. This gives the bound on the number of points. In 1985, Schoof presented a polynomial time algorithm for computing The algorithm has running time of 0(log® q) bit ... -
Soundness and completeness results in partially-interpreted logics
Formulas in mathematical logic are syntactic expressions of uninterpreted symbols. The classical computational techniques of logic are oriented toward establishing the truth or falsehood of logic formulas in their uninterpreted ... -
Algorithms and lower bounds for graph connectivity and covering
Graph Connectivity is a well-studied problem, and its time complexity is well understood. However, its space complexity remains a mystery. Closely related to the space complexity of connectivity is the problem of derandomizing ... -
Extension of path probability method to approximate inference over time
There has been a tremendous growth in publicly available digital video footage over the past decade. This has necessitated the development of new techniques in computer vision geared towards efficient analysis, storage, ... -
Incremental techniques for code generation problems
Incremental compilation plays an important role in the functioning of integrated programming environments. The earlier phases of compilation like lexical analysis, parsing, semantic analysis, and dataflow analysis have ...

