Division of Electrical, Electronics, and Computer Science (EECS): Recent submissions
Now showing items 241-260 of 1303
-
Deep Learning over Hypergraphs
Graphs have been extensively used for modelling real-world network datasets, however, they are restricted to pairwise relationships, i.e., each edge connects exactly two vertices. Hypergraphs relax the notion of edges ... -
Classifying Magnetic and Non-magnetic Two-dimensional Materials by Machine Learning
There has been a giant leap in technological advancement with the introduction of graphene and its remarkable properties after 2005. Since the inception of graphene, the new class of materials called 2D materials are ... -
Probabilistic source-filter model of speech
The human respiratory system plays a crucial role in breathing and swallow ing. However, it also plays an essential role in speech production, which is unique to humans. Speech production involves expelling air from the ... -
Novel Regularized Image Reconstruction Algorithms for Sparse Photoacoustic Tomography
Among all tissue imaging modalities, photo-acoustic tomography (PAT), has been getting increasing attention in the recent past due to the fact that it has high contrast, high penetrability, and has capability of retrieving ... -
MPCLeague: Robust MPC Platform for Privacy-Preserving Machine Learning
In the modern era of computing, machine learning tools have demonstrated their potential in vital sectors, such as healthcare and finance, to derive proper inferences. The sensitive and confidential nature of the data in ... -
Optimal Redundancy in Distributed Systems for Latency and Repair
Distributed systems are employed in many modern storage and computing architecture for greater reliability and cost-efficiency. There are several important considerations in the design and implementation of such distributed ... -
Quantum-Safe Identity-Based Signature Scheme in Multivariate Quadratic Setting
Cryptographic techniques are essential for the security of communication in modern society. Today, nearly all public key cryptographic schemes used in practice are based on the two problems of factoring large integers and ... -
Spectrotemporal Processing of Speech Signals Using the Riesz Transform
Speech signals possess a rich time-varying spectral content, which makes their analysis a challenging signal processing problem. Developing methods for accurate speech analysis has a direct impact on applications such as ... -
Probabilistic Forwarding of Coded Packets for Broadcasting over Networks
Motivated by applications in sensor networks and the Internet of Things (IoT), in this dissertation, we consider the problem of energy-efficient broadcasting from a source node in a large dense network. Flooding, as a ... -
A Syntactic Neural Model For Question Decomposition
Question decomposition along with single-hop Question Answering (QA) system serve as useful modules in developing multi-hop Question Answering systems, mainly because the resulting QA system is interpretable and has been ... -
Enhancing Coverage and Robustness of Database Generators
Generating synthetic databases that capture essential data characteristics of client databases is a common requirement for enterprise database vendors. This need stems from a variety of use-cases, such as application testing ... -
Acoustic-Articulatory Mapping: Analysis and Improvements with Neural Network Learning Paradigms
Human speech is one of many acoustic signals we perceive, which carries linguistic and paralinguistic (e.g., speaker identity, emotional state) information. Speech acoustics are produced as a result of different temporally ... -
Extending Program Analysis Techniques to Web Applications and Distributed Systems
Web-based applications and distributed systems are ubiquitous and indispensable today. These systems use multiple parallel machines for greater functionality, and efficient and reliable computation. At the same time they ... -
Speaker verification using whispered speech
Like neutral speech, whispered speech is one of the natural modes of speech production, and it is often used by speakers in their day-to-day life. For some people, such as laryngectomees, whispered speech is the only ... -
Sequential Controlled Sensing to Detect an Anomalous Process
In this thesis, we study the problem of identifying an anomalous arm in a multi-armed bandit as quickly as possible, subject to an upper bound on the error probability. Also known as odd arm identification, this problem ... -
Statistical Network Analysis: Community Structure, Fairness Constraints, and Emergent Behavior
Networks or graphs provide mathematical tools for describing and analyzing relational data. They are used in biology to model interactions between proteins, in economics to identify trade alliances among countries, in ... -
Support Recovery from Linear Measurements: Tradeoffs in the Measurement-Constrained Regime
In this thesis, we study problems under the theme of discovering joint sparsity structure in a set of high-dimensional data samples from linear measurements. Our primary focus is on the regime where the number of samples ... -
Problems on bend-number, circular separation dimension and maximum edge 2-colouring
Representation of graphs as the intersection graphs of geometric objects has a long history. The objective is to a nd a collection of \simple" sets S such that a given graph G is its intersection graph. We are interested ... -
Guarding Terrain using k-Watchtowers
The discrete k-watchtower problem for a polyhedral terrain T in R3 with n vertices is to nd k vertical segments, called watchtowers, of smallest height, whose bottom end-points (bases) lie on some vertices of T, and ... -
Integrated Optical Double Ring Resonators with MEMS for Pressure and Acceleration Sensing
Silicon Photonics has become a signi ficant area of research in last three decades because of its high speed operation, low power consumption and the most important feature, resistant to electro-magnetic interferences. ...