Browsing Computer Science and Automation (CSA) by Title
Now showing items 321-340 of 559
-
A Mechanism Design Approach To Resource Procurement In Computational Grids With Rational Resource Providers
(2009-07-08)A computational grid is a hardware and software infrastructure that provides dependable, consistent, pervasive, and inexpensive access to high-end computational capabilities. In the presence of grid users who are autonomous, ... -
Mechanism Design For Strategic Crowdsourcing
(Indian Institute of Science, 2013-12-17)This thesis looks into the economics of crowdsourcing using game theoretic modeling. The art of aggregating information and expertise from a diverse population has been in practice since a long time. The Internet and the ... -
A Memory Allocation Framework for Optimizing Power Consumption and Controlling Fragmentation
(2018-07-20)Large physical memory modules are necessary to meet performance demands of today's ap- plications but can be a major bottleneck in terms of power consumption during idle periods or when systems are running with workloads ... -
MIST : Mlgrate The Storage Too
(2017-05-25)We address the problem of migration of local storage of desktop users to remote sites. Assuming a network connection is maintained between the source and destination after the migration makes it possible for us to transfer ... -
Mitigating Bias via Algorithms with Fairness Guarantees
The rapid integration of automated decision-making systems in critical domains such as resume screening, loan approval, content recommendation, and disaster containment has raised significant concerns regarding biases in ... -
An MLIR-Based High-Level Synthesis Compiler for Hardware Accelerator Design
The emergence of machine learning, image and audio processing on edge devices has motivated research towards power-efficient custom hardware accelerators. Though FPGAs are an ideal target for custom accelerators, the ... -
Model Checking Temporal Properties of Presburger Counter Systems
Counter systems are a well-known and powerful modeling notation for specifying infnite state systems. In this thesis we target the problem of checking temporal properties of counter systems. We address three predominant ... -
Model Extraction and Active Learning
Machine learning models are increasingly being offered as a service by big companies such as Google, Microsoft and Amazon. They use Machine Learning as a Service (MLaaS) to expose these machine learning models to the ... -
Model Extraction Defense using Modified Variational Autoencoder
Machine Learning as a Service (MLaaS) exposes machine learning (ML) models that are trained on confidential datasets to users in the form of an Application Programming Interface (API). Since the MLaaS models are deployed ... -
Model-based Safe Deep Reinforcement Learning and Empirical Analysis of Safety via Attribution
During initial iterations of training in most Reinforcement Learning (RL) algorithms, agents perform a significant number of random exploratory steps, which in the real-world limit the practicality of these algorithms ... -
Model-Checking in Presburger Counter Systems using Accelerations
(2018-04-18)Model checking is a powerful technique for analyzing reach ability and temporal properties of finite state systems. Model-checking finite state systems has been well-studied and there are well known efficient algorithms ... -
Model-Checking Infinite-State Systems For Information Flow Security Properties
(2017-02-16)Information flow properties are away of specifying security properties of systems ,dating back to the work of Goguen and Meseguer in the eighties. In this framework ,a system is modeled as having high-level (or confidential)events ... -
Modeling and Adaptive Scheduling Strategies for Distributed Graph Algorithms
Graph processing at scales of millions-billions of vertices and edges has become common to solve real-world problems in domains like social networks, smart cities and genomics. Distributed "Big Data" platforms for graph ... -
Modeling and analysis of industrial design and fabrication Processes
Product design and development constitute an important activity in any manufacturing firm. Designing an optimized product design process and an optimized fabrication process is an important problem in itself and is of ... -
Modeling and verification of database-accessing applications
Databases are central to the functioning of most IT-enabled processes and services. In many domains, databases are accessed and updated via applications written in general-purpose lan- guages, as such applications need ... -
Modelling program dynamics : A study on locality of reference
Locality of reference is a phenomenon exhibited by programs and computer systems in general, and refers to the tendency to localize operations to a small subset of the available resources. In the past, this phenomenon has ... -
Module Grobner Bases Over Fields With Valuation
(2017-07-12)Tropical geometry is an area of mathematics that interfaces algebraic geometry and combinatorics. The main object of study in tropical geometry is the tropical variety, which is the combinatorial counterpart of a classical ... -
Monitoring program dynamics : Evaluation of software profiler effectiveness
Program monitoring tools are often used to verify program correctness, study program performance, and identify performance bottlenecks. Program profilers are a class of program monitoring tools which aid in tuning the ... -
Morse-Smale Complexes : Computation and Applications
(2018-01-30)In recent decades, scientific data has become available in increasing sizes and precision. Therefore techniques to analyze and summarize the ever increasing datasets are of vital importance. A common form of scientific ...

