• Login
    Browsing Computer Science and Automation (CSA) by Title 
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Browsing Computer Science and Automation (CSA) by Title
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Browsing Computer Science and Automation (CSA) by Title
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browsing Computer Science and Automation (CSA) by Title

    • 0-9
    • A
    • B
    • C
    • D
    • E
    • F
    • G
    • H
    • I
    • J
    • K
    • L
    • M
    • N
    • O
    • P
    • Q
    • R
    • S
    • T
    • U
    • V
    • W
    • X
    • Y
    • Z

    Sort by:

    Order:

    Results:

    Now showing items 128-147 of 351

    • title
    • xmlui.ArtifactBrowser.ConfigurableBrowse.sort_by.datesubmitted
    • issue date
    • ascending
    • descending
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
      • FA RCU: Fault Aware Read-Copy-Update 

        Dubey, Abhishek
        Deferred freeing is the fundamental technique used in Read-Copy-Update (RCU) synchronization technique where reclamation of resources is deferred until the completion of all active RCU read-side critical sections. We observe ...
      • Falcon : A Graph Manipulation Language for Distributed Heterogeneous Systems 

        Cheramangalath, Unnikrishnan (2018-08-20)
        Graphs model relationships across real-world entities in web graphs, social network graphs, and road network graphs. Graph algorithms analyze and transform a graph to discover graph properties or to apply a computation. ...
      • Fast Actively Secure OT Extension for Short Secrets 

        Ajith, S (2018-05-25)
        Oblivious Transfer (OT) is one of the most fundamental cryptographic primitives with wide-spread application in general secure multi-party computation (MPC) as well as in a number of tailored and special-purpose problems ...
      • Fast Algorithms for Max Cut on Geometric Intersection Graphs 

        Joshi, Utkarsh
        In this work, we design fast algorithms for max cut on geometric intersection graphs. In the maximum cut (a.k.a., max cut) problem, the input is an undirected graph, and the goal is to partition the vertex set into two ...
      • Feature Adaptation Algorithms for Reinforcement Learning with Applications to Wireless Sensor Networks And Road Traffic Control 

        Prabuchandran, K J (2017-09-20)
        Many sequential decision making problems under uncertainty arising in engineering, science and economics are often modelled as Markov Decision Processes (MDPs). In the setting of MDPs, the goal is to and a state dependent ...
      • Feature Selection under Multicollinearity & Causal Inference on Time Series 

        Bhattacharya, Indranil (2018-08-20)
        In this work, we study and extend algorithms for Sparse Regression and Causal Inference problems. Both the problems are fundamental in the area of Data Science. The goal of regression problem is to nd out the \best" ...
      • A Fine-Grained Dynamic Information Flow Analysis for Android Apps 

        Sankaran, Shyam (2018-08-20)
        Android has been steadily gaining popularity ever since its launch in 2008. One of the major factors for this is the easy availability of a large variety of apps. They range from simple apps such as calculator apps to apps ...
      • A Framework for Privacy-Compliant Delivery Drones 

        Beck, Rakesh Rajan
        We present Privaros, a framework to enforce privacy policies on drones. Privaros is designed for commercial delivery drones, such as the ones that will likely be used by Amazon Prime Air. Such drones visit a number of host ...
      • Fully Resilient Non-Interactive ID-Based Hierarchical Key Agreement 

        Tiwari, Mayank
        Non-Interactive Key Agreement (NIKA) is a cryptographic primitive which allows two parties to agree on a shared secret key without any interaction. Identity-based Non-Interactive Key Agreement (ID-NIKA) allows each party ...
      • Fully Resilient Non-Interactive ID-Based Hierarchical Key Agreement 

        Tiwari, Mayank
        Non-Interactive Key Agreement (NIKA) is a cryptographic primitive which allows two parties to agree on a shared secret key without any interaction. Identity-based Non-Interactive Key Agreement (ID-NIKA) allows each party ...
      • Game Theoretic Models For Social Network Analysis 

        Narayanam, Ramasuri (2014-08-01)
        With increasing demand for social network based activities, it is very important to understand not only the structural properties of social networks but also how social networks form, to better exploit their promise and ...
      • Game-Theoretic Analysis of Strategic Behaviour in Networks, Crowds and Classrooms 

        Vallam, Rohith Dwarakanath (2018-01-03)
        Over the past decade, the explosive growth of the Internet has led to a surge of interest to understand and predict aggregate behavior of large number of people or agents, particularly when they are connected through an ...
      • Generalization of Hitting, Covering and Packing Problems on Intervals 

        Datta Krupa, R (2018-05-29)
        Interval graphs are well studied structures. Intervals can represent resources like jobs to be sched-uled. Finding maximum independent set in interval graphs would correspond to scheduling maximum number of non-conflicting ...
      • Generalizations Of The Popular Matching Problem 

        Nasre, Meghana (2013-07-02)
        Matching problems arise in several real-world scenarios like assigning posts to applicants, houses to trainees and room-mates to one another. In this thesis we consider the bipartite matching problem where one side of the ...
      • Genetic Algorithm Based Automatic Data Partitioning Scheme For HPF On A Linux Cluster 

        Anand, Sunil Kumar (2011-09-26)
      • Geometric and Topological Methods for Biomolecular Visualization 

        Masood, Talha Bin
        Biomolecules like proteins are the basic building blocks of living systems. It has been observed that the structure of a biomolecule plays an important role in defining its function. In this thesis, we describe novel ...
      • A GPU Accelerated Tensor Spectral Method for Subspace Clustering 

        Pai, Nithish (2017-11-30)
        In this thesis we consider the problem of clustering the data lying in a union of subspaces using spectral methods. Though the data generated may have high dimensionality, in many of the applications, such as motion ...
      • Graph Models For Query Focused Text Summarization And Assessment Of Machine Translation Using Stopwords 

        Rama, B (2014-04-09)
        Text summarization is the task of generating a shortened version of the original text where core ideas of the original text are retained. In this work, we focus on query focused summarization. The task is to generate the ...
      • Grobuer Basis Algorithms for Polynomial Ideal Theory over Noetherian Commutative Rings 

        Francis, Maria (2018-05-14)
        One of the fundamental problems in commutative algebra and algebraic geometry is to understand the nature of the solution space of a system of multivariate polynomial equations over a field k, such as real or complex ...
      • Guarding Terrain using k-Watchtowers 

        Tripathi, Nitesh
        The discrete k-watchtower problem for a polyhedral terrain T in R3 with n vertices is to nd k vertical segments, called watchtowers, of smallest height, whose bottom end-points (bases) lie on some vertices of T, and ...

        etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
        Contact Us | Send Feedback | Thesis Templates
        Theme by 
        Atmire NV
         

         

        Browse

        All of etd@IIScCommunities & CollectionsTitlesAuthorsAdvisorsSubjectsBy Thesis Submission DateThis CollectionTitlesAuthorsAdvisorsSubjectsBy Thesis Submission Date

        My Account

        LoginRegister

        etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
        Contact Us | Send Feedback | Thesis Templates
        Theme by 
        Atmire NV