• Login
    Browsing Computer Science and Automation (CSA) by Title 
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Browsing Computer Science and Automation (CSA) by Title
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Browsing Computer Science and Automation (CSA) by Title
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browsing Computer Science and Automation (CSA) by Title

    • 0-9
    • A
    • B
    • C
    • D
    • E
    • F
    • G
    • H
    • I
    • J
    • K
    • L
    • M
    • N
    • O
    • P
    • Q
    • R
    • S
    • T
    • U
    • V
    • W
    • X
    • Y
    • Z

    Sort by:

    Order:

    Results:

    Now showing items 138-157 of 351

    • title
    • xmlui.ArtifactBrowser.ConfigurableBrowse.sort_by.datesubmitted
    • issue date
    • ascending
    • descending
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
      • Game Theoretic Models For Social Network Analysis 

        Narayanam, Ramasuri (2014-08-01)
        With increasing demand for social network based activities, it is very important to understand not only the structural properties of social networks but also how social networks form, to better exploit their promise and ...
      • Game-Theoretic Analysis of Strategic Behaviour in Networks, Crowds and Classrooms 

        Vallam, Rohith Dwarakanath (2018-01-03)
        Over the past decade, the explosive growth of the Internet has led to a surge of interest to understand and predict aggregate behavior of large number of people or agents, particularly when they are connected through an ...
      • Generalization of Hitting, Covering and Packing Problems on Intervals 

        Datta Krupa, R (2018-05-29)
        Interval graphs are well studied structures. Intervals can represent resources like jobs to be sched-uled. Finding maximum independent set in interval graphs would correspond to scheduling maximum number of non-conflicting ...
      • Generalizations Of The Popular Matching Problem 

        Nasre, Meghana (2013-07-02)
        Matching problems arise in several real-world scenarios like assigning posts to applicants, houses to trainees and room-mates to one another. In this thesis we consider the bipartite matching problem where one side of the ...
      • Genetic Algorithm Based Automatic Data Partitioning Scheme For HPF On A Linux Cluster 

        Anand, Sunil Kumar (2011-09-26)
      • Geometric and Topological Methods for Biomolecular Visualization 

        Masood, Talha Bin
        Biomolecules like proteins are the basic building blocks of living systems. It has been observed that the structure of a biomolecule plays an important role in defining its function. In this thesis, we describe novel ...
      • A GPU Accelerated Tensor Spectral Method for Subspace Clustering 

        Pai, Nithish (2017-11-30)
        In this thesis we consider the problem of clustering the data lying in a union of subspaces using spectral methods. Though the data generated may have high dimensionality, in many of the applications, such as motion ...
      • Graph Models For Query Focused Text Summarization And Assessment Of Machine Translation Using Stopwords 

        Rama, B (2014-04-09)
        Text summarization is the task of generating a shortened version of the original text where core ideas of the original text are retained. In this work, we focus on query focused summarization. The task is to generate the ...
      • Grobuer Basis Algorithms for Polynomial Ideal Theory over Noetherian Commutative Rings 

        Francis, Maria (2018-05-14)
        One of the fundamental problems in commutative algebra and algebraic geometry is to understand the nature of the solution space of a system of multivariate polynomial equations over a field k, such as real or complex ...
      • Guarding Terrain using k-Watchtowers 

        Tripathi, Nitesh
        The discrete k-watchtower problem for a polyhedral terrain T in R3 with n vertices is to nd k vertical segments, called watchtowers, of smallest height, whose bottom end-points (bases) lie on some vertices of T, and ...
      • Hadwiger's Conjecture On Circular Arc Graphs 

        Belkale, Naveen (2009-04-30)
        Conjectured in 1943, Hadwiger’s conjecture is one of the most challenging open problems in graph theory. Hadwiger’s conjecture states that if the chromatic number of a graph G is k, then G has a clique minor of size at ...
      • Handling Overloads with Social Consistency 

        Singla, Priyanka
        Cloud computing applications have dynamic workloads, and they often observe spikes in the incoming traffic which might result in system overloads. System overloads are generally handled by various load balancing techniques ...
      • Hard Drive Failure Prediction : A Rule Based Approach 

        Agrawal, Vipul (2011-07-12)
        The ability to accurately predict an impending hard disk failure is important for reliable storage system design. The facility provided by most hard drive manufacturers, called S.M.A.R.T. (self-monitoring, analysis and ...
      • Heterogeneity Aware Shared DRAM Cache for Integrated Heterogeneous Architectures 

        Patil, Adarsh
        Integrated Heterogeneous System (IHS) processors pack throughput-oriented GPGPUs along-side latency-oriented CPUs on the same die sharing certain resources, e.g., shared last level cache, network-on-chip (NoC), and the ...
      • Hierarchical Data Structures for Pattern Recognition 

        Choudhury, Sabyasachy (Indian Institute of Science, 2005-02-22)
        Pattern recognition is an important area with potential applications in computer vision, Speech understanding, knowledge engineering, bio-medical data classification, earth sciences, life sciences, economics, psychology, ...
      • High Performance GPU Tensor Core Code Generation for Matmul using MLIR 

        Katel, Naveep Kumar
        State of the art in high-performance deep learning is primarily driven by highly tuned libraries. These libraries are often hand-optimized and tuned by expert programmers using low-level abstractions with significant effort. ...
      • Hitting and Piercing Geometric Objects Induced by a Point Set 

        Rajgopal, Ninad (2017-12-07)
      • Hitting Geometric Range Spaces using a Few Points 

        Ashok, Pradeesha (2018-02-15)
        A range space (P, S) consists of a set P of n elements and a collection S = {S1,...,Sm} of subsets of P , referred to as ranges. A hitting set for this range space refers to a subset H of P such that every Si in S contains ...
      • Honest Majority and Beyond: Efficient Secure Computation over Small Population 

        Singla, Swati
        Secure Multi-Party Computation for small population has witnessed notable practically-efficient works in the setting of both honest majority and dishonest majority. While honest majority provides the promise of stronger ...
      • HYDRA: A Dynamic Approach to Database Regeneration 

        Sanghi, Anupam
        Database software vendors often need to generate synthetic databases for a variety of applications, including (a) Testing database engines and applications, (b) Data masking, (c) Benchmarking, (d) Creating what-if scenarios, ...

        etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
        Contact Us | Send Feedback | Thesis Templates
        Theme by 
        Atmire NV
         

         

        Browse

        All of etd@IIScCommunities & CollectionsTitlesAuthorsAdvisorsSubjectsBy Thesis Submission DateThis CollectionTitlesAuthorsAdvisorsSubjectsBy Thesis Submission Date

        My Account

        LoginRegister

        etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
        Contact Us | Send Feedback | Thesis Templates
        Theme by 
        Atmire NV