• Login
    Browsing Computer Science and Automation (CSA) by Title 
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Browsing Computer Science and Automation (CSA) by Title
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Browsing Computer Science and Automation (CSA) by Title
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browsing Computer Science and Automation (CSA) by Title

    • 0-9
    • A
    • B
    • C
    • D
    • E
    • F
    • G
    • H
    • I
    • J
    • K
    • L
    • M
    • N
    • O
    • P
    • Q
    • R
    • S
    • T
    • U
    • V
    • W
    • X
    • Y
    • Z

    Sort by:

    Order:

    Results:

    Now showing items 274-293 of 509

    • title
    • xmlui.ArtifactBrowser.ConfigurableBrowse.sort_by.datesubmitted
    • issue date
    • ascending
    • descending
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
      • Labelled clustering and its applications 

        Sridhar, V
        Clustering is a process of grouping a collection of objects. Clustering approaches can be broadly categorized into conventional and knowledge-based approaches. In a conventional approach, objects are typically represented ...
      • Language Support for Exploiting Software Structure Specifications 

        Kumar, Bharath M (Indian Institute of Science, 2005-02-16)
        Precise specification of the architecture and design of software is a good practice. Such specifications contain a lot of information about the software that can potentially be exploited by tools, to reduce redundancy ...
      • Language Support for Exploiting Software Structure Specifications  

        Kumar, Bharath M
        Precise specification of the architecture and design of software is a good practice. Such specifications contain a lot of information about the software that can potentially be exploited by tools to reduce redundancy in ...
      • Language Support For Testing CORBA Based Applications 

        Vardhan, K Ananda (Indian Institute of Science, 2005-12-07)
        Component Based Development has emerged as economical, reusable, scalable way of developing enterprise as well as embedded software applications. Testing distributed component based systems is difficult when third party ...
      • Large Data Clustering And Classification Schemes For Data Mining 

        Babu, T Ravindra (2009-03-20)
        Data Mining deals with extracting valid, novel, easily understood by humans, potentially useful and general abstractions from large data. A data is large when number of patterns, number of features per pattern or both are ...
      • Large Scale Graph Processing in a Distributed Environment 

        Upadhyay, Nitesh (2018-05-25)
        Graph algorithms are ubiquitously used across domains. They exhibit parallelism, which can be exploited on parallel architectures, such as multi-core processors and accelerators. However, real world graphs are massive in ...
      • Large Scale Implementation Of The Block Lanczos Algorithm 

        Srikanth, Cherukupally (2010-08-16)
        Large sparse matrices arise in many applications, especially in the major problems of Cryptography of factoring integers and computing discrete logarithms. We focus attention on such matrices called sieve matrices generated ...
      • Large-Scale Integer And Polynomial Computations : Efficient Implementation And Applications 

        Amberker, B B (2012-05-03)
      • Learning Algorithms Using Chance-Constrained Programs 

        Jagarlapudi, Saketha Nath (2010-07-08)
        This thesis explores Chance-Constrained Programming (CCP) in the context of learning. It is shown that chance-constraint approaches lead to improved algorithms for three important learning problems — classification with ...
      • Learning Decentralized Goal-Based Vector Quantization 

        Gupta, Piyush (2012-05-04)
      • Learning Dynamic Prices In Electronic Markets 

        Venkata Lakshmipathi Raju, CH (2011-04-19)
      • Learning From Examples Using Hierarchical Counterfactual Expressions 

        Bhandaru, Malini Krishnan
        In this study, we develop algorithms for learning concepts from examples. Learning is the capability that allows a system to improve its performance. It involves the ability to correct errors, learn domain knowledge, ...
      • Learning Invariants for Verification of Programs and Control Systems 

        Ezudheen, P
        Deductive verification techniques in the style of Floyd and Hoare have the potential to give us concise, compositional, and scalable proofs of the correctness of various kinds of software systems like programs and control ...
      • Learning Robust Support Vector Machine Classifiers With Uncertain Observations 

        Bhadra, Sahely (2015-08-19)
        The central theme of the thesis is to study linear and non linear SVM formulations in the presence of uncertain observations. The main contribution of this thesis is to derive robust classfiers from partial knowledge of ...
      • Learning to Adapt Policies for uSD card 

        Anand, Abhinav
        Machine Learning(ML) for Systems is a new and promising research area where performance of computer systems is optimized using machine learning methods. ML for Systems has outperformed traditional heuristics methods in ...
      • Learning Tournament Solutions from Preference-based Multi-Armed Bandits 

        Siddartha, Y R
        We consider the dueling bandits problem, a sequential decision task where the goal is to learn to pick `good' arms out of an available pool by actively querying for and observing relative preferences between selected pairs ...
      • Learning with Complex Performance Measures : Theory, Algorithms and Applications 

        Narasimhan, Harikrishna (2017-12-07)
        We consider supervised learning problems, where one is given objects with labels, and the goal is to learn a model that can make accurate predictions on new objects. These problems abound in applications, ranging from ...
      • LiWA : a lightweight agent framework for distributed systems 

        Chhabra, Avneet Singh
        In the world of mobile computing, agent-based systems present one of the most promising areas of research in distributed systems. Component-based architecture is a new paradigm that is ideal for developing agent frameworks, ...
      • Locally Reconstructable Non-malleable Secret Sharing 

        Tomy, Jenit
        Non-malleable secret sharing (NMSS) schemes, introduced by Goyal and Kumar (STOC 2018), ensure that a secret m can be distributed into shares m1,...,mn (for some n), such that any t (a parameter <= n) shares can be ...
      • Loop Transformations for Multi-/Many-Core Architectures using Machine Learning 

        Babalad, Shilpa
        Loop transformation techniques such as loop tiling, loop interchange and unroll-and-jam help expose better coarse-grain and fine-grain data-level parallelisms as well as exploit data locality. These transformations are ...

        etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
        Contact Us | Send Feedback | Thesis Templates
        Theme by 
        Atmire NV
         

         

        Browse

        All of etd@IIScCommunities & CollectionsTitlesAuthorsAdvisorsSubjectsBy Thesis Submission DateThis CollectionTitlesAuthorsAdvisorsSubjectsBy Thesis Submission Date

        My Account

        LoginRegister

        etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
        Contact Us | Send Feedback | Thesis Templates
        Theme by 
        Atmire NV