• Login
    Browsing Computer Science and Automation (CSA) by Title 
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Browsing Computer Science and Automation (CSA) by Title
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Browsing Computer Science and Automation (CSA) by Title
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browsing Computer Science and Automation (CSA) by Title

    • 0-9
    • A
    • B
    • C
    • D
    • E
    • F
    • G
    • H
    • I
    • J
    • K
    • L
    • M
    • N
    • O
    • P
    • Q
    • R
    • S
    • T
    • U
    • V
    • W
    • X
    • Y
    • Z

    Sort by:

    Order:

    Results:

    Now showing items 203-222 of 351

    • title
    • xmlui.ArtifactBrowser.ConfigurableBrowse.sort_by.datesubmitted
    • issue date
    • ascending
    • descending
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
      • Machine Learning and Rank Aggregation Methods for Gene Prioritization from Heterogeneous Data Sources 

        Laha, Anirban (2017-12-05)
        Gene prioritization involves ranking genes by possible relevance to a disease of interest. This is important in order to narrow down the set of genes to be investigated biologically, and over the years, several computational ...
      • Matching Domain Model with Source Code using Relationships 

        Bharat, Patil Tejas (2018-01-30)
        We address the task of mapping a given domain model (e.g., an industry-standard reference model) for a given domain (e.g., ERP), with the source code of an independently developed application in the same domain. This has ...
      • A Mechanism Design Approach To Resource Procurement In Computational Grids With Rational Resource Providers 

        Prakash, Hastagiri (2009-07-08)
        A computational grid is a hardware and software infrastructure that provides dependable, consistent, pervasive, and inexpensive access to high-end computational capabilities. In the presence of grid users who are autonomous, ...
      • Mechanism Design For Strategic Crowdsourcing 

        Nath, Swaprava (Indian Institute of Science, 2013-12-17)
        This thesis looks into the economics of crowdsourcing using game theoretic modeling. The art of aggregating information and expertise from a diverse population has been in practice since a long time. The Internet and the ...
      • A Memory Allocation Framework for Optimizing Power Consumption and Controlling Fragmentation 

        Panwar, Ashish (2018-07-20)
        Large physical memory modules are necessary to meet performance demands of today's ap- plications but can be a major bottleneck in terms of power consumption during idle periods or when systems are running with workloads ...
      • MIST : Mlgrate The Storage Too 

        Kamala, R (2017-05-25)
        We address the problem of migration of local storage of desktop users to remote sites. Assuming a network connection is maintained between the source and destination after the migration makes it possible for us to transfer ...
      • Model Checking Temporal Properties of Presburger Counter Systems 

        Kommineni, Vasanta Lakshmi
        Counter systems are a well-known and powerful modeling notation for specifying infnite state systems. In this thesis we target the problem of checking temporal properties of counter systems. We address three predominant ...
      • Model Extraction and Active Learning 

        Shukla, Aditya
        Machine learning models are increasingly being offered as a service by big companies such as Google, Microsoft and Amazon. They use Machine Learning as a Service (MLaaS) to expose these machine learning models to the ...
      • Model Extraction Defense using Modified Variational Autoencoder 

        Gupta, Yash
        Machine Learning as a Service (MLaaS) exposes machine learning (ML) models that are trained on confidential datasets to users in the form of an Application Programming Interface (API). Since the MLaaS models are deployed ...
      • Model-based Safe Deep Reinforcement Learning and Empirical Analysis of Safety via Attribution 

        Jayant, Ashish
        During initial iterations of training in most Reinforcement Learning (RL) algorithms, agents perform a significant number of random exploratory steps, which in the real-world limit the practicality of these algorithms ...
      • Model-Checking in Presburger Counter Systems using Accelerations 

        Acharya, Aravind N (2018-04-18)
        Model checking is a powerful technique for analyzing reach ability and temporal properties of finite state systems. Model-checking finite state systems has been well-studied and there are well known efficient algorithms ...
      • Model-Checking Infinite-State Systems For Information Flow Security Properties 

        Raghavendra, K R (2017-02-16)
        Information flow properties are away of specifying security properties of systems ,dating back to the work of Goguen and Meseguer in the eighties. In this framework ,a system is modeled as having high-level (or confidential)events ...
      • Modeling and Adaptive Scheduling Strategies for Distributed Graph Algorithms 

        Dindokar, Ravikant Devidas
        Graph processing at scales of millions-billions of vertices and edges has become common to solve real-world problems in domains like social networks, smart cities and genomics. Distributed "Big Data" platforms for graph ...
      • Modeling and verification of database-accessing applications 

        Chawla, Geetam
        Databases are central to the functioning of most IT-enabled processes and services. In many domains, databases are accessed and updated via applications written in general-purpose lan- guages, as such applications need ...
      • Modelling The Acoustics Of The Vocal Tract Using Phase-Integral Theory 

        Bhattacharya, Sukumar (2012-05-03)
      • Module Grobner Bases Over Fields With Valuation 

        Sen, Aritra (2017-07-12)
        Tropical geometry is an area of mathematics that interfaces algebraic geometry and combinatorics. The main object of study in tropical geometry is the tropical variety, which is the combinatorial counterpart of a classical ...
      • Morse-Smale Complexes : Computation and Applications 

        Shivashankar, Nithin (2018-01-30)
        In recent decades, scientific data has become available in increasing sizes and precision. Therefore techniques to analyze and summarize the ever increasing datasets are of vital importance. A common form of scientific ...
      • MPCLeague: Robust MPC Platform for Privacy-Preserving Machine Learning 

        Ajith, S
        In the modern era of computing, machine learning tools have demonstrated their potential in vital sectors, such as healthcare and finance, to derive proper inferences. The sensitive and confidential nature of the data in ...
      • Multi-Armed Bandits – On Range Searching and On Slowly-varying Non-stationarity 

        Ramakrishnan, K
        Multi-Armed Bandits (MAB) is a popular framework for modelling sequential decision-making problems under uncertainty. This thesis is a compilation of two independent works on MABs. 1. In the first work, we study a ...
      • Multi-label Classification with Multiple Label Correlation Orders And Structures 

        Posinasetty, Anusha (2018-06-18)
        Multilabel classification has attracted much interest in recent times due to the wide applicability of the problem and the challenges involved in learning a classifier for multilabeled data. A crucial aspect of multilabel ...

        etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
        Contact Us | Send Feedback | Thesis Templates
        Theme by 
        Atmire NV
         

         

        Browse

        All of etd@IIScCommunities & CollectionsTitlesAuthorsAdvisorsSubjectsBy Thesis Submission DateThis CollectionTitlesAuthorsAdvisorsSubjectsBy Thesis Submission Date

        My Account

        LoginRegister

        etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
        Contact Us | Send Feedback | Thesis Templates
        Theme by 
        Atmire NV