Browsing Computer Science and Automation (CSA) by Title
Now showing items 263282 of 351

P3 : An Effective Technique for Partitioned Path Profiling
Acyclic path profile is an abstraction of dynamic control flow paths of procedures and has been found to be useful in a wide spectrum of activities. Unfortunately, the runtime overhead of obtaining such a profile can be ... 
A Parallelizing Compiler for Fortran
(Indian Institute of Science, 20050309)With the advent of Distributed Memory Machines (DMMs) numerous work have been undertaken to ease the work of a programmer these systems. Data parallel languages like Fortran D, Vienna Fortran, High Performance Fortran and ... 
Parameterized Complexity of Maximum Edge Coloring in Graphs
(20180309)The classical graph edge coloring problem deals in coloring the edges of a given graph with minimum number of colors such that no two adjacent edges in the graph, get the same color in the proposed coloring. In the following ... 
Performance Characterization and Optimizations of Traditional ML Applications
Even in the era of Deep Learning based methods, traditional machine learning methods with large data sets continue to attract significant attention. However, we find an apparent lack of a detailed performance characterization ... 
Petri Net Model Based Energy Optimization Of Programs Using Dynamic Voltage And Frequency Scaling
(20130529)High power dissipation and onchip temperature limit performance and affect reliability in modern microprocessors. For servers and data centers, they determine the cooling cost, whereas for handheld and mobile systems, ... 
Plan Bouquets : An Exploratory Approach to Robust Query Processing
(20170926)Over the last four decades, relational database systems, with their mathematical basis in firstorder logic, have provided a congenial and efficient environment to handle enterprise data during its entire life cycle of ... 
Polymage : Automatic Optimization for Image Processing Pipelines
(20180625)Image processing pipelines are ubiquitous. Every image captured by a camera and every image uploaded on social networks like Google+or Facebook is processed by a pipeline. Applications in a wide range of domains like ... 
Power Efficient Last Level Cache For Chip Multiprocessors
(20150909)The number of processor cores and onchip cache size has been increasing on chip multiprocessors (CMPs). As a result, leakage power dissipated in the onchip cache has become very significant. We explore various techniques ... 
Power Issues in SoCs : Power Aware DFT Architecture and Power Estimation
(20180110)Test power, data volume, and test time have been longstanding problems for sequential scan based testing of systemonchip (SoC) design. The modern SoCs fabricated at lower technology nodes are complex in nature, the ... 
Practically Efficient Secure Small Party Computation over the Internet
Secure Multiparty Computation (MPC) with small population has drawn focus specifically due to customization in techniques and resulting efficiency that the constructions can offer. Practically efficient constructions ... 
Precise Analysis of Private And Shared Caches for Tight WCET Estimates
(20171031)Worst Case Execution Time (WCET) is an important metric for programs running on realtime systems, and finding precise estimates of a program’s WCET is crucial to avoid overallocation and wastage of hardware resources and ... 
Problems on bendnumber, circular separation dimension and maximum edge 2colouring
Representation of graphs as the intersection graphs of geometric objects has a long history. The objective is to a nd a collection of \simple" sets S such that a given graph G is its intersection graph. We are interested ... 
Procurement Network Formation : A Cooperative Game Theoretic Approach
(20090416)Complex economic activity often involves interrelationships at several levels of production, often referred to as supply chains or procurement networks. In this thesis we address the problem of forming procurement networks ... 
Program Analyses to Support Memorysaving Refactorings in Java Programs
Software commonly consumes unexpectedly high amounts of memory, frequently due to programming idioms that are used to make software more reliable, maintainable and understandable. In the case of modern objectoriented ... 
Program Repair by Automated Generation of Hints
Programming has become an important skill in today's technologydriven world. It is a complex activity because of which programmers make mistakes in their software. Student programmers make mistakes in their programs due ... 
Provable Methods for Nonnegative Matrix Factorization
(20171031)Nonnegative matrix factorization (NMF) is an important dataanalysis problem which concerns factoring a given d n matrix A with nonnegative entries into matrices B and C where B and C are d k and k n with nonnegative ... 
QuantumSafe IdentityBased Signature Scheme in Multivariate Quadratic Setting
Cryptographic techniques are essential for the security of communication in modern society. Today, nearly all public key cryptographic schemes used in practice are based on the two problems of factoring large integers and ... 
Rainbow Colouring and Some Dimensional Problems in Graph Theory
(20180405)This thesis touches three diﬀerent topics in graph theory, namely, rainbow colouring, product dimension and boxicity. Rainbow colouring An edge colouring of a graph is called a rainbow colouring, if every pair of vertices ...