• Login
    Browsing Computer Science and Automation (CSA) by Title 
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Browsing Computer Science and Automation (CSA) by Title
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Browsing Computer Science and Automation (CSA) by Title
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browsing Computer Science and Automation (CSA) by Title

    • 0-9
    • A
    • B
    • C
    • D
    • E
    • F
    • G
    • H
    • I
    • J
    • K
    • L
    • M
    • N
    • O
    • P
    • Q
    • R
    • S
    • T
    • U
    • V
    • W
    • X
    • Y
    • Z

    Sort by:

    Order:

    Results:

    Now showing items 330-349 of 351

    • title
    • xmlui.ArtifactBrowser.ConfigurableBrowse.sort_by.datesubmitted
    • issue date
    • ascending
    • descending
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
      • Targeted Client Synthesis for Detecting Concurrency Bugs 

        Samak, Malavika (2018-01-01)
        Detecting concurrency bugs can be challenging due to the intricacies associated with their manifestation. These intricacies correspond to identifying the methods that need to be invoked concurrently, the inputs passed to ...
      • A Theoretical Study of the Synergy and Lazy Annotation Algorithms 

        Jayaram, Sampath (2018-04-03)
        Given a program with assertions, the assertion checking problem is to tell whether there is an execution of the program that violates one of the assertions. One approach to this problem is to explore different paths towards ...
      • Tiling Stencil Computations To Maximize Parallelism 

        Bandishti, Vinayaka Prakasha (2017-05-21)
        Stencil computations are iterative kernels often used to simulate the change in a discretized spatial domain overtime (e.g., computational fluid dynamics) or to solve for unknowns in a discretized space by converging to a ...
      • Time Management In Partitioned Systems 

        Kodancha, A Hariprasad (2010-02-11)
        Time management is one of the critical modules of safety-critical systems. Applications need strong assurance from the operating system that their hard real-time requirements are met. Partitioned system has recently evolved ...
      • Top-k Spatial Aware Ads 

        Savla, Virti
        Consider an app on a smartphone which displays local business ads. When a user opens the app, then k local business ads need to displayed (where k would typically be 3 or 5) such that the profit made by the app is ...
      • Towards a Charcterization of the Symmetries of the Nisan-Wigderson Polynomial Family 

        Gupta, Nikhil (2018-07-09)
        Understanding the structure and complexity of a polynomial family is a fundamental problem of arithmetic circuit complexity. There are various approaches like studying the lower bounds, which deals with nding the smallest ...
      • Towards Effcient Privacy-Preserving Two-Party k-Means Clustering Protocol 

        Chim, Sonali
        Two-party data mining is a win-win game if played with a guarantee of data privacy from each other. This guarantee is provided by the use of cryptographic techniques in designing the two-party protocol. The need to ...
      • Towards Secure and Efficient Realization of Pairing-Based Signatures from Static Assumptions. 

        Kabaleeshwaran, R
        Bilinear pairing defined over elliptic curve group was first used to design novel cryptosystem in 2000. Since then a large number of cryptosystems has been proposed in pairing-based cryptography (PBC). The main tool for ...
      • Transducer-based Algorithmic Verification of Retransmission Protocols over Noisy Channels 

        Thakkar, Jay (2018-04-05)
        Unreliable communication channels are a practical reality. They add to the complexity of protocol design and verification. In this work, we consider noisy channels which can corrupt messages. We present an approach to model ...
      • TriSL: A Software Architecture Description Language and Environment 

        Lakshminarayanan, R (Indian Institute of Science, 2005-03-14)
        As the size and complexity of a software system increases, the design problem goes beyond the algorithms and data structures of the computation. Designing and specifying the overall system structure -- or software architecture ...
      • A Trusted-Hardware Backed Secure Payments Platform for Android 

        Agarwal, Rounak
        Digital payments using personal electronic devices have been steadily gaining in popularity for the last few years. While digital payments using smartphones are very convenient, they are also more susceptible to security ...
      • Two Player Game Variant Of The Erdos Szekeres Problem 

        Parikshit, K (2014-08-01)
        The following problem has been known for its beauty and elementary character. The Erd˝os Szekeres problem[7]: For any integer k ≥ 3, determine if there exists a smallest positive integer N(k) such that any set of atleast ...
      • Typestates and Beyond: Verifying Rich Behavioral Properties Over Complex Programs 

        Mishra, Ashish
        Statically verifying behavioral properties of programs is an important research problem. An efficient solution to this problem will have visible effects over multiple domains, ranging from program development, program ...
      • A Unified Approach to Quantitative Software Lifecycle Modeling 

        Rao, Vijay D (Indian Institute of Science, 2005-04-06)
        An evolutionary process currently taking place in engineering systems is the shift from hardware to software where the role of software engineering is becoming more central in developing large engineering systems. This ...
      • Unifying Views Of Tail-Biting Trellises For Linear Block Codes 

        Nori, Aditya Vithal (2011-09-23)
      • Using Explicit State Space Enumeration For Specification Based Regression Testing 

        Chakrabarti, Sujit Kumar (2010-07-08)
        Regression testing of an evolving software system may involve significant challenges. While, there would be a requirement of maximising the probability of finding out if the latest changes to the system has broken some ...
      • Utilizing Worker Groups And Task Dependencies in Crowdsourcing 

        Ojha, Prakhar
        Crowdsourcing has emerged as a convenient mechanism to collect human judgments on a variety of tasks, ranging from document and image classification to scientific experimentation. However, in recent times crowdsourcing has ...
      • Variants and Generalization of Some Classical Problems in Combinatorial Geometry 

        Bharadwaj, Subramanya B V (2018-02-18)
        In this thesis we consider extensions and generalizations of some classical problems in Combinatorial Geometry. Our work is an offshoot of four classical problems in Combinatorial Geometry. A fundamental assumption in these ...
      • Variants of Hegselmann-Krause Model 

        Shiragur, Kirankumar Shivanand (2017-12-04)
        The Hegselmann-Krause system (HK system for short) is one of the most popular models for the dynamics of opinion formation in multi agent systems. Agents are modeled as points in opinion space, and at every time step, each ...
      • Verification of a Generative Separation Kernel 

        Haque, Inzemamul
        A Separation Kernel is a small specialized microkernel that provides a sand-boxed execution environment for a given set of processes (also called \subjects"). The subjects may communicate only via declared memory channels, ...

        etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
        Contact Us | Send Feedback | Thesis Templates
        Theme by 
        Atmire NV
         

         

        Browse

        All of etd@IIScCommunities & CollectionsTitlesAuthorsAdvisorsSubjectsBy Thesis Submission DateThis CollectionTitlesAuthorsAdvisorsSubjectsBy Thesis Submission Date

        My Account

        LoginRegister

        etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
        Contact Us | Send Feedback | Thesis Templates
        Theme by 
        Atmire NV