Browsing Computer Science and Automation (CSA) by Title
Now showing items 164183 of 354

An Implementation of Cross Architecture Procedure Call
(Indian Institute of Science, 20050126)workstations are ideally suited for computing jobs which require an interactive environment because they are basically single user machines and hence provide consistent response time. Another factor is the availability ... 
Implementation Of Database Security Features Using Bit Matrices
(Indian Institute of Science, 20050216)Information security is of utmost concern in a multiuser environment. The importance of security is felt much more with the widespread use of distributed database. Information is by itself a critical resource of an enterprise ... 
Improved Algorithms for Variants of Bin Packing and Knapsack.
We study variants of two classical optimization problems: Bin Packing and Knapsack. Both bin packing and knapsack fall under the regime of "Packing and Covering Problems". In bin packing, we are given a set of input items, ... 
Improved approximation bounds on maximum edge q coloring of dense graphs
The antiRamsey number ar(G,H) with input graph G and pattern graph H, is the maximum positive integer k such that there exists an edge coloring of G using k colors, in which there are no rainbow subgraphs isomorphic to ... 
An Improved Lower Bound for Depth four Arithmetic Circuits
(20180529)We study the problem of proving lower bounds for depth four arithmetic circuits. Depth four circuits have been receiving much attraction when it comes to recent circuit lower bound results, as a result of the series of ... 
An Improved Lower Bound for Multiric Depth Four Circuits as a Function of the Number of Input Variables
In this work we study the multiric formula model introduced by [KS15c] and improve upon the lower bound for multiric depth four circuits given in [KST16b], when viewed as a function of the number of input variables ... 
Improving LastLevel Cache Performance in Single and MultiCore Processsors
(20180423)With offchip memory access taking 100's of processor cycles, getting data to the processor in a timely fashion remains one of the key performance bottlenecks in current systems. With increasing core counts, this problem ... 
Improving the Precision of a Scalable DemandDriven Null Dereference Verification for Java
(20180319)The problem addressed in this thesis is sound, scalable, demanddriven nulldereference veriﬁcation for Java programs via overapproximated weakest preconditions analysis. The base version of this analysis having been ... 
Incentive Design for Crowdfunding and Crowdsourcing Markets
(20180523)With the everincreasing trend in the number of social interactions getting intermediated by technology (the world wide web) as the backdrop, this thesis focuses on the design of mechanisms for online communities (crowds) ... 
Incentive Strategies and Algorithms for Networks, Crowds and Markets
(20180802)This work is motivated by several modern applications involving social networks, crowds, and markets. Our work focuses on the theme of designing effective incentive strategies for these applications. Viral marketing is ... 
Inducing Constraints in Paraphrase Generation and Consistency in Paraphrase Detection
Deep learning models typically require a large volume of data. Manual curation of datasets is timeconsuming and limited by imagination. As a result, natural language generation (NLG) has been employed to automate the ... 
Integrated Parallel Simulations and Visualization for LargeScale Weather Applications
(20180728)The emergence of the exascale era necessitates development of new techniques to efficiently perform highperformance scientific simulations, online data analysis and onthefly visualization. Critical applications like ... 
Integrated Scheduling For Clustered VLIW Processors
(Indian Institute of Science, 20051125)Clustered architecture processors are preferred for embedded systems because centralized register file architectures scale poorly in terms of clock rate, chip area, and power consumption. Scheduling for clustered architectures ... 
Integrated Scheduling For Distributed Systems
(20130731) 
Integrating A New Cluster Assignment And Scheduling Algorithm Into An Experimental Retargetable Code Generation Framework
(20090309)This thesis presents a new uniﬁed algorithm for cluster assignment and acyclic region scheduling in a partitioned architecture, and preliminary results on its integration into an experimental retargetable code generation ... 
Integrating ReadCopyUpdate Synchronization and Memory Allocation
The evolution of multicore systems with thousands of cores has led to the exploration of nontraditional procrastinationbased synchronization techniques such as ReadCopy Update (RCU). Deferred destruction is the ... 
Interactive Virtual Machining : A Voxel Based Approach
(20130724) 
Intersection Graphs Of Boxes And Cubes
(20110125)A graph Gis said to be an intersection graph of sets from a family of sets if there exists a function ƒ : V(G)→ such that for u,v V(G), (u,v) E(G) ƒ (u) ƒ (v) ≠ . Interval graphs are thus the intersection graphs ... 
Investigations on CPI Centric Worst Case Execution Time Analysis
(20180319)Estimating program worst case execution time (WCET) is an important problem in the domain of realtime systems and embedded systems that are deadlinecentric. If WCET of a program is found to exceed the deadline, it is ...