Browsing Computer Science and Automation (CSA) by Title
Now showing items 184203 of 380

An Improved Lower Bound for Multiric Depth Four Circuits as a Function of the Number of Input Variables
In this work we study the multiric formula model introduced by [KS15c] and improve upon the lower bound for multiric depth four circuits given in [KST16b], when viewed as a function of the number of input variables ... 
Improving LastLevel Cache Performance in Single and MultiCore Processsors
(20180423)With offchip memory access taking 100's of processor cycles, getting data to the processor in a timely fashion remains one of the key performance bottlenecks in current systems. With increasing core counts, this problem ... 
Improving the Precision of a Scalable DemandDriven Null Dereference Verification for Java
(20180319)The problem addressed in this thesis is sound, scalable, demanddriven nulldereference veriﬁcation for Java programs via overapproximated weakest preconditions analysis. The base version of this analysis having been ... 
Incentive Design for Crowdfunding and Crowdsourcing Markets
(20180523)With the everincreasing trend in the number of social interactions getting intermediated by technology (the world wide web) as the backdrop, this thesis focuses on the design of mechanisms for online communities (crowds) ... 
Incentive Strategies and Algorithms for Networks, Crowds and Markets
(20180802)This work is motivated by several modern applications involving social networks, crowds, and markets. Our work focuses on the theme of designing effective incentive strategies for these applications. Viral marketing is ... 
Inducing Constraints in Paraphrase Generation and Consistency in Paraphrase Detection
Deep learning models typically require a large volume of data. Manual curation of datasets is timeconsuming and limited by imagination. As a result, natural language generation (NLG) has been employed to automate the ... 
Integrated Parallel Simulations and Visualization for LargeScale Weather Applications
(20180728)The emergence of the exascale era necessitates development of new techniques to efficiently perform highperformance scientific simulations, online data analysis and onthefly visualization. Critical applications like ... 
Integrated Scheduling For Clustered VLIW Processors
(Indian Institute of Science, 20051125)Clustered architecture processors are preferred for embedded systems because centralized register file architectures scale poorly in terms of clock rate, chip area, and power consumption. Scheduling for clustered architectures ... 
Integrated Scheduling For Distributed Systems
(20130731) 
Integrating A New Cluster Assignment And Scheduling Algorithm Into An Experimental Retargetable Code Generation Framework
(20090309)This thesis presents a new uniﬁed algorithm for cluster assignment and acyclic region scheduling in a partitioned architecture, and preliminary results on its integration into an experimental retargetable code generation ... 
Integrating ReadCopyUpdate Synchronization and Memory Allocation
The evolution of multicore systems with thousands of cores has led to the exploration of nontraditional procrastinationbased synchronization techniques such as ReadCopy Update (RCU). Deferred destruction is the ... 
Interactive Virtual Machining : A Voxel Based Approach
(20130724) 
Intersection Graphs Of Boxes And Cubes
(20110125)A graph Gis said to be an intersection graph of sets from a family of sets if there exists a function ƒ : V(G)→ such that for u,v V(G), (u,v) E(G) ƒ (u) ƒ (v) ≠ . Interval graphs are thus the intersection graphs ... 
Investigations on CPI Centric Worst Case Execution Time Analysis
(20180319)Estimating program worst case execution time (WCET) is an important problem in the domain of realtime systems and embedded systems that are deadlinecentric. If WCET of a program is found to exceed the deadline, it is ... 
IO Pattern Aware Methods to Improve the Performance and Lifetime of NAND SSD
Modern SSDs can store multiple bits per transistor which enables it to have higher storage capacities. Low cost per bit of such SSDs has made it a commercial success. As of 2018, cells with an ability to store three bits ... 
The Isoperimetric Problem On Trees And Bounded Tree Width Graphs
(20100826)In this thesis we study the isoperimetric problem on trees and graphs with bounded treewidth. Let G = (V,E) be a finite, simple and undirected graph. For let δ(S,G)= {(u,v) ε E : u ε S and v ε V – S }be the edge boundary ... 
Kernel Methods Fast Algorithms and real life applications
(Indian Institute of Science, 20050208)Support Vector Machines (SVM) have recently gained prominence in the field of machine learning and pattern classification (Vapnik, 1995, Herbrich, 2002, Scholkopf and Smola, 2002). Classification is achieved by finding a ... 
A KnowledgeBased Approach To Pattern Clustering
(Indian Institute of Science, 20050311)The primary objective of this thesis is to develop a methodology for clustering of objects based on their functionality typified by the notion of concept. We begin by giving a formal definition of concept. By assigning a ... 
Language Support for Exploiting Software Structure Specifications
(Indian Institute of Science, 20050216)Precise specification of the architecture and design of software is a good practice. Such specifications contain a lot of information about the software that can potentially be exploited by tools, to reduce redundancy ...