• Login
    Browsing Computer Science and Automation (CSA) by Title 
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Browsing Computer Science and Automation (CSA) by Title
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Browsing Computer Science and Automation (CSA) by Title
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browsing Computer Science and Automation (CSA) by Title

    • 0-9
    • A
    • B
    • C
    • D
    • E
    • F
    • G
    • H
    • I
    • J
    • K
    • L
    • M
    • N
    • O
    • P
    • Q
    • R
    • S
    • T
    • U
    • V
    • W
    • X
    • Y
    • Z

    Sort by:

    Order:

    Results:

    Now showing items 283-302 of 394

    • title
    • xmlui.ArtifactBrowser.ConfigurableBrowse.sort_by.datesubmitted
    • issue date
    • ascending
    • descending
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
      • On The Complexity Of Grobner Basis And Border Basis Detection 

        Prabhanjan, V A (2013-06-14)
        The theory of Grobner bases has garnered the interests of a large number of researchers in computational algebra due to its applications not only in mathematics but also in areas like control systems, robotics, cryptography ...
      • On the Round Complexity Landscape of Secure Multi-party Computation 

        Ravi, Divya
        In secure multi-party computation (MPC), n parties wish to jointly perform a computation on their private inputs in a secure way, so that no adversary corrupting a subset of the parties can learn more information than their ...
      • Online Learning and Simulation Based Algorithms for Stochastic Optimization 

        Lakshmanan, K (2018-03-07)
        In many optimization problems, the relationship between the objective and parameters is not known. The objective function itself may be stochastic such as a long-run average over some random cost samples. In such cases ...
      • Online Optimization Of RED Routers 

        Vaidya, Rahul (2011-04-25)
      • Operating System Support for Efficient Virtual Memory 

        Panwar, Ashish
        Computers rely on the virtual memory abstraction to simplify programming, portability, physical memory management and ensure isolation among co-running applications. However, it creates a layer of indirection in the ...
      • Operating System Support For Optimistic Distributed Simulation 

        Raja, V (2013-07-24)
      • Optimization Algorithms for Deterministic, Stochastic and Reinforcement Learning Settings 

        Joseph, Ajin George (2018-05-30)
        Optimization is a very important field with diverse applications in physical, social and biological sciences and in various areas of engineering. It appears widely in ma-chine learning, information retrieval, regression, ...
      • Optimizations In Storage Area Networks And Direct Attached Storage 

        Dharmadeep, M C (2009-07-23)
        The thesis consists of three parts. In the first part, we introduce the notion of device-cache-aware schedulers. Modern disk subsystems have many megabytes of memory for various purposes such as prefetching and caching. ...
      • An Optimizing Code Generator for a Class of Lattice-Boltzmann Computations 

        Pananilath, Irshad Muhammed (2018-03-09)
        Lattice-Boltzmann method(LBM), a promising new particle-based simulation technique for complex and multiscale fluid flows, has seen tremendous adoption in recent years in computational fluid dynamics. Even with a ...
      • Optimizing Dense Matrix Computations with PolyMage 

        Kumudha, K N
        Linear algebra computations and other arbitrary affine accesses are ubiquitous in applications from domains like scientific computing, digital signal processing (DSP), and deep neural networks. Libraries such as OpenBLAS, ...
      • Outlier Detection with Applications in Graph Data Mining 

        Ranga Suri, N N R (2018-04-24)
        Outlier detection is an important data mining task due to its applicability in many contemporary applications such as fraud detection and anomaly detection in networks, etc. It assumes significance due to the general ...
      • P3 : An Effective Technique for Partitioned Path Profiling 

        Afraz, Mohammed
        Acyclic path profile is an abstraction of dynamic control flow paths of procedures and has been found to be useful in a wide spectrum of activities. Unfortunately, the runtime overhead of obtaining such a profile can be ...
      • A Parallelizing Compiler for Fortran 

        Janaki, S (Indian Institute of Science, 2005-03-09)
        With the advent of Distributed Memory Machines (DMMs) numerous work have been undertaken to ease the work of a programmer these systems. Data parallel languages like Fortran D, Vienna Fortran, High Performance Fortran and ...
      • Parameterized Complexity of Maximum Edge Coloring in Graphs 

        Goyal, Prachi (2018-03-09)
        The classical graph edge coloring problem deals in coloring the edges of a given graph with minimum number of colors such that no two adjacent edges in the graph, get the same color in the proposed coloring. In the following ...
      • Pattern Synthesis Techniques And Compact Data Representation Schemes For Efficient Nearest Neighbor Classification 

        Pulabaigari, Viswanath (2011-12-09)
      • Performance Characterization and Optimizations of Traditional ML Applications 

        Kumar, Harsh
        Even in the era of Deep Learning based methods, traditional machine learning methods with large data sets continue to attract significant attention. However, we find an apparent lack of a detailed performance characterization ...
      • Petri Net Model Based Energy Optimization Of Programs Using Dynamic Voltage And Frequency Scaling 

        Arun, R (2013-05-29)
        High power dissipation and on-chip temperature limit performance and affect reliability in modern microprocessors. For servers and data centers, they determine the cooling cost, whereas for handheld and mobile systems, ...
      • Plan Bouquets : An Exploratory Approach to Robust Query Processing 

        Dutt, Anshuman (2017-09-26)
        Over the last four decades, relational database systems, with their mathematical basis in first-order logic, have provided a congenial and efficient environment to handle enterprise data during its entire life cycle of ...
      • Polymage : Automatic Optimization for Image Processing Pipelines 

        Mullapudi, Ravi Teja (2018-06-25)
        Image processing pipelines are ubiquitous. Every image captured by a camera and every image uploaded on social networks like Google+or Facebook is processed by a pipeline. Applications in a wide range of domains like ...
      • Power Efficient Last Level Cache For Chip Multiprocessors 

        Mandke, Aparna (2015-09-09)
        The number of processor cores and on-chip cache size has been increasing on chip multiprocessors (CMPs). As a result, leakage power dissipated in the on-chip cache has become very significant. We explore various techniques ...

        etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
        Contact Us | Send Feedback | Thesis Templates
        Theme by 
        Atmire NV
         

         

        Browse

        All of etd@IIScCommunities & CollectionsTitlesAuthorsAdvisorsSubjectsBy Thesis Submission DateThis CollectionTitlesAuthorsAdvisorsSubjectsBy Thesis Submission Date

        My Account

        LoginRegister

        etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
        Contact Us | Send Feedback | Thesis Templates
        Theme by 
        Atmire NV