• Login
    Browsing Computer Science and Automation (CSA) by Title 
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Browsing Computer Science and Automation (CSA) by Title
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Browsing Computer Science and Automation (CSA) by Title
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browsing Computer Science and Automation (CSA) by Title

    • 0-9
    • A
    • B
    • C
    • D
    • E
    • F
    • G
    • H
    • I
    • J
    • K
    • L
    • M
    • N
    • O
    • P
    • Q
    • R
    • S
    • T
    • U
    • V
    • W
    • X
    • Y
    • Z

    Sort by:

    Order:

    Results:

    Now showing items 300-319 of 394

    • title
    • xmlui.ArtifactBrowser.ConfigurableBrowse.sort_by.datesubmitted
    • issue date
    • ascending
    • descending
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
      • Plan Bouquets : An Exploratory Approach to Robust Query Processing 

        Dutt, Anshuman (2017-09-26)
        Over the last four decades, relational database systems, with their mathematical basis in first-order logic, have provided a congenial and efficient environment to handle enterprise data during its entire life cycle of ...
      • Polymage : Automatic Optimization for Image Processing Pipelines 

        Mullapudi, Ravi Teja (2018-06-25)
        Image processing pipelines are ubiquitous. Every image captured by a camera and every image uploaded on social networks like Google+or Facebook is processed by a pipeline. Applications in a wide range of domains like ...
      • Power Efficient Last Level Cache For Chip Multiprocessors 

        Mandke, Aparna (2015-09-09)
        The number of processor cores and on-chip cache size has been increasing on chip multiprocessors (CMPs). As a result, leakage power dissipated in the on-chip cache has become very significant. We explore various techniques ...
      • Power Issues in SoCs : Power Aware DFT Architecture and Power Estimation 

        Tudu, Jaynarayan Thakurdas (2018-01-10)
        Test power, data volume, and test time have been long-standing problems for sequential scan based testing of system-on-chip (SoC) design. The modern SoCs fabricated at lower technology nodes are complex in nature, the ...
      • Practically Efficient Secure Small Party Computation over the Internet 

        Byali, Megha
        Secure Multi-party Computation (MPC) with small population has drawn focus specifically due to customization in techniques and resulting efficiency that the constructions can offer. Practically efficient constructions ...
      • Precise Analysis of Private And Shared Caches for Tight WCET Estimates 

        Nagar, Kartik (2017-10-31)
        Worst Case Execution Time (WCET) is an important metric for programs running on real-time systems, and finding precise estimates of a program’s WCET is crucial to avoid over-allocation and wastage of hardware resources and ...
      • Privadome: A System for Citizen Privacy in the Delivery Drone Era 

        Pillai, Gokulnath
        E-commerce companies are actively considering the use of delivery drones for customer fulfillment, leading to growing concerns around citizen privacy. Drones are equipped with cameras, and the video feed from these cameras ...
      • Problems on bend-number, circular separation dimension and maximum edge 2-colouring 

        Lahiri, Abhiruk
        Representation of graphs as the intersection graphs of geometric objects has a long history. The objective is to a nd a collection of \simple" sets S such that a given graph G is its intersection graph. We are interested ...
      • Procurement Network Formation : A Cooperative Game Theoretic Approach 

        Chandrashekar, T S (2009-04-16)
        Complex economic activity often involves inter-relationships at several levels of production, often referred to as supply chains or procurement networks. In this thesis we address the problem of forming procurement networks ...
      • Program Analyses to Support Memory-saving Refactorings in Java Programs 

        Rama, Girish Maskeri
        Software commonly consumes unexpectedly high amounts of memory, frequently due to programming idioms that are used to make software more reliable, maintainable and understandable. In the case of modern object-oriented ...
      • Program Repair by Automated Generation of Hints 

        Kaleeswaran, Shalini
        Programming has become an important skill in today's technology-driven world. It is a complex activity because of which programmers make mistakes in their software. Student programmers make mistakes in their programs due ...
      • Prolog Technology For Temporal Reasoning In Relational Databases 

        Suresh Babu, V S S (2012-05-03)
      • Provable Methods for Non-negative Matrix Factorization 

        Pani, Jagdeep (2017-10-31)
        Nonnegative matrix factorization (NMF) is an important data-analysis problem which concerns factoring a given d n matrix A with nonnegative entries into matrices B and C where B and C are d k and k n with nonnegative ...
      • PyGraph: Compiler Support for Efficient and Transparent Use of CUDA Graphs 

        Ghosh, Abhishek
        CUDA Graphs --- a recent hardware feature introduced for NVIDIA GPUs --- aim to reduce CPU launch overhead by capturing and launching a series of GPU tasks (kernels) as a DAG. However, deploying CUDA Graphs faces several ...
      • Quantum-Safe Identity-Based Signature Scheme in Multivariate Quadratic Setting 

        Dimri, Akansha
        Cryptographic techniques are essential for the security of communication in modern society. Today, nearly all public key cryptographic schemes used in practice are based on the two problems of factoring large integers and ...
      • Rainbow Colouring and Some Dimensional Problems in Graph Theory 

        Rajendraprasad, Deepak (2018-04-05)
        This thesis touches three different topics in graph theory, namely, rainbow colouring, product dimension and boxicity. Rainbow colouring An edge colouring of a graph is called a rainbow colouring, if every pair of vertices ...
      • Rainbow Connection Number Of Graph Power And Graph Products 

        Arunselvan, R (2014-09-09)
        The minimum number of colors required to color the edges of a graph so that any two distinct vertices are connected by at least one path in which no two edges are colored the same is called its rainbow connection number. ...
      • Ranking from Pairwise Comparisons : The Role of the Pairwise Preference Matrix 

        Rajkumar, Arun (2018-07-05)
        Ranking a set of candidates or items from pair-wise comparisons is a fundamental problem that arises in many settings such as elections, recommendation systems, sports team rankings, document rankings and so on. Indeed it ...
      • Rational Secure Computation: New Definitions and Constructions 

        Agarwal, Siddharth
        Cryptography and Game Theory are two fascinating areas of modern computing, and there have been numerous works since the early 2000s to bridge these. While cryptography provides mechanisms to detect deviations, game theory ...
      • Reasoning about Safety of Camera-Based Neural Network Controlled Systems 

        Habeeb, P
        Autonomous technologies are becoming increasingly prevalent due to the numerous benefits they offer, including improved safety and security, enhanced accessibility for mobility-challenged individuals, and the ability to ...

        etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
        Contact Us | Send Feedback | Thesis Templates
        Theme by 
        Atmire NV
         

         

        Browse

        All of etd@IIScCommunities & CollectionsTitlesAuthorsAdvisorsSubjectsBy Thesis Submission DateThis CollectionTitlesAuthorsAdvisorsSubjectsBy Thesis Submission Date

        My Account

        LoginRegister

        etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
        Contact Us | Send Feedback | Thesis Templates
        Theme by 
        Atmire NV