• Login
    Browsing Computer Science and Automation (CSA) by Title 
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Browsing Computer Science and Automation (CSA) by Title
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Browsing Computer Science and Automation (CSA) by Title
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browsing Computer Science and Automation (CSA) by Title

    • 0-9
    • A
    • B
    • C
    • D
    • E
    • F
    • G
    • H
    • I
    • J
    • K
    • L
    • M
    • N
    • O
    • P
    • Q
    • R
    • S
    • T
    • U
    • V
    • W
    • X
    • Y
    • Z

    Sort by:

    Order:

    Results:

    Now showing items 320-339 of 394

    • title
    • xmlui.ArtifactBrowser.ConfigurableBrowse.sort_by.datesubmitted
    • issue date
    • ascending
    • descending
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
      • Recommendations in Complex Networks: Unifying Structure into Random Walk 

        Nandanwar, Sharad
        Making recommendations or predicting links which are likely to exist in the future is one of the central problems in network science and graph mining. In spite of modern state-of- the-art approaches for link prediction, ...
      • Reconstruction of 3D Neuronal Structures 

        Kumar, Kanuj (2018-03-17)
        Microscopic analysis of biological structures can be significantly enhanced by representing the object of study as a three-dimensional entity. To assist neurobiologists investigate the molecular mechanisms involved in ...
      • Recovery Algorithms for planted structures in Semi-random models 

        Paul, Rameesh
        For many NP-hard problems, the analysis of best-known approximation algorithms yields “poor” worst-case guarantees. However, using various heuristics, the problems can be solved (to some extent) in real-life instances. ...
      • Recovery From DoS Attacks In MIPv6 : Modelling And Validation 

        Kumar, Manish C (2010-07-26)
        Denial-of-Service (DoS) attacks form a very important category of security threats that are possible in MIPv6 (Mobile Internet Protocol version 6). This thesis proposes a scheme for participants (Mobile Node, Home Agent, ...
      • Reeb Graphs : Computation, Visualization and Applications 

        Harish, D (2018-02-23)
        Level sets are extensively used for the visualization of scalar fields. The Reeb graph of a scalar function tracks the evolution of the topology of its level sets. It is obtained by mapping each connected component of a ...
      • A Refinement-Based Methodology for Verifying Abstract Data Type Implementations 

        Divakaran, Sumesh (2018-06-21)
        This thesis is about techniques for proving the functional correctness of Abstract Data Type (ADT) implementations. We provide a framework for proving the functional correctness of imperative language implementations of ...
      • Reinforcement Learning Algorithms for Off-Policy, Multi-Agent Learning and Applications to Smart Grids 

        Diddigi, Raghuram Bharadwaj
        Reinforcement Learning (RL) algorithms are a popular class of algorithms for training an agent to learn desired behavior through interaction with an environment whose dynamics is unknown to the agent. RL algorithms ...
      • Reliability Modelling Of Whole RAID Storage Subsystems 

        Karmakar, Prasenjit (2014-06-05)
        Reliability modelling of RAID storage systems with its various components such as RAID controllers, enclosures, expanders, interconnects and disks is important from a storage system designer's point of view. A model that ...
      • Representing Networks: Centrality, Node Embeddings, Community Outliers and Graph Representation 

        Bandyopadhyay, Sambaran
        Networks are ubiquitous. We start our technical work in this thesis by exploring the classical concept of node centrality (also known as influence measure) in information networks. Like clustering, node centrality is also ...
      • Resolving the Complexity of Some Fundamental Problems in Computational Social Choice 

        Dey, Palash (2017-12-16)
        In many real world situations, especially involving multiagent systems and artificial intelligence, participating agents often need to agree upon a common alternative even if they have differing preferences over the available ...
      • Resource Allocation for Sequential Decision Making Under Uncertainaty : Studies in Vehicular Traffic Control, Service Systems, Sensor Networks and Mechanism Design 

        Prashanth, L A (2017-11-27)
        A fundamental question in a sequential decision making setting under uncertainty is “how to allocate resources amongst competing entities so as to maximize the rewards accumulated in the long run?”. The resources allocated ...
      • Retweet Profiling - Study Dissemination of Twitter Messages 

        Rangnani, Soniya (2017-09-23)
        Social media has become an important means of everyday communication. It is a mechanism for “sharing” and “resharing” of information. While social network platforms provide the means to users for resharing/reblogging (aka ...
      • Revisiting Statistical Techniques for Result Cardinality Estimation 

        Shah, Dhrumilkumar
        The Relational Database Management Systems (RDBMS) constitute the backbone of today's information-rich society, providing a congenial environment for handling enterprise data during its entire life cycle of generation, ...
      • RLtools : A Toolset For Visual Language Application Development Based on Relational Grammars 

        Suresh, B G (2012-11-20)
      • Robust Algorithms for recovering planted structures in Semi-random instances 

        Khanna, Yash
        In this thesis, we study algorithms for three fundamental graph problems. These are NP-hard problems which have not been understood completely as there is a signifiicant gap between the algorithmic and the hardness fronts ...
      • Scalable Low Power Issue Queue And Store Queue Design For Superscalar Processors 

        Vivekanandham, Rajesh (2009-03-09)
        A Large instruction window is a key requirement to exploit greater Instruction Level Parallelism in out-of-order superscalar processors. Along with the instruction window size, the size of various other structures including ...
      • Scalable Sprase Bayesian Nonparametric and Matrix Tri-factorization Models for Text Mining Applications 

        Ranganath, B N (2018-05-23)
        Hierarchical Bayesian Models and Matrix factorization methods provide an unsupervised way to learn latent components of data from the grouped or sequence data. For example, in document data, latent component corn-responds ...
      • Scaling Blockchains Using Coding Theory and Verifiable Computing 

        Rathi, Nilesh
        The issue of scalability has been restricting blockchain from its widespread adoption. The current transaction rate of bitcoin is around seven transactions/second while its size has crossed the 300 GB mark. Although many ...
      • Scaling Context-Sensitive Points-To Analysis 

        Nasre, Rupesh (2014-05-06)
        Pointer analysis is one of the key static analyses during compilation. The efficiency of several compiler optimizations and transformations depends directly on the scalability and precision of the underlying pointer analysis. ...
      • Secure Computation Protocol Suite for Privacy-Conscious Applications 

        Saipanmuluk, Koti Nishat
        As an alternative to performing analytics in the clear, there is an increasing demand for developing privacy-preserving solutions that aim to protect sensitive data while still allowing for its efficient analysis. Among ...

        etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
        Contact Us | Send Feedback | Thesis Templates
        Theme by 
        Atmire NV
         

         

        Browse

        All of etd@IIScCommunities & CollectionsTitlesAuthorsAdvisorsSubjectsBy Thesis Submission DateThis CollectionTitlesAuthorsAdvisorsSubjectsBy Thesis Submission Date

        My Account

        LoginRegister

        etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
        Contact Us | Send Feedback | Thesis Templates
        Theme by 
        Atmire NV