• Login
    Browsing Computer Science and Automation (CSA) by Title 
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Browsing Computer Science and Automation (CSA) by Title
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Browsing Computer Science and Automation (CSA) by Title
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browsing Computer Science and Automation (CSA) by Title

    • 0-9
    • A
    • B
    • C
    • D
    • E
    • F
    • G
    • H
    • I
    • J
    • K
    • L
    • M
    • N
    • O
    • P
    • Q
    • R
    • S
    • T
    • U
    • V
    • W
    • X
    • Y
    • Z

    Sort by:

    Order:

    Results:

    Now showing items 323-342 of 392

    • title
    • xmlui.ArtifactBrowser.ConfigurableBrowse.sort_by.datesubmitted
    • issue date
    • ascending
    • descending
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
      • A Refinement-Based Methodology for Verifying Abstract Data Type Implementations 

        Divakaran, Sumesh (2018-06-21)
        This thesis is about techniques for proving the functional correctness of Abstract Data Type (ADT) implementations. We provide a framework for proving the functional correctness of imperative language implementations of ...
      • Reinforcement Learning Algorithms for Off-Policy, Multi-Agent Learning and Applications to Smart Grids 

        Diddigi, Raghuram Bharadwaj
        Reinforcement Learning (RL) algorithms are a popular class of algorithms for training an agent to learn desired behavior through interaction with an environment whose dynamics is unknown to the agent. RL algorithms ...
      • Reliability Modelling Of Whole RAID Storage Subsystems 

        Karmakar, Prasenjit (2014-06-05)
        Reliability modelling of RAID storage systems with its various components such as RAID controllers, enclosures, expanders, interconnects and disks is important from a storage system designer's point of view. A model that ...
      • Representing Networks: Centrality, Node Embeddings, Community Outliers and Graph Representation 

        Bandyopadhyay, Sambaran
        Networks are ubiquitous. We start our technical work in this thesis by exploring the classical concept of node centrality (also known as influence measure) in information networks. Like clustering, node centrality is also ...
      • Resolving the Complexity of Some Fundamental Problems in Computational Social Choice 

        Dey, Palash (2017-12-16)
        In many real world situations, especially involving multiagent systems and artificial intelligence, participating agents often need to agree upon a common alternative even if they have differing preferences over the available ...
      • Resource Allocation for Sequential Decision Making Under Uncertainaty : Studies in Vehicular Traffic Control, Service Systems, Sensor Networks and Mechanism Design 

        Prashanth, L A (2017-11-27)
        A fundamental question in a sequential decision making setting under uncertainty is “how to allocate resources amongst competing entities so as to maximize the rewards accumulated in the long run?”. The resources allocated ...
      • Retweet Profiling - Study Dissemination of Twitter Messages 

        Rangnani, Soniya (2017-09-23)
        Social media has become an important means of everyday communication. It is a mechanism for “sharing” and “resharing” of information. While social network platforms provide the means to users for resharing/reblogging (aka ...
      • Revisiting Statistical Techniques for Result Cardinality Estimation 

        Shah, Dhrumilkumar
        The Relational Database Management Systems (RDBMS) constitute the backbone of today's information-rich society, providing a congenial environment for handling enterprise data during its entire life cycle of generation, ...
      • RLtools : A Toolset For Visual Language Application Development Based on Relational Grammars 

        Suresh, B G (2012-11-20)
      • Robust Algorithms for recovering planted structures in Semi-random instances 

        Khanna, Yash
        In this thesis, we study algorithms for three fundamental graph problems. These are NP-hard problems which have not been understood completely as there is a signifiicant gap between the algorithmic and the hardness fronts ...
      • Scalable Low Power Issue Queue And Store Queue Design For Superscalar Processors 

        Vivekanandham, Rajesh (2009-03-09)
        A Large instruction window is a key requirement to exploit greater Instruction Level Parallelism in out-of-order superscalar processors. Along with the instruction window size, the size of various other structures including ...
      • Scalable Sprase Bayesian Nonparametric and Matrix Tri-factorization Models for Text Mining Applications 

        Ranganath, B N (2018-05-23)
        Hierarchical Bayesian Models and Matrix factorization methods provide an unsupervised way to learn latent components of data from the grouped or sequence data. For example, in document data, latent component corn-responds ...
      • Scaling Blockchains Using Coding Theory and Verifiable Computing 

        Rathi, Nilesh
        The issue of scalability has been restricting blockchain from its widespread adoption. The current transaction rate of bitcoin is around seven transactions/second while its size has crossed the 300 GB mark. Although many ...
      • Scaling Context-Sensitive Points-To Analysis 

        Nasre, Rupesh (2014-05-06)
        Pointer analysis is one of the key static analyses during compilation. The efficiency of several compiler optimizations and transformations depends directly on the scalability and precision of the underlying pointer analysis. ...
      • Secure Computation Protocol Suite for Privacy-Conscious Applications 

        Saipanmuluk, Koti Nishat
        As an alternative to performing analytics in the clear, there is an increasing demand for developing privacy-preserving solutions that aim to protect sensitive data while still allowing for its efficient analysis. Among ...
      • Security of Post-Quantum Multivariate Blind Signature Scheme: Revisited and Improved 

        Majumdar, Aalo
        Current cryptosystems face an imminent threat from quantum algorithms like Shor's and Grover's, leading us to post-quantum cryptography. Multivariate signatures are prominent in post-quantum cryptography due to their fast, ...
      • Semantic Analysis of Web Pages for Task-based Personal Web Interactions 

        Manjunath, Geetha (2017-11-27)
        Mobile widgets now form a new paradigm of simplified web. Probably, the best experience of the Web is when a user has a widget for every frequently executed task, and can execute it anytime, anywhere on any device. However, ...
      • Semi-Supervised Classification Using Gaussian Processes 

        Patel, Amrish (2010-03-26)
        Gaussian Processes (GPs) are promising Bayesian methods for classification and regression problems. They have also been used for semi-supervised classification tasks. In this thesis, we propose new algorithms for solving ...
      • Sentiment-Driven Topic Analysis Of Song Lyrics 

        Sharma, Govind (2015-08-17)
        Sentiment Analysis is an area of Computer Science that deals with the impact a document makes on a user. The very field is further sub-divided into Opinion Mining and Emotion Analysis, the latter of which is the basis for ...
      • Signcryption in a Quantum World 

        Puria, Shravan Kumar Parshuram
        With recent advancements and research on quantum computers, it is conjectured that in the foreseeable future, sufficiently large quantum computers will be built to break essentially all public key cryptosystems currently ...

        etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
        Contact Us | Send Feedback | Thesis Templates
        Theme by 
        Atmire NV
         

         

        Browse

        All of etd@IIScCommunities & CollectionsTitlesAuthorsAdvisorsSubjectsBy Thesis Submission DateThis CollectionTitlesAuthorsAdvisorsSubjectsBy Thesis Submission Date

        My Account

        LoginRegister

        etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
        Contact Us | Send Feedback | Thesis Templates
        Theme by 
        Atmire NV