• Login
    Browsing Computer Science and Automation (CSA) by Title 
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Browsing Computer Science and Automation (CSA) by Title
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Browsing Computer Science and Automation (CSA) by Title
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browsing Computer Science and Automation (CSA) by Title

    • 0-9
    • A
    • B
    • C
    • D
    • E
    • F
    • G
    • H
    • I
    • J
    • K
    • L
    • M
    • N
    • O
    • P
    • Q
    • R
    • S
    • T
    • U
    • V
    • W
    • X
    • Y
    • Z

    Sort by:

    Order:

    Results:

    Now showing items 323-342 of 354

    • title
    • xmlui.ArtifactBrowser.ConfigurableBrowse.sort_by.datesubmitted
    • issue date
    • ascending
    • descending
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
      • Structured Regularization Through Convex Relaxations Of Discrete Penalties 

        Sankaran, Raman
        Motivation. Empirical risk minimization(ERM) is a popular framework for learning predictive models from data, which has been used in various domains such as computer vision, text processing, bioinformatics, neuro-biology, ...
      • Studies In Automatic Management Of Storage Systems 

        Pipada, Pankaj (2015-11-16)
        Autonomic management is important in storage systems and the space of autonomics in storage systems is vast. Such autonomic management systems can employ a variety of techniques depending upon the specific problem. In this ...
      • A Study Of Quantum And Reversible Computing 

        Paul, Arnab (2013-07-31)
      • A Study of the Performance Benefits of Controlling Parallel Asynochrous Iteractive Applications 

        Joseph, P J (Indian Institute of Science, 2005-03-11)
        High performance networks of workstation are becoming increasingly popular a parallel computing platform because of their lower cost. Both message passing and software distributed shared memory (DSM) programming paradigms ...
      • A Study of Thompson Sampling Approach for the Sleeping Multi-Armed Bandit Problem 

        Chatterjee, Aritra (2018-05-29)
        The multi-armed bandit (MAB) problem provides a convenient abstraction for many online decision problems arising in modern applications including Internet display advertising, crowdsourcing, online procurement, smart grids, ...
      • Superscalar Processor Models Using Statistical Learning 

        Joseph, P J (2009-06-24)
        Processor architectures are becoming increasingly complex and hence architects have to evaluate a large design space consisting of several parameters, each with a number of potential settings. In order to assist in guiding ...
      • Supervised Classification of Missense Mutations as Pathogenic or Tolerated using Ensemble Learning Methods 

        Balasubramanyam, Rashmi (2018-07-09)
        Missense mutations account for more than 50% of the mutations known to be involved in human inherited diseases. Missense classification is a challenging task that involves sequencing of the genome, identifying the variations, ...
      • Symmetry in Scalar Fields 

        Thomas, Dilip Mathew (2018-01-09)
        Scalar fields are used to represent physical quantities measured over a domain of interest. Study of symmetric or repeating patterns in scalar fields is important in scientific data analysis because it gives deep insights ...
      • A Syntactic Neural Model For Question Decomposition 

        Gupta, Suman
        Question decomposition along with single-hop Question Answering (QA) system serve as useful modules in developing multi-hop Question Answering systems, mainly because the resulting QA system is interpretable and has been ...
      • A Systems Perspective of Software Runtime Bloat - Origin, Mitigation and Power-Performance Implications 

        Bhattacharya, Suparna (2018-03-08)
        Large flexible software systems tend to incur “bloat”, here defined as the runtime overhead induced by the accumulation of excess functionality and objects. Removing bloat is hard as these overheads are a side-effect of ...
      • Targeted Client Synthesis for Detecting Concurrency Bugs 

        Samak, Malavika (2018-01-01)
        Detecting concurrency bugs can be challenging due to the intricacies associated with their manifestation. These intricacies correspond to identifying the methods that need to be invoked concurrently, the inputs passed to ...
      • A Theoretical Study of the Synergy and Lazy Annotation Algorithms 

        Jayaram, Sampath (2018-04-03)
        Given a program with assertions, the assertion checking problem is to tell whether there is an execution of the program that violates one of the assertions. One approach to this problem is to explore different paths towards ...
      • Tiling Stencil Computations To Maximize Parallelism 

        Bandishti, Vinayaka Prakasha (2017-05-21)
        Stencil computations are iterative kernels often used to simulate the change in a discretized spatial domain overtime (e.g., computational fluid dynamics) or to solve for unknowns in a discretized space by converging to a ...
      • Time Management In Partitioned Systems 

        Kodancha, A Hariprasad (2010-02-11)
        Time management is one of the critical modules of safety-critical systems. Applications need strong assurance from the operating system that their hard real-time requirements are met. Partitioned system has recently evolved ...
      • Top-k Spatial Aware Ads 

        Savla, Virti
        Consider an app on a smartphone which displays local business ads. When a user opens the app, then k local business ads need to displayed (where k would typically be 3 or 5) such that the profit made by the app is ...
      • Towards a Charcterization of the Symmetries of the Nisan-Wigderson Polynomial Family 

        Gupta, Nikhil (2018-07-09)
        Understanding the structure and complexity of a polynomial family is a fundamental problem of arithmetic circuit complexity. There are various approaches like studying the lower bounds, which deals with nding the smallest ...
      • Towards Effcient Privacy-Preserving Two-Party k-Means Clustering Protocol 

        Chim, Sonali
        Two-party data mining is a win-win game if played with a guarantee of data privacy from each other. This guarantee is provided by the use of cryptographic techniques in designing the two-party protocol. The need to ...
      • Towards Secure and Efficient Realization of Pairing-Based Signatures from Static Assumptions. 

        Kabaleeshwaran, R
        Bilinear pairing defined over elliptic curve group was first used to design novel cryptosystem in 2000. Since then a large number of cryptosystems has been proposed in pairing-based cryptography (PBC). The main tool for ...
      • Transducer-based Algorithmic Verification of Retransmission Protocols over Noisy Channels 

        Thakkar, Jay (2018-04-05)
        Unreliable communication channels are a practical reality. They add to the complexity of protocol design and verification. In this work, we consider noisy channels which can corrupt messages. We present an approach to model ...
      • TriSL: A Software Architecture Description Language and Environment 

        Lakshminarayanan, R (Indian Institute of Science, 2005-03-14)
        As the size and complexity of a software system increases, the design problem goes beyond the algorithms and data structures of the computation. Designing and specifying the overall system structure -- or software architecture ...

        etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
        Contact Us | Send Feedback | Thesis Templates
        Theme by 
        Atmire NV
         

         

        Browse

        All of etd@IIScCommunities & CollectionsTitlesAuthorsAdvisorsSubjectsBy Thesis Submission DateThis CollectionTitlesAuthorsAdvisorsSubjectsBy Thesis Submission Date

        My Account

        LoginRegister

        etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
        Contact Us | Send Feedback | Thesis Templates
        Theme by 
        Atmire NV