Browsing Computer Science and Automation (CSA) by thesis submitted date"2011"
Now showing items 1-15 of 15
-
Autonomous Spacecraft Mission Planning And Execution In A Petri Net Framework
(2014-08-01)Presently, most spacecraft are controlled from ground involving activities such as up-linking the schedule of daily operations and monitoring health parameters. These activities lead to a cognitive overload on human ... -
Checking Compatability of Programs on Shared Data
(2018-07-28)A large software system is built by composing multiple programs, possibly developed independently. The component programs communicate by sharing data. Data sharing involves creation of instances of the shared data by one ... -
Compiler Transformations For Improving The Performance Of Software Transactional Memory
(2013-03-27)Expressing synchronization using traditional lock based primitives has been found to be both error-prone and restrictive. Hence there has been considerable research work to develop scalable and programmer-friendly alternatives ... -
Game Theoretic Models For Social Network Analysis
(2014-08-01)With increasing demand for social network based activities, it is very important to understand not only the structural properties of social networks but also how social networks form, to better exploit their promise and ... -
Generalizations Of The Popular Matching Problem
(2013-07-02)Matching problems arise in several real-world scenarios like assigning posts to applicants, houses to trainees and room-mates to one another. In this thesis we consider the bipartite matching problem where one side of the ... -
Network Centrality Measures And Their Applications
(2014-03-03)Study of complex networks by researchers from many disciplines has provided penetrating insights on various complex systems. A study of the world wide web from a network theoretic perspective has led to the design of new ... -
New Approaches And Experimental Studies On - Alegebraic Attacks On Stream Ciphers
(2015-02-05)Algebraic attacks constitute an effective class of cryptanalytic attacks which have come up recently. In algebraic attacks, the relations between the input, output and the key are expressed as a system of equations and ... -
A Novel Game Theoretic And Voting Mechanism Based Approach For Carbon Emissions Reduction
(2014-08-07)Global warming is currently a major challenge facing the world. There are widespread ongoing efforts in the form of summits, conferences, etc., to find satisfactory ways of surmounting this challenge. The basic objective ... -
On Dimensional Parameters Of Graphs And Posets
(2013-06-21)In this thesis we study the following dimensional parameters : boxicity, cubicity, threshold dimension and poset dimension. While the first three parameters are defined on graphs, poset dimension is defined on partially ... -
On The Complexity Of Grobner Basis And Border Basis Detection
(2013-06-14)The theory of Grobner bases has garnered the interests of a large number of researchers in computational algebra due to its applications not only in mathematics but also in areas like control systems, robotics, cryptography ... -
Petri Net Model Based Energy Optimization Of Programs Using Dynamic Voltage And Frequency Scaling
(2013-05-29)High power dissipation and on-chip temperature limit performance and affect reliability in modern microprocessors. For servers and data centers, they determine the cooling cost, whereas for handheld and mobile systems, ... -
Rainbow Connection Number Of Graph Power And Graph Products
(2014-09-09)The minimum number of colors required to color the edges of a graph so that any two distinct vertices are connected by at least one path in which no two edges are colored the same is called its rainbow connection number. ... -
Sparse Multiclass And Multi-Label Classifier Design For Faster Inference
(2013-06-20)Many real-world problems like hand-written digit recognition or semantic scene classification are treated as multiclass or multi-label classification prob-lems. Solutions to these problems using support vector machines (SVMs) ... -
Two Player Game Variant Of The Erdos Szekeres Problem
(2014-08-01)The following problem has been known for its beauty and elementary character. The Erd˝os Szekeres problem[7]: For any integer k ≥ 3, determine if there exists a smallest positive integer N(k) such that any set of atleast ... -
Visual Analysis Of Interactions In Multifield Scientific Data
(2014-11-14)Data from present day scientific simulations and observations of physical processes often consist of multiple scalar fields. It is important to study the interactions between the fields to understand the underlying phenomena. ...