• Login
    Browsing Computer Science and Automation (CSA) by thesis submitted date 
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Browsing Computer Science and Automation (CSA) by thesis submitted date
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Browsing Computer Science and Automation (CSA) by thesis submitted date
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browsing Computer Science and Automation (CSA) by thesis submitted date"2018"

    • 0-9
    • A
    • B
    • C
    • D
    • E
    • F
    • G
    • H
    • I
    • J
    • K
    • L
    • M
    • N
    • O
    • P
    • Q
    • R
    • S
    • T
    • U
    • V
    • W
    • X
    • Y
    • Z

    Sort by:

    Order:

    Results:

    Now showing items 1-20 of 22

    • title
    • xmlui.ArtifactBrowser.ConfigurableBrowse.sort_by.datesubmitted
    • issue date
    • ascending
    • descending
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
      • Adaptively Secure Primitives in the Random Oracle Model 

        Sarkar, Pratik
        Adaptive security embodies one of the strongest notions of security that allows an adversary to corrupt parties at any point during protocol execution and gain access to its internal state. Since it models reallife situations ...
      • Algorithms for Multilingual IR in Low Resource Languages using Weakly Aligned Corpora 

        Tholpadi, Goutham
        Multilingual information retrieval (MLIR) methods generally rely on linguistic resources such as dictionaries, parallel corpora, etc., to overcome the language barrier. For low resource languages without these resources, ...
      • Automated Test Generation and Performance Improvement using Dynamic Program Analysis 

        Dhok, Monika
        Software development process consists of various stages like design, implementation, and testing. Since programmers are considerably involved in these stages, their intuition and expertise play a vital role in the success ...
      • Checking Observational Purity of Procedures 

        Arora, Himanshu
        We provide two static analysis approaches(using theorem proving) that check if a given (recursive) procedure behaves as if it were stateless, even when it maintains state in global variables. In other words, we check if ...
      • Computing Contour Tress for 2D Piecewise Polynomial Functions 

        Nucha, Girijanandan
        Contour trees are extensively used in scalar field analysis. The contour tree is a data structure that tracks the evolution of level set topology in a scalar field. Scalar fields are typically available as samples at ...
      • Data Structures and Algorithms to Analyze Concurrency in Android Applications 

        Pallavi Maiya, H P
        Android is a popular mobile operating system, providing a rich ecosystem for the development of applications which run on the Android platform. Entities such as the device user, network and sensors interact continuously ...
      • Deep Learning Models for Few-shot and Metric Learning 

        Mehrotra, Akshay
        Deep neural network-based models have achieved unprecedented performance levels over many tasks in the traditional supervised setting and scale well with large quantities of data. On the other hand, improving performance ...
      • Design of Trusted Market Platforms using Permissioned Blockchains and Game Theory 

        Narang, Shivika
        The blockchain concept forms the backbone of a new wave technology that promises to be deployed extensively in a wide variety of industrial and societal applications. Governments, financial institutions, banks, industrial ...
      • An Exploratory Framework for Cyclone Identification and Tracking 

        Valsangkar, Akash Anil
        Analyzing depressions plays an important role in meteorology, especially in the study of cyclones. In particular, the study of the temporal evolution of cyclones requires a robust depression tracking framework. To cope ...
      • Fully Resilient Non-Interactive ID-Based Hierarchical Key Agreement 

        Tiwari, Mayank
        Non-Interactive Key Agreement (NIKA) is a cryptographic primitive which allows two parties to agree on a shared secret key without any interaction. Identity-based Non-Interactive Key Agreement (ID-NIKA) allows each party ...
      • Fully Resilient Non-Interactive ID-Based Hierarchical Key Agreement 

        Tiwari, Mayank
        Non-Interactive Key Agreement (NIKA) is a cryptographic primitive which allows two parties to agree on a shared secret key without any interaction. Identity-based Non-Interactive Key Agreement (ID-NIKA) allows each party ...
      • Geometric and Topological Methods for Biomolecular Visualization 

        Masood, Talha Bin
        Biomolecules like proteins are the basic building blocks of living systems. It has been observed that the structure of a biomolecule plays an important role in defining its function. In this thesis, we describe novel ...
      • Guarding Terrain using k-Watchtowers 

        Tripathi, Nitesh
        The discrete k-watchtower problem for a polyhedral terrain T in R3 with n vertices is to nd k vertical segments, called watchtowers, of smallest height, whose bottom end-points (bases) lie on some vertices of T, and ...
      • Handling Overloads with Social Consistency 

        Singla, Priyanka
        Cloud computing applications have dynamic workloads, and they often observe spikes in the incoming traffic which might result in system overloads. System overloads are generally handled by various load balancing techniques ...
      • Integrating Read-Copy-Update Synchronization and Memory Allocation 

        Prasad, Aravinda
        The evolution of multicore systems with thousands of cores has led to the exploration of non-traditional procrastination-based synchronization techniques such as Read-Copy- Update (RCU). Deferred destruction is the ...
      • IO Pattern Aware Methods to Improve the Performance and Lifetime of NAND SSD 

        Arpith, K
        Modern SSDs can store multiple bits per transistor which enables it to have higher storage capacities. Low cost per bit of such SSDs has made it a commercial success. As of 2018, cells with an ability to store three bits ...
      • Model Checking Temporal Properties of Presburger Counter Systems 

        Kommineni, Vasanta Lakshmi
        Counter systems are a well-known and powerful modeling notation for specifying infnite state systems. In this thesis we target the problem of checking temporal properties of counter systems. We address three predominant ...
      • Modeling and Adaptive Scheduling Strategies for Distributed Graph Algorithms 

        Dindokar, Ravikant Devidas
        Graph processing at scales of millions-billions of vertices and edges has become common to solve real-world problems in domains like social networks, smart cities and genomics. Distributed "Big Data" platforms for graph ...
      • Problems on bend-number, circular separation dimension and maximum edge 2-colouring 

        Lahiri, Abhiruk
        Representation of graphs as the intersection graphs of geometric objects has a long history. The objective is to a nd a collection of \simple" sets S such that a given graph G is its intersection graph. We are interested ...
      • Stochastic Approximation with Markov Noise: Analysis and applications in reinforcement learning 

        Karmakar, Prasenjit
        Stochastic approximation algorithms are sequential non-parametric methods for finding a zero or minimum of a function in the situation where only the noisy observations of the function values are available. Two time-scale ...

        etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
        Contact Us | Send Feedback | Thesis Templates
        Theme by 
        Atmire NV
         

         

        Browse

        All of etd@IIScCommunities & CollectionsTitlesAuthorsAdvisorsSubjectsBy Thesis Submission DateThis CollectionTitlesAuthorsAdvisorsSubjectsBy Thesis Submission Date

        My Account

        LoginRegister

        etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
        Contact Us | Send Feedback | Thesis Templates
        Theme by 
        Atmire NV