• Login
    Search 
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Search
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 161-170 of 195

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100

    Efficient Static Analyses for Concurrent Programs 

    Mukherjee, Suvam (2018-06-29)
    Concurrent programs are pervasive owing to the increasing adoption of multi-core systems across the entire computing spectrum. However, the large set of possible program behaviors make it difficult to write correct and ...

    Efficient Bandwidth Constrained Routing Protocols For Communication Networks 

    Hadimani, Vijayalakshmi (2007-10-24)
    QoS routing is one of the major building blocks for supporting QoS in communication networks and, hence, a necessary component of future communication networks. Bandwidth- Constrained Routing Algorithm (BCRA) may help to ...

    A Static Slicing Tool for Sequential Java Programs 

    Devaraj, Arvind (2018-07-28)
    A program slice consists of a subset of the statements of a program that can potentially affect values computed at some point of interest. Such a point of interest along with a set of variables is called a slicing criterion. ...

    Semantic Analysis of Web Pages for Task-based Personal Web Interactions 

    Manjunath, Geetha (2017-11-27)
    Mobile widgets now form a new paradigm of simplified web. Probably, the best experience of the Web is when a user has a widget for every frequently executed task, and can execute it anytime, anywhere on any device. However, ...

    Precise Analysis of Private And Shared Caches for Tight WCET Estimates 

    Nagar, Kartik (2017-10-31)
    Worst Case Execution Time (WCET) is an important metric for programs running on real-time systems, and finding precise estimates of a program’s WCET is crucial to avoid over-allocation and wastage of hardware resources and ...

    Plan Bouquets : An Exploratory Approach to Robust Query Processing 

    Dutt, Anshuman (2017-09-26)
    Over the last four decades, relational database systems, with their mathematical basis in first-order logic, have provided a congenial and efficient environment to handle enterprise data during its entire life cycle of ...

    Symmetry in Scalar Fields 

    Thomas, Dilip Mathew (2018-01-09)
    Scalar fields are used to represent physical quantities measured over a domain of interest. Study of symmetric or repeating patterns in scalar fields is important in scientific data analysis because it gives deep insights ...

    Delaunay Graphs for Various Geometric Objects 

    Agrawal, Akanksha (2017-12-12)
    Given a set of n points P ⊂ R2, the Delaunay graph of P for a family of geometric objects C is a graph defined as follows: the vertex set is P and two points p, p' ∈ P are connected by an edge if and only if there exists ...

    A GPU Accelerated Tensor Spectral Method for Subspace Clustering 

    Pai, Nithish (2017-11-30)
    In this thesis we consider the problem of clustering the data lying in a union of subspaces using spectral methods. Though the data generated may have high dimensionality, in many of the applications, such as motion ...

    Hitting and Piercing Geometric Objects Induced by a Point Set 

    Rajgopal, Ninad (2017-12-07)
    • 1
    • . . .
    • 14
    • 15
    • 16
    • 17
    • 18
    • 19
    • 20

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV
     

     

    Browse

    All of etd@IIScCommunities & CollectionsTitlesAuthorsAdvisorsSubjectsBy Thesis Submission DateThis CollectionTitlesAuthorsAdvisorsSubjectsBy Thesis Submission Date

    My Account

    LoginRegister

    Discover

    AuthorBharadwaj, Subramanya B V (2)Ranganath, B N (2)Ravindar, Archana (2)Srikanth, Cherukupally (2)Tudu, Jaynarayan Thakurdas (2)Acharya, Aravind N (1)Afraz, Mohammed (1)Agrawal, Akanksha (1)Agrawal, Vipul (1)Ajith, S (1)... View MoreSubject
    Computer Science (195)
    Machine Learning (13)Game Theory (8)Graph Theory (7)Compilers (5)Crowdsourcing (5)Algorithms (4)Computational Geometry (4)Computer Architecture (4)Data Mining (4)... View MoreDate Issued2010 - 2018 (158)2007 - 2009 (17)Has File(s)Yes (195)

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV