• Login
    Search 
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Search
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 171-180 of 195

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100

    Neural Models for Personalized Recommendation Systems with External Information 

    Vijaikumar, M
    Personalized recommendation systems use the data generated by user-item interactions (for example, in the form of ratings) to predict different users interests in available items and recommend a set of items or products ...

    Explainable and Efficient Neural Models for Natural Language to Bash Command Translation 

    Bharadwaj, Shikhar
    One of the key goals of Natural Language Processing is to make computers understand natural language. Semantic Parsing has been one of the driving tasks for Natural Language Understanding. It is formally defined as the ...

    nuKSM: NUMA-aware Memory De-duplication for Multi-socket Servers 

    Panda, Akash
    An operating system's memory management has multiple goals, e.g. reducing memory access latencies, reducing memory footprint. These goals can conflict with each other when independent subsystems optimize them in silos. ...

    A Nash Bargaining Based Bid Optimizer for Sponsored Search Auctions 

    Kannan, Ramakrishnan
    The on-line advertising market involving displaying of Ads against search results by a search engine is growing at a fast rate. A majority of the search engine companies sell their advertising space through auctions which ...

    Efficient Key Management Protocols for Secure Routing and End-to-End Key Establishment with Enhanced Security in Mobile Ad hoc Networks 

    Talawar, Shrikant
    There is a need to protect mobile ad hoc network (MANET) from external attackers as well as internal attackers during route discovery and end-to-end key establishment. During route discovery, the external attackers can be ...

    Learning Tournament Solutions from Preference-based Multi-Armed Bandits 

    Siddartha, Y R
    We consider the dueling bandits problem, a sequential decision task where the goal is to learn to pick `good' arms out of an available pool by actively querying for and observing relative preferences between selected pairs ...

    An Improved Lower Bound for Multi-r-ic Depth Four Circuits as a Function of the Number of Input Variables 

    Hegde, Sumant
    In this work we study the multi-r-ic formula model introduced by [KS15c] and improve upon the lower bound for multi-r-ic depth four circuits given in [KST16b], when viewed as a function of the number of input variables ...

    Deep Learning with Minimal Supervision 

    Pandey, Gaurav
    Abstract In recent years, deep neural networks have achieved extraordinary performance on supervised learning tasks. Convolutional neural networks (CNN) have vastly improved the state of the art for most computer vision ...

    Expanders in Arithmetic Circuit Lower Bound : Towards a Separation Between ROABPs and Multilinear Depth 3 Circuits 

    Nair, Vineet
    Consider the problem of Polynomial Identity Testing(PIT): we are given an arithmetic circuit computing a multivariate polynomial over some eld and we have to determine whether that polynomial is identically zero or not. ...

    Efficient Schemes for Partitioning Based Scheduling of Real-Time Tasks in Multicore Architecture 

    Saranya, N
    The correctness of hard real-time systems depends not only on its logical correctness but also, on its ability to meet all its deadline. Existing real-time systems use either a pure real-time scheduler or a real-time ...
    • 1
    • . . .
    • 15
    • 16
    • 17
    • 18
    • 19
    • 20

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV
     

     

    Browse

    All of etd@IIScCommunities & CollectionsTitlesAuthorsAdvisorsSubjectsBy Thesis Submission DateThis CollectionTitlesAuthorsAdvisorsSubjectsBy Thesis Submission Date

    My Account

    LoginRegister

    Discover

    AuthorBharadwaj, Subramanya B V (2)Ranganath, B N (2)Ravindar, Archana (2)Srikanth, Cherukupally (2)Tudu, Jaynarayan Thakurdas (2)Acharya, Aravind N (1)Afraz, Mohammed (1)Agrawal, Akanksha (1)Agrawal, Vipul (1)Ajith, S (1)... View MoreSubject
    Computer Science (195)
    Machine Learning (13)Game Theory (8)Graph Theory (7)Compilers (5)Crowdsourcing (5)Algorithms (4)Computational Geometry (4)Computer Architecture (4)Data Mining (4)... View MoreDate Issued2010 - 2018 (158)2007 - 2009 (17)Has File(s)Yes (195)

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV