• Login
    Search 
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Search
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 71-80 of 135

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100

    Stochastic approximation with set-valued maps and Markov noise: Theoretical foundations and applications 

    Yaji, Vinayaka Ganapati
    Stochastic approximation algorithms produce estimates of a desired solution using noisy real world data. Introduced by Robbins and Monro, in 1951, stochastic approximation techniques have been instrumental in the asymptotic ...

    Extending Program Analysis Techniques to Web Applications and Distributed Systems 

    Athaiya, Snigdha
    Web-based applications and distributed systems are ubiquitous and indispensable today. These systems use multiple parallel machines for greater functionality, and efficient and reliable computation. At the same time they ...

    Problems on bend-number, circular separation dimension and maximum edge 2-colouring 

    Lahiri, Abhiruk
    Representation of graphs as the intersection graphs of geometric objects has a long history. The objective is to a nd a collection of \simple" sets S such that a given graph G is its intersection graph. We are interested ...

    Structured Regularization Through Convex Relaxations Of Discrete Penalties 

    Sankaran, Raman
    Motivation. Empirical risk minimization(ERM) is a popular framework for learning predictive models from data, which has been used in various domains such as computer vision, text processing, bioinformatics, neuro-biology, ...

    Adaptively Secure Primitives in the Random Oracle Model 

    Sarkar, Pratik
    Adaptive security embodies one of the strongest notions of security that allows an adversary to corrupt parties at any point during protocol execution and gain access to its internal state. Since it models reallife situations ...

    Guarding Terrain using k-Watchtowers 

    Tripathi, Nitesh
    The discrete k-watchtower problem for a polyhedral terrain T in R3 with n vertices is to nd k vertical segments, called watchtowers, of smallest height, whose bottom end-points (bases) lie on some vertices of T, and ...

    A Trusted-Hardware Backed Secure Payments Platform for Android 

    Agarwal, Rounak
    Digital payments using personal electronic devices have been steadily gaining in popularity for the last few years. While digital payments using smartphones are very convenient, they are also more susceptible to security ...

    Novel Reinforcement Learning Algorithms and Applications to Hybrid Control Design Problems 

    Gandhi, Meet
    The thesis is a compilation of two independent works. In the first work, we develop novel weight assignment procedure, which helps us develop several schedule based algorithms. Learning the value function of a given policy ...

    Towards Effcient Privacy-Preserving Two-Party k-Means Clustering Protocol 

    Chim, Sonali
    Two-party data mining is a win-win game if played with a guarantee of data privacy from each other. This guarantee is provided by the use of cryptographic techniques in designing the two-party protocol. The need to ...

    Locally Reconstructable Non-malleable Secret Sharing 

    Tomy, Jenit
    Non-malleable secret sharing (NMSS) schemes, introduced by Goyal and Kumar (STOC 2018), ensure that a secret m can be distributed into shares m1,...,mn (for some n), such that any t (a parameter <= n) shares can be ...
    • 1
    • . . .
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • 11
    • . . .
    • 14

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV
     

     

    Browse

    All of etd@IIScCommunities & CollectionsTitlesAuthorsAdvisorsSubjectsBy Thesis Submission DateThis CollectionTitlesAuthorsAdvisorsSubjectsBy Thesis Submission Date

    My Account

    LoginRegister

    Discover

    AuthorPatil, Vishakha (2)Agarwal, Rounak (1)Agarwal, Siddharth (1)Aggarwal, Manasvi (1)Agrawal, Nikhil (1)Ajith, S (1)Allabadi, Swati (1)Anand, Abhinav (1)Arora, Himanshu (1)Arpith, K (1)... View MoreSubject
    TECHNOLOGY (135)
    Reinforcement Learning (9)Cryptography (7)Deep Learning (7)Machine Learning (7)Markov Decision Processes (5)Natural Language Processing (5)algorithms (4)Artificial Intelligence (4)Security (4)... View MoreHas File(s)
    Yes (135)

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV