• Login
    Search 
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Search
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 71-80 of 158

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100

    A Case for Protecting Huge Pages from the Kernel 

    Patel, Naman (2018-01-01)
    Modern architectures support multiple size pages to facilitate applications that use large chunks of contiguous memory either for buffer allocation, application specific memory management, in-memory caching or garbage ...

    A Systems Perspective of Software Runtime Bloat - Origin, Mitigation and Power-Performance Implications 

    Bhattacharya, Suparna (2018-03-08)
    Large flexible software systems tend to incur “bloat”, here defined as the runtime overhead induced by the accumulation of excess functionality and objects. Removing bloat is hard as these overheads are a side-effect of ...

    Investigations on CPI Centric Worst Case Execution Time Analysis 

    Ravindar, Archana (2018-03-19)
    Estimating program worst case execution time (WCET) is an important problem in the domain of real-time systems and embedded systems that are deadline-centric. If WCET of a program is found to exceed the deadline, it is ...

    Online Learning and Simulation Based Algorithms for Stochastic Optimization 

    Lakshmanan, K (2018-03-07)
    In many optimization problems, the relationship between the objective and parameters is not known. The objective function itself may be stochastic such as a long-run average over some random cost samples. In such cases ...

    Reconstruction of 3D Neuronal Structures 

    Kumar, Kanuj (2018-03-17)
    Microscopic analysis of biological structures can be significantly enhanced by representing the object of study as a three-dimensional entity. To assist neurobiologists investigate the molecular mechanisms involved in ...

    Construction of Secure and Efficient Private Set Intersection Protocol 

    Kumar, Vikas (2018-03-17)
    Private set intersection(PSI) is a two party protocol where both parties possess a private set and at the end of the protocol, one party (client) learns the intersection while other party (server) learns nothing. Motivated ...

    Improving the Precision of a Scalable Demand-Driven Null- Dereference Verification for Java 

    Margoor, Amogh (2018-03-19)
    The problem addressed in this thesis is sound, scalable, demand-driven null-dereference verification for Java programs via over-approximated weakest preconditions analysis. The base version of this analysis having been ...

    Parameterized Complexity of Maximum Edge Coloring in Graphs 

    Goyal, Prachi (2018-03-09)
    The classical graph edge coloring problem deals in coloring the edges of a given graph with minimum number of colors such that no two adjacent edges in the graph, get the same color in the proposed coloring. In the following ...

    An Optimizing Code Generator for a Class of Lattice-Boltzmann Computations 

    Pananilath, Irshad Muhammed (2018-03-09)
    Lattice-Boltzmann method(LBM), a promising new particle-based simulation technique for complex and multiscale fluid flows, has seen tremendous adoption in recent years in computational fluid dynamics. Even with a ...

    Optimization Algorithms for Deterministic, Stochastic and Reinforcement Learning Settings 

    Joseph, Ajin George (2018-05-30)
    Optimization is a very important field with diverse applications in physical, social and biological sciences and in various areas of engineering. It appears widely in ma-chine learning, information retrieval, regression, ...
    • 1
    • . . .
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • 11
    • . . .
    • 16

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV
     

     

    Browse

    All of etd@IIScCommunities & CollectionsTitlesAuthorsAdvisorsSubjectsBy Thesis Submission DateThis CollectionTitlesAuthorsAdvisorsSubjectsBy Thesis Submission Date

    My Account

    LoginRegister

    Discover

    AuthorBharadwaj, Subramanya B V (2)Ranganath, B N (2)Ravindar, Archana (2)Srikanth, Cherukupally (2)Tudu, Jaynarayan Thakurdas (2)Acharya, Aravind N (1)Agrawal, Akanksha (1)Agrawal, Vipul (1)Ajith, S (1)Alagarsamy, K (1)... View MoreSubject
    Computer Science (158)
    Machine Learning (12)Game Theory (6)Graph Theory (6)Compilers (4)Computational Geometry (4)Crowdsourcing (4)Graph Algorithms (4)Multiclass Classification (4)Reinforcement Learning (4)... View MoreDate Issued2018 (72)2017 (18)2011 (17)2010 (12)2013 (12)2012 (10)2014 (10)2015 (5)2016 (2)Has File(s)
    Yes (158)

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV