• Login
    Search 
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Search
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 231-240 of 546

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100

    Bandit Algorithms: Fairness, Welfare, and Applications in Causal Inference 

    Sawarni, Ayush
    We study regret in online learning from a welfarist perspective and explore an application of bandit algorithms in causal inference. We introduce Nash regret, which measures the difference between the optimal action ...

    Rational Secure Computation: New Definitions and Constructions 

    Agarwal, Siddharth
    Cryptography and Game Theory are two fascinating areas of modern computing, and there have been numerous works since the early 2000s to bridge these. While cryptography provides mechanisms to detect deviations, game theory ...

    An Explainable Hierarchical Class Attention Model for Legal Appeal Automation 

    Sasanka Rani, Vutla
    Judicial systems worldwide are overburdened due to the limited number of legal professionals. The digitization of legal processes has resulted in abundant legal data, paving the way for the development of legal automation ...

    HYDRA: A Dynamic Approach to Database Regeneration 

    Sanghi, Anupam
    Database software vendors often need to generate synthetic databases for a variety of applications, including (a) Testing database engines and applications, (b) Data masking, (c) Benchmarking, (d) Creating what-if scenarios, ...

    Algorithms for Achieving Fairness and Efficiency in Matching Problems 

    Narang, Shivika
    Matching problems arise in numerous practical settings. Fairness and efficiency are two desirable properties in most such real world scenarios. This dissertation work presents new approaches and models for capturing and ...

    Towards Robustness of Neural Legal Judgement System 

    Raj, Rohit
    Legal Judgment Prediction (LJP) implements Natural Language Processing (NLP) techniques to predict judgment results based on fact description. It can play a vital role as a legal assistant and benefit legal practitioners ...

    Multi-Armed Bandits – On Range Searching and On Slowly-varying Non-stationarity 

    Ramakrishnan, K
    Multi-Armed Bandits (MAB) is a popular framework for modelling sequential decision-making problems under uncertainty. This thesis is a compilation of two independent works on MABs. 1. In the first work, we study a ...

    Privadome: A System for Citizen Privacy in the Delivery Drone Era 

    Pillai, Gokulnath
    E-commerce companies are actively considering the use of delivery drones for customer fulfillment, leading to growing concerns around citizen privacy. Drones are equipped with cameras, and the video feed from these cameras ...

    CodeQueries: Benchmarking Query Answering over Source Code 

    Sahu, Surya Prakash
    Software developers often make queries about the security, performance effectiveness, and maintainability of their code. Through an iterative debugging process, developers analyze the code to find answers to these ...

    Advancing the Communication Complexity Landscape of Perfectly Secure Multiparty Computation 

    Patil, Shravani Mahesh
    Secure multiparty computation (MPC) allows n distrustful parties to jointly compute a function on their inputs while keeping their inputs private. The distrust is modelled as an adversary that controls up to t parties and ...
    • 1
    • . . .
    • 21
    • 22
    • 23
    • 24
    • 25
    • 26
    • 27
    • . . .
    • 55

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV
     

     

    Browse

    All of etd@IIScCommunities & CollectionsTitlesAuthorsAdvisorsSubjectsBy Thesis Submission DateThis CollectionTitlesAuthorsAdvisorsSubjectsBy Thesis Submission Date

    My Account

    LoginRegister

    Discover

    AuthorAjith, S (2)Arun, R (2)Babu, T Ravindra (2)Bharadwaj, Subramanya B V (2)Dayama, Pankaj (2)Deodhare, Dipti (2)Dubey, Abhishek (2)Dukkipati, Ambedkar (2)Goswami, Asis K (2)Gupta, Nikhil (2)... View MoreSubjectComputer Science (195)TECHNOLOGY (134)Computer and Information Science (28)Machine Learning (24)Game Theory (15)Reinforcement Learning (15)Cryptography (14)Graph Theory (10)Deep Learning (9)Markov Decision Processes (9)... View MoreDate Issued2010 - 2018 (189)2005 - 2009 (49)Has File(s)Yes (546)

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV