• Login
    Search 
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Search
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 1-10 of 394

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100

    New Models and Methods for Formation and Analysis of Social Networks 

    Dhamal, Swapnil
    Social networks are an inseparable part of human lives, and play a major role in a wide range of activities in our day-to-day as well as long-term lives. The rapid growth of online social networks has enabled people to ...
    Thumbnail

    New Techniques for Automatic Short Answer Grading 

    Roy, Shourya
    Assessing acquired knowledge by students is one of the key aspects of the pedagogical ecosystem. A significant part of a teacher’s time is spent towards grading responses of students to questions given in assignments and ...

    Fully Resilient Non-Interactive ID-Based Hierarchical Key Agreement 

    Tiwari, Mayank
    Non-Interactive Key Agreement (NIKA) is a cryptographic primitive which allows two parties to agree on a shared secret key without any interaction. Identity-based Non-Interactive Key Agreement (ID-NIKA) allows each party ...

    Heterogeneity Aware Shared DRAM Cache for Integrated Heterogeneous Architectures 

    Patil, Adarsh
    Integrated Heterogeneous System (IHS) processors pack throughput-oriented GPGPUs along-side latency-oriented CPUs on the same die sharing certain resources, e.g., shared last level cache, network-on-chip (NoC), and the ...

    Algorithms for Fair Decision Making: Provable Guarantees and Applications 

    Biswas, Arpita
    The topic of fair allocation of indivisible items has received significant attention because of its applicability in several real-world settings. This has led to a vast body of work focusing on defining appropriate fairness ...

    A Nash Bargaining Based Bid Optimizer for Sponsored Search Auctions 

    Kannan, Ramakrishnan
    The on-line advertising market involving displaying of Ads against search results by a search engine is growing at a fast rate. A majority of the search engine companies sell their advertising space through auctions which ...

    Representing Networks: Centrality, Node Embeddings, Community Outliers and Graph Representation 

    Bandyopadhyay, Sambaran
    Networks are ubiquitous. We start our technical work in this thesis by exploring the classical concept of node centrality (also known as influence measure) in information networks. Like clustering, node centrality is also ...

    Embedding Networks: Node and Graph Level Representations 

    Aggarwal, Manasvi
    Graph neural networks gained significant attention for graph representation and classification in the machine learning community. For graph classification, different pooling techniques are introduced, but none of them has ...

    Efficient Key Management Protocols for Secure Routing and End-to-End Key Establishment with Enhanced Security in Mobile Ad hoc Networks 

    Talawar, Shrikant
    There is a need to protect mobile ad hoc network (MANET) from external attackers as well as internal attackers during route discovery and end-to-end key establishment. During route discovery, the external attackers can be ...

    On Learning and Lower Bound Problems Related to the Iterated Matrix Multiplication Polynomial 

    Nair, Vineet
    The iterated matrix multiplication polynomial (IMM) of width w and length d is the 1x1 entry in the product of d square matrices of size w. The w^2d entries in the d matrices are distinct variables. In this thesis, we study ...
    • 1
    • 2
    • 3
    • 4
    • . . .
    • 40

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV
     

     

    Browse

    All of etd@IIScCommunities & CollectionsTitlesAuthorsAdvisorsSubjectsBy Thesis Submission DateThis CollectionTitlesAuthorsAdvisorsSubjectsBy Thesis Submission Date

    My Account

    LoginRegister

    Discover

    AuthorAjith, S (2)Arun, R (2)Bharadwaj, Subramanya B V (2)Dubey, Abhishek (2)Dukkipati, Ambedkar (2)Gupta, Nikhil (2)Joseph, P J (2)Karmakar, Prasenjit (2)Nagpal, Rahul (2)Nair, Vineet (2)... View MoreSubjectComputer Science (195)TECHNOLOGY (122)Computer and Information Science (28)Machine Learning (23)Game Theory (15)Reinforcement Learning (13)Cryptography (10)Graph Theory (10)Algorithms (8)Computational Geometry (8)... View MoreDate Issued2010 - 2018 (189)2005 - 2009 (49)Has File(s)
    Yes (394)

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV