• Login
    Search 
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Search
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 1-10 of 122

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100

    Fully Resilient Non-Interactive ID-Based Hierarchical Key Agreement 

    Tiwari, Mayank
    Non-Interactive Key Agreement (NIKA) is a cryptographic primitive which allows two parties to agree on a shared secret key without any interaction. Identity-based Non-Interactive Key Agreement (ID-NIKA) allows each party ...

    Algorithms for Fair Decision Making: Provable Guarantees and Applications 

    Biswas, Arpita
    The topic of fair allocation of indivisible items has received significant attention because of its applicability in several real-world settings. This has led to a vast body of work focusing on defining appropriate fairness ...

    Representing Networks: Centrality, Node Embeddings, Community Outliers and Graph Representation 

    Bandyopadhyay, Sambaran
    Networks are ubiquitous. We start our technical work in this thesis by exploring the classical concept of node centrality (also known as influence measure) in information networks. Like clustering, node centrality is also ...

    Embedding Networks: Node and Graph Level Representations 

    Aggarwal, Manasvi
    Graph neural networks gained significant attention for graph representation and classification in the machine learning community. For graph classification, different pooling techniques are introduced, but none of them has ...

    On Learning and Lower Bound Problems Related to the Iterated Matrix Multiplication Polynomial 

    Nair, Vineet
    The iterated matrix multiplication polynomial (IMM) of width w and length d is the 1x1 entry in the product of d square matrices of size w. The w^2d entries in the d matrices are distinct variables. In this thesis, we study ...

    Algorithms for Social Good in Online Platforms with Guarantees on Honest Participation and Fairness 

    Ghalme, Ganesh Sambhaji
    Recent decades have seen a revolution in the way people communicate, buy products, learn new things, and share life experiences. This has spurred the growth of online platforms that enable users from all over the globe to ...

    Verification of a Generative Separation Kernel 

    Haque, Inzemamul
    A Separation Kernel is a small specialized microkernel that provides a sand-boxed execution environment for a given set of processes (also called \subjects"). The subjects may communicate only via declared memory channels, ...

    Deep Learning Models for Few-shot and Metric Learning 

    Mehrotra, Akshay
    Deep neural network-based models have achieved unprecedented performance levels over many tasks in the traditional supervised setting and scale well with large quantities of data. On the other hand, improving performance ...

    Geometric and Topological Methods for Biomolecular Visualization 

    Masood, Talha Bin
    Biomolecules like proteins are the basic building blocks of living systems. It has been observed that the structure of a biomolecule plays an important role in defining its function. In this thesis, we describe novel ...

    Deep Learning for Bug Localization and Program Repair 

    Gupta, Rahul
    In this thesis, we focus on the problem of program debugging and present novel deep learning based techniques for bug-localization and program repair. Deep learning techniques have been successfully applied to a variety ...
    • 1
    • 2
    • 3
    • 4
    • . . .
    • 13

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV
     

     

    Browse

    All of etd@IIScCommunities & CollectionsTitlesAuthorsAdvisorsSubjectsBy Thesis Submission DateThis CollectionTitlesAuthorsAdvisorsSubjectsBy Thesis Submission Date

    My Account

    LoginRegister

    Discover

    AuthorPatil, Vishakha (2)Tiwari, Mayank (2)Agarwal, Rounak (1)Agarwal, Siddharth (1)Aggarwal, Manasvi (1)Agrawal, Nikhil (1)Ajith, S (1)Allabadi, Swati (1)Anand, Abhinav (1)Arora, Himanshu (1)... View MoreSubject
    TECHNOLOGY (122)
    Reinforcement Learning (7)Deep Learning (6)Machine Learning (6)Cryptography (5)Natural Language Processing (5)algorithms (3)Approximation Algorithms (3)Artificial Intelligence (3)Graphs (3)... View MoreHas File(s)Yes (122)

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV