Computer Science and Automation (CSA): Recent submissions
Now showing items 1-20 of 559
-
New approaches to improved detection and tracking performance in radars
The purpose of a Track While Scan (TWS) radar system is to detect, locate and track the various targets under its surveillance in the presence of interfering echoes. In the conventional approaches, the two basic functions ... -
Modeling and analysis of industrial design and fabrication Processes
Product design and development constitute an important activity in any manufacturing firm. Designing an optimized product design process and an optimized fabrication process is an important problem in itself and is of ... -
Capacity Optimized Wireless Ad-Hoc Networks
Recently, many types of mobile devices with high level computing capabilities, such as cellular phones, PCs, digital cameras, and high performance PDAs, have come into widespread use. In 2000, some of these devices became ... -
OFDM-MAC algorithms and their impact on TCP performance in next generation mobile networks
With the increasing adoption of wireless technology, it is reasonable to expect an increase in the demand for supporting both real time multimedia and high rate reliable data services. Next generation wireless systems ... -
Distributed logic simulation: performance studies of event-driven and time- first evaluation algorithms
With the increasing complexity of VLSI circuits, simulation of digital circuits is becoming a more complex and time consuming task. Of the different types of simulators available for analysing the design at various stages ... -
Functional test generation for synchronous sequential circuits
In this work, we present a novel approach to generate functional test sequences for synchronous sequential non scan circuits. The method is applicable when the functional description of the circuit can be obtained in the ... -
Sensitivity and Round off noise studies on signal processor based second order digital filters
Digital filters are invaluable tools for real time signal processing because of their significant advantages such as accuracy, reproducibility, and flexibility. Higher order digital filters are usually realized by cascading ... -
Logic relizations based on reed-muller canonical forms Ph.D. Thesis
The thesis is concerncd v/ith a study of Recd-Mullor Canonical (FMC) forms and the associated logic realizations. Tv/o nonexhaustive procedures for obtaining minimal PS'IC forms have been reviewed, One of them has boen ... -
Performance evaluation of concurrency control algorithms for distributed database
Among the different issues associated with a distributed database system (DDBS), perhaps the most difficult one is Concurrency Control (CC). Although a large number of CC algorithms are available in the literature, very ... -
Gaussian processes for learning problems with related outputs
Gaussian processes (GPs) have attracted much attention in the machine learning community due to their promising generalization performance and unique properties. GPs provide a Bayesian non-parametric approach to learning ... -
Structure and computation of a class of piece wise linear generalized voronoi diagrams with applications to translational motion planning
This thesis concerns the development of a piecewise linear generalized Voronoi diagram and its application for translating a convex polytope among convex polyhedra in a general r r-dimensional polyhedral world. This work ... -
Survey on the approximation techniques for network design and multiple tool milling problems
Most of the optimization problems are known to be NP-hard. Designing approximation algorithms for these NP-hard problems is of great interest these days. In this dissertation, we present a survey of generalized approximation ... -
Treebeard: A Schedule Guided Retargetable Compiler for Decision Tree Inference
The proliferation of machine learning together with the rapid evolution of the hardware ecosystem has led to a surge in the demand for model inference on a variety of hardware. Decision tree based models are the most popular ... -
Whole-Program and Non-Bare-Metal Control-Flow Attestation
Software attestation enables a remote entity to verify that a program executed as intended on an untrusted platform, with applications in domains such as embedded systems, Internet of Things (IoT), and cloud-edge computing. ... -
Object-Oriented software engineering of a compiler prototyp-ing system
A compiler consists of two phases: source program analysis and object program generation. The problem of compilation has been extensively studied and many tools and techniques for building the analysis phase are available. ... -
High performance optimistic parallel discrete event simulation in a network of linux machines
Parallel Discrete Event Simulation (PDES) refers to the execution of a discrete?event simulation on a parallel or distributed system. The synchronization mechanism of PDES uses either an optimistic or conservative approach. ... -
Efficient algorithms for linearly constrained convex programming and some proximity problems
This thesis addresses the following problems: Linearly constrained convex programming problem in n constraints and d dimensions for a fixed d. Some proximity problems between two convex polyhedra A and B, each polyhedron ... -
On Policy Gradients, Momentum, and Learning with Adversaries: Algorithms and Convergence Analysis
This thesis comprises five works, organized into three parts: the first focuses on average-reward Reinforcement Learning (RL), the second on distributed learning under adversaries in heterogeneous and asynchronous setups, ... -
Knowledge-based mining of multi-database for associations
Knowledge Discovery in Databases (KDD) uses knowledge engineering tools and database technology to extract hidden patterns from databases. Data mining is a step in the KDD process that finds useful patterns in the data. ... -
Design and perfomance evaluation of bus access schemes for salan-an experimental local area network
Local Area Networks (LANs) spanning a limited geographic area have emerged of late as a field of wide applicability. One of the prime factors governing the design of a LAN is the Medium Access Control (MAC) scheme which ...

