Computer Science and Automation (CSA): Recent submissions
Now showing items 21-40 of 545
-
Pattern classification using conjuctive conceptual clustering procedures
This thesis deals with the salient features of the conjunctive conceptual algorithm CLUSTER/2 and describes new algorithms based on conjunctive concepts to overcome some of the problems associated with CLUSTER/2. From a ... -
Sharable instructable agent for information filtering
This thesis presents a sharable instructable agent for information filtering. It also proposes the use of network-based collaboration in huge distributed communities of personalized agents. These agents carry out the tasks ... -
Secure ECom framework for small-communities
Universal reach of the web has made it possible for merchants to reach their customers, and vice versa, through what has now come to be referred as Electronic Commerce, or ecom in short. Despite admitting the new opportunities ... -
Learning subspace methods using weighted and multi-subspace representations
The learning subspace methods (LSMs) of classification are decision-theoretic pattern recognition methods where the primary model for a class is a linear subspace of the Euclidean pattern space. Classification is based on ... -
Techniques in The Markov Chain Monte Carlo Method
Consider the problem of sampling from a set of combinatorial objects according to a certain given distribution. The Markov chain Monte Carlo (MCMC) method is a possible solution for this problem. The method consists of ... -
Verification of information flow properties
Information flow properties are a way of specifying security properties of systems, that dates back to the work of Goguen and Meseguer [7] in the eighties. A system is viewed as generating traces containing “confidential” ... -
Approximation algorithms for the K- MST problem
Given a graph GGG on nnn vertices, the kkk-MST optimization problem is to find a tree spanning at least kkk vertices of GGG such that the cost of the tree is minimized over all such possible trees. The main contribution ... -
Computer generation and recognition of printed Telugu characters
The thesis is primarily concerned with two problems, namely, generation of Telugu characters and recognition of printed Telugu characters. In addition to the practical utility of generative schemes for pictorial patterns, ... -
Performance analysis of methods that overcome false sharing effects in software DSMs
Software Distributed Shared Memory (DSM) systems, which rely on virtual memory mechanisms to detect accesses to shared locations and maintain their consistency, support a sharing granularity of a page size, which is of the ... -
Enhancing Privacy and Efficiency of Distributed Encryption
The primary objective of a distributed system is to eliminate reliance on a central authority. In a distributed encryption scheme, users should be able to generate their key materials independently while securely sharing ... -
On some themes and models in economics (with a case-study in management)
The case study has sought to draw attention to the fact that historical factors have a strong impact on the structure and behaviour of a company. In the case of HMT, some of these factors were the association with the ... -
Symbolic processings of polynomia matrices using finite field transforms (Polynomial matrix-processor system design)
A new representation of the rational polynomials with integral coefficients over a finite field by expressing each of their coefficients in a suitable prime base is outlined. A modified form of this representation using ... -
Some studies in location and scheduling problems
The location and scheduling problems considered in this study are special cases of what are called combinatorial models. A combinatorial optimization problem consists of finding, from among a finite set of alternatives, ... -
Time domain and time series models for human activity in compensatory tracking experiments, Ph.D. Thesis
Analytical understanding of voluntary human behaviour while performing as an element of a closed-loop manual control situation has been sought since the 1940s. However, a total appreciation of human behaviour has been ... -
Contributions to the development of computationally efficient clustering techniques
The concept of multilevel theory is applied in this thesis to reduce the computation and storage requirements of various existing clustering algorithms. At the first level, the data is divided arbitrarily into a number of ... -
New charactrisations and algorithmic studies on chordal graphs and k-trees
A wealth of literature on graph theory has appeared in the last few centuries. This is to a large extent due to the increase in the applications of graph theory to problems of practical interest. Graph theory is also closely ... -
Zero Knowledge Proofs: Succinct Verification, Distributed Proofs and Lookup Arguments
Zero-Knowledge Proofs (ZKPs) are fundamental cryptographic tools enabling a prover to convince a verifier about the knowledge of a secret witness related to a public statement, without revealing any information beyond the ... -
Secure Vickrey Auctions with Rational Parties
In this work, we construct a second price (Vickrey) auction protocol (SPA), which does not require any auctioneers and ensures total privacy in the presence of rational parties participating in the auction. In particular, ... -
Protecting Deep Learning Models on Cloud Platforms with Trusted Execution Environments
Deep learning is rapidly integrated into different applications, from medical imaging to financial products. Organisations are spending enormous financial resources to train deep learning models. Often, many organisations ... -
Labelled clustering and its applications
Clustering is a process of grouping a collection of objects. Clustering approaches can be broadly categorized into conventional and knowledge-based approaches. In a conventional approach, objects are typically represented ...

