Now showing items 401-420 of 545

    • MIST : Mlgrate The Storage Too 

      Kamala, R (2017-05-25)
      We address the problem of migration of local storage of desktop users to remote sites. Assuming a network connection is maintained between the source and destination after the migration makes it possible for us to transfer ...
    • Automatic Data Allocation, Buffer Management And Data Movement For Multi-GPU Machines 

      Ramashekar, Thejas (2017-05-24)
      Multi-GPU machines are being increasingly used in high performance computing. These machines are being used both as standalone work stations to run computations on medium to large data sizes (tens of gigabytes) and as a ...
    • Computational And Combinatorial Problems On Some Geometric Proximity Graphs 

      Khopkar, Abhijeet (2017-05-24)
      In this thesis, we focus on the study of computational and combinatorial problems on various geometric proximity graphs. Delaunay and Gabriel graphs are widely studied geometric proximity structures. These graphs have been ...
    • Tiling Stencil Computations To Maximize Parallelism 

      Bandishti, Vinayaka Prakasha (2017-05-21)
      Stencil computations are iterative kernels often used to simulate the change in a discretized spatial domain overtime (e.g., computational fluid dynamics) or to solve for unknowns in a discretized space by converging to a ...
    • Model-Checking Infinite-State Systems For Information Flow Security Properties 

      Raghavendra, K R (2017-02-16)
      Information flow properties are away of specifying security properties of systems ,dating back to the work of Goguen and Meseguer in the eighties. In this framework ,a system is modeled as having high-level (or confidential)events ...
    • Access Path Based Dataflow Analysis For Sequential And Concurrent Programs 

      Arnab De, * (2016-09-14)
      In this thesis, we have developed a flow-sensitive data flow analysis framework for value set analyses for Java-like languages. Our analysis frame work is based on access paths—a variable followed by zero or more field ...
    • Efficient Usage Of Flash Memories In High Performance Scenarios 

      Srimugunthan, * (2016-09-09)
      New PCI-e flash cards and SSDs supporting over 100,000 IOPs are now available, with several usecases in the design of a high performance storage system. By using an array of flash chips, arranged in multiple banks, large ...
    • Weighted Average Based Clock Synchronization Protocols For Wireless Sensor Networks 

      Swain, Amulya Ratna (2016-07-12)
      Wireless Sensor Networks (WSNs) consist of a large number of resource constrained sensor nodes equipped with various sensing devices which can monitor events in the real world. There are various applications such as ...
    • Mechanism Design For Strategic Crowdsourcing 

      Nath, Swaprava (Indian Institute of Science, 2013-12-17)
      This thesis looks into the economics of crowdsourcing using game theoretic modeling. The art of aggregating information and expertise from a diverse population has been in practice since a long time. The Internet and the ...
    • Studies In Automatic Management Of Storage Systems 

      Pipada, Pankaj (2015-11-16)
      Autonomic management is important in storage systems and the space of autonomics in storage systems is vast. Such autonomic management systems can employ a variety of techniques depending upon the specific problem. In this ...
    • Power Efficient Last Level Cache For Chip Multiprocessors 

      Mandke, Aparna (2015-09-09)
      The number of processor cores and on-chip cache size has been increasing on chip multiprocessors (CMPs). As a result, leakage power dissipated in the on-chip cache has become very significant. We explore various techniques ...
    • Learning Robust Support Vector Machine Classifiers With Uncertain Observations 

      Bhadra, Sahely (2015-08-19)
      The central theme of the thesis is to study linear and non linear SVM formulations in the presence of uncertain observations. The main contribution of this thesis is to derive robust classfiers from partial knowledge of ...
    • Sentiment-Driven Topic Analysis Of Song Lyrics 

      Sharma, Govind (2015-08-17)
      Sentiment Analysis is an area of Computer Science that deals with the impact a document makes on a user. The very field is further sub-divided into Opinion Mining and Emotion Analysis, the latter of which is the basis for ...
    • New Approaches And Experimental Studies On - Alegebraic Attacks On Stream Ciphers 

      Pillai, N Rajesh (2015-02-05)
      Algebraic attacks constitute an effective class of cryptanalytic attacks which have come up recently. In algebraic attacks, the relations between the input, output and the key are expressed as a system of equations and ...
    • Visual Analysis Of Interactions In Multifield Scientific Data 

      Suthambhara, N (2014-11-14)
      Data from present day scientific simulations and observations of physical processes often consist of multiple scalar fields. It is important to study the interactions between the fields to understand the underlying phenomena. ...
    • Rainbow Connection Number Of Graph Power And Graph Products 

      Arunselvan, R (2014-09-09)
      The minimum number of colors required to color the edges of a graph so that any two distinct vertices are connected by at least one path in which no two edges are colored the same is called its rainbow connection number. ...
    • A Novel Game Theoretic And Voting Mechanism Based Approach For Carbon Emissions Reduction 

      Shelke, Sunil Sitaram (2014-08-07)
      Global warming is currently a major challenge facing the world. There are widespread ongoing efforts in the form of summits, conferences, etc., to find satisfactory ways of surmounting this challenge. The basic objective ...
    • Autonomous Spacecraft Mission Planning And Execution In A Petri Net Framework 

      Indra, A (2014-08-01)
      Presently, most spacecraft are controlled from ground involving activities such as up-linking the schedule of daily operations and monitoring health parameters. These activities lead to a cognitive overload on human ...
    • Two Player Game Variant Of The Erdos Szekeres Problem 

      Parikshit, K (2014-08-01)
      The following problem has been known for its beauty and elementary character. The Erd˝os Szekeres problem[7]: For any integer k ≥ 3, determine if there exists a smallest positive integer N(k) such that any set of atleast ...
    • Game Theoretic Models For Social Network Analysis 

      Narayanam, Ramasuri (2014-08-01)
      With increasing demand for social network based activities, it is very important to understand not only the structural properties of social networks but also how social networks form, to better exploit their promise and ...