• Login
    Search 
    •   etd@IISc
    • Division of Interdisciplinary Research
    • Search
    •   etd@IISc
    • Division of Interdisciplinary Research
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 1-9 of 9

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100

    Improving The Communication Performance Of I/O Intensive And Communication Intensive Application In Cluster Computer Systems 

    Kumar, V Santhosh (2009-04-13)
    Cluster computer systems assembled from commodity off-the-shelf components have emerged as a viable and cost-effective alternative to high-end custom parallel computer systems.In this thesis, we investigate how scalable ...

    Performance Modeling And Evaluation Of Network Processors 

    Govind, S (2009-03-02)
    In recent years there has been an exponential growth in Internet traffic resulting in increased network bandwidth requirements which, in turn, has led to stringent processing requirements on network layer devices like ...

    On The Issues Of Supporting On-Demand Streaming Application Over Peer-to-Peer Networks 

    Kalapriya, K (2009-06-17)
    Bandwidth and resource constraints at the server side is a limitation for deployment of streaming media applications. Resource constraints at the server side often leads to saturation of resources during sudden increase ...

    Reduction Of Query Optimizer Plan Diagrams 

    Darera, Pooja N (2009-06-17)
    Modern database systems use a query optimizer to identify the most efficient strategy, called "plan", to execute declarative SQL queries. Optimization is a mandatory exercise since the difference between the cost of best ...

    Applications Of Machine Learning To Anomaly Based Intrusion Detection 

    Phani, B (2009-03-02)
    This thesis concerns anomaly detection as a mechanism for intrusion detection in a machine learning framework, using two kinds of audit data : system call traces and Unix shell command traces. Anomaly detection systems ...

    Information Theoretic Approach To Extractive Text Summarization 

    Ravindra, G (2009-04-13)
    Automatic text summarization techniques, which can reduce a source text to a summary text by content generalization or selection have assumed signifi- cance in recent times due to the ever expanding information explosion ...

    Power-Aware Compilation Techniques For Embedded Systems 

    Shyam, K (2008-01-25)
    The demand for devices like Personal Digital Assistants (PDA’s), Laptops, Smart Mobile Phones, are at an all time high. As the demand for these devices increases, so is the push to provide sophisticated functionalities ...

    One To Mant And Many To Many Collective Communication Operations On Grids 

    Gupta, Rakhi (2008-01-16)
    Collective Communication Operations are widely used in MPI applications and play an important role in their performance. Hence, various projects have focused on optimization of collective communications for various kinds ...

    Deterministic Scheduling Of Parallel Discrete And Batch Processors 

    Venkataramana, M (2009-03-03)
    Scheduling concerns the allocation of limited resources to tasks over time. In manufacturing systems, scheduling is nothing but assigning the jobs to the available processors over a period of time. Our research focuses on ...

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV
     

     

    Browse

    All of etd@IIScCommunities & CollectionsTitlesAuthorsAdvisorsSubjectsBy Thesis Submission DateThis CommunityTitlesAuthorsAdvisorsSubjectsBy Thesis Submission Date

    My Account

    LoginRegister

    Discover

    AuthorDarera, Pooja N (1)Govind, S (1)Gupta, Rakhi (1)Kalapriya, K (1)Kumar, V Santhosh (1)Phani, B (1)Ravindra, G (1)Shyam, K (1)Venkataramana, M (1)Subject
    Computer Science (9)
    Network Processors (2)Abstracting (1)Allgather - Algorithms (1)Anomaly Detection (1)Anorexic Reduced Diagrams (1)Ant Colony Optimization (ACO) (1)ATC-BATC Rule (1)Automatic Extractive Summarizer (1)Batch Processing (1)... View MoreDate Issued2009 (7)2008 (2)Has File(s)Yes (9)

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV