• Login
    Search 
    •   etd@IISc
    • Division of Interdisciplinary Research
    • Supercomputer Education and Research Centre (SERC)
    • Search
    •   etd@IISc
    • Division of Interdisciplinary Research
    • Supercomputer Education and Research Centre (SERC)
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 1-6 of 6

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100

    Improving The Communication Performance Of I/O Intensive And Communication Intensive Application In Cluster Computer Systems 

    Kumar, V Santhosh (2009-04-13)
    Cluster computer systems assembled from commodity off-the-shelf components have emerged as a viable and cost-effective alternative to high-end custom parallel computer systems.In this thesis, we investigate how scalable ...

    Performance Modeling And Evaluation Of Network Processors 

    Govind, S (2009-03-02)
    In recent years there has been an exponential growth in Internet traffic resulting in increased network bandwidth requirements which, in turn, has led to stringent processing requirements on network layer devices like ...

    On The Issues Of Supporting On-Demand Streaming Application Over Peer-to-Peer Networks 

    Kalapriya, K (2009-06-17)
    Bandwidth and resource constraints at the server side is a limitation for deployment of streaming media applications. Resource constraints at the server side often leads to saturation of resources during sudden increase ...

    Reduction Of Query Optimizer Plan Diagrams 

    Darera, Pooja N (2009-06-17)
    Modern database systems use a query optimizer to identify the most efficient strategy, called "plan", to execute declarative SQL queries. Optimization is a mandatory exercise since the difference between the cost of best ...

    Applications Of Machine Learning To Anomaly Based Intrusion Detection 

    Phani, B (2009-03-02)
    This thesis concerns anomaly detection as a mechanism for intrusion detection in a machine learning framework, using two kinds of audit data : system call traces and Unix shell command traces. Anomaly detection systems ...

    Information Theoretic Approach To Extractive Text Summarization 

    Ravindra, G (2009-04-13)
    Automatic text summarization techniques, which can reduce a source text to a summary text by content generalization or selection have assumed signifi- cance in recent times due to the ever expanding information explosion ...

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV
     

     

    Browse

    All of etd@IIScCommunities & CollectionsTitlesAuthorsAdvisorsSubjectsBy Thesis Submission DateThis CollectionTitlesAuthorsAdvisorsSubjectsBy Thesis Submission Date

    My Account

    LoginRegister

    Discover

    AuthorDarera, Pooja N (1)Govind, S (1)Kalapriya, K (1)Kumar, V Santhosh (1)Phani, B (1)Ravindra, G (1)Subject
    Computer Science (6)
    Network Processors (2)Abstracting (1)Anomaly Detection (1)Anorexic Reduced Diagrams (1)Automatic Extractive Summarizer (1)Black Board System (1)Bloom Filter Processing (1)Bursty Traffic (1)Cluster Computer Systems (1)... View MoreDate Issued
    2009 (6)
    Has File(s)Yes (6)

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV