Now showing items 101-112 of 112

    • QoS Over Multihop Wireless Networks 

      Saxena, Tarun (2009-05-12)
      The aim of this work is to understand the requirements behind Quality of Service (QoS) for Multihop Wireless Networks and evaluate the performance of different such strategies. This work starts by establishing the basis ...
    • Analysis And Predictions Of DNA Sequence Transformations On Grids 

      Joshi, Yadnyesh R (2009-05-11)
      Phylogenetics is the study of evolution of organisms. Evolution occurs due to mutations of DNA sequences. The reasons behind these seemingly random mutations are largely unknown. There are many algorithms that build ...
    • Improving The Communication Performance Of I/O Intensive And Communication Intensive Application In Cluster Computer Systems 

      Kumar, V Santhosh (2009-04-13)
      Cluster computer systems assembled from commodity off-the-shelf components have emerged as a viable and cost-effective alternative to high-end custom parallel computer systems.In this thesis, we investigate how scalable ...
    • Information Theoretic Approach To Extractive Text Summarization 

      Ravindra, G (2009-04-13)
      Automatic text summarization techniques, which can reduce a source text to a summary text by content generalization or selection have assumed signifi- cance in recent times due to the ever expanding information explosion ...
    • A Systematic Approach To Synthesis Of Verification Test-Suites For Modular SoC Designs 

      Surendran, Sudhakar (2009-03-03)
      SoCs (System on Chips) are complex designs with heterogeneous modules (CPU, memory, etc.) integrated in them. Verification is one of the important stages in designing an SoC. Verification is the process of checking if the ...
    • Applications Of Machine Learning To Anomaly Based Intrusion Detection 

      Phani, B (2009-03-02)
      This thesis concerns anomaly detection as a mechanism for intrusion detection in a machine learning framework, using two kinds of audit data : system call traces and Unix shell command traces. Anomaly detection systems ...
    • Performance Modeling And Evaluation Of Network Processors 

      Govind, S (2009-03-02)
      In recent years there has been an exponential growth in Internet traffic resulting in increased network bandwidth requirements which, in turn, has led to stringent processing requirements on network layer devices like ...
    • Power-Aware Compilation Techniques For Embedded Systems 

      Shyam, K (2008-01-25)
      The demand for devices like Personal Digital Assistants (PDA’s), Laptops, Smart Mobile Phones, are at an all time high. As the demand for these devices increases, so is the push to provide sophisticated functionalities ...
    • One To Mant And Many To Many Collective Communication Operations On Grids 

      Gupta, Rakhi (2008-01-16)
      Collective Communication Operations are widely used in MPI applications and play an important role in their performance. Hence, various projects have focused on optimization of collective communications for various kinds ...
    • CDMA Base Station Receive Co-Processor Architecture 

      Santhosam, Charles L (2007-10-23)
      Third generation mobile communication systems promise a greater data rate and new services to the mobile subscribers. 3G systems support up to 2 Mbps of data rate to a fixed subscriber and 144 Kbps of data rate to a fully ...
    • A Novel Chip Resistor Spacecloth For Radar Absorbing Materials 

      Sudhendra, Chandrika (Indian Institute of Science, 2007-05-17)
      Spacecloth design and development is vital and crucial in Radar Absorbing Materials (RAM) for achieving Low Observability in an Aircraft or an Unmanned Air Vehicle(UAV). The RAM design translates into the spacecloth design. ...
    • Checkpointing Algorithms for Parallel Computers 

      Kalaiselvi, S (Indian Institute of Science, 2005-02-11)
      Checkpointing is a technique widely used in parallel/distributed computers for rollback error recovery. Checkpointing is defined as the coordinated saving of process state information at specified time instances. Checkpoints ...