etd AT Indian Institute of Science: Recent submissions
Now showing items 121-140 of 7099
-
Pattern recognition schemes involving feature measurment and random classification costs
The central theme of this thesis is the study of the effects of costs on the design and operation of statistical pattern recognition schemes. An analysis of Bayesian pattern recognition including feature measurement costs ... -
A protocol for the Bi-directional connectivity of peers in the presence of heterogeneous internet address space
The number of hosts connecting to the Internet is growing day by day, and the available statistics show that this growth is exponential. This growth has made IP address a scarce resource. IPv6 is proposed as a long term ... -
Performance evaluation of backbone technologies in distributed systems
The backbone of a distributed system is the interior-most part of the communication network which carries traffic generated from several sources. Applications such as accessing the Internet, multimedia, etc., demand a lot ... -
Networked information discovery and retrieval on the ERNET
Networked Information Discovery and Retrieval (NIDR) is the problem of locating information that is present on a network and making use of the located information. With the increase in volume and kind of information on ... -
A Multi-ring data flow architecture for parallel execution of logic programs.
The problems in Artificial Intelligence (AI) are highly search-intensive, requiring enormous amounts of computation time on a sequential computer. This has motivated researchers to design parallel computer architectures ... -
Nodeterminism and communication in functional programming systems : A study in formal program development
The phenomenal advancement in VLSI technology witnessed in recent years has led to the economic feasibility of building computers which support massive parallelism in computation. Functional programming languages have great ... -
Approximate decoding over tail-biting trellises
This thesis proposes and implements soft-decision decoding algorithms on tail-biting trellises. For linear block codes, tail-biting trellises are interesting from a soft-decision decoding view-point, because of their reduced ... -
Scaling the performance of web servers using a greedy data buffering and caching strategy
Pervasive use of the web has placed extreme performance demands on its key architectural elements of which the web server is the most critical. A web server is a highly I/O intensive application, and I/O data handling ... -
Fault-tolerant distributed algorithms for reconfiguration of rings using management tokens
In this thesis, we propose two algorithms using slightly different approaches to detect failures in a ring, and to reconfigure the ring using a combination of multithreading and management tokens which circulate around the ... -
A complier writing system based on affix grammars
Compiler Generators have become well-established tools in the production of a compiler. In general, a compiler generator uses a specification of a programming language at an abstract level as input and outputs the code for ... -
Evaluating cache performance under multiprogrammed workloads
Computer system performance is critically dependent on cache performance. Cache effectiveness is determined by factors such as program locality of reference and cache organization. Different approaches to cache performance ... -
Enzymatically Combating Biofilm Associated Microbial Infections: Towards Next-Gen Enzyme-Based Therapeutics
Bacteria employ various defense mechanisms, one of the most significant being forming biofilms─structured communities of microorganisms encased in a self-produced extracellular polymeric substance (EPS) matrix. The widespread ... -
Investigation of the Indian Summer Monsoon Rainfall Using Statistical and Machine Learning Techniques
The Indian Summer Monsoon is an important atmospheric phenomenon, marked by a characteristic seasonal wind reversal pattern, delivering 70 to 90% of the annual rainfall to the Indian subcontinent. Monsoon rain profoundly ... -
Exploration of Oxides and Polyanionic Cathodes for Zn-ion and Zn-air Batteries
Lithium-ion batteries (LIBs) rule the modern consumer electronics and electric vehicle sectors. However, their high production costs, safety risks from flammable electrolytes, and paucity of lithium resources have spurred ... -
An error correction algorithm for long-read sequencing
Long-read sequencing technologies have transformed genomics by generating longer and suffi- ciently accurate DNA sequences, offering advantages in analysing highly repetitive and complex regions of a genome. A long-read ... -
Sequential Decision Making with Risk, Offline Data and External Influence: Bandits and Reinforcement Learning
Reinforcement Learning (RL) serves as a foundational framework for addressing sequential decision-making problems under uncertainty. In recent years, extensive research in this domain has led to significant advancements ... -
Constrained virtual path routing algorithms in packet networks
We presented a new algorithm for on-line routing of Virtual Paths in a packet network. The main application of the algorithm is in explicit routing o f LSPs in MPLS networks. We modeled the routing problem as a mixed ... -
Wavelength routing in All-Optical networks using full, limited and no wavelength conversion
We study the effect of full, limited and no wavelength conversion on the blocking performance of the all-optical networks. We first formulate an exact model for linear tree networks for the case of full and no wavelength ... -
Call admission control for deterministic traffic in speed networks
Future high speed network, such as Broadband ISDN, will be required to carry the traffic generated by a wide range of services. These services will have very diverse traffic flow characteristics and performance requirements. ... -
Optimal control for queue length fairness in dual bus networks
Advances in optical fibre transmission have created interest in a class of multiple access local and metropolitan area networks called unidirectional bus networks. In the absence of medium access control, the nodes closer ...

