Browsing by Title

Sort by: Order: Results:

  • Dhar, Aritra; Purandare, Rahul (Advisor) (2014-12-12)
    Programs are susceptible to malformed data coming from untrusted sources. Occasionally the programming logic or constructs used are inappropriate to handle all types of constraints that are imposed by legal and well-formed ...
  • Sharma, Siddhant; Naik, Vinayak (Advisor) (2017-04-18)
    With the term coined in 1985, Internet of Things (IoT) has been an idea that was always on the minds of researchers, but not quite there yet in implementation. However, with the heavy penetration of the Internet in the ...
  • Singh, Aditya; Darak, Sumit Jagdish (Advisor) (IIIT-Delhi, 2023-11-29)
    Cloud Labs enable hardware based courses in remote environments and developing self paced learning modules. The integrated hardware and software solutions developed allow for remote access to physical labs and offer a ...
  • Goel, Pulkit; Anand, Saket (Advisor); Fell, Alexander (Advisor) (IIITD-Delhi, 2019-04-28)
    Deep learning neural networks have revolutionized the elds of Computer Vision, Robotics, Artifi cial Intelligence. However, these State of the art algorithms come at a high computational cost, huge memory requirements and ...
  • Khan, Ruhma Mehek; Gupta, Ria; Shukla, Jainendra (Advisor); Bera, Aniket (Advisor) (IIIT-Delhi, 2021-12-14)
    Humans make use of gestures while interacting to enhance the effectiveness of their communication. With the increasing use of virtual agents and humanoid robots, researchers have been trying to make the virtual agents more ...
  • Khan, Ruhma Mehek; Gupta, Ria; Shukla, Jainendra (Advisor) (IIIT-Delhi, 2021-03-17)
    Humans make use of gestures while interacting to enhance the effectiveness of their communication. With the increasing use of humanoid robots and virtual agents, researchers have been trying to make the robots more human-like, ...
  • Malhotra, Hrithik; Purandare, Rahul (Advisor) (IIIT-Delhi, 2021-12)
    Code clones are duplicate code fragments that share (nearly) similar syntax or semantics. Code clone detection plays an important role in software maintenance, code refactoring, and reuse. Most of the techniques for code ...
  • Vinayakarao, Venkatesh; Purandare, Rahul (Advisor) (IIIT-Delhi, 2018-04)
    Code variants represent alternative implementations of a code snippet, where each alternative provides the same functionality, but has different properties that make some of them better suited to the overall project ...
  • Gopal, Sneihil; Kaul, Sanjit Krishnan (Advisor) (IIIT-Delhi, 2020-12)
    The proliferation of data-intensive applications has led to an exponential growth in wireless data traffic over the last decade. Solutions to accommodate this increase in traffic demand include (a) improvements in technology, ...
  • Tanwar, Tanmay Prashansa; Gupta, Anubha (Advisor) (IIIT-Delhi, 2021-05)
    Working Memory is the small amount of information that is stored in the brain long enough for humans to use it. It is important in many cognitive functions and aids in problem solving. The Working memory task performance ...
  • Peer, Mansi; Bohara, Vivek Ashok (Advisor) (2016-12-06)
    Energy consumption is one of the primary concerns in the deployment of futuristic wireless sensor networks. On one hand due to advent of technologies such as Internet of Things (IoT), there has been tremendous growth in ...
  • Gupta, Naveen; Bohara, Vivek Ashok (Advisor) (IIIT-Delhi, 2017-09)
    Past few decades have seen a phenomenal growth in wireless multimedia and data applications. Recent forecast (via Cisco) suggested that the overall mobile data traffic could reach 24.3 exabytes per month by 2019. As a ...
  • Collab VR 
    Panchal, Dushyant; Kapur, Ishan; Parnami, Aman (Advisor) (IIIT-Delhi, 2022-05)
    Virtual 3D immersive collaborative systems for remote collaboration are on the rise due to the tough times of COVID 19, where people are forced to work remotely. However, it is a cumbersome task to explore and figure out ...
  • Goel, Mansi; Garcia, David (Advisor); Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2017-11-16)
    In online social networks, users may choose to keep a lot of important information in the private domain. Users may choose to hide their location, gender, interests, and affiliations. With usage of social networks and ...
  • Kumar, Sarthak; Biswas, Sanat (Advisor) (IIIT-Delhi, 2023-12-09)
    The primary objective of this research project was to conduct a comprehensive analysis of stateof- the-art algorithms designed for the calculation of Collision Probability between satellites and other space objects, ...
  • Arora, Chaitanya; Sambuddho (advisor) (IIIT-Delhi, 2023-11-24)
    This research introduces an advanced watermarking methodology designed to combat digital video piracy, specifically targeting traitor tracing and identifying piraters within digital media distribution platforms. The study ...
  • Anderson, Nihesh; Arora, Kushagra; Raman, Rajiv (Advisor); Das, Syamantak (Advisor) (IIITD-Delhi, 2019-04-15)
    Given a metric space X, a set of clients C X, and a set of facilities F X, such that X = F S C. the fault-tolerant k-median problem (FTM) requires to open k facilities in F so as to minimize the sum of distances from each ...
  • Lahiri, Shayan; Sujit, PB (Advisor) (2015-12-02)
    Robots have been successfully deployed during natural disasters to perform remote search and rescue missions. These robots are tasked under human operator supervision. For remote operations, network connectivity is ...
  • Agrawal, Chaitanya; Das, Syamantak (Advisor); Chakraborty, Tanmoy (Advisor) (IIIT-Delhi, 2019-11-15)
    We are trying to devise a community detection algorithm for networks through modularity maximization. In this semester we further studied and understood the modularity function. We have explored semi-supervised active ...
  • Dvivedi, Shubhang Shekhar; Pujari, Sai Leela Rahul; Vijay, Vyshnav; Lodh, Shoumik; Kumar, Dhruv (Advisor) (IIIT-Delhi, 2023-11-29)
    This paper presents a comprehensive comparative analysis of Large Language Models (LLMs) for code documentation generation. Code documentation is an essential part of the software writing process as it allows a new user ...

Search Repository

Browse

My Account