Browsing by Title

Sort by: Order: Results:

  • Siddiqui, Sahar; Mehta, Sameep (Advisor); Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2017-04-18)
    In the era of big data where every individual is a target of intensive data collection, there is a need to create technological tools that empower individuals to track what happens to their data. Provenance has been ...
  • Jindal, Arun Kumar; Naik, Vinayak (Advisor) (2013-07-15)
    Bring Your Own Device (BYOD) is an IT policy being adopted by corporate organizations worldwide. It permits the employees to bring their own devices like smartphones, tablets, etc to their place of work and use them to ...
  • Kumari, Jahnvi; Chakraborty, Tanmoy (Advisor) (IIIT-Delhi, 2022-05)
    With the prevalence of social media as a medium of communication in today’s society, countering the spread of fake news on the network has become an important area of study. In this work, we study the notion of competing ...
  • Roy, Trinita; Raghava, Gajendra Pal Singh (Advisor) (IIIT-Delhi, 2022-05)
    Influenza A, an infectious viral disease affecting the lungs, is a significant public health concern. It has already caused four pandemics in the past, and some strains are now seasonal. Being zoonotic, the virus is ...
  • Manjunath, R Sumesh; Sanadhya, Somitra Kumar (Advisor) (2013-06-10)
    Privacy of the message and authenticity of the sender in a secure communication is a challenging concern. Tradionally these two aims were achieved by using di erent cryptographic primitives: by using encryption for privacy ...
  • Grover, Karish; Chakraborty, Tanmoy (Advisor); Akhtar, Md. Shad (Advisor) (IIIT-Delhi, 2022-05)
    Social media has become the fulcrum of all forms of communication. Classifying social texts such as fake news, rumour, sarcasm, etc. has gained significant attention. The surface-level signals expressed by a social-text ...
  • Gupta, Tushar; Kumaraguru, Ponnurangam (Advisor) (2017-04-18)
    We study the use of creative content in the tweets made by Mumbai Police and its impact on user-engagement. Showing that the use of creative content by police departments actually helps them in reaching more number of ...
  • Bhagat, Dhruv; Mahalwal, Manish; Sujit, PB (Advisor) (IIIT-Delhi, 2020-05-30)
    In pursuit-evasion problems, we are presented with one or more pursuers attempting to capture one or more evaders. We consider the same problem in a bounded and convex physics-based environment. In our case, the agents ...
  • Dhamecha, Tejas Indulal; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (IIIT-Delhi, 2017-07)
    Due to the unconstrained nature of data capture and non-cooperative subjects, automatic face recognition is still a research challenge for application scenarios such as law enforcement. We observe that challenges of face ...
  • Gosain, Devashish; Agarwal, Anshika; Acharya, Hrishikesh Bhatt; Chakravarty, Sambuddho (2016-09-23)
    Decoy Routing, the use of routers (rather than end hosts) as proxies, is a new direction in anti-censorship research. However, existing proposals require control of hundreds of Autonomous Systems (AS) to provide Decoy ...
  • Shanu; Bera, Debajyoti (Advisor) (IIIT-Delhi, 2018-07)
    Distinguishing between unitary operators is one of the fundamental problems in the field of quantum computing. In the operator identification problem, we are given access to unknown operator U as a black-box that implements ...
  • Chhillar, Jayant; Roy, Sayan Basu (Advisor) (IIIT-Delhi, 2022)
    This report presents a literature review survey about the field of Quantum Control Theory and its applications. Concepts of control followed in classical control (including open-loop control and closed loop control) are ...
  • Rana, Bhavika; Singh, Pushpendra (Advisor) (IIIT-Delhi, 2021-12)
    Academic work that looks at designing for queer populations has gained traction in the HCI community over the years but most of it is predominantly based in the Global North. This project responds to the call for work ...
  • Gosain, Devashish; Chakravarty, Sambuddho (Advisor) (IIIT-Delhi, 2020-07)
    The original design of the Internet was a resilient, distributed architecture, that should be able to route around (and therefore recover from) massive disruption — up to and including nuclear war. However, network routing ...
  • Anand, Anuneet; Gupta, Isha; Mutharaju, Vijaya Raghava (Advisor) (IIIT-Delhi, 2022-05)
    In recent years, there has been a growing interest in digitising health records and healthcare data so that sophisticated systems can be built for faster retrieval, processing and analysis of data. One such type of system ...
  • Kashif, Mohammed; Arora, Chetan (Advisor) (2017-06)
    Question-Answering systems are becoming increasingly popular, especially after the advent of Machine Learning. Such systems can be used in a wide variety of applications ranging from Open domain question answering or closed ...
  • Anwer, Samit; Purandare, Rahul (Advisor) (2014-12-12)
    Every Android application runs in its own virtual machine, with its own Linux user account and corresponding permissions. Although this ensures that permissions are given as per each application’s requirements, each ...
  • Badri, M.; Raman, Rajiv (Advisor); Ram, Shobha Sundar (Advisor) (IIIT- Delhi, 2021-05)
    This work aims at interference mitigation in recently booming automotive radar networks, via careful beam forming techniques based on Geometric Algorithms and Optimizations. We first thoroughly explore a relatively simple ...
  • Sharma, Rachesh; Majumdar, Angshul (Advisor); Kumar, Vibhor (Advisor) (IIIT-Delhi, 2019-04)
    A human body has billions of cells specialized with their own function and each cell carries genome in its nucleus. The activity of the genome is controlled by a multitude of molecular complexes called as epigenome. Previously ...
  • Vasisth, Aditya; Hashmi, Mohammad S. (Advisor); Jain, Abhishek (Advisor) (2015-12-05)
    Moving towards deep submicron technologies, consideration for design margin will increase. In these technologies, process variation will increase the requirements of design margins. Lower supply voltage and higher clock ...

Search Repository

Browse

My Account