Browsing by Title

Sort by: Order: Results:

  • Hemani, Rakhi; Banerjee, Subhasis; Guha, Apala (2014-09-15)
    Simultaneous execution of multiple threads on multicores is necessary for good resource utilization. However, such utilization calls for accurate models to predict the impact on performance due to contention of shared ...
  • Verma, Sagar; Arora, Chetan (Advisor) (2017-07)
    With an increase in usage and availability of wearable devices like GoPro, Microsoft Hololens, Google Glass, etc, egocentric video analysis has become essential. An interesting application is action recognition in egocentric ...
  • Banerjee, Shisagnee; Majumdar, Angshul (Advisor) (2016-09-15)
    In the following three chapters of my thesis, I have applied several methods to solve the coldstart problem in Recommender Systems. The coldstart problem is the situation where a user or item is new to a website and ...
  • Agarwal, Aman; Jain, Atulya; Kogta, Saloni; Naik, Vinayak (Advisor) (2017-04-18)
    Delhi has been ranked the most polluted city in the world. The air quality has been reported to be far above the safe limits. Our project aims to bring forth insights into the aspects that affect the quality of the air. ...
  • Aneja, Joy; Singh, Pushpendra (Advisor) (2016)
    The wide deployment of IEEE 802.11 Wireless LAN in offices, colleges and other organizations makes it a prime solution for indoor localization. Wireless access point awareness and its small cell size helps in localizing ...
  • Sharma, Vijender Kumar; Deb, Sujay (Advisor) (IIIT Delhi, 2014-09-06)
    Maintaining quality of signal transmission is a major challenge with the increasing speed of data transmission in Nano-scale VLSI technology. The decreasing voltage margins at the same time, makes it even stringent to ...
  • Agarwal, Mallika; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (2017-04-18)
    Recognizing people with their face has received a lot of attention from the research community. However, face recognition for newborns is in a nascent stage. The need for effective identification of newborns has been rising ...
  • Bhattacharjee, Protim; Majumdar, Angshul (Advisor) (2016-09-13)
    Data classification is the core of leading technologies today. With the explosion of data through mobility and growth of the Internet, analysis and classification of data is the immediate process after acquisition. Most ...
  • Ghosh, Mohona; Sanadhya, Somitra Kumar (Advisor); Chang, Donghoon (Advisor) (2016-04-18)
    Cryptographic protocols have been a cornerstone of secure communications among armed forces and diplomatic missions since time immemorial. With easy availability and low cost of computing facilities and Internet, the domain ...
  • Khandelwal, Aanchal; Srivastava, Anand (Advisor) (2017-12)
    This thesis work provides theoretical analysis of an optical distribution network (ODN) that integrates mobile backhaul network with already existing passive optical network (PON). The need to reduce the cost of laying ...
  • Maktoomi, Md Ayatullah; Hashmi, Mohammad S. (Advisor) (2016-10-14)
    The proliferation of multi-band and multi-standard wireless systems are well known but very little is known about the challenges associated in the design and development of such systems. For example, the RF front-ends in ...
  • Aggarwal, Deepanker; Kiehn, Astrid (2015-09-10)
    The well-known coordinated snapshot algorithm of mutable checkpointing [7{9] is studied. We equip it with a concise formal model and analyze its operational behavior via an invariant characterizing the snapshot computation. ...
  • Gupta, Shaifali; Garg, Rashi; Jain, Nikita; Naik, Vinayak; Kaul, Sanjit (2013-10-31)
    The rapid adoption of smartphones has engendered a large ecosystem of mobile data applications. In fact, a large part of mobile tra c is now data and not voice. Many of these applications, for example VoIP clients, stay ...
  • Cheema, Gullal Singh; Anand, Saket (Advisor) (2016-09-15)
    Mean shift is a non-parametric mode seeking procedure widely used in many computer vision problems. Mean shift clustering in particular is a well studied and established algorithm, which has many merits over the classic ...
  • Mukherjee, Rajdeep; Chakravarty, Sambuddho (Advisor) (2017)
    Peer-to-peer (P2P) file sharing accounts for one of the major sources of the Internet traffic. As privacy and anonymity issues continue to grow due to constant censorship and network surveillance, more and more Internet ...
  • Atal, Ritika; Sureka, Ashish (Advisor) (2015-07-20)
    Software Engineering (SE) being a practice-oriented and applied field is taught primarily (at University Level) using instructor-driven classroom lectures as well as team-based projects requiring hands-on skills. In ...
  • Juneja, Prerna; Sureka, Ashish (Advisor) (2015-03-11)
    Issue Tracking Systems (ITS) such as Bugzilla can be viewed as Process Aware Information Systems (PAIS) generating event-logs during the lifecycle of a bug report. Process Mining consists of mining event logs generated from ...
  • Gupta, Priyanka; Sethi, Tavpritesh (Advisor); Goyal, Vikram (Advisor) (2017-07)
    Data analytics is not embedded into critical environments such as Intensive Care Unit. It is now realized that there is an untapped potential of Big-data in improving patient care. However, this is not taken into practice ...
  • Bharath, K; Fell, Alexander (Advisor) (2016-12)
    With the advancement in technology nodes, the number of components operating in different clock domains on System on Chip (SoC) increases. To support the processing of data between these components, the demand of an ...
  • Kumar, Ashish; Sanadhya, Somitra Kumar (2012-03-14)
    Many RFID protocols use cryptographic hash functions for their security. The resource constrained nature of RFID systems forces the use of light weight cryptographic algorithms. Tav-128 is one such light weight hash ...

Search Repository

Browse

My Account