Browsing by Title

Sort by: Order: Results:

  • Kumar, Gundu Anil; Hashmi, Mohammad S. (Advisor) (2015-12-07)
    Up to 70% of Systems on a Chip (SoC) area are occupied by embedded memories. In order to achieve higher robustness, embedded SRAMs (eSRAM) are often used in SOC applications. However, due to advancement in technology it ...
  • Khan, Akif Ahmed; Raman, Rajiv (Advisor); Bera, Debajyoti (Advisor); Sharma, Ojaswa (Advisor) (2015-12-03)
    Range Tree is a geometrical data structure used to store data in d-dimensions. In order to store larger amount of data in external memory, we need an I/O efficient algorithm. There are many I/O efficient algorithms ...
  • Singh, Vinod Kumar; Biswas, R. N. (Advisor) (IIIT Delhi, 2014-09-06)
    An approach is proposed to improve static timing analysis for early TA-signoff closure at Very Deep Sub-Micron (V-DSM) nodes. At higher technology nodes (>100nm) the timing path delay is governed mainly by the cells, and ...
  • Lamba, Hemank; Dhamecha, Tejas I; Vatsa, Mayank; Singh, Richa (2012-03-26)
    Subclass discriminant analysis is found to be applicable under various scenarios. However, it is computationally very expensive to update the between-class and within-class scatter matrices. This research presents an ...
  • Hemani, Rakhi; Banerjee, Subhasis; Guha, Apala (2015-05-19)
    Cache contention modeling is necessary for good resource utilization on commercial multicore processors. Our goal is to build cache contention models that are sensitive to changes in, 1) the micro-architecture, 2) ...
  • Gupta, Kartik; Singh, Pushpendra (Advisor) (2017-05-05)
    Severe Mental Illness is one of the rising cause of concerns throughout the world. In India, the family members of an individual suffering from SMI (like bipolar disorder, Schizophrenia, etc.) play a significant role in ...
  • Sood, Sphoorti; Bagler, Ganesh (Advisor) (2017-11)
    High-throughput technologies have revolutionized scientific research by producing copious amounts of data at a low cost. These large-scale biological data offers tremendous opportunities to understand the molecular mechanisms ...
  • Jain, Neha; Bohara, Vivek Ashok (Advisor) (2015-12-07)
    With the exponential increase in wireless applications, there arises the need to utilize the spectrum more e ciently. Cooperative spectrum sharing (CSS) schemes have been proposed as a viable framework for cognitive radio ...
  • Mehra, Apurv; Singh, Amarjeet (Advisor) (IIIT Delhi, 2014-09-05)
    Recent IT advancements have resulted digital collection of health related information. There exist diverse health information systems today, each addressing a speci c need in the healthcare domain e.g. Hospital Information ...
  • Sachdev, Astha; Sureka, Ashish (Advisor) (2015-02-16)
    Process mining consists of mining business process event-logs for discovering run-time process models, process compliance verifi cation and extracting useful insights on process e efficiency. Process model discovery from ...
  • Mehra, Rohit; Naik, Vinayak (Advisor) (2015-12-03)
    A large number of web applications are written using server-side scripting languages. Although web browsers allow clients to run these applications, it is often cumbersome to depend on the desktops for the services ...
  • Likhyani, Ankita; Bedathur, Srikanta (2015-06-18)
    In applications arising in massive on-line social networks, biological networks, and knowledge graphs it is often required to find shortest length path between two given nodes. Recent results have addressed the problem of ...
  • Gogna, Anuprriya; Majumdar, Angshul (Advisor) (IIIT-Delhi, 2017-04)
    The enormous growth in online availability of information content has made Recommender Systems (RS) an integral part of most online portals and e-commerce sites. Most websites and service portals, be it movie rental services, ...
  • Sankaran, Anush; Vatsa, Mayank; Singh, Richa (2015-01-27)
    Latent fingerprint comparison evidences are used in the court of law for more than 100 years. Manual matching of latent fingerprints is challenged by subjectivity and inconsistency in terms of results and is not scalable ...
  • Pani, Suman; Darak, Sumit Jagdish (Adviosr) (2017-09-17)
    Opportunistic spectrum access (OSA) in a decentralized network is a challenging problem since each unlicensed user (i.e. cognitive radio (CR)) needs to characterize frequency bands as per the occupancy statistics of multiple ...
  • Sankaran, Anush; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIIT-Delhi, 2017-02)
    Fingerprint recognition has evolved over the decades, providing innumerable applications for improving the modern day security. Based on the method of capture, fingerprints can be classified into four variants: inked, ...
  • Gupta, Pooja; Guha, Apala (Advisor) (2015-12-02)
    In today's complex environment, it is very crucial for the devices to feature low power consumption at allow cost. Internet of things is predicted to bring an era where everything will have chips embedded in them, be it ...
  • Mehta, Ankita; Gunturi, Viswanath (Advisor) (2017-05)
    Input to the Load Balanced Network Voronoi Diagram (LBNVD) consists of the following: (a) a transportation network represented as a directed graph; (b) locations of public service units (e.g., schools in a city) as vertices ...
  • Soubam, Sonia; Naik, Vinayak (Advisor) (2013-05-30)
    This work focuses on providing privacy in MobiShare, which is a location-based service that assists users in searching and sharing files. A user’s mobility profile is summarization of its raw mobility data in terms of ...
  • Yadav, Kuldeep; Naik, Vinayak; Singh, Amarjeet; Singh, Pushpendra (2012-03-14)
    Location-aware applications are steadily gaining popularity across the world. However lack of GPS in low-end programmable phones (< $100) and general absence of Wi-Fi infrastructure in developing countries prevents users ...

Search Repository

Browse

My Account