Browsing by Title

Sort by: Order: Results:

  • Sachdev, Astha; Sureka, Ashish (Advisor) (2015-02-16)
    Process mining consists of mining business process event-logs for discovering run-time process models, process compliance verifi cation and extracting useful insights on process e efficiency. Process model discovery from ...
  • Mehra, Rohit; Naik, Vinayak (Advisor) (2015-12-03)
    A large number of web applications are written using server-side scripting languages. Although web browsers allow clients to run these applications, it is often cumbersome to depend on the desktops for the services ...
  • Likhyani, Ankita; Bedathur, Srikanta (2015-06-18)
    In applications arising in massive on-line social networks, biological networks, and knowledge graphs it is often required to find shortest length path between two given nodes. Recent results have addressed the problem of ...
  • Gogna, Anuprriya; Majumdar, Angshul (Advisor) (IIIT-Delhi, 2017-04)
    The enormous growth in online availability of information content has made Recommender Systems (RS) an integral part of most online portals and e-commerce sites. Most websites and service portals, be it movie rental services, ...
  • Sankaran, Anush; Vatsa, Mayank; Singh, Richa (2015-01-27)
    Latent fingerprint comparison evidences are used in the court of law for more than 100 years. Manual matching of latent fingerprints is challenged by subjectivity and inconsistency in terms of results and is not scalable ...
  • Pani, Suman; Darak, Sumit Jagdish (Adviosr) (2017-09-17)
    Opportunistic spectrum access (OSA) in a decentralized network is a challenging problem since each unlicensed user (i.e. cognitive radio (CR)) needs to characterize frequency bands as per the occupancy statistics of multiple ...
  • Sankaran, Anush; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIIT-Delhi, 2017-02)
    Fingerprint recognition has evolved over the decades, providing innumerable applications for improving the modern day security. Based on the method of capture, fingerprints can be classified into four variants: inked, ...
  • Gupta, Pooja; Guha, Apala (Advisor) (2015-12-02)
    In today's complex environment, it is very crucial for the devices to feature low power consumption at allow cost. Internet of things is predicted to bring an era where everything will have chips embedded in them, be it ...
  • Mehta, Ankita; Gunturi, Viswanath (Advisor) (2017-05)
    Input to the Load Balanced Network Voronoi Diagram (LBNVD) consists of the following: (a) a transportation network represented as a directed graph; (b) locations of public service units (e.g., schools in a city) as vertices ...
  • Soubam, Sonia; Naik, Vinayak (Advisor) (2013-05-30)
    This work focuses on providing privacy in MobiShare, which is a location-based service that assists users in searching and sharing files. A user’s mobility profile is summarization of its raw mobility data in terms of ...
  • Yadav, Kuldeep; Naik, Vinayak; Singh, Amarjeet; Singh, Pushpendra (2012-03-14)
    Location-aware applications are steadily gaining popularity across the world. However lack of GPS in low-end programmable phones (< $100) and general absence of Wi-Fi infrastructure in developing countries prevents users ...
  • Yadav, Shivangi; Vatsa, Mayank (Advisor) (2016-09-13)
    Face recognition is an important area of research due to its requirement in our day-to-day life, be it surveillance or authentication. Current advancements in technology and computational power have shown promising results ...
  • Shekhawat, Sahil; Chakravarty, Sambuddho (Advisor) (2017-07-06)
    Last semester we found that the Indian government delegates censorship policies at ISP level which is inconsistent and disorganized. We filed multiple RTIs to Department of Telecommunication seeking censorship policies of ...
  • Vachher, Mayank (Advisor); Kumaraguru, Ponnurangam (Advisor) (2016-11-16)
    Over the past couple of years, clicking and posting selfies has become a popular trend. However, since March 2014, 127 people have died and many have been injured while trying to click a selfie. Researchers have studied ...
  • Singh, Vibhutesh Kumar; Bohara, Vivek Ashok (Advisor) (2016-09-13)
    Device-to-Device communication is expected to be a part of future 5G networks. Many researchers have provided solid theoretical concepts to implement it, but a real practical solution is still in dearth. In this work, first ...
  • Bhardwaj, Abhishek; Arjunan, Pandarasamy; Singh, Amarjeet; Naik, Vinayak; Singh, Pushpendra (2012-03-26)
    Ubiquitous availability of cellular network and cheap mobile phones have made them promising sensing platforms for various application domains including healthcare, environment, and astronomy among others. However, ...
  • Bhatt, Himanshu S; Bharadwaj, Samarth; Singh, Richa; Vatsa, Mayank (2012-03-26)
    One of the important cues in solving crimes and apprehending criminals is matching sketches with digital face images. This paper presents an automated algorithm that extracts discriminating information from local regions ...
  • Jain, Abhinav; Fell, Alexander (Advisor) (2015-12-05)
    The VLSI industry is witnessing rapid changes driven by the growing mar- ket requirements. In order to maintain their competitive quotient, reducing the time to market of their IC products has become a prime concern of ...
  • Wason, Manan; Singh, Pushpendra (Advisor) (2016-11-18)
    Nowadays, mobile devices are loaded with many useful sensors and have high computational capabilities. The sensors available on these devices provide valuable data that can be harnessed in many ways. Due to abundance of ...
  • Mittal, Megha; Sureka, Ashish (Advisor) (2014-01-24)
    An undergraduate level Software Engineering course generally consists of a team-based semester long project and emphasizes on both technical and managerial skills. Software Engineering is a practice-oriented and applied ...

Search Repository

Browse

My Account