Browsing by Title

Sort by: Order: Results:

  • Sethi, Kiran; Sengupta, Debarka (Advisor) (IIIT-Delhi, 2022-08)
    Human cancers are composed of cells with varying genotypes, epigenetic states, and gene expression profiles. Intra and inter-tumor clonal heterogeneity is now recognized as one of the biggest drawbacks for therapeutic ...
  • Dhar, Aritra; Purandare, Rahul (Advisor) (2014-12-12)
    Programs are susceptible to malformed data coming from untrusted sources. Occasionally the programming logic or constructs used are inappropriate to handle all types of constraints that are imposed by legal and well-formed ...
  • Sharma, Siddhant; Naik, Vinayak (Advisor) (2017-04-18)
    With the term coined in 1985, Internet of Things (IoT) has been an idea that was always on the minds of researchers, but not quite there yet in implementation. However, with the heavy penetration of the Internet in the ...
  • Goel, Pulkit; Anand, Saket (Advisor); Fell, Alexander (Advisor) (IIITD-Delhi, 2019-04-28)
    Deep learning neural networks have revolutionized the elds of Computer Vision, Robotics, Artifi cial Intelligence. However, these State of the art algorithms come at a high computational cost, huge memory requirements and ...
  • Khan, Ruhma Mehek; Gupta, Ria; Shukla, Jainendra (Advisor); Bera, Aniket (Advisor) (IIIT-Delhi, 2021-12-14)
    Humans make use of gestures while interacting to enhance the effectiveness of their communication. With the increasing use of virtual agents and humanoid robots, researchers have been trying to make the virtual agents more ...
  • Khan, Ruhma Mehek; Gupta, Ria; Shukla, Jainendra (Advisor) (IIIT-Delhi, 2021-03-17)
    Humans make use of gestures while interacting to enhance the effectiveness of their communication. With the increasing use of humanoid robots and virtual agents, researchers have been trying to make the robots more human-like, ...
  • Malhotra, Hrithik; Purandare, Rahul (Advisor) (IIIT-Delhi, 2021-12)
    Code clones are duplicate code fragments that share (nearly) similar syntax or semantics. Code clone detection plays an important role in software maintenance, code refactoring, and reuse. Most of the techniques for code ...
  • Vinayakarao, Venkatesh; Purandare, Rahul (Advisor) (IIIT-Delhi, 2018-04)
    Code variants represent alternative implementations of a code snippet, where each alternative provides the same functionality, but has different properties that make some of them better suited to the overall project ...
  • Gopal, Sneihil; Kaul, Sanjit Krishnan (Advisor) (IIIT-Delhi, 2020-12)
    The proliferation of data-intensive applications has led to an exponential growth in wireless data traffic over the last decade. Solutions to accommodate this increase in traffic demand include (a) improvements in technology, ...
  • Tanwar, Tanmay Prashansa; Gupta, Anubha (Advisor) (IIIT-Delhi, 2021-05)
    Working Memory is the small amount of information that is stored in the brain long enough for humans to use it. It is important in many cognitive functions and aids in problem solving. The Working memory task performance ...
  • Peer, Mansi; Bohara, Vivek Ashok (Advisor) (2016-12-06)
    Energy consumption is one of the primary concerns in the deployment of futuristic wireless sensor networks. On one hand due to advent of technologies such as Internet of Things (IoT), there has been tremendous growth in ...
  • Gupta, Naveen; Bohara, Vivek Ashok (Advisor) (IIIT-Delhi, 2017-09)
    Past few decades have seen a phenomenal growth in wireless multimedia and data applications. Recent forecast (via Cisco) suggested that the overall mobile data traffic could reach 24.3 exabytes per month by 2019. As a ...
  • Collab VR 
    Panchal, Dushyant; Kapur, Ishan; Parnami, Aman (Advisor) (IIIT-Delhi, 2022-05)
    Virtual 3D immersive collaborative systems for remote collaboration are on the rise due to the tough times of COVID 19, where people are forced to work remotely. However, it is a cumbersome task to explore and figure out ...
  • Goel, Mansi; Garcia, David (Advisor); Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2017-11-16)
    In online social networks, users may choose to keep a lot of important information in the private domain. Users may choose to hide their location, gender, interests, and affiliations. With usage of social networks and ...
  • Anderson, Nihesh; Arora, Kushagra; Raman, Rajiv (Advisor); Das, Syamantak (Advisor) (IIITD-Delhi, 2019-04-15)
    Given a metric space X, a set of clients C X, and a set of facilities F X, such that X = F S C. the fault-tolerant k-median problem (FTM) requires to open k facilities in F so as to minimize the sum of distances from each ...
  • Lahiri, Shayan; Sujit, PB (Advisor) (2015-12-02)
    Robots have been successfully deployed during natural disasters to perform remote search and rescue missions. These robots are tasked under human operator supervision. For remote operations, network connectivity is ...
  • Agrawal, Chaitanya; Das, Syamantak (Advisor); Chakraborty, Tanmoy (Advisor) (IIIT-Delhi, 2019-11-15)
    We are trying to devise a community detection algorithm for networks through modularity maximization. In this semester we further studied and understood the modularity function. We have explored semi-supervised active ...
  • Khatri, Sagar; Goyal, Vikram (Advisor) (2017)
    We study two measures namely maximal information coefficient (MIC) and distance correlation (dCor) for the application anomaly detection. MIC is based on the concept of information theory and measures the mutual information ...
  • Maheswari, Surbhi; Srivastava, Anand (Advisor) (2017-06)
    This thesis work proposes analysis and simulation of 5G multi-carrier transmission schemes based on generalized frequency division multiplexing (GFDM) along with existing optical orthogonal frequency division multiplexing ...
  • Sharma, Soumya; Naik, Vinayak (Advisor) (2016-11-17)
    With multiple mobile applications for a single function in the market, there is a need to look into the resources the application utilizes as well. In this study, we focus on which resources a particular mobile application ...

Search Repository

Browse

My Account