Browsing by Title

Sort by: Order: Results:

  • Malhotra, Rahul; Deb, Sujay (Advisor) (2015-12-07)
    State of the art automotive microcontrollers (MCUs) implementing complex system-on-chip (SoC) architectures requires often additional functional patterns to achieve high degree of reliability. Functional pattern family ...
  • Garg, Vaishali; Chakravarty, Sambuddho (Advisor) (2015-12-03)
    Various Open Source Cryptographic Libraries are being used these days to implement the general purpose cryptographic functions and to provide a secure communication channel over the internet. These libraries, that implement ...
  • Chitkara, Neha; Fell, Alexander (Advisor) (2015-12-07)
    In this thesis a novel, low memory P-Skip mode decision algorithm for encoding video sequences is proposed. The existing algorithms for P-Skip estimation require reading the previous frames from the memory. The proposed ...
  • Gupta, Srishti; Kumaraguru, Ponnurangam (Advisor) (2013-12-03)
    The awareness and sense of privacy has increased in the minds of people over the past few years. Earlier, people were not very restrictive in sharing their personal information, but now they are more cautious in sharing ...
  • Singh, Mridula; Kaul, Sanjit (2014-07-04)
    While the density of access points in enterprise settings has increased, the sharing of the spatial resource amongst links in 802:11 wireless local area networks remains ine cient. Conservative mechanisms based on a ...
  • Sankaran, Anush; Vatsa, Mayank; Singh, Richa (2012-03-14)
    Simultaneous latent fingerprints are a cluster of latent fingerprints that are concurrently deposited by the same person. Though ACE-V methodology provides the scientific basis for matching latent fingerprints, extending ...
  • Gupta, Akanksha; Mallik, Anupama (Advisor) (2015-12-02)
    Past decade has seen a prominent rise in the number of e-commerce applications in the World Wide Web. Designing recommendation algorithms for predicting user interests is quite challenging for such systems. Several ...
  • Agarwal, Swati; Sureka, Ashish (Advisor); Goyal, Vikram (Advisor) (IIIT-Delhi, 2017-06)
    Online Social media platforms such as Tumblr, Twitter (micro-blogging website) and YouTube (video sharing website) contains information which is publicly available or open-source. Open source social media intelligence ...
  • Mithal, Aditi; Kumaraguru, Ponnurangam (Advisor) (2017-04-18)
    A tremendous amount of impact is generated through the images on social media as they account for more than 60% of the content available online. Understanding the textual content of the image is therefore significant for ...
  • Sondhi, Devika; Singh, Pushpendra (Advisor) (2015-12-02)
    Sensors that come built in smartphones are extensively used by various apps and for analysis purpose. Some of these sensors, especially GPS and Microphone, are energy expensive. Hence, there is a need to use these judiciously. ...
  • Jain, Milan; Singh, Amarjeet (Advisor) (IIIT Delhi, 2014-09-05)
    Buildings account for a signi cant proportion of overall energy consumption across the world. Heating Ventilation and Air Conditioning (HVAC) typically consumes a major proportion (e.g. 32% in India) of the total building ...
  • Gupta, Nisha; Sureka, Ashish (Advisor) (2015-02-16)
    Process mining consists of extracting knowledge and actionable information from event-logs recorded by Process Aware Information Systems (PAIS). PAIS are vulnerable to system failures, malfunctions, fraudulent and ...
  • Verma, Robin; Gupta, Gaurav (2014-12-25)
    The use of digital technology in conventional as well as new age crimes is increasing throughout the world, and researchers are working to develop digital forensics techniques to investigate such crimes. Digital forensic ...
  • Reddy, Kompelly Harshavardhan; Goyal, Vikram (Advisor) (2015-12-03)
    Graphs have always been an interesting structure to study in both mathematics and computer science , and have become even more interesting in the context of online social networks, recommendation networks whose underlying ...
  • Aggarwal, Anupama; Kumaraguru, Ponnurangam (Advisor) (2013-10-11)
    With the advent of online social media, phishers have started using social networks like Twitter, Facebook, and Foursquare to spread phishing scams. Twitter is an immensely popular micro- blogging network where people ...
  • Gupta, Ojaswi; Sharma, Ojaswa (Advisor) (2016-04-28)
    Physically Based Volume Rendering involves solving the Radiative Transfer Equation (with the Rendering Equation as its boundary condition) in-silico to produce images that are indistinguishable from reality. Graphics ...
  • Tripathi, Shreya; Anand, Saket (Advisor) (2016-09-15)
    3D registration of scenes is a widely researched topic. Since the availability of low cost sensors like the Kinect RGB-D cameras, they are being extensively used for additional depth information about the scene. Most of ...
  • Deepika; Singh, Amarjeet (Advisor) (2014-11-14)
    Energy has become basis of human life today. Practically, we rely on energy for everything we do every single day. As a result, the rate of consumption of energy has increased manifold and thereby has become a global ...
  • Chandoke, Nidhi; Deb, Sujay (Advisor) (2015-12-07)
    The increasing complexity of current day Systems-on-Chip and the rising market demands for low power devices has necessitated the need to perform power analysis of the complete system-on-chip at system level. This ...
  • Jain, Abhishek; Hashmi, Mohammad S. (Advisor) (2015-12-07)
    With reduction in size and shrinking in geometry, we have reached a point in time in which we no more can draw a direct correlation of the performance of the IC design with respect to the number of transistors on a single ...

Search Repository

Browse

My Account