Browsing by Title

Sort by: Order: Results:

  • Aggarwal, Deepanker; Kiehn, Astrid (2015-09-10)
    The well-known coordinated snapshot algorithm of mutable checkpointing [7{9] is studied. We equip it with a concise formal model and analyze its operational behavior via an invariant characterizing the snapshot computation. ...
  • Mukherjee, Arpan; Chakraborty, Tanmoy (Advisor) (IIIT-Delhi, 2018-06)
    Understanding how users behave when they connect to social networking sites creates opportunities for better interface design, more productive studies of social interactions, and improved design of content distribution ...
  • Gupta, Shaifali; Garg, Rashi; Jain, Nikita; Naik, Vinayak; Kaul, Sanjit Krishnan (2013-10-31)
    The rapid adoption of smartphones has engendered a large ecosystem of mobile data applications. In fact, a large part of mobile tra c is now data and not voice. Many of these applications, for example VoIP clients, stay ...
  • Sinha, Sanchit; Agarwal, Mohit; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (IIITD-Delhi, 2019-04-26)
    Deforestation and loss of habitat have resulted in a rapid decline of certain species of primates in forests. On the other hand, the uncontrolled growth of a few species of primates in urban areas has led to safety issues ...
  • Cheema, Gullal Singh; Anand, Saket (Advisor) (2016-09-15)
    Mean shift is a non-parametric mode seeking procedure widely used in many computer vision problems. Mean shift clustering in particular is a well studied and established algorithm, which has many merits over the classic ...
  • Mukherjee, Rajdeep; Chakravarty, Sambuddho (Advisor) (2017)
    Peer-to-peer (P2P) file sharing accounts for one of the major sources of the Internet traffic. As privacy and anonymity issues continue to grow due to constant censorship and network surveillance, more and more Internet ...
  • Atal, Ritika; Sureka, Ashish (Advisor) (2015-07-20)
    Software Engineering (SE) being a practice-oriented and applied field is taught primarily (at University Level) using instructor-driven classroom lectures as well as team-based projects requiring hands-on skills. In ...
  • Juneja, Prerna; Sureka, Ashish (Advisor) (2015-03-11)
    Issue Tracking Systems (ITS) such as Bugzilla can be viewed as Process Aware Information Systems (PAIS) generating event-logs during the lifecycle of a bug report. Process Mining consists of mining event logs generated from ...
  • Kaur, Jasmine; Eden, Grace (Advisor) (IIIT-Delhi, 2021-05)
    Mental Health is an integral part of one's health, and it enables people to realize their potential and cope with everyday hardships while being productive with work. This report documents my User Interface Design journey ...
  • Garg, Hardik; Sethi, Tavpritesh (Advisor) (IIIT-Delhi, 2022-12)
    AI systems have achieved domain expert level performance in a number of healthcare tasks involving patients. However, these systems might also incorporate and amplify human biases contained in the datasets fed to them. ...
  • Srivastava, Kshitij; Biyani, Pravesh (Advisor) (IIIT-Delhi, 2020-06)
    The concept of open data has become quite popular in recent times among governments and public-facing organizations promoting transparency and collaboration. In a similar expedition, the Open Transit Data Platform for Delhi ...
  • Yadav, Raj Kamal; Mutharaju, Vijaya Raghava (Advisor); Bhatia, Sumit (Advisor) (IIIT-Delhi, 2015-11-15)
    Approximate Reasoning involves compromising the soundness or the completeness of reasoning over description logic ontologies in favor of significant speed up in the run time. The efficiency of approximate Reasoning can ...
  • Jarwal, Akanksha; Raghava, Gajendra Pal Singh (Advisor) (IIIT-Delhi, 2023-02)
    Head and Neck Squamous Cell Carcinoma (HNSC) or Head and Neck Cancer is the sixth most highly prevalent cancer type worldwide. Early detection of HNSC is one of the important challenges in managing the treatment of cancer ...
  • Mahant, Ayush; Gupta, Harshita; Jha, Shruti; Shah, Rajiv Ratn (Advisor) (IIIT-Delhi, 2022-05)
    Since the COVID-19 breakout which made remote education necessary, online courses and other virtual learning platforms have increased in popularity and reach. However with the increase in demand for remote learning, another ...
  • Gagandeep; Saurabh, Sneh (Advisor) (IIIT-Delhi, 2022-08)
    The total wire length of a design affects various QoR measures such as timing, power, and routability. Hence, it is a critical parameter to optimize in physical design. Post global routing, the total wire length can be ...
  • Gupta, Priyanka; Sethi, Tavpritesh (Advisor); Goyal, Vikram (Advisor) (2017-07)
    Data analytics is not embedded into critical environments such as Intensive Care Unit. It is now realized that there is an untapped potential of Big-data in improving patient care. However, this is not taken into practice ...
  • S, Amaithi Priya; Murugan, Arul (Advisor) (IIIT-Delhi, 2022-06)
    BACE1 (beta-site amyloid precursor protein cleaving enzyme 1) is an aspartyl protease with a transmembrane domain that cleaves at the 671st position of amyloid precursor protein (APP) at the beta site. The production and ...
  • Thakker, Madhav; Anand, Saket (Advisor); Purandare, Swapna (Advisor) (IIIT-Delhi, 2019-11-16)
    The decline in biodiversity threatens food-security and the quality of life of all living beings. The decline in the number of insects (bees) is a critical phenomenon that should be looked deeply into. Computer Vision ...
  • Bharath, K; Fell, Alexander (Advisor) (2016-12)
    With the advancement in technology nodes, the number of components operating in different clock domains on System on Chip (SoC) increases. To support the processing of data between these components, the demand of an ...
  • Kumar, Ashish; Sanadhya, Somitra Kumar (2012-03-14)
    Many RFID protocols use cryptographic hash functions for their security. The resource constrained nature of RFID systems forces the use of light weight cryptographic algorithms. Tav-128 is one such light weight hash ...

Search Repository

Browse

My Account