<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
<channel>
<title>Year-2012</title>
<link>http://repository.iiitd.edu.in/xmlui/handle/123456789/5</link>
<description/>
<pubDate>Sat, 11 Apr 2026 12:42:38 GMT</pubDate>
<dc:date>2026-04-11T12:42:38Z</dc:date>
<item>
<title>MobiShare : cloud-enabled opportunistic content sharing among mobile peers</title>
<link>http://repository.iiitd.edu.in/xmlui/handle/123456789/69</link>
<description>MobiShare : cloud-enabled opportunistic content sharing among mobile peers
Yadav, Kuldeep; Naik, Vinayak; Singh, Amarjeet
In developing countries, smartphones and high&#13;
bandwidth connections are not yet within the reach of&#13;
majority of the people. To share multimedia content among&#13;
themselves, people rely on manual local sharing mechanisms&#13;
i.e. either using physical exchange of memory card or through&#13;
short-range wireless technologies, such as Bluetooth. However,&#13;
this model of content sharing is not scalable in terms of&#13;
number of users and shared items.&#13;
In this paper, we propose MobiShare which is a mobilecloud&#13;
based system designed to support searching and sharing&#13;
of content among pair of mobile peers. The cloud does&#13;
aggregation of shared content in user’s social network and&#13;
enables scalable content search with real-time computation of&#13;
expected encounter time between content source and requester.&#13;
For finding expected encounter time, we build algorithms for&#13;
(1) Finding mobility profiles of the users using heterogeneous&#13;
location data services such as Cell ID and WiFi; and (2)&#13;
Predicting places that will be visited in the future, together with&#13;
corresponding time spent, using those profiles. We deployed&#13;
MobiShare with 16 volunteers and collected data for 4 weeks.&#13;
We present evaluation results of the system based on the&#13;
collected data.
</description>
<pubDate>Fri, 12 Oct 2012 05:40:45 GMT</pubDate>
<guid isPermaLink="false">http://repository.iiitd.edu.in/xmlui/handle/123456789/69</guid>
<dc:date>2012-10-12T05:40:45Z</dc:date>
</item>
<item>
<title>Take control over your SMSes : a real-world evaluation of a mobile-based spam SMS filtering system</title>
<link>http://repository.iiitd.edu.in/xmlui/handle/123456789/38</link>
<description>Take control over your SMSes : a real-world evaluation of a mobile-based spam SMS filtering system
Yadav, Kuldeep; Malhotra, Anshu; Kumaraguru, Ponnurangam; Khurana, Rushil; Singh, Dipesh Kumar
In developing countries, Short Messaging Service (SMS) is&#13;
one of the most widely used and cheapest modes of commu-&#13;
nication. Hence, this medium is often exploited by advertis-&#13;
ing companies to reach masses. The unsolicited (spam) SM-&#13;
Ses consume user attention and have become a reason of an-&#13;
noyance for most of the mobile phone users, as not many of&#13;
them use the information from these SMSes. We conducted&#13;
a three phase study to understand the scale of SMS spam&#13;
problem and to propose technological measures to curb it.&#13;
First, we conducted a survey among 458 participants in In-&#13;
dia to understand general perceptions about spam SMSes,&#13;
user preferences and requirements. Ninety seven percent of&#13;
the survey participants admitted that they are quite annoyed&#13;
with the burst of spam SMSes and lack of appropriate tech-&#13;
nological or regulatory solutions.&#13;
&#13;
Next, we designed and implemented a mobile based appli-&#13;
cation SMSAssassin, which can ﬁlter spam SMSes using&#13;
content based machine learning techniques and user gener-&#13;
ated customized rules. And last, we conducted a user study&#13;
of this application with twenty three participants who used&#13;
the application in real world for a month. Results show that&#13;
a mobile based solution can effectively ﬁlter spam SMSes&#13;
and the application can be usable too.
</description>
<pubDate>Wed, 25 Jul 2012 07:56:08 GMT</pubDate>
<guid isPermaLink="false">http://repository.iiitd.edu.in/xmlui/handle/123456789/38</guid>
<dc:date>2012-07-25T07:56:08Z</dc:date>
</item>
<item>
<title>Securing the uncharted territory : transaction receipts in branchless banking</title>
<link>http://repository.iiitd.edu.in/xmlui/handle/123456789/37</link>
<description>Securing the uncharted territory : transaction receipts in branchless banking
Panjwani, Saurabh; Ghosh, Mohona; Kumaraguru, Ponnurangam; Singh, Soumya Vardhan
Mobile-based branchless banking has become a key mech-&#13;
anism for enabling financial inclusion in the developing re-&#13;
gions of the world. A fundamental requirement of all branch-&#13;
less banking systems is a mechanism to provide reliable ev-&#13;
idence to users about the occurrence of transactions, which&#13;
is implemented in the form of receipts delivered after each&#13;
transaction. Existing receipt delivery mechanisms, however,&#13;
provide poor security guarantees to users, which has led to&#13;
multiple exploits and financial losses recently. In this paper,&#13;
we present results from two studies conducted with users of a&#13;
leading branchless banking service in India. Our first study&#13;
explores current practice with respect to transaction receipts&#13;
through interviews conducted with 67 users and 87 trans-&#13;
action observations. The study reveals a desire for robust&#13;
receipt delivery systems amongst users as well as a preva-&#13;
lence of insecure practices, which makes users susceptible to&#13;
fraud. The second study tests usability of receipt verification&#13;
protocols with 30 users and finds that despite their limited&#13;
education, users are able to distinguish between secure and&#13;
insecure interfaces for receipt verification and 37% of them&#13;
state a strong preference for the secure interface even though&#13;
it is evidently less convenient.
</description>
<pubDate>Wed, 25 Jul 2012 07:47:24 GMT</pubDate>
<guid isPermaLink="false">http://repository.iiitd.edu.in/xmlui/handle/123456789/37</guid>
<dc:date>2012-07-25T07:47:24Z</dc:date>
</item>
<item>
<title>Incremental subclass discriminant analysis : a case study in face recognition</title>
<link>http://repository.iiitd.edu.in/xmlui/handle/123456789/32</link>
<description>Incremental subclass discriminant analysis : a case study in face recognition
Lamba, Hemank; Dhamecha, Tejas I; Vatsa, Mayank; Singh, Richa
Subclass discriminant analysis is found to be applicable under various scenarios. However, it is computationally very expensive&#13;
to update the between-class and within-class scatter matrices. This research presents an incremental subclass discriminant analysis&#13;
algorithm to update SDA in incremental manner with increasing number of samples per class. The effectiveness of the proposed&#13;
algorithm is demonstrated using face recognition in terms of identification accuracy and training time. Experiments are performed&#13;
on the AR face database and compared with other subspace based incremental and batch learning algorithms. The results illustrate&#13;
that Incremental SDA yields significant reduction in time compared to SDA along with improving the accuracy compared to other&#13;
incremental approaches.
</description>
<pubDate>Mon, 26 Mar 2012 11:07:57 GMT</pubDate>
<guid isPermaLink="false">http://repository.iiitd.edu.in/xmlui/handle/123456789/32</guid>
<dc:date>2012-03-26T11:07:57Z</dc:date>
</item>
</channel>
</rss>
