IIIT-Delhi Institutional Repository

Browsing Computer Science and Engineering by Title

Browsing Computer Science and Engineering by Title

Sort by: Order: Results:

  • Singh, Deepak; Kumar, Vibhor (Advisor) (IIIT-Delhi, 2023-11-22)
    There are scenarios in machine learning problems when the available class is only positive, and the rest of the data points are unlabelled. In our current approach, for a given disease-gene set, given members of the gene ...
  • Pal, Ambar; Sharma, Gaurav (Advisor); Arora, Chetan (Advisor) (IIIT-Delhi, 2016-07-18)
    Recent methods on combining textual and visual information using supervised (textual, visual) data have shown encouraging performance. However they are mostly limited to paired (textual, visual) data. We are interested ...
  • Rathee, Ravi; Bhattacharya, Arani (Advisor) (IIIT-Delhi, 2022-06)
    Mobile devices like smartphones can augment their low-power processors by offloading GPU- heavy applications to cloud servers. However, cloud data centers consume a lot of energy and have high latency. To mitigate the ...
  • Biswas, Sandipan; Sanadhya, Somitra Kumar (Advisor) (2014-05-02)
    The Transport Layer Protocol (TLS) ensures con dentiality and integrity of tra c between communicating parties over internet. Almost all web applications commonly use TLS. A block cipher (such as AES, Camellia etc.) is ...
  • Kadam, Somanshu; Ghosh, R.K. (Advisor) (IIIT-Delhi, 2023-11-29)
    Due to decreased dielectric screening and increased Coulombic interactions, two-dimensional (2D) materials display pronounced excitonic effects. These effects alter the way these materials absorb light and respond to ...
  • Gupta, Neha; Kumaraguru, Ponnurangam (Advisor) (2014-07-10)
    Existence of spam URLs over emails and Online Social Media (OSM) has become a growing phenomenon. To counter the dissemination issues associated with long complex URLs in emails and character limit imposed on various OSM ...
  • Singhal, Priyanka; Singh, Pushpendra (Advisor) (2015-12-03)
    Many in class and distance courses off ered these days involve the submission of assignments online. These assignments are meant to be assessed to give students timely feedback. However, ensuring that the student who ...
  • Ganguly, Abhigyan; Khurana, Mehar; Gupta, Prakhar; Anand, Saket (Advisor) (IIIT-Delhi, 2023-11-29)
    As autonomous vehicles advance toward mainstream adoption, efficient testing methods have become paramount to expand their presence in crowded and unpredictable environments like those seen in Indian cities. Autonomous ...
  • Singh, Katyayani; Sharma, Ojaswa (Advisor); Dey, Arindam (Advisor) (IIITD-Delhi, 2018-04-30)
    In this work, we evaluate the applicability of Augmented Reality and Virtual Reality in designing enhanced learning experiments for children. Such an intervention can prove to be very useful to kids with reduced cognitive ...
  • Prasoon; Arora, Chetan (Advisor) (2016-09-13)
    Several tasks in computer vision and Machine Learning are modeled as MRF-MAP inference problems. The problem can often be modeled as minimizing sum of submodular functions. Since, sum of submodular functions (SoS) is also ...
  • Simran; Chakraborty, Tanmoy (Advisor); Akhtar, Md. Shad (Advisor) (IIIT-Delhi, 2022-12)
    Extreme Abstractive Summarization of long scientific papers requires domain knowledge and a concise summary maintaining faithfulness to the source and covering novel aspects presented in the paper. Human annotations are ...
  • Verma, Priyanka; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (2015-12-03)
    Research in face and gender recognition under constrained environment has achieved an acceptable level of performance. There have been advancements in face and gender recognition in unconstrained environment, however, ...
  • Bharadwaj, Samarth; Dhamecha, Tejas I; Vatsa, Mayank; Singh, Richa (2014-06-03)
    For robust face biometrics, a reliable anti-spoofing approach has become an essential pre-requisite against attacks. While spoofing attacks are possible with any biometric modality, face spoofing attacks are relatively ...
  • Shah, Mahek; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (2015-12-05)
    With increasing security concerns, surveillance cameras are playing an important role in the society and face recognition in crowd is gaining more importance than ever. For video face recognition, researchers have primarily ...
  • Jain, Arushi; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (2017-04-18)
    Face Recognition involves a wide range of applications, many of which are centered around forensic applications. Dead bodies in large-scale calamities like foods and earthquakes require to be identified. However, the bodies ...
  • Singh, Maneet; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (IIIT-Delhi, 2021-12)
    Automated facial analysis has widespread applicability in scenarios related to image tagging, access control, and surveillance. Initial research focused primarily on face recognition in constrained settings, where the ...
  • Gupta, Naina; Chang, Donghoon (Advisor) (2016-01-01)
    In the modern world, almost every computing device uses some cryptographic technique or the other. Over the years several schemes have been proposed implemented and standardized. For any kind of data transfer the primary ...
  • Agrawal, Sankalp; Rawal, Jay; Mohania, Mukesh (Advisor); Padmanabhan, Deepak (Advisor) (IIIT- Delhi, 2021-05)
    Entity matching (EM) has been one of the long-standing challenges in databases domain. Tra- ditionally, the approaches for EM focuses on developing matching algorithms and works on pairwise similarity between attributes. ...
  • Budhija, Kuber; Shah, Rajiv Ratn (Advisor) (IIIT-Delhi, 2023-11-01)
    In a world where machine learning and AI play an increasing role in decision-making across various sectors, concerns about fairness have emerged. This report delves into the journey of understanding fairness in machine ...
  • Dhawan, Sarthika; Chakraborty, Tanmoy (Advisor) (IIITD-Delhi, 2019-04-15)
    Online reviews play a crucial role in deciding the quality before purchasing any product. Unfortunately, scammers often take advantage of online review forums by writing fraud reviews to promote/demote certain products. ...

Search Repository


Advanced Search

Browse

My Account