IIIT-Delhi Institutional Repository

Browsing Computer Science and Engineering by Title

Browsing Computer Science and Engineering by Title

Sort by: Order: Results:

  • Arora, Kanchan; Bedathur, Srikanta (Advisor) (2014-12-12)
    Identifying semantic similarity between two texts has many applications in NLP including information extraction and retrieval, word sense disambigua- tion, text summarization and type classi cation. Similarity between ...
  • Sharma, Kunal; Chaudhary, Vipin; Subramanyam, A V (Advisor) (IIIT-Delhi, 2019-11)
    Video summarization is an important step in analysing video feeds in various scenarios such as surveillance, events and other applications. However, it is a challenging task due to inherent dynamic nature of video due to ...
  • Sundriyal, Divyanshu; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIIT-Delhi, 2020-06)
    Deep learning systems require a large amount of labelled training dataset. However large amount of labelled data is not available in many cases as it requires considerable human effort to label each sample correctly. In ...
  • Fulara, Harish; Naik, Vinayak (Advisor); Maity, Mukulika (Advisor) (IIITD-Delhi, 2018-11-25)
    When a mobile client gets wirelessly associated with an access point, it continuously monitors its connection with the access point. To monitor the connection, the client continuously exchanges management frames with the ...
  • Gupta, Nalin; Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2017-04-18)
  • Kataria, Tushar; Agarwal, Vasu; Chakraborty, Tanmoy (Advisor) (IIITD-Delhi, 2018-11-26)
    The problem of stock market predictability has intrigued both academia and industry. In this thesis, we try to empirically predict the stock market using models from deep natural language processing. We review existing ...
  • Bhatia, Vedant; Sujit, PB (Advisor) (IIIT-Delhi, 2020-06-04)
    The shepherding problem is a problem setting in the multi-agent systems domain. The primary aim is to guide or ‘shepherd’ a swarm of unwilling agents to a destination, with the help of autonomous agents. We explore this ...
  • Gupta, Neha; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor); Mukhopadhyay, Sourav (Advisor) (2015-12-02)
    In this work, we present the rst side channel collision based key recovery attack on TWINE block cipher with 80-bit secret key and also present the improved version of the work done by Jongsung et al. in on DES.We focus ...
  • Sagar, Himanshu; Chakravarty, Sambuddho (Advisor) (IIIT-Delhi, 2018-11)
    Decoy Routing, the use of routers (rather than end hosts) as proxies, shows great promise as an anti-censorship mechanism. To use a Decoy Router, the user sends specially crafted packets, apparently to an uncensored website. ...
  • Shah, Daksh; Kumaraguru, Ponnurangam (Advisor) (IIIT- Delhi, 2020-12)
    Stack Overflow, a Q&A site on programming, awards reputation points and badges (game elements) to users on performing various actions. Situating our work in Digital Signaling Theory, we investigate the role of these game ...
  • Sundriyal, Himanshu; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIIT-Delhi, 2020-06)
    Identifying face attributes is an ongoing problem of research which is used in bio-metrics, surveillance etc. In past, researchers have proposed methods which predict single facial attribute at a time. Real-time applications ...
  • Chaudhuri, Dibyendu Roy; Subramanyam, A V (Advisor) (IIIT-Delhi, 2021-07-01)
    Adversarial attacks have been extensively investigated in the recent past. Quite interestingly, a majority of these attacks primarily work in the lp space. In this work, we propose a novel approach for generating adversarial ...
  • Chakraborty, Tapadeep; Bera, Debajyoti (Advisor) (IIIT-Delhi, 2021-12)
    With the advent of big data, graphs have gained popularity as one of the most efficient data storage mechanisms. A graph can not only capture relationships between entities, but it can also store attributes associated with ...
  • Gautam, Alvika; Naik, Vinayak; Gupta, Archie; Sharma, SK (2014-09-17)
    Sleep quantity affects an individual’s personal health. The gold standard of measuring sleep and diagnosing sleep disorders is Polysomnography (PSG). Although PSG is accurate, it is expensive and it lacks portability. ...
  • Raina, Samarth; Sharma, Swati; Yadav, Muskan; Shukla, Jainendra (Advisor); Ray, Sonia Baloni (Advisor); Chakrabarty, Mrinmoy (Advisor) (IIIT-Delhi, 2023-12-30)
    This research aims to improve the diagnosis of neurodevelopmental disorders by using smartphones, focusing on the psychology of eyes through pupil dynamics analysis. We are developing a user-friendly smartphone app to track ...
  • Bansal, Varun; Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2017-11-16)
    This project includes learning of big data tools like Apache Storm, elastic search, and data visualisations library like D3. Started with understanding how social media analytics tools work and done code refactoring, UI/UX ...
  • Singh, Siddharth; Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2017-11-16)
    An emerging trend in developing regions is to give users access to certain Internet services for free (or zero-rated) over cellular connections from phones. This can help bring the Internet to users who otherwise could ...
  • Sachdeva, Niharika; Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2017-04)
    Law and order concerns are one of the major disquiets of urban societies in day-to-day life. Various crime prevention theories show the importance of collaboration between residents and police for maintaining law and order ...
  • Rajpal, Rohan; Kumaraguru, Ponnurangam (Advisor) (IIIT- Delhi, 2020-12)
    This project aims to characterize the role of the NaMo app in shaping political discourse on social media. The Narendra Modi app, or the NaMo app, is the official app ofthe Prime Minister of India. It has an inbuilt social ...
  • Ghatak, Shounak; Chakraborty, Tanmoy (Advisor) (IIIT-Delhi, 2022-12)
    In today’s e-commerce setting, it is becoming easier to commit fraud & escape undetected. In this thesis, we investigate the return to origin (RTO) problem. The aim is to build a robust model to label orders with an RTO ...

Search Repository


Advanced Search

Browse

My Account