IIIT-Delhi Institutional Repository

Browsing Computer Science and Engineering by Title

Browsing Computer Science and Engineering by Title

Sort by: Order: Results:

  • Agarwal, Anshika; Gosain, Devashish; Acharya, HB; Chakravarty, Sambuddho (2016-09-23)
    Censorship of the Internet by government is a hotly contested topic. Some nations lean more toward free speech; others are much more conservative. How feasible is it for a government to censor the Internet? What mechanisms ...
  • Agarwal, Anshika; Chakravarty, Sambuddho (Advisor) (2016-09-15)
    Censorship of the Internet by government is a hotly contested topic. Some nations lean more towards free speech; others are much more conservative. How feasible is it for a government to censor the Internet? What mechanisms ...
  • Jain, Prachi; Kumaraguru, Ponnurangam (Advisor) (2014-07-10)
    There is a great concern about the potential for people to leak private information on social networks. There are many anecdotal examples of this, but few quantitative studies. This research explores the activity of ...
  • Verma, Ishita; Saran, Nitika; Arora, Chetan (Advisor) (IIIT-Delhi, 2017-04-18)
    Pose estimation is a fundamental problem in computer vision and is prevalent in numerous applications such as object-detection, tracking etc. Generally, in pose estimation between two camera views, we have 6 degrees of ...
  • Lamba, Hemank; Sarkar, Ankit; Vatsa, Mayank; Singh, Richa (2012-03-26)
    One of the major challenges of face recognition is to de- sign a feature extractor that reduces the intra-class vari- ations and increases the inter-class variations. The fea- ture extraction algorithm has to be robust ...
  • Dewan, Prateek; Gupta, Mayank; Kumaraguru, Ponnurangam (2012-03-14)
    While passwords, by de nition, are meant to be secret, recent trends in the Internet usage have witnessed an increasing number of people sharing their email passwords for both personal and professional purposes. As ...
  • Yadav, Kuldeep; Kumar, Amit; Bharti, Aparna; Naik, Vinayak (2013-10-10)
    Location data collected from mobile phone users provide an ideal platform to generate human mobility patterns. These patterns give us insights into how people travel in their dayto- day lives.With availability of cellular ...
  • Grover, Karan; Kumaraguru, Ponnurangam (Advisor) (2017-04-18)
    In social psychology, a rumor is defined as a story or statement in general circulation without confirmation or certainty to facts. Rumors are known to arise in the context of ambiguity, when the meaning of a situation is ...
  • Rawat, Madhur; Chakravarty, Sambuddho (Advisor) (2017-06)
    Cyberwarfare remains a sparsely explored domain of cybersecurity research, most often involving targeted attacks by one nation against another, using botnets. These botnets use malware to launch various kinds of attacks ...
  • Dubey, Manisha; Goyal, Vikram (Advisor) (2016-09-15)
    Bloom’s Taxonomy is a framework which acts as a reference for classification of questions across different cognitive levels such as Knowledge, Comprehension, Application, Analysis, Synthesis, and Evaluation. It can be used ...
  • Dhar, Aritra; Purandare, Rahul (Advisor) (2014-12-12)
    Programs are susceptible to malformed data coming from untrusted sources. Occasionally the programming logic or constructs used are inappropriate to handle all types of constraints that are imposed by legal and well-formed ...
  • Vinayakarao, Venkatesh; Purandare, Rahul (Advisor) (IIIT-Delhi, 2018-04)
    Code variants represent alternative implementations of a code snippet, where each alternative provides the same functionality, but has different properties that make some of them better suited to the overall project ...
  • Goel, Mansi; Garcia, David (Advisor); Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2017-11-16)
    In online social networks, users may choose to keep a lot of important information in the private domain. Users may choose to hide their location, gender, interests, and affiliations. With usage of social networks and ...
  • Lahiri, Shayan; Sujit, PB (Advisor) (2015-12-02)
    Robots have been successfully deployed during natural disasters to perform remote search and rescue missions. These robots are tasked under human operator supervision. For remote operations, network connectivity is ...
  • Khatri, Sagar; Goyal, Vikram (Advisor) (2017)
    We study two measures namely maximal information coefficient (MIC) and distance correlation (dCor) for the application anomaly detection. MIC is based on the concept of information theory and measures the mutual information ...
  • Sharma, Soumya; Naik, Vinayak (Advisor) (2016-11-17)
    With multiple mobile applications for a single function in the market, there is a need to look into the resources the application utilizes as well. In this study, we focus on which resources a particular mobile application ...
  • Rana, Anurag; Singh, Pushpendra (Advisor) (2015-12-03)
    Telephones have high reach both in developed and developing countries that have made it a preferred tool for collecting and disseminating information. Voice based information collection systems o ffers data collection ...
  • Saxena, Simran; Kumaraguru, Ponnurangam (Advisor); Dubey, Alpana (Advisor); Balaji, Arun (Advisor); Sachdeva, Niharika (Advisor) (IIIT-Delhi, 2018-04)
    Crowdsourcing is the practice of getting information or input for a task or project from a number of people by floating out the task at hand to a pool of people who are usually not full-time employees. Use of Crowdsourcing ...
  • Mishra, Shreemoy (2014-07-16)
    I study the market for consumer information. Firms cannot commit to privacy, so buyers anticipate disclosure of purchase history for targeted pricing. In the literature, strategic rejections of informative o ers make ...
  • Correa, Denzil; Sureka, Ashish (Advisor) (2014-12-24)
    There has been a proliferation of Web 2.0 sites on the Internet. Contemporary Web 2.0 sites like Facebook and Twitter are primarily driven by user generated content (UGC). On the other hand, the volume of content by such ...

Search Repository


Advanced Search

Browse

My Account