IIIT-Delhi Institutional Repository

Browsing Computer Science and Engineering by Title

Browsing Computer Science and Engineering by Title

Sort by: Order: Results:

  • Singh, Ankur; Swami, Herrman; Mor, Prikankshit; Narayan, Priyank (Advisor) (2017-04-18)
    FestaVesta.com is an event ticketing and management company that helps you organize better events with our technologies. We make various kinds of registrations, entry and management solutions for events and also help you ...
  • Padhariya, Nilesh; Mondal, Anirban (Advisor) (2015-09-02)
    In a Mobile ad hoc Peer-to-Peer (M-P2P) network, mobile peers (MPs) interact with each other in a peer-to-peer (P2P) fashion. Proliferation of mobile devices (e.g., laptops, PDAs, mobile phones) coupled with the ever-increasing ...
  • Gautam, Alvika; Naik, Vinayak (Advisor) (2014-07-17)
    Sleep quality and quantity a ects an individual's personal health. Polysomnography (PSG) is the conventional approach for sleep monitoring. PSG has several limitations in terms of sleep monitoring by a regular user. A ...
  • Wala, Rounaq Jhunjhunu; Arora, Chetan (Advisor) (IIIT-Delhi, 2017-04-18)
    Use of higher order clique potentials in MRF-MAP problems has been limited primarily because of the inefficiencies of the existing algorithmic schemes. A combinatorial algorithm called Generic Cuts Algorithm was proposed ...
  • Bhatt, Himanshu S; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (2014-04-14)
    A covariate in face recognition can be defined as an effect that independently increases the intra-class variability or decreases the inter-class variability or both. Covariates such as pose, illumination, expression, ...
  • Parmar, Lohitaksh; Kumaraguru, Ponnurangam (Advisor); Ahmed, Mustaque (Advisor); Gupta, Payas (Advisor) (IIIT-Delhi, 2017-04-18)
    The main aim of a scam campaign is to get the maximum monetary benefit with maximum reach and least infrastructure. This makes Online Social Networks (OSNs) such as Facebook and Twitter prime targets for such campaigns. ...
  • Rastogi, Ayushi; Nagappan, Nachiappan (Advisor); Jalote, Pankaj (Advisor) (IIIT-Delhi, 2017-08)
  • Mohan, Nitinder; Singh, Pushpendra (Advisor) (2015-12-01)
    Content Centric Network is a proposed future networking paradigm where data is the central entity for communication and the correspondence model follows two-step approach for data delivery. With increasing research in this ...
  • Singh, Digvijay; Singh, Pushpendra (Advisor) (2015-12-02)
    A key factor limiting the wide adoption of ubiquitous computing enabling systems is the need for deployment of expensive sensors and hardware to provide contextual information. These sensors deployments are not commonly ...
  • Diwan, Parikshit; Singh, Pushpendra (Advisor) (IIIT-Delhi, 2018-04-18)
    Residential Electricity consumption accounts for 25% of electric energy consumption consumed in India and is expected to increase in the future to rapid urbanization, growing income levels, etc. In this project we have ...
  • Maji, Kartik; Sinha, Shubham; Aggarwal, Taruvar; Singh, Pushpendra (Advisor) (2017-04-30)
    The present invention, generally relates to a navigation aid for visually challenged people, and is essentially an escort bot system and method for providing navigational aid to the visually challenged and senior citizens.
  • Pal, Ambar; Sharma, Gaurav (Advisor); Arora, Chetan (Advisor) (IIIT-Delhi, 2016-07-18)
    Recent methods on combining textual and visual information using supervised (textual, visual) data have shown encouraging performance. However they are mostly limited to paired (textual, visual) data. We are interested ...
  • Biswas, Sandipan; Sanadhya, Somitra Kumar (Advisor) (2014-05-02)
    The Transport Layer Protocol (TLS) ensures con dentiality and integrity of tra c between communicating parties over internet. Almost all web applications commonly use TLS. A block cipher (such as AES, Camellia etc.) is ...
  • Gupta, Neha; Kumaraguru, Ponnurangam (Advisor) (2014-07-10)
    Existence of spam URLs over emails and Online Social Media (OSM) has become a growing phenomenon. To counter the dissemination issues associated with long complex URLs in emails and character limit imposed on various OSM ...
  • Singhal, Priyanka; Singh, Pushpendra (Advisor) (2015-12-03)
    Many in class and distance courses off ered these days involve the submission of assignments online. These assignments are meant to be assessed to give students timely feedback. However, ensuring that the student who ...
  • Prasoon; Arora, Chetan (Advisor) (2016-09-13)
    Several tasks in computer vision and Machine Learning are modeled as MRF-MAP inference problems. The problem can often be modeled as minimizing sum of submodular functions. Since, sum of submodular functions (SoS) is also ...
  • Verma, Priyanka; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (2015-12-03)
    Research in face and gender recognition under constrained environment has achieved an acceptable level of performance. There have been advancements in face and gender recognition in unconstrained environment, however, ...
  • Bharadwaj, Samarth; Dhamecha, Tejas I; Vatsa, Mayank; Singh, Richa (2014-06-03)
    For robust face biometrics, a reliable anti-spoofing approach has become an essential pre-requisite against attacks. While spoofing attacks are possible with any biometric modality, face spoofing attacks are relatively ...
  • Shah, Mahek; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (2015-12-05)
    With increasing security concerns, surveillance cameras are playing an important role in the society and face recognition in crowd is gaining more importance than ever. For video face recognition, researchers have primarily ...
  • Jain, Arushi; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (2017-04-18)
    Face Recognition involves a wide range of applications, many of which are centered around forensic applications. Dead bodies in large-scale calamities like foods and earthquakes require to be identified. However, the bodies ...

Search Repository


Advanced Search

Browse

My Account