IIIT-Delhi Institutional Repository

Browsing Computer Science and Engineering by Title

Browsing Computer Science and Engineering by Title

Sort by: Order: Results:

  • Suri, Anshuman; Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2018-04-18)
    Deep neural networks (DNNs) have been shown to be vulnerable to adversarial examples - malicious inputs which are crafted by the adversary to induce the trained model to produce erroneous outputs. This vulnerability has ...
  • Jain, Abhishek; Jain, Siddharth; Singh, Pushpendra (Advisor) (2017-04-18)
    In India, patients with severe mental illnesses (SMI) generally have their family members as caregivers. It becomes difficult for the caregiver to monitor the patients activites and behavior closely and communicate the ...
  • Bharadwaj, Samarth; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (2015-09-02)
    Large scale biometric identification systems still lack the versatility to handle challenging situations such as adverse imaging conditions, missing or corrupt data, and non-conventional operating scenarios. It is well ...
  • Garg, Rishabh; Baweja, Yashasvi; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIITD-Delhi, 2018-11)
    Heterogeneous biometric recognition requires matching images with variations such as resolution and spectrum. Heterogeneity in images often reduces the inter-class homogeneous distance while increasing the intra-class ...
  • Tiwari, Abhiprayah; Kumar, Vivek (Advisor); Mitra, Gaurav(Advisor) (IIIT-Delhi, 2018-07)
    With energy efficiency becoming a major concern in the HPC community, low-power alternatives such as heterogeneous Multi-Processor System-on-chip (MPSoC) are gainingpopularity. These devices house several different kinds ...
  • Dahiya, Lakshay; Singh, Chaudhary Guroosh Gabriel; Gunturi, Venkata M. Viswnath (Advisor) (IIIT-Delhi, 2018-08-13)
    With the advent of mobile phones and wearable technology, there has been a sudden increase in the amount of geo-located data available to us. One of the basic forms of pattern recognition is the identification of hotspots. ...
  • Bhatnagar, Juhi; Kumaraguru, Ponnurangam (Advisor); Venkatraman, Shriram (Advisor) (2017-04-18)
    This study examines selfie as a human-driven action and investigates how selfies can turn into killfies by examining the user behavior associated with selfies. Three data collection techniques are discussed - interviews, ...
  • Bansal, Ruchita; Goyal, Vikram (Advisor) (2015-12-03)
    High-utility itemset mining has attracted signicant attention from the research community. Identifying high-utility itemsets from a transaction database can help business owners to earn better profit by promoting the sales ...
  • Gupta, Srishti; Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2019-01)
    Online Social Networks (OSNs) have become a huge aspect of modern society. Social network usage is on a rise, with over 2 billion people using it across the globe, and the surge is only expected to increase. Online Social ...
  • Khan, Akif Ahmed; Raman, Rajiv (Advisor); Bera, Debajyoti (Advisor); Sharma, Ojaswa (Advisor) (2015-12-03)
    Range Tree is a geometrical data structure used to store data in d-dimensions. In order to store larger amount of data in external memory, we need an I/O efficient algorithm. There are many I/O efficient algorithms ...
  • Suri, Saksham; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIITD-Delhi, 2019-01-10)
    The human mind processes the information in a complex fashion including utilization of color, shape, texture and symmetry-related meta-information. but in conjunction with a strong (domain) knowledge, these can boost the ...
  • Khilariwal, Vishisht; Purandare, Rahul (Advisor) (2017-07-05)
    Memory or RAM of a device contains a lot of data.This work focuses on how to ensure security of our critical data like our passwords or encryption keys stored in the memory which if become public can pose a big security ...
  • Sahrawat, Dhruva; Anand, Saket (Advisor); Kaul, Sanjit Krishnan (Advisor) (IIITD-Delhi, 2019-04-15)
    One of the major problems faced with advanced driver assistance systems is to correctly estimate Driver's situation awareness. We detect and track other vehicles and use that to predict if an accident will occur. We propose ...
  • Lamba, Hemank; Dhamecha, Tejas I; Vatsa, Mayank; Singh, Richa (2012-03-26)
    Subclass discriminant analysis is found to be applicable under various scenarios. However, it is computationally very expensive to update the between-class and within-class scatter matrices. This research presents an ...
  • Leeka, Jyoti; Bedathur, Srikanta (Advisor) (IIIT-Delhi, 2017-12)
    RDF data management has received a lot of attention in the past decade due to the widespread growth of Semantic Web and Linked Open Data initiatives. RDF data is expressed in the form of triples (as Subject - Predicate - ...
  • Hemani, Rakhi; Banerjee, Subhasis; Guha, Apala (2015-05-19)
    Cache contention modeling is necessary for good resource utilization on commercial multicore processors. Our goal is to build cache contention models that are sensitive to changes in, 1) the micro-architecture, 2) ...
  • Gupta, Kartik; Singh, Pushpendra (Advisor) (2017-05-05)
    Severe Mental Illness is one of the rising cause of concerns throughout the world. In India, the family members of an individual suffering from SMI (like bipolar disorder, Schizophrenia, etc.) play a significant role in ...
  • Arya, Shreyash; Kumaraguru I, Ponnurangam (Advisor) (IIITD-Delhi, 2018-07-08)
    Location-Based Social Networks(LBSNs) have emerged as major sources of information about users as well as locations. Different LBSNs have different ratings and reviews for a particular location and each claims to have ...
  • Pai, Sharan; Sujit, PB (Advisor) (IIITD-Delhi, 2019-11)
    To investigate the effcacy of Information Sharing Schemes in Decentralized Multi-Agent Systems. We mainly focused on a Multi-Agent framework for Multi-Task Learning and then moved to Information sharing with Experience-based ...
  • Mehra, Apurv; Singh, Amarjeet (Advisor) (IIIT Delhi, 2014-09-05)
    Recent IT advancements have resulted digital collection of health related information. There exist diverse health information systems today, each addressing a speci c need in the healthcare domain e.g. Hospital Information ...

Search Repository


Advanced Search

Browse

My Account