IIIT-Delhi Institutional Repository

Browsing Computer Science and Engineering by Title

Browsing Computer Science and Engineering by Title

Sort by: Order: Results:

  • Gupta, Srishti; Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2019-01)
    Online Social Networks (OSNs) have become a huge aspect of modern society. Social network usage is on a rise, with over 2 billion people using it across the globe, and the surge is only expected to increase. Online Social ...
  • Khan, Akif Ahmed; Raman, Rajiv (Advisor); Bera, Debajyoti (Advisor); Sharma, Ojaswa (Advisor) (2015-12-03)
    Range Tree is a geometrical data structure used to store data in d-dimensions. In order to store larger amount of data in external memory, we need an I/O efficient algorithm. There are many I/O efficient algorithms ...
  • Suri, Saksham; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIITD-Delhi, 2019-01-10)
    The human mind processes the information in a complex fashion including utilization of color, shape, texture and symmetry-related meta-information. but in conjunction with a strong (domain) knowledge, these can boost the ...
  • Khilariwal, Vishisht; Purandare, Rahul (Advisor) (2017-07-05)
    Memory or RAM of a device contains a lot of data.This work focuses on how to ensure security of our critical data like our passwords or encryption keys stored in the memory which if become public can pose a big security ...
  • Sahrawat, Dhruva; Anand, Saket (Advisor); Kaul, Sanjit Krishnan (Advisor) (IIITD-Delhi, 2019-04-15)
    One of the major problems faced with advanced driver assistance systems is to correctly estimate Driver's situation awareness. We detect and track other vehicles and use that to predict if an accident will occur. We propose ...
  • Lamba, Hemank; Dhamecha, Tejas I; Vatsa, Mayank; Singh, Richa (2012-03-26)
    Subclass discriminant analysis is found to be applicable under various scenarios. However, it is computationally very expensive to update the between-class and within-class scatter matrices. This research presents an ...
  • Leeka, Jyoti; Bedathur, Srikanta (Advisor) (IIIT-Delhi, 2017-12)
    RDF data management has received a lot of attention in the past decade due to the widespread growth of Semantic Web and Linked Open Data initiatives. RDF data is expressed in the form of triples (as Subject - Predicate - ...
  • Hemani, Rakhi; Banerjee, Subhasis; Guha, Apala (2015-05-19)
    Cache contention modeling is necessary for good resource utilization on commercial multicore processors. Our goal is to build cache contention models that are sensitive to changes in, 1) the micro-architecture, 2) ...
  • Gupta, Kartik; Singh, Pushpendra (Advisor) (2017-05-05)
    Severe Mental Illness is one of the rising cause of concerns throughout the world. In India, the family members of an individual suffering from SMI (like bipolar disorder, Schizophrenia, etc.) play a significant role in ...
  • Arya, Shreyash; Kumaraguru I, Ponnurangam (Advisor) (IIITD-Delhi, 2018-07-08)
    Location-Based Social Networks(LBSNs) have emerged as major sources of information about users as well as locations. Different LBSNs have different ratings and reviews for a particular location and each claims to have ...
  • Pai, Sharan; Sujit, PB (Advisor) (IIITD-Delhi, 2019-11)
    To investigate the effcacy of Information Sharing Schemes in Decentralized Multi-Agent Systems. We mainly focused on a Multi-Agent framework for Multi-Task Learning and then moved to Information sharing with Experience-based ...
  • Mehra, Apurv; Singh, Amarjeet (Advisor) (IIIT Delhi, 2014-09-05)
    Recent IT advancements have resulted digital collection of health related information. There exist diverse health information systems today, each addressing a speci c need in the healthcare domain e.g. Hospital Information ...
  • Sachdev, Astha; Sureka, Ashish (Advisor) (2015-02-16)
    Process mining consists of mining business process event-logs for discovering run-time process models, process compliance verifi cation and extracting useful insights on process e efficiency. Process model discovery from ...
  • Nanda, Vedant; Kumaraguru, Ponnurangam (Advisor) (IIITD-Delhi, 2018-04-18)
    Sel es have become a prominent medium for self-portrayal on social media. Unfortunately, certain social media users go to extreme lengths to click selfies , which puts their lives at risk. Two hundred and thirty-two ...
  • Sinha, Raunak; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIITD-Delhi, 2019-04-29)
    Automatic kinship verifi cation using face images involves analyzing features and computing similarities between two input images to establish kin-relationship. It has gained signi cant interest from the research community ...
  • Mehra, Rohit; Naik, Vinayak (Advisor) (2015-12-03)
    A large number of web applications are written using server-side scripting languages. Although web browsers allow clients to run these applications, it is often cumbersome to depend on the desktops for the services ...
  • Likhyani, Ankita; Bedathur, Srikanta (2015-06-18)
    In applications arising in massive on-line social networks, biological networks, and knowledge graphs it is often required to find shortest length path between two given nodes. Recent results have addressed the problem of ...
  • Sankaran, Anush; Vatsa, Mayank; Singh, Richa (2015-01-27)
    Latent fingerprint comparison evidences are used in the court of law for more than 100 years. Manual matching of latent fingerprints is challenged by subjectivity and inconsistency in terms of results and is not scalable ...
  • Sankaran, Anush; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIIT-Delhi, 2017-02)
    Fingerprint recognition has evolved over the decades, providing innumerable applications for improving the modern day security. Based on the method of capture, fingerprints can be classified into four variants: inked, ...
  • Gupta, Pooja; Guha, Apala (Advisor) (2015-12-02)
    In today's complex environment, it is very crucial for the devices to feature low power consumption at allow cost. Internet of things is predicted to bring an era where everything will have chips embedded in them, be it ...

Search Repository


Advanced Search

Browse

My Account