IIIT-Delhi Institutional Repository

Browsing Computer Science and Engineering by Title

Browsing Computer Science and Engineering by Title

Sort by: Order: Results:

  • Ahuja, Yajur; Das, Syamantak (Advisor) (IIIT-DElhi, 2020-06-03)
    We consider a generalization of the classical K-center problem with capacities, demands, and outliers. The capacitated K-center problem adds a constraint to the original K-center problem of every vertex having a capacity ...
  • Sachdev, Astha; Sureka, Ashish (Advisor) (2015-02-16)
    Process mining consists of mining business process event-logs for discovering run-time process models, process compliance verifi cation and extracting useful insights on process e efficiency. Process model discovery from ...
  • Nanda, Vedant; Kumaraguru, Ponnurangam (Advisor) (IIITD-Delhi, 2018-04-18)
    Sel es have become a prominent medium for self-portrayal on social media. Unfortunately, certain social media users go to extreme lengths to click selfies , which puts their lives at risk. Two hundred and thirty-two ...
  • Sinha, Raunak; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIITD-Delhi, 2019-04-29)
    Automatic kinship verifi cation using face images involves analyzing features and computing similarities between two input images to establish kin-relationship. It has gained signi cant interest from the research community ...
  • Mehra, Rohit; Naik, Vinayak (Advisor) (2015-12-03)
    A large number of web applications are written using server-side scripting languages. Although web browsers allow clients to run these applications, it is often cumbersome to depend on the desktops for the services ...
  • Saini, Vipul; Mutharaju, Vijaya Raghava (advisor); Chakraborty, Tanmoy (advisor) (IIIT-Delhi, 2020-06-05)
    Knowledge graphs have become quite popular and their utility is increasing at a very fast rate. There exist numerous extensive knowledge graphs that contain information on a plethora of topics. With new information ...
  • Anand, Gyanesh; Shah, Rajiv Ratn (advisor); Mutharaju, Raghava (advisor) (IIIT-Delhi, 2020-05-31)
    With the explosion of healthcare information, there has been a tremendous amount of heterogeneous Textual Medical Knowledge(TMK), which plays an essential role in healthcare information systems. Existing works for integrating ...
  • Likhyani, Ankita; Bedathur, Srikanta (2015-06-18)
    In applications arising in massive on-line social networks, biological networks, and knowledge graphs it is often required to find shortest length path between two given nodes. Recent results have addressed the problem of ...
  • Sankaran, Anush; Vatsa, Mayank; Singh, Richa (2015-01-27)
    Latent fingerprint comparison evidences are used in the court of law for more than 100 years. Manual matching of latent fingerprints is challenged by subjectivity and inconsistency in terms of results and is not scalable ...
  • Sankaran, Anush; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIIT-Delhi, 2017-02)
    Fingerprint recognition has evolved over the decades, providing innumerable applications for improving the modern day security. Based on the method of capture, fingerprints can be classified into four variants: inked, ...
  • Sondhi, Devika; Purandare, Rahul (Advisor) (IIIT- Delhi, 2021-06)
    With the ever-growing dependency on software, testing for their unexpected behavior is as important as verifying for their known properties, to avoid potential losses. Existing software testing approaches assume either ...
  • Gupta, Pooja; Guha, Apala (Advisor) (2015-12-02)
    In today's complex environment, it is very crucial for the devices to feature low power consumption at allow cost. Internet of things is predicted to bring an era where everything will have chips embedded in them, be it ...
  • Mehta, Ankita; Gunturi, Viswanath (Advisor) (2017-05)
    Input to the Load Balanced Network Voronoi Diagram (LBNVD) consists of the following: (a) a transportation network represented as a directed graph; (b) locations of public service units (e.g., schools in a city) as vertices ...
  • Soubam, Sonia; Naik, Vinayak (Advisor) (2013-05-30)
    This work focuses on providing privacy in MobiShare, which is a location-based service that assists users in searching and sharing files. A user’s mobility profile is summarization of its raw mobility data in terms of ...
  • Yadav, Kuldeep; Naik, Vinayak; Singh, Amarjeet; Singh, Pushpendra (2012-03-14)
    Location-aware applications are steadily gaining popularity across the world. However lack of GPS in low-end programmable phones (< $100) and general absence of Wi-Fi infrastructure in developing countries prevents users ...
  • Yadav, Shivangi; Vatsa, Mayank (Advisor) (2016-09-13)
    Face recognition is an important area of research due to its requirement in our day-to-day life, be it surveillance or authentication. Current advancements in technology and computational power have shown promising results ...
  • Gupta, Taejas; Gupta, Anubha (Advisor) (IIITD-Delhi, 2019-04-28)
    Cancer is caused by an increased amount of cell growth in an area due to alterations in protein synthesis caused by mutations in certain genes known as cancer driver genes. Determining the gene regulatory network for the ...
  • Gosain, Devashish; Rawat, Madhur; Sharma, Piyush Kumar; Acharya, Hrishikesh Bhatt (IIIT-Delhi, 2020-01)
    National governments know the Internet as both a blessing and a headache. On the one hand, it unlocks great economic and strategic opportunity. On the other hand, government, military, or emergency-services become vulnerable ...
  • Maheshwary, Yashit; Kurian, Deepak; Buduru, Arun Balaji (Advisor) (IIIT-Delhi, 2020-05-29)
    Malware Detection is an important problem in modern day due to the increasing frequency of malware attacks using unknown malware strains. Unlike traditional detection techniques which require a signature for each sample, ...
  • Shekhawat, Sahil; Chakravarty, Sambuddho (Advisor) (2017-07-06)
    Last semester we found that the Indian government delegates censorship policies at ISP level which is inconsistent and disorganized. We filed multiple RTIs to Department of Telecommunication seeking censorship policies of ...

Search Repository


Advanced Search

Browse

My Account