IIIT-Delhi Institutional Repository

Browsing Computer Science and Engineering by Title

Browsing Computer Science and Engineering by Title

Sort by: Order: Results:

  • Likhyani, Ankita; Bedathur, Srikanta (Advisor) (2015-06-18)
    In applications arising in massive on-line social networks, biological networks, and knowledge graphs it is often required to find shortest length path between two given nodes. Recent results have addressed the problem of ...
  • Sankaran, Anush; Vatsa, Mayank; Singh, Richa (2015-01-27)
    Latent fingerprint comparison evidences are used in the court of law for more than 100 years. Manual matching of latent fingerprints is challenged by subjectivity and inconsistency in terms of results and is not scalable ...
  • Malhotra, Aakarsh; Vatsa, Mayank (advisor); Singh, Richa (advisor) (IIIT-Delhi, 2024-01)
    Attributed to extensive acceptance and research, lives can and inked fingerprints are successfully used for human recognition. However, applications such as contactless biometrics amidst the pandemic and crime scene ...
  • V, Venktesh; Mohania, Mukesh (Advisor); Goyal, Vikram (Advisor) (IIIT-Delhi, 2023-03)
    Education in traditional classroom settings was restricted to static content in textbooks. It also assumes all the learners have a similar pace of learning. Online learning platforms have shifted the paradigm and have made ...
  • Sankaran, Anush; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIIT-Delhi, 2017-02)
    Fingerprint recognition has evolved over the decades, providing innumerable applications for improving the modern day security. Based on the method of capture, fingerprints can be classified into four variants: inked, ...
  • Wadhwa, Pritish; Satija, Gitansh Raj; Shah, Rajiv Ratn (Advisor) (IIIT-Delhi, 2022-07)
    Legal Domain has been explored by the scientific community only upto a limited extent. While there is some amount of research available in the United States of America, the amount of research in India in the same domain ...
  • Goswami, Chitrita; Sengupta, Debarka (Advisor) (IIIT-Delhi, 2023-02)
    In an era where machine learning (ML) is changing the landscape of financial markets, education, security and privacy, the retail sector, and many other crucial aspects of human life, it is only fitting that we should use ...
  • Sondhi, Devika; Purandare, Rahul (Advisor) (IIIT- Delhi, 2021-06)
    With the ever-growing dependency on software, testing for their unexpected behavior is as important as verifying for their known properties, to avoid potential losses. Existing software testing approaches assume either ...
  • Gupta, Pooja; Guha, Apala (Advisor) (2015-12-02)
    In today's complex environment, it is very crucial for the devices to feature low power consumption at allow cost. Internet of things is predicted to bring an era where everything will have chips embedded in them, be it ...
  • Mehta, Ankita; Gunturi, Venkata M. Viswanath (Advisor) (2017-05)
    Input to the Load Balanced Network Voronoi Diagram (LBNVD) consists of the following: (a) a transportation network represented as a directed graph; (b) locations of public service units (e.g., schools in a city) as vertices ...
  • Soubam, Sonia; Naik, Vinayak (Advisor) (2013-05-30)
    This work focuses on providing privacy in MobiShare, which is a location-based service that assists users in searching and sharing files. A user’s mobility profile is summarization of its raw mobility data in terms of ...
  • Gautam, Dibya; Agrawal, Navneet (IIIT-Delhi, 2021-11)
    Keyphrase extraction is the task of automatically extracting a set of phrases from a document that represents the overall context of the given document. Such keyphrases can be used in multiple ways in Information retrieval, ...
  • Yadav, Kuldeep; Naik, Vinayak; Singh, Amarjeet; Singh, Pushpendra (2012-03-14)
    Location-aware applications are steadily gaining popularity across the world. However lack of GPS in low-end programmable phones (< $100) and general absence of Wi-Fi infrastructure in developing countries prevents users ...
  • Yadav, Shivangi; Vatsa, Mayank (Advisor) (2016-09-13)
    Face recognition is an important area of research due to its requirement in our day-to-day life, be it surveillance or authentication. Current advancements in technology and computational power have shown promising results ...
  • Kumar, Tanya Sanjay; Shah, Rajiv Ratn (Advisor); K, Sarveswaran (Advisor) (IIIT-Delhi, 2022-05)
    Natural Language Processing has been one of the most important domain in computer linguistics in today’s world. Though there are various efficiently performing tools and models for various NLP subtasks for English, Indic ...
  • Gupta, Taejas; Gupta, Anubha (Advisor) (IIITD-Delhi, 2019-04-28)
    Cancer is caused by an increased amount of cell growth in an area due to alterations in protein synthesis caused by mutations in certain genes known as cancer driver genes. Determining the gene regulatory network for the ...
  • Gosain, Devashish; Rawat, Madhur; Sharma, Piyush Kumar; Acharya, Hrishikesh Bhatt (IIIT-Delhi, 2020-01)
    National governments know the Internet as both a blessing and a headache. On the one hand, it unlocks great economic and strategic opportunity. On the other hand, government, military, or emergency-services become vulnerable ...
  • Maheshwary, Yashit; Kurian, Deepak; Buduru, Arun Balaji (Advisor) (IIIT-Delhi, 2020-05-29)
    Malware Detection is an important problem in modern day due to the increasing frequency of malware attacks using unknown malware strains. Unlike traditional detection techniques which require a signature for each sample, ...
  • Shekhawat, Sahil; Chakravarty, Sambuddho (Advisor) (2017-07-06)
    Last semester we found that the Indian government delegates censorship policies at ISP level which is inconsistent and disorganized. We filed multiple RTIs to Department of Telecommunication seeking censorship policies of ...
  • Mongia, Aanchal; Majumdar, Angshul (Advisor) (IIIT-Delhi, 2020-09)
    Data analytics and computational techniques applied to biological sciences aid rapid technological advances, swift discoveries, and reliable analysis. A broad range of bountiful tools and algorithms have played pivotal ...

Search Repository


Advanced Search

Browse

My Account