IIIT-Delhi Institutional Repository

Browsing Computer Science and Engineering by Title

Browsing Computer Science and Engineering by Title

Sort by: Order: Results:

  • Jain, Milan; Singh, Amarjeet (Advisor) (IIIT Delhi, 2014-09-05)
    Buildings account for a signi cant proportion of overall energy consumption across the world. Heating Ventilation and Air Conditioning (HVAC) typically consumes a major proportion (e.g. 32% in India) of the total building ...
  • Gupta, Nisha; Sureka, Ashish (Advisor) (2015-02-16)
    Process mining consists of extracting knowledge and actionable information from event-logs recorded by Process Aware Information Systems (PAIS). PAIS are vulnerable to system failures, malfunctions, fraudulent and ...
  • Verma, Robin; Gupta, Gaurav (2014-12-25)
    The use of digital technology in conventional as well as new age crimes is increasing throughout the world, and researchers are working to develop digital forensics techniques to investigate such crimes. Digital forensic ...
  • Reddy, Kompelly Harshavardhan; Goyal, Vikram (Advisor) (2015-12-03)
    Graphs have always been an interesting structure to study in both mathematics and computer science , and have become even more interesting in the context of online social networks, recommendation networks whose underlying ...
  • Aggarwal, Anupama; Kumaraguru, Ponnurangam (Advisor) (2013-10-11)
    With the advent of online social media, phishers have started using social networks like Twitter, Facebook, and Foursquare to spread phishing scams. Twitter is an immensely popular micro- blogging network where people ...
  • Gupta, Ojaswi; Sharma, Ojaswa (Advisor) (2016-04-28)
    Physically Based Volume Rendering involves solving the Radiative Transfer Equation (with the Rendering Equation as its boundary condition) in-silico to produce images that are indistinguishable from reality. Graphics ...
  • Tripathi, Shreya; Anand, Saket (Advisor) (2016-09-15)
    3D registration of scenes is a widely researched topic. Since the availability of low cost sensors like the Kinect RGB-D cameras, they are being extensively used for additional depth information about the scene. Most of ...
  • Deepika; Singh, Amarjeet (Advisor) (2014-11-14)
    Energy has become basis of human life today. Practically, we rely on energy for everything we do every single day. As a result, the rate of consumption of energy has increased manifold and thereby has become a global ...
  • Gupta, Kunal; Sureka, Ashish (Advisor) (2015-05-05)
    Process-Aware Information Systems (PAIS) support business processes and generate large amounts of event logs from the execution of business processes. An event log is represented as a tuple of CaseID, Timestamp, Activity and ...
  • Gupta, Shuchita; Sharma, Yashovardhan; Naik, Vinayak (Advisor) (2016-11-17)
    We are building a low-cost and portable device, which can be controlled by patient's Android smartphone, to measure sleep. The device is easy to use and consists of Airow (Rate of respiration), Pulse Oximeter (Heart rate ...
  • Bera, Debajyoti; Goyal, Vikram; Saxena, Anuj S. (2012-03-26)
    There are many results on the possibilities of privacy leak in location-based services, and many remedies have also been suggested. In this paper, we look at this problem from an altogether different perspective - ...
  • Dawar, Siddharth; Goyal, Vikram (Advisor) (2014-07-10)
    The rapid increase in popularity of location-based services have resulted in huge amount of spatial textual data being generated by applications like Foursquare, Facebook Places, Flickr etc. The location-based services ...
  • Bhatia, Anam; Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2017-11-18)
    It can be observed that students in hostels under high work pressure ( similar to IIITD ) often miss the most essential meals of the day. Project LazyPizza aims to crowd-source intra-university food delivery where students ...
  • Siddiqui, Sahar; Mehta, Sameep (Advisor); Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2017-04-18)
    In the era of big data where every individual is a target of intensive data collection, there is a need to create technological tools that empower individuals to track what happens to their data. Provenance has been ...
  • Jindal, Arun Kumar; Naik, Vinayak (Advisor) (2013-07-15)
    Bring Your Own Device (BYOD) is an IT policy being adopted by corporate organizations worldwide. It permits the employees to bring their own devices like smartphones, tablets, etc to their place of work and use them to ...
  • Manjunath, R Sumesh; Sanadhya, Somitra Kumar (Advisor) (2013-06-10)
    Privacy of the message and authenticity of the sender in a secure communication is a challenging concern. Tradionally these two aims were achieved by using di erent cryptographic primitives: by using encryption for privacy ...
  • Gupta, Tushar; Kumaraguru, Ponnurangam (Advisor) (2017-04-18)
    We study the use of creative content in the tweets made by Mumbai Police and its impact on user-engagement. Showing that the use of creative content by police departments actually helps them in reaching more number of ...
  • Dhamecha, Tejas Indulal; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (IIIT-Delhi, 2017-07)
    Due to the unconstrained nature of data capture and non-cooperative subjects, automatic face recognition is still a research challenge for application scenarios such as law enforcement. We observe that challenges of face ...
  • Gosain, Devashish; Agarwal, Anshika; Acharya, HB; Chakravarty, Sambuddho (2016-09-23)
    Decoy Routing, the use of routers (rather than end hosts) as proxies, is a new direction in anti-censorship research. However, existing proposals require control of hundreds of Autonomous Systems (AS) to provide Decoy ...
  • Shanu; Bera, Debajyoti (Advisor) (IIIT-Delhi, 2018-07)
    Distinguishing between unitary operators is one of the fundamental problems in the field of quantum computing. In the operator identification problem, we are given access to unknown operator U as a black-box that implements ...

Search Repository


Advanced Search

Browse

My Account