IIIT-Delhi Institutional Repository

Browsing Computer Science and Engineering by Title

Browsing Computer Science and Engineering by Title

Sort by: Order: Results:

  • Gosain, Devashish; Agarwal, Anshika; Acharya, HB; Chakravarty, Sambuddho (2016-09-23)
    Decoy Routing, the use of routers (rather than end hosts) as proxies, is a new direction in anti-censorship research. However, existing proposals require control of hundreds of Autonomous Systems (AS) to provide Decoy ...
  • Shanu; Bera, Debajyoti (Advisor) (IIIT-Delhi, 2018-07)
    Distinguishing between unitary operators is one of the fundamental problems in the field of quantum computing. In the operator identification problem, we are given access to unknown operator U as a black-box that implements ...
  • Kashif, Mohammed; Arora, Chetan (Advisor) (2017-06)
    Question-Answering systems are becoming increasingly popular, especially after the advent of Machine Learning. Such systems can be used in a wide variety of applications ranging from Open domain question answering or closed ...
  • Anwer, Samit; Purandare, Rahul (Advisor) (2014-12-12)
    Every Android application runs in its own virtual machine, with its own Linux user account and corresponding permissions. Although this ensures that permissions are given as per each application’s requirements, each ...
  • Chaudhary, Shashwat; Hassija, Nikhil; Chakravarty, Sambuddho (Advisor) (IIITD-Delhi, 2019-04-26)
    Anonymous censorship-resistant communication systems are primarily designed keeping in mind semi real-time traffic such as web browsing. One such system, Tor [1], has gained prominence as the de-facto anonymity preserving ...
  • Bansal, Palash; Sharma, Ojaswa (Advisor) (IIITD-Delhi, 2018-11-26)
    The goal of this BTP is starting a venture by taking RealVol of as a technology company that strives to improve the best in class visualization of medical scans for better learning and diagnostics and to finally provide ...
  • Kochar, Komal; Sanadhya, Somitra Kumar (Advisor) (2012-07-25)
    Cryptographic hash Functions are widely used for a wide range of applications such as au- thentication of information, digital signatures and protection of pass-phrases. In the last few years, the cryptanalysis of hash ...
  • Bhatt, Himanshu S; Bharadwaj, Samarth; Singh, Richa; Vatsa, Mayank (2012-03-14)
    Widespread acceptability and use of biometrics for person authentication has instigated several techniques for evading identification. One such technique is altering facial appearance using surgical procedures that has ...
  • Pal, Mayank Kumar; Kaul, Sanjit K. (Advisor); Anand, Saket (Advisor) (IIITD-Delhi, 2018-11-23)
    We addressed the problem of jointly selecting communications and vehicular planning strategies with the goal of optimizing the driving utility like the speed of the car. Much related work assumes the communications channels ...
  • Thukral, Deepak; Goyal, Vikram (Advisor); Chakraborty, Tanmoy (Advisor) (IIIT-Delhi, 2018-04-18)
    Automatic estimation of relative difficulty of a pair of questions is an important and challenging problem in community question answering (CQA) services. There are limited studies which addressed this problem. Past studies ...
  • Pandey, Adesh; Thukral, Deepak; Gupta, Rishabh; Goyal, Vikram (Advisor); Chakraborty, Tanmoy (Advisor) (IIIT-Delhi, 2017-11-16)
    Given a question on a crowd sourced Q&A platform, we tried to gauge the difficulty of the question. Earlier, we tried various NLP based techniques for this purpose. Now, we tried various graph models in order to model ...
  • Kochanthara, Sangeeth; Purandare, Rahul (Advisor) (2016-11-01)
    Real-time systems are becoming more complex and open, thus increasing their development and verification costs. Although several static verification tools have been proposed over the last decades, they suffer from scalability ...
  • Chowdhury, Anurag; Vatsa, Mayank (Advisor) (2016-09-20)
    Biometric analysis of surveillance videos carries inherent challenges in form of variations in pose, distance, illumination and expression. To address these variations, different methodologies are proposed, including ...
  • Gupta, Madhvi; Nagaraja, Shishir (Advisor) (2012-10-17)
    With improved technology, every user now generates huge amount of data that requires ever increasing amount of space to store it. It is not economical for the users to purchase new storage device every time. As a remedy ...
  • Madan, Anish; Anand, Saket (Advisor) (IIITD-Delhi, 2019-04-16)
    Machine Learning models are deployed in various tasks including image classification, malware detection, network intrusion detection, etc. But recent work has demonstrated that even state-of-the-art deep neural networks, ...
  • Mohindra, Mayank; Chakravarty, Sambuddho (Advisor) (IIITD-Delhi, 2019-04-21)
    Due to the proliferation of CDNs with edge networks, the known hierarchical model of the Internet is gradually changing. Very recently, it has been demonstrated that CDNs have become part of the Internet core [5]. There ...
  • Jain, Ritika; Sureka, Ashish (Advisor) (2014-02-19)
    User requirement speci cation (URS) documents written in the form of free-form natural lan- guage text contain system use-case descriptions as one of the elements in the URS. For few application domains, some of the ...
  • Jain, Varun; Singh, Pushpendra (Advisor) (IIIT-Delhi, 2018-04-19)
    The Government of India started its flagship programme 'ASHA' under the National Rural Health Mission (NRHM) which delivers health care services to the rural population and has a key focus on pregnable sections like women ...
  • Khattar, Manisha; Sureka, Ashish (Advisor) (2014-10-16)
    Software regression bugs are de ned as defects which occur, when a previously working software feature or functionality stops behaving as intended. One of the reasons for regression bugs is code changes or system patching ...
  • Gupta, Vivek; Goyal, Vikram (Advisor) (2015-05-27)
    Spatio-textual similarity join retrieves a set of pairs of objects wherein objects in each pair are close in spatial as well as textual dimensions. A lot of work has been done in the spatial dimension but no work has been ...

Search Repository


Advanced Search

Browse

My Account