IIIT-Delhi Institutional Repository

Browsing Computer Science and Engineering by Title

Browsing Computer Science and Engineering by Title

Sort by: Order: Results:

  • Gosain, Devashish; Agarwal, Anshika; Acharya, HB; Chakravarty, Sambuddho (2016-09-23)
    Decoy Routing, the use of routers (rather than end hosts) as proxies, is a new direction in anti-censorship research. However, existing proposals require control of hundreds of Autonomous Systems (AS) to provide Decoy ...
  • Kashif, Mohammed; Arora, Chetan (Advisor) (2017-06)
    Question-Answering systems are becoming increasingly popular, especially after the advent of Machine Learning. Such systems can be used in a wide variety of applications ranging from Open domain question answering or closed ...
  • Anwer, Samit; Purandare, Rahul (Advisor) (2014-12-12)
    Every Android application runs in its own virtual machine, with its own Linux user account and corresponding permissions. Although this ensures that permissions are given as per each application’s requirements, each ...
  • Kochar, Komal; Sanadhya, Somitra Kumar (Advisor) (2012-07-25)
    Cryptographic hash Functions are widely used for a wide range of applications such as au- thentication of information, digital signatures and protection of pass-phrases. In the last few years, the cryptanalysis of hash ...
  • Bhatt, Himanshu S; Bharadwaj, Samarth; Singh, Richa; Vatsa, Mayank (2012-03-14)
    Widespread acceptability and use of biometrics for person authentication has instigated several techniques for evading identification. One such technique is altering facial appearance using surgical procedures that has ...
  • Kochanthara, Sangeeth; Purandare, Rahul (Advisor) (2016-11-01)
    Real-time systems are becoming more complex and open, thus increasing their development and verification costs. Although several static verification tools have been proposed over the last decades, they suffer from scalability ...
  • Chowdhury, Anurag; Vatsa, Mayank (Advisor) (2016-09-20)
    Biometric analysis of surveillance videos carries inherent challenges in form of variations in pose, distance, illumination and expression. To address these variations, different methodologies are proposed, including ...
  • Gupta, Madhvi; Nagaraja, Shishir (Advisor) (2012-10-17)
    With improved technology, every user now generates huge amount of data that requires ever increasing amount of space to store it. It is not economical for the users to purchase new storage device every time. As a remedy ...
  • Jain, Ritika; Sureka, Ashish (Advisor) (2014-02-19)
    User requirement speci cation (URS) documents written in the form of free-form natural lan- guage text contain system use-case descriptions as one of the elements in the URS. For few application domains, some of the ...
  • Khattar, Manisha; Sureka, Ashish (Advisor) (2014-10-16)
    Software regression bugs are de ned as defects which occur, when a previously working software feature or functionality stops behaving as intended. One of the reasons for regression bugs is code changes or system patching ...
  • Gupta, Vivek; Goyal, Vikram (Advisor) (2015-05-27)
    Spatio-textual similarity join retrieves a set of pairs of objects wherein objects in each pair are close in spatial as well as textual dimensions. A lot of work has been done in the spatial dimension but no work has been ...
  • Bansal, Tarun Kumar; Sanadhya, Somitra Kumar (Advisor) (2013-07-11)
    In this work, we throw light on gaps between theoretical construction of cryptographic primitives and their practical instantiation. It is assumed that cryptographic primitives will not have any trapdoors in the given ...
  • Panjwani, Saurabh; Ghosh, Mohona; Kumaraguru, Ponnurangam; Singh, Soumya Vardhan (2012-07-25)
    Mobile-based branchless banking has become a key mech- anism for enabling financial inclusion in the developing re- gions of the world. A fundamental requirement of all branch- less banking systems is a mechanism to ...
  • Arora, Kanchan; Bedathur, Srikanta (Advisor) (2014-12-12)
    Identifying semantic similarity between two texts has many applications in NLP including information extraction and retrieval, word sense disambigua- tion, text summarization and type classi cation. Similarity between ...
  • Gupta, Neha; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor); Mukhopadhyay, Sourav (Advisor) (2015-12-02)
    In this work, we present the rst side channel collision based key recovery attack on TWINE block cipher with 80-bit secret key and also present the improved version of the work done by Jongsung et al. in on DES.We focus ...
  • Gautam, Alvika; Naik, Vinayak; Gupta, Archie; Sharma, SK (2014-09-17)
    Sleep quantity affects an individual’s personal health. The gold standard of measuring sleep and diagnosing sleep disorders is Polysomnography (PSG). Although PSG is accurate, it is expensive and it lacks portability. ...
  • Sachdeva, Niharika; Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2017-04)
    Law and order concerns are one of the major disquiets of urban societies in day-to-day life. Various crime prevention theories show the importance of collaboration between residents and police for maintaining law and order ...
  • Rajani, Anuj; Majumdar, Angshul (Advisor) (2014-07-10)
    Low-rank matrix factorization finds applications in large number of problems in signal processing and machine learning. Stochastic gradient descent (SGD) is a standard technique for solving large scale matrix factorization ...
  • Aggarwal, Aniya; Purandare, Rahul (Advisor) (2014-12-12)
    Each Android application (app) runs in its own virtual machine (VM), with every VM allocated a limited heap size for creating new objects. The heap size is scarce and device dependent. The more heap space an app uses, ...
  • Aggarwal, Hemant Kumar; Majumdar, Angshul (Advisor) (2016-12-23)
    Human vision is a powerful imaging system that can capture and interpret light energy coming from different sources although it is limited to visible light. There are various applications such as face recognition, medical ...

Search Repository


Advanced Search

Browse

My Account