IIIT-Delhi Institutional Repository

Browsing Computer Science and Engineering by Title

Browsing Computer Science and Engineering by Title

Sort by: Order: Results:

  • Yadav, Kuldeep; Malhotra, Anshu; Kumaraguru, Ponnurangam; Khurana, Rushil; Singh, Dipesh Kumar (2012-07-25)
    In developing countries, Short Messaging Service (SMS) is one of the most widely used and cheapest modes of commu- nication. Hence, this medium is often exploited by advertis- ing companies to reach masses. The unsolicited ...
  • Singh, Rahul Kumar; Chakravarty, Sambuddho (Advisor) (2015-12-03)
    With approximately 250 million Internet users, India stands amongst the top 5 Internet using nations of the world. India's network space is made up of 789 Autonomous Systems (ASes), that route all the network traffic of ...
  • Dewan, Prateek; Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2017-08)
    Online Social Networks have become a cornerstone of Web 2.0 era. Internet users around the world use Online Social Networks as primary sources to consume news, updates, and information about events around the world. However, ...
  • Kongara, Amani; Bedathur, Srikanta (Advisor) (2014-12-12)
    Several knowledge resources are available both online and o line in learning technical topics. Textbooks act as a basic reference with their general organization into sections where each section is dedicated in explaining ...
  • Jaiswal, Aishwarya; Chakravarty, Sambuddho (Advisor) (IIIT-Delhi, 2018-04-21)
    The term bandwidth, capacity, and throughput characterize the amount of data that can be transferred per unit time. Accurate estimation of bandwidth can be leveraged by various applications which seek to provide best user ...
  • Rathore, Sonam; Goyal, Vikram (Advisor) (2015-12-05)
    Mining high utility episodes in complex event sequences is an emerging topic in data mining. In utility mining, users set a minimum threshold and the episodes having higher utility than the threshold are reported. ...
  • Chakravarty, Sambuddho; Naik, Vinayak; Acharya, HB; Tanwar, Chaitanya Singh (2015-01-23)
    Network censorship and surveillance generally involves ISPs working under the orders of repressive regimes, monitoring (and sometimes filtering) users’ traffic, often using powerful networking devices, e.g. routers ...
  • Yadav, Tarun Kumar; Chakravarty, Sambuddho (Advisor) (IIIT-Delhi, 2018-04-18)
    This report presents a detailed study of the Internet censorship in India. We consolidated a list of potentially blocked websites from various public sources and checked their accessibility from 9 popular ISPs within the ...
  • Asthana, Siddhartha; Kumaraguru, Ponnurangam; Singh, Pushpendra; Singh, Amarjeet (2012-03-14)
    In developing regions, voice based telecommunication services are one of the most appropriate medium for information dissemination as they overcome prevalent low literacy rate and are more reachable than any other medium. ...
  • Kumar Abhinav; Dwarakanath, Anurag (Advisor); Singh, Pushpendra (Advisor) (2015-12-03)
    Crowdsourcing is an exciting new trend where a group of geographically distributed individuals contribute willingly, sometimes for free, towards a common goal. Previous research and studies have shown how Crowdsourcing ...
  • Bhola, Abhishek; Kumaraguru, Ponnurangam (Advisor) (2014-07-10)
    This year (2014) in the month of May, the tenure of the 15th Lok Sabha was to end and the elections to the 543 parliamentary seats were to be held. With 813 million registered voters, out of which a 100 million were rst ...
  • Gupta, Aditi; Kumaraguru, Ponnurangam (2012-03-14)
    Large amount of content is generated on online social net- working and micro-blogging services daily; Twitter is one such micro-blogging service. Twitter has evolved from be- ing used for conversing with friends and ...
  • Gupta, Aditi; Kumaraguru, Ponnurangam (2012-03-26)
    Online social media has become an integral part of every Internet users' life. It has given common people a platform and forum to share information, post their opinions and promote campaigns. The threat of exploitation of ...
  • Rao, Tushar; Srivastava, Saket (2012-03-26)
    Emerging interest of trading companies and hedge funds in mining social web has created new avenues for intelligent systems that make use of public opinion in driving investment decisions. It is well accepted that at ...
  • K, Muhammed Noufal; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor) (2015-12-02)
    Fair conduct of elections are essential for smooth existence of democratic societies. Voting systems are the method and infrastructure we use to conduct elections. Paper ballot based voting schemes, electronic voting ...
  • Deka, Namrata; Kaul, Sanjit (Advisor); Anand, Saket (Advisor) (2017-04-18)
    This report outlines my work in continuation to last semester on understanding human behavior when it comes to driving on Indian streets. Since traffic in India is not governed by lane-markings, zebra crossings and proper ...
  • Goyal, Vikram; Dawar, Siddharth (2015-02-11)
    High-utility itemset mining is an emerging research area in the field of Data Mining. Several algorithms were proposed to find high- utility itemsets from transaction databases and use a data structure called UP-tree ...
  • Phokela, Kanchanjot Kaur; Naik, Vinayak (Advisor) (2017-07)
    Sleep plays a crucial part of one’s physical and mental wellbeing. Polysomnography, which is the gold standard for measuring and analyzing sleep requires the subject to sleep overnight with many expensive sensors attached ...
  • Chandok, Srishti; Kumaraguru, Ponnurangam (Advisor) (2017)
    The Online Social Network (OSN) landscape has transformed significantly over the past few years with the emergence of networks. The primary capabilities of these online networks differ. Few of the major leading ones are: ...
  • Vij, Megha; Naik, Vinayak (Advisor); Gunturi, Venkata MV (Advisor) (2016-07-18)
    We look at the problem of using accelerometer in smartphones to detect whether the user is at a metro train station or in a metro train. Currently, we have solutions to detect simple activities, such as sitting or walking. ...

Search Repository


Advanced Search

Browse

My Account