IIIT-Delhi Institutional Repository

Browsing Computer Science and Engineering by Title

Browsing Computer Science and Engineering by Title

Sort by: Order: Results:

  • Yadav, Kuldeep; Malhotra, Anshu; Kumaraguru, Ponnurangam; Khurana, Rushil; Singh, Dipesh Kumar (2012-07-25)
    In developing countries, Short Messaging Service (SMS) is one of the most widely used and cheapest modes of commu- nication. Hence, this medium is often exploited by advertis- ing companies to reach masses. The unsolicited ...
  • Singh, Rahul Kumar; Chakravarty, Sambuddho (Advisor) (2015-12-03)
    With approximately 250 million Internet users, India stands amongst the top 5 Internet using nations of the world. India's network space is made up of 789 Autonomous Systems (ASes), that route all the network traffic of ...
  • Dewan, Prateek; Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2017-08)
    Online Social Networks have become a cornerstone of Web 2.0 era. Internet users around the world use Online Social Networks as primary sources to consume news, updates, and information about events around the world. However, ...
  • Kongara, Amani; Bedathur, Srikanta (Advisor) (2014-12-12)
    Several knowledge resources are available both online and o line in learning technical topics. Textbooks act as a basic reference with their general organization into sections where each section is dedicated in explaining ...
  • Jaiswal, Aishwarya; Chakravarty, Sambuddho (Advisor) (IIIT-Delhi, 2018-04-21)
    The term bandwidth, capacity, and throughput characterize the amount of data that can be transferred per unit time. Accurate estimation of bandwidth can be leveraged by various applications which seek to provide best user ...
  • Rathore, Sonam; Goyal, Vikram (Advisor) (2015-12-05)
    Mining high utility episodes in complex event sequences is an emerging topic in data mining. In utility mining, users set a minimum threshold and the episodes having higher utility than the threshold are reported. ...
  • Chakravarty, Sambuddho; Naik, Vinayak; Acharya, HB; Tanwar, Chaitanya Singh (2015-01-23)
    Network censorship and surveillance generally involves ISPs working under the orders of repressive regimes, monitoring (and sometimes filtering) users’ traffic, often using powerful networking devices, e.g. routers ...
  • Dantu, Subramanyam; Goyal, Tanmay; Jain, Varnit; Jalote, Pankaj (Advisor) (IIITD-Delhi, 2019-04-25)
    Traffic congestion is a major concern in highly populated metropolitan cities like Delhi, Bangalore, Hyderabad, etc. In developing countries like India, most of the traffic management is done manually. While building better ...
  • Yadav, Tarun Kumar; Chakravarty, Sambuddho (Advisor) (IIIT-Delhi, 2018-04-18)
    This report presents a detailed study of the Internet censorship in India. We consolidated a list of potentially blocked websites from various public sources and checked their accessibility from 9 popular ISPs within the ...
  • Asthana, Siddhartha; Kumaraguru, Ponnurangam; Singh, Pushpendra; Singh, Amarjeet (2012-03-14)
    In developing regions, voice based telecommunication services are one of the most appropriate medium for information dissemination as they overcome prevalent low literacy rate and are more reachable than any other medium. ...
  • Kumar Abhinav; Dwarakanath, Anurag (Advisor); Singh, Pushpendra (Advisor) (2015-12-03)
    Crowdsourcing is an exciting new trend where a group of geographically distributed individuals contribute willingly, sometimes for free, towards a common goal. Previous research and studies have shown how Crowdsourcing ...
  • Bhola, Abhishek; Kumaraguru, Ponnurangam (Advisor) (2014-07-10)
    This year (2014) in the month of May, the tenure of the 15th Lok Sabha was to end and the elections to the 543 parliamentary seats were to be held. With 813 million registered voters, out of which a 100 million were rst ...
  • Gupta, Aditi; Kumaraguru, Ponnurangam (2012-03-14)
    Large amount of content is generated on online social net- working and micro-blogging services daily; Twitter is one such micro-blogging service. Twitter has evolved from be- ing used for conversing with friends and ...
  • Gupta, Aditi; Kumaraguru, Ponnurangam (2012-03-26)
    Online social media has become an integral part of every Internet users' life. It has given common people a platform and forum to share information, post their opinions and promote campaigns. The threat of exploitation of ...
  • Rao, Tushar; Srivastava, Saket (2012-03-26)
    Emerging interest of trading companies and hedge funds in mining social web has created new avenues for intelligent systems that make use of public opinion in driving investment decisions. It is well accepted that at ...
  • K, Muhammed Noufal; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor) (2015-12-02)
    Fair conduct of elections are essential for smooth existence of democratic societies. Voting systems are the method and infrastructure we use to conduct elections. Paper ballot based voting schemes, electronic voting ...
  • Deka, Namrata; Kaul, Sanjit (Advisor); Anand, Saket (Advisor) (2017-04-18)
    This report outlines my work in continuation to last semester on understanding human behavior when it comes to driving on Indian streets. Since traffic in India is not governed by lane-markings, zebra crossings and proper ...
  • Jaisinghani, Dheryta; Naik, Vinayak (Advisor); Kaul, Sanjit (Advisor) (IIIT-Delhi, 2019-04)
    A WiFi client needs to discover access points (APs) in its vicinity before it can establish a WiFi connection and initiate a data transfer. Discovery is also essential for a client to stay connected to an AP deemed best ...
  • Balasubramanian, Ajay; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (2019-01)
    Object Detection is a fundamental problem in Computer Vision. Face Detection is an important and intriguing type of object detection that is being extensively used in day-to-day activities like in video surveillance, online ...
  • Goswami, Gaurav; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (IIIT-Delhi, 2018-11)
    Automatic face recognition in unconstrained environments is a popular and challenging research problem. With the improvements in recognition algorithms, focus has shifted from addressing various covariates individually to ...

Search Repository


Advanced Search

Browse

My Account