IIIT-Delhi Institutional Repository

Browsing Computer Science and Engineering by Title

Browsing Computer Science and Engineering by Title

Sort by: Order: Results:

  • Rastogi, Ayushi; Nagappan, Nachiappan (Advisor); Jalote, Pankaj (Advisor) (IIIT-Delhi, 2017-08)
  • Monteiro, Kyzyl John; Parnami, Aman (Advisor) (IIIT-Delhi, 2023-05)
    We introduce Teachable Reality, an augmented reality (AR) prototyping tool for creating interactive tangible AR applications with arbitrary everyday objects. Teachable Reality leverages vision-based interactive machine ...
  • Mohan, Nitinder; Singh, Pushpendra (Advisor) (2015-12-01)
    Content Centric Network is a proposed future networking paradigm where data is the central entity for communication and the correspondence model follows two-step approach for data delivery. With increasing research in this ...
  • Singh, Digvijay; Singh, Pushpendra (Advisor) (2015-12-02)
    A key factor limiting the wide adoption of ubiquitous computing enabling systems is the need for deployment of expensive sensors and hardware to provide contextual information. These sensors deployments are not commonly ...
  • Diwan, Parikshit; Singh, Pushpendra (Advisor) (IIIT-Delhi, 2018-04-18)
    Residential Electricity consumption accounts for 25% of electric energy consumption consumed in India and is expected to increase in the future to rapid urbanization, growing income levels, etc. In this project we have ...
  • Saxena, Anuj Shanker; Goyal, Vikram (Advisor); Bera, Debajyoti (Advisor) (IIIT-Delhi, 2019-04)
    The ubiquity of mobile devices has led to the deployment of many mobile applications for providing different types of services, like internet access, route recommendation, cab finder, nearby friends, etc. Some of these ...
  • Yadav, Anshul; Sethi, Tavpritesh (Advisor) (IIIT-Delhi, 2022-05)
    There is no reliable or sustainable source of revenue for content creators and artists of all kinds. They rely heavily on brand collaborations and advertising in which a major share is taken by the companies. Their creative ...
  • Maji, Kartik; Sinha, Shubham; Aggarwal, Taruvar; Singh, Pushpendra (Advisor) (2017-04-30)
    The present invention, generally relates to a navigation aid for visually challenged people, and is essentially an escort bot system and method for providing navigational aid to the visually challenged and senior citizens.
  • Dev, Harshal; Maity, Mukulika (Advisor); Bhattacharya, Arani (Advisor) (IIIT-Delhi, 2021-12)
    IEEE 802.11ax, popularly known as WiFi 6, introduces OFDMA (Orthogonal Frequency Division Multiple Access) that allows multiple users to transmit or receive frames concurrently via a more flexible utilization of the available ...
  • Arora, Kushagr; Goyal, Vikram (Advisor) (IIIT- Delhi, 2021-05)
    Explanation of predictions made by black-box deep learning models has been rather challenging, especially when neither the model details nor its training data are known. Various techniques based on shadow-model have been ...
  • Pal, Ambar; Sharma, Gaurav (Advisor); Arora, Chetan (Advisor) (IIIT-Delhi, 2016-07-18)
    Recent methods on combining textual and visual information using supervised (textual, visual) data have shown encouraging performance. However they are mostly limited to paired (textual, visual) data. We are interested ...
  • Rathee, Ravi; Bhattacharya, Arani (Advisor) (IIIT-Delhi, 2022-06)
    Mobile devices like smartphones can augment their low-power processors by offloading GPU- heavy applications to cloud servers. However, cloud data centers consume a lot of energy and have high latency. To mitigate the ...
  • Biswas, Sandipan; Sanadhya, Somitra Kumar (Advisor) (2014-05-02)
    The Transport Layer Protocol (TLS) ensures con dentiality and integrity of tra c between communicating parties over internet. Almost all web applications commonly use TLS. A block cipher (such as AES, Camellia etc.) is ...
  • Gupta, Neha; Kumaraguru, Ponnurangam (Advisor) (2014-07-10)
    Existence of spam URLs over emails and Online Social Media (OSM) has become a growing phenomenon. To counter the dissemination issues associated with long complex URLs in emails and character limit imposed on various OSM ...
  • Singhal, Priyanka; Singh, Pushpendra (Advisor) (2015-12-03)
    Many in class and distance courses off ered these days involve the submission of assignments online. These assignments are meant to be assessed to give students timely feedback. However, ensuring that the student who ...
  • Singh, Katyayani; Sharma, Ojaswa (Advisor); Dey, Arindam (Advisor) (IIITD-Delhi, 2018-04-30)
    In this work, we evaluate the applicability of Augmented Reality and Virtual Reality in designing enhanced learning experiments for children. Such an intervention can prove to be very useful to kids with reduced cognitive ...
  • Prasoon; Arora, Chetan (Advisor) (2016-09-13)
    Several tasks in computer vision and Machine Learning are modeled as MRF-MAP inference problems. The problem can often be modeled as minimizing sum of submodular functions. Since, sum of submodular functions (SoS) is also ...
  • Simran; Chakraborty, Tanmoy (Advisor); Akhtar, Md. Shad (Advisor) (IIIT-Delhi, 2022-12)
    Extreme Abstractive Summarization of long scientific papers requires domain knowledge and a concise summary maintaining faithfulness to the source and covering novel aspects presented in the paper. Human annotations are ...
  • Verma, Priyanka; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (2015-12-03)
    Research in face and gender recognition under constrained environment has achieved an acceptable level of performance. There have been advancements in face and gender recognition in unconstrained environment, however, ...
  • Bharadwaj, Samarth; Dhamecha, Tejas I; Vatsa, Mayank; Singh, Richa (2014-06-03)
    For robust face biometrics, a reliable anti-spoofing approach has become an essential pre-requisite against attacks. While spoofing attacks are possible with any biometric modality, face spoofing attacks are relatively ...

Search Repository


Advanced Search

Browse

My Account