IIIT-Delhi Institutional Repository

Browsing Computer Science and Engineering by Title

Browsing Computer Science and Engineering by Title

Sort by: Order: Results:

  • Sahu, Pankaj; Goyal, Vikram (Advisor) (IIIT Delhi, 2014-09-12)
    A RkNN (Reverse k Nearest Neighbor) set of a query q is known as the influence set of q that contains the top k influential points. This query has got a considerable amount of attention due to its importance in various ...
  • Chopra, Shaan; Vatsa, Mayank (Advisor); Singh, Richa (Advisor); Malhotra, Aakarsh (Advisor) (IIITD-Delhi, 2019-01-22)
    Biometrics based user authentication is rather popular in mobile devices using face and fingerprints as the primary modalities. Fingerphoto (an image of a person’s finger captured using an inbuilt smartphone camera) based ...
  • Diwan, Nirav; Chakravorty, Tanmoy (Advisor) (IIIT- Delhi, 2021-05)
    There are concerns that the ability of language models (LMs) to generate high quality synthetic text can be misused to launch spam, dis-information, or propaganda. Therefore, the re-search community is actively working on ...
  • Sengupta, Srishti; Gupta, Naman; Naik, Vinayak (Advisor) (2017-04-18)
    With the advent of the Internet of things, privacy and security of sensitive data has become a major concern. IoT devices generate a lot of data, and we need this data to go over the Internet in a secure manner. To solve ...
  • Snehil; Chakraborty, Tanmoy (Advisor); Akhtar, Md. Shad (Advisor) (IIIT- Delhi, 2021-07)
    Curbing hate speech is undoubtedly a major challenge for online microblogging platforms like Twitter. While there have been studies around hate speech detection, it is not clear how hate speech finds its way into an online ...
  • Govindaraj, Jayaprakash; Gupta, Gaurav (Advisor); Chang, Donghoon (Advisor) (IIIT-Delhi, 2018-05)
    The enterprises are facing constant security threats with the emergence of new mobile computing devices like smartphones, smartwatches, and wearables. The existing digital forensic enabled security solutions are not able ...
  • Singh, Abhishek Pratap; Mitra, Abhijit (Advisor); Srivastava, Anand (Advisor) (IIIT-Delhi, 2021-05)
    The extensive growth in the demand for network bandwidth has created new challenges for net- work operators in the last few years. Traditional optical network technology is no longer enough to handle the massive bandwidth ...
  • Jain, Shilpi; Goyal, Vikram (Advisor) (2014-07-10)
    In the current changing trends, collaboration between di erent organizations or consolidation between applications of the same organization has become a common phenomenon. In order to achieve strategic business objectives ...
  • Jain, Ayushi; Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2022-05)
    Millions of mobile apps are downloaded and used by users throughout the world. For many developers, these apps are the source of their income. Given that there is monetary aspect attached to applications, this gives rise ...
  • Rattey, Hemant; Prashant; Moyers Jr., Timothy Scott (Advisor) (IIITD-Delhi, 2019-11-26)
    Making games is a comparatively new eld which demands technical as well as creative ability. Game Development is increasingly becoming popular among millennials. Developing a game involves designing the levels, programming ...
  • Agrawal, Navin; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (2016-09-13)
    Gender classification is used in applications as a soft feature or attribute in biometrics to help identify people. Using gender classification as an indexing technique can boost the performance of facial-biometric. If the ...
  • Yadav, Kuldeep; Naik, Vinayak (Advisor); Singh, Pushpendra (Advisor); Singh, Amarjeet (Advisor) (2014-01-21)
    Location-based mobile applications are steadily gaining popularity across the world. These applications require information about user's current location to access different kind of services. However, location-based ...
  • Rastogi, Ayushi; Nagappan, Nachiappan; Gousios, Georgios (2016-01-11)
    Open source development has often been considered to be a level playing field for all developers. But there has been little work to investigate if bias plays any role in getting contributions accepted. The work presented ...
  • Mala, Shuchi; Sengupta, Raja (Advisor) (2013-11-25)
    In India, there is a strong need of a nation-wide disease surveillance system. As of now there are very few surveillance systems in India to detect disease outbreaks. IDSP (Integrated Disease Surveillance Project) was ...
  • Gupta, Devansh; Chhabra, Parth; Anand, Saket (Advisor); Kalyanaraman, Kaushik (Advisor) (2021-11)
    In machine learning, disentangling factors of variation lead to robust latent space representations and improve the efficacy of various downstream tasks like classification, prediction etc. Disentangling representations ...
  • Himanshu; Pandey, Satish Kumar (Advisor) (IIIT-Delhi, 2022-05)
    While the project is about general exploration of geometry of Banach spaces, we plan to look carefully at the following two questions: 1. Does every infinite-dimensional Banach space contain an infinite dimensional reflexive ...
  • Singhal, Anmol; Oberoi, Tejas; Shah, Rajiv Ratn (Advisor) (IIIT- Delhi, 2021-05)
    In recent years, researchers have started putting in extensive efforts for Natural Language Pro- cessing (NLP) in the context of Indic Languages like Hindi. Tasks like Spell and Grammar Correction, which have been ...
  • Mahajan, Sahil; Raman, Rajiv (Advisor) (2016-09-13)
    In guillotine cut problem, we are given non-intersecting convex sets in the plane and we are allowed straight line cuts. If a cut passes through an object, it kills that object. Can one always save a constant fraction or ...
  • Jain, Siddhartha; Raman, Rajiv (Advisor); Ram, Samrith (Advisor) (IIITD-Delhi, 2019-04-15)
    Given a set of axis-parallel rectangles on a plane, can you cut out a constant fraction of them using only Guillotine cuts? We try to answer this question in the project. The general problem of cutting out convex sets was ...
  • Garg, Mannika; Singh, Pushpendra (Advisor) (IIIT-Delhi, 2020-05-31)
    Lack of hand-hygiene is one of the major causes of the spread of various bacterial diseases. Proper hand hygiene can be pivotal in the prevention of such healthcare-associated infections. In this project, we come up with ...

Search Repository


Advanced Search

Browse

My Account