IIIT-Delhi Institutional Repository

Browsing Computer Science and Engineering by Title

Browsing Computer Science and Engineering by Title

Sort by: Order: Results:

  • Snehil; Chakraborty, Tanmoy (Advisor); Akhtar, Md. Shad (Advisor) (IIIT- Delhi, 2021-07)
    Curbing hate speech is undoubtedly a major challenge for online microblogging platforms like Twitter. While there have been studies around hate speech detection, it is not clear how hate speech finds its way into an online ...
  • Govindaraj, Jayaprakash; Gupta, Gaurav (Advisor); Chang, Donghoon (Advisor) (IIIT-Delhi, 2018-05)
    The enterprises are facing constant security threats with the emergence of new mobile computing devices like smartphones, smartwatches, and wearables. The existing digital forensic enabled security solutions are not able ...
  • Singh, Abhishek Pratap; Mitra, Abhijit (Advisor); Srivastava, Anand (Advisor) (IIIT-Delhi, 2021-05)
    The extensive growth in the demand for network bandwidth has created new challenges for net- work operators in the last few years. Traditional optical network technology is no longer enough to handle the massive bandwidth ...
  • Jain, Shilpi; Goyal, Vikram (Advisor) (2014-07-10)
    In the current changing trends, collaboration between di erent organizations or consolidation between applications of the same organization has become a common phenomenon. In order to achieve strategic business objectives ...
  • Jain, Ayushi; Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2022-05)
    Millions of mobile apps are downloaded and used by users throughout the world. For many developers, these apps are the source of their income. Given that there is monetary aspect attached to applications, this gives rise ...
  • Rattey, Hemant; Prashant; Moyers Jr., Timothy Scott (Advisor) (IIITD-Delhi, 2019-11-26)
    Making games is a comparatively new eld which demands technical as well as creative ability. Game Development is increasingly becoming popular among millennials. Developing a game involves designing the levels, programming ...
  • Agrawal, Navin; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (2016-09-13)
    Gender classification is used in applications as a soft feature or attribute in biometrics to help identify people. Using gender classification as an indexing technique can boost the performance of facial-biometric. If the ...
  • Yadav, Kuldeep; Naik, Vinayak (Advisor); Singh, Pushpendra (Advisor); Singh, Amarjeet (Advisor) (2014-01-21)
    Location-based mobile applications are steadily gaining popularity across the world. These applications require information about user's current location to access different kind of services. However, location-based ...
  • Rastogi, Ayushi; Nagappan, Nachiappan; Gousios, Georgios (2016-01-11)
    Open source development has often been considered to be a level playing field for all developers. But there has been little work to investigate if bias plays any role in getting contributions accepted. The work presented ...
  • Mala, Shuchi; Sengupta, Raja (Advisor) (2013-11-25)
    In India, there is a strong need of a nation-wide disease surveillance system. As of now there are very few surveillance systems in India to detect disease outbreaks. IDSP (Integrated Disease Surveillance Project) was ...
  • Gupta, Devansh; Chhabra, Parth; Anand, Saket (Advisor); Kalyanaraman, Kaushik (Advisor) (2021-11)
    In machine learning, disentangling factors of variation lead to robust latent space representations and improve the efficacy of various downstream tasks like classification, prediction etc. Disentangling representations ...
  • Himanshu; Pandey, Satish Kumar (Advisor) (IIIT-Delhi, 2022-05)
    While the project is about general exploration of geometry of Banach spaces, we plan to look carefully at the following two questions: 1. Does every infinite-dimensional Banach space contain an infinite dimensional reflexive ...
  • Singhal, Anmol; Oberoi, Tejas; Shah, Rajiv Ratn (Advisor) (IIIT- Delhi, 2021-05)
    In recent years, researchers have started putting in extensive efforts for Natural Language Pro- cessing (NLP) in the context of Indic Languages like Hindi. Tasks like Spell and Grammar Correction, which have been ...
  • Mahajan, Sahil; Raman, Rajiv (Advisor) (2016-09-13)
    In guillotine cut problem, we are given non-intersecting convex sets in the plane and we are allowed straight line cuts. If a cut passes through an object, it kills that object. Can one always save a constant fraction or ...
  • Jain, Siddhartha; Raman, Rajiv (Advisor); Ram, Samrith (Advisor) (IIITD-Delhi, 2019-04-15)
    Given a set of axis-parallel rectangles on a plane, can you cut out a constant fraction of them using only Guillotine cuts? We try to answer this question in the project. The general problem of cutting out convex sets was ...
  • Garg, Mannika; Singh, Pushpendra (Advisor) (IIIT-Delhi, 2020-05-31)
    Lack of hand-hygiene is one of the major causes of the spread of various bacterial diseases. Proper hand hygiene can be pivotal in the prevention of such healthcare-associated infections. In this project, we come up with ...
  • Suri, Anshuman; Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2018-04-18)
    Deep neural networks (DNNs) have been shown to be vulnerable to adversarial examples - malicious inputs which are crafted by the adversary to induce the trained model to produce erroneous outputs. This vulnerability has ...
  • Vigneshwar, Palani; Akhtar, Md. Shad (Advisor); Chakraborty, Tanmoy (Advisor) (IIIT-Delhi, 2023-05)
    With the widespread use of social media platforms, virality has become a fascinating subject for researchers. Content-based research emphasizes the role of content characteristics in predicting virality, such as the type ...
  • Jain, Abhishek; Jain, Siddharth; Singh, Pushpendra (Advisor) (2017-04-18)
    In India, patients with severe mental illnesses (SMI) generally have their family members as caregivers. It becomes difficult for the caregiver to monitor the patients activites and behavior closely and communicate the ...
  • Bharadwaj, Samarth; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (2015-09-02)
    Large scale biometric identification systems still lack the versatility to handle challenging situations such as adverse imaging conditions, missing or corrupt data, and non-conventional operating scenarios. It is well ...

Search Repository


Advanced Search

Browse

My Account