IIIT-Delhi Institutional Repository

Browsing Computer Science and Engineering by Title

Browsing Computer Science and Engineering by Title

Sort by: Order: Results:

  • Vigneshwar, Palani; Akhtar, Md. Shad (Advisor); Chakraborty, Tanmoy (Advisor) (IIIT-Delhi, 2023-05)
    With the widespread use of social media platforms, virality has become a fascinating subject for researchers. Content-based research emphasizes the role of content characteristics in predicting virality, such as the type ...
  • Jain, Abhishek; Jain, Siddharth; Singh, Pushpendra (Advisor) (2017-04-18)
    In India, patients with severe mental illnesses (SMI) generally have their family members as caregivers. It becomes difficult for the caregiver to monitor the patients activites and behavior closely and communicate the ...
  • Bharadwaj, Samarth; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (2015-09-02)
    Large scale biometric identification systems still lack the versatility to handle challenging situations such as adverse imaging conditions, missing or corrupt data, and non-conventional operating scenarios. It is well ...
  • Patel, Rhythm; Agrawal, Mohnish; Shah, Rajiv Ratn (Advisor); Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2022-05)
    Hate speech has been defined as the act of offending, insulting, or threatening individuals or a group of people based on their religion, race, caste, orientation, gender, or belongingness to a specific stereotyped community ...
  • Makkar, Sakshi; Chakraborty, Tanmoy (Advisor) (IIIT-Delhi, 2020-07)
    Online hate speech, particularly over microblogging platforms like Twitter, has emerged as arguably the most severe issue of the past decade. Several countries have reported a steep rise in hate crimes infuriated by ...
  • Garg, Rishabh; Baweja, Yashasvi; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIITD-Delhi, 2018-11)
    Heterogeneous biometric recognition requires matching images with variations such as resolution and spectrum. Heterogeneity in images often reduces the inter-class homogeneous distance while increasing the intra-class ...
  • Mittal, Shravika; Chakraborty, Tanmoy (Advisor) (IIIT-Delhi, 2020-05-27)
    Community affiliation of a node plays an important role in determining its contextual position in the network, which may raise privacy concerns when a sensitive node wants to hide its identity in a network. Oftentimes, ...
  • Tiwari, Abhiprayah; Kumar, Vivek (Advisor); Mitra, Gaurav (Advisor) (IIIT-Delhi, 2018-07)
    With energy efficiency becoming a major concern in the HPC community, low-power alternatives such as heterogeneous Multi-Processor System-on-chip (MPSoC) are gainingpopularity. These devices house several different kinds ...
  • Dahiya, Lakshay; Singh, Chaudhary Guroosh Gabriel; Gunturi, Venkata M. Viswanath (Advisor) (IIIT-Delhi, 2018-08-13)
    With the advent of mobile phones and wearable technology, there has been a sudden increase in the amount of geo-located data available to us. One of the basic forms of pattern recognition is the identification of hotspots. ...
  • Kamat, Ankit Kumar; Yadav, Vikhyat; Mutharaju, Vijaya Raghava (Advisor) (IIIT-Delhi, 2022-12)
    HopOn India by Desiwalks Tours Pvt. Ltd., uses the power of modern cloud technology to enhance visitor experiences and tell stories about destinations like Museums and Monuments. Museums are organisations that collect and ...
  • Bhardwaj, Mohit; Chakraborty, Tanmoy (Advisor); Akhtar, Md. Shad (Advisor) (IIIT- Delhi, 2021-07)
    The swift escalation in hostile content on the web and specifically on Online Social Media (OSM) has lately become a matter of concern that we must tackle. The situation worsens to a whole different level with recent events ...
  • Bhatnagar, Juhi; Kumaraguru, Ponnurangam (Advisor); Venkatraman, Shriram (Advisor) (2017-04-18)
    This study examines selfie as a human-driven action and investigates how selfies can turn into killfies by examining the user behavior associated with selfies. Three data collection techniques are discussed - interviews, ...
  • Bansal, Ruchita; Goyal, Vikram (Advisor) (2015-12-03)
    High-utility itemset mining has attracted signicant attention from the research community. Identifying high-utility itemsets from a transaction database can help business owners to earn better profit by promoting the sales ...
  • Gupta, Srishti; Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2019-01)
    Online Social Networks (OSNs) have become a huge aspect of modern society. Social network usage is on a rise, with over 2 billion people using it across the globe, and the surge is only expected to increase. Online Social ...
  • Saini, Sakshi; Mutharaju, Vijaya Raghava (Advisor); Bhatia, Sumit (Advisor) (IIIT-Delhi, 2021)
    In Semantic Web languages, such as RDF and OWL, a binary relation is represented by the property, which links two entities or Individuals. Binary relations cannot be used to capture the relation between more than two ...
  • Singh, Dashmesh; Gautam, Gaurav; Sarda, Vaibhav; Ali, Adnan; Singh, Pushpendra (Advisor) (IIIT-Delhi, 2021-05)
    ERP is an integral system in our Institute for managing academic data pertaining to students and professors. The current ERP system has certain issues in functionality, usability concerns, redundancies. We propose to ...
  • Kumar, Ashwat; Shah, Rajiv Ratn (Advisor) (IIIT-Delhi, 2020-06-01)
    Image Repurposing is a type multimedia manipulation in which instead of manipulating image and it’s content, manipulation is done on it’s associated modality. For example - image’s caption, location metadata, author ...
  • Khan, Akif Ahmed; Raman, Rajiv (Advisor); Bera, Debajyoti (Advisor); Sharma, Ojaswa (Advisor) (2015-12-03)
    Range Tree is a geometrical data structure used to store data in d-dimensions. In order to store larger amount of data in external memory, we need an I/O efficient algorithm. There are many I/O efficient algorithms ...
  • Kottur, Shaguftha Zuveria; Shah, Rinku (Advisor); Tammana, Praveen (Advisor); Kadiyala, Krishna (Advisor) (IIIT-Delhi, 2023-05)
    Control and management plane applications such as serverless function orchestration and 4G/5G control plane functions are offloaded to smartNICs to reduce communication and processing latency. Such applications involve ...
  • Aggarwal, Yash; Chakraborty, Tanmoy (Advisor); Akhtar, Md. Shad (Advisor) (IIIT-Delhi, 2022-05)
    With an increasing amount of hate on online social media platforms, automatic detection of toxic language plays a protecting role for online users and content moderators. Hence, it be- comes important to ensure that these ...

Search Repository


Advanced Search

Browse

My Account