IIIT-Delhi Institutional Repository

Browsing Computer Science and Engineering by Title

Browsing Computer Science and Engineering by Title

Sort by: Order: Results:

  • Kaur, Ramneek; Goyal, Vikram (Advisor); Gunturi, Venkata M. Viswanath (Advisor) (IIIT-Delhi, 2022-06)
    Transportation is a fundamental task in modern-day civilization. Examples of transportation in our daily lives include going to the workplace, returning home after work, etc. In this thesis, we investigate computational ...
  • Akhtar, Mohammad Hamzah; Sheoran, Shikhar; Prasad, Ranjitha (Advisor) (IIIT-Delhi, 2021-12)
    Estimating the structure of directed acyclic graphs (DAGs, also known as Bayesian networks) is a challenging problem since the search space of DAGs is combinatorial and scales super exponentially with the number of nodes. ...
  • Ahuja, Yajur; Das, Syamantak (Advisor) (IIIT-DElhi, 2020-06-03)
    We consider a generalization of the classical K-center problem with capacities, demands, and outliers. The capacitated K-center problem adds a constraint to the original K-center problem of every vertex having a capacity ...
  • Sachdev, Astha; Sureka, Ashish (Advisor) (2015-02-16)
    Process mining consists of mining business process event-logs for discovering run-time process models, process compliance verifi cation and extracting useful insights on process e efficiency. Process model discovery from ...
  • Nanda, Vedant; Kumaraguru, Ponnurangam (Advisor) (IIITD-Delhi, 2018-04-18)
    Sel es have become a prominent medium for self-portrayal on social media. Unfortunately, certain social media users go to extreme lengths to click selfies , which puts their lives at risk. Two hundred and thirty-two ...
  • Sinha, Raunak; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIITD-Delhi, 2019-04-29)
    Automatic kinship verifi cation using face images involves analyzing features and computing similarities between two input images to establish kin-relationship. It has gained signi cant interest from the research community ...
  • Mehra, Rohit; Naik, Vinayak (Advisor) (2015-12-03)
    A large number of web applications are written using server-side scripting languages. Although web browsers allow clients to run these applications, it is often cumbersome to depend on the desktops for the services ...
  • Mukherjee, Asmita; Chakraborty, Tanmoy (Advisor); Akhtar, Md. Shad (Advisor) (IIIT-Delhi, 2022-12)
    A research paper is a document that presents an original work and introduces new concepts and makes interconnections between them via arguments and statements. Extreme Summarization involves high compression of the information ...
  • Saini, Vipul; Mutharaju, Vijaya Raghava (Advisor); Chakraborty, Tanmoy (Advisor) (IIIT-Delhi, 2020-06-05)
    Knowledge graphs have become quite popular and their utility is increasing at a very fast rate. There exist numerous extensive knowledge graphs that contain information on a plethora of topics. With new information ...
  • Anand, Gyanesh; Shah, Rajiv Ratn (Advisor); Mutharaju, Vijaya Raghava (Advisor) (IIIT-Delhi, 2020-05-31)
    With the explosion of healthcare information, there has been a tremendous amount of heterogeneous Textual Medical Knowledge(TMK), which plays an essential role in healthcare information systems. Existing works for integrating ...
  • Likhyani, Ankita; Bedathur, Srikanta (Advisor) (2015-06-18)
    In applications arising in massive on-line social networks, biological networks, and knowledge graphs it is often required to find shortest length path between two given nodes. Recent results have addressed the problem of ...
  • Sankaran, Anush; Vatsa, Mayank; Singh, Richa (2015-01-27)
    Latent fingerprint comparison evidences are used in the court of law for more than 100 years. Manual matching of latent fingerprints is challenged by subjectivity and inconsistency in terms of results and is not scalable ...
  • Malhotra, Aakarsh; Vatsa, Mayank (advisor); Singh, Richa (advisor) (IIIT-Delhi, 2024-01)
    Attributed to extensive acceptance and research, lives can and inked fingerprints are successfully used for human recognition. However, applications such as contactless biometrics amidst the pandemic and crime scene ...
  • V, Venktesh; Mohania, Mukesh (Advisor); Goyal, Vikram (Advisor) (IIIT-Delhi, 2023-03)
    Education in traditional classroom settings was restricted to static content in textbooks. It also assumes all the learners have a similar pace of learning. Online learning platforms have shifted the paradigm and have made ...
  • Sankaran, Anush; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIIT-Delhi, 2017-02)
    Fingerprint recognition has evolved over the decades, providing innumerable applications for improving the modern day security. Based on the method of capture, fingerprints can be classified into four variants: inked, ...
  • Wadhwa, Pritish; Satija, Gitansh Raj; Shah, Rajiv Ratn (Advisor) (IIIT-Delhi, 2022-07)
    Legal Domain has been explored by the scientific community only upto a limited extent. While there is some amount of research available in the United States of America, the amount of research in India in the same domain ...
  • Goswami, Chitrita; Sengupta, Debarka (Advisor) (IIIT-Delhi, 2023-02)
    In an era where machine learning (ML) is changing the landscape of financial markets, education, security and privacy, the retail sector, and many other crucial aspects of human life, it is only fitting that we should use ...
  • Sondhi, Devika; Purandare, Rahul (Advisor) (IIIT- Delhi, 2021-06)
    With the ever-growing dependency on software, testing for their unexpected behavior is as important as verifying for their known properties, to avoid potential losses. Existing software testing approaches assume either ...
  • Gupta, Pooja; Guha, Apala (Advisor) (2015-12-02)
    In today's complex environment, it is very crucial for the devices to feature low power consumption at allow cost. Internet of things is predicted to bring an era where everything will have chips embedded in them, be it ...
  • Mehta, Ankita; Gunturi, Venkata M. Viswanath (Advisor) (2017-05)
    Input to the Load Balanced Network Voronoi Diagram (LBNVD) consists of the following: (a) a transportation network represented as a directed graph; (b) locations of public service units (e.g., schools in a city) as vertices ...

Search Repository


Advanced Search

Browse

My Account