IIIT-Delhi Institutional Repository

Browsing Computer Science and Engineering by Title

Browsing Computer Science and Engineering by Title

Sort by: Order: Results:

  • Soubam, Sonia; Naik, Vinayak (Advisor) (2013-05-30)
    This work focuses on providing privacy in MobiShare, which is a location-based service that assists users in searching and sharing files. A user’s mobility profile is summarization of its raw mobility data in terms of ...
  • Gautam, Dibya; Agrawal, Navneet (IIIT-Delhi, 2021-11)
    Keyphrase extraction is the task of automatically extracting a set of phrases from a document that represents the overall context of the given document. Such keyphrases can be used in multiple ways in Information retrieval, ...
  • Yadav, Kuldeep; Naik, Vinayak; Singh, Amarjeet; Singh, Pushpendra (2012-03-14)
    Location-aware applications are steadily gaining popularity across the world. However lack of GPS in low-end programmable phones (< $100) and general absence of Wi-Fi infrastructure in developing countries prevents users ...
  • Yadav, Shivangi; Vatsa, Mayank (Advisor) (2016-09-13)
    Face recognition is an important area of research due to its requirement in our day-to-day life, be it surveillance or authentication. Current advancements in technology and computational power have shown promising results ...
  • Kumar, Tanya Sanjay; Shah, Rajiv Ratn (Advisor); K, Sarveswaran (Advisor) (IIIT-Delhi, 2022-05)
    Natural Language Processing has been one of the most important domain in computer linguistics in today’s world. Though there are various efficiently performing tools and models for various NLP subtasks for English, Indic ...
  • Gupta, Taejas; Gupta, Anubha (Advisor) (IIITD-Delhi, 2019-04-28)
    Cancer is caused by an increased amount of cell growth in an area due to alterations in protein synthesis caused by mutations in certain genes known as cancer driver genes. Determining the gene regulatory network for the ...
  • Gosain, Devashish; Rawat, Madhur; Sharma, Piyush Kumar; Acharya, Hrishikesh Bhatt (IIIT-Delhi, 2020-01)
    National governments know the Internet as both a blessing and a headache. On the one hand, it unlocks great economic and strategic opportunity. On the other hand, government, military, or emergency-services become vulnerable ...
  • Maheshwary, Yashit; Kurian, Deepak; Buduru, Arun Balaji (Advisor) (IIIT-Delhi, 2020-05-29)
    Malware Detection is an important problem in modern day due to the increasing frequency of malware attacks using unknown malware strains. Unlike traditional detection techniques which require a signature for each sample, ...
  • Shekhawat, Sahil; Chakravarty, Sambuddho (Advisor) (2017-07-06)
    Last semester we found that the Indian government delegates censorship policies at ISP level which is inconsistent and disorganized. We filed multiple RTIs to Department of Telecommunication seeking censorship policies of ...
  • Mongia, Aanchal; Majumdar, Angshul (Advisor) (IIIT-Delhi, 2020-09)
    Data analytics and computational techniques applied to biological sciences aid rapid technological advances, swift discoveries, and reliable analysis. A broad range of bountiful tools and algorithms have played pivotal ...
  • Vachher, Mayank; Kumaraguru, Ponnurangam (Advisor) (2016-11-16)
    Over the past couple of years, clicking and posting selfies has become a popular trend. However, since March 2014, 127 people have died and many have been injured while trying to click a selfie. Researchers have studied ...
  • Srivastava, Abhishek; Shah, Rajiv Ratn (Advisor); Yu, Yi (Advisor) (IIIT-Delhi, 2020-07)
    Automating the process of melody generation from lyrics has been a challenging research task in the field of artificial intelligence. Lately, however, music-related datasets have become available at large-scale, and with ...
  • Bhardwaj, Abhishek; Arjunan, Pandarasamy; Singh, Amarjeet; Naik, Vinayak; Singh, Pushpendra (2012-03-26)
    Ubiquitous availability of cellular network and cheap mobile phones have made them promising sensing platforms for various application domains including healthcare, environment, and astronomy among others. However, ...
  • Bhatt, Himanshu S; Bharadwaj, Samarth; Singh, Richa; Vatsa, Mayank (2012-03-26)
    One of the important cues in solving crimes and apprehending criminals is matching sketches with digital face images. This paper presents an automated algorithm that extracts discriminating information from local regions ...
  • Singh, Mandeep; Roy, Sayan Basu (Advisor) (IIIT-Delhi, 2020-07)
    A memory efficient filter based iterative algorithm is proposed for a two-player zero sum linear differential game problem arising in the control of process systems affected by disturbances.The objective in such a scenario ...
  • Hussain, Lasani (IIIT-Delhi, 2022-12)
    Data centers demand high throughput (100 to 400 Gbps) and sub-millisecond latency. The performance of data center applications heavily depends on the efficiency of the underlying TCP stack. Despite several optimizations, ...
  • Wason, Manan; Singh, Pushpendra (Advisor) (2016-11-18)
    Nowadays, mobile devices are loaded with many useful sensors and have high computational capabilities. The sensors available on these devices provide valuable data that can be harnessed in many ways. Due to abundance of ...
  • Arjunan, Pandarasamy; Singh, Amarjeet (Advisor); Singh, Pushpendra (Advisor) (IIIT-Delhi, 2018-03)
    As one of the largest consumers of overall energy, buildings have emerged as attractive targets for using information and communications technologies to advance large-scale sustainability goals. With increasing availability ...
  • Mittal, Megha; Sureka, Ashish (Advisor) (2014-01-24)
    An undergraduate level Software Engineering course generally consists of a team-based semester long project and emphasizes on both technical and managerial skills. Software Engineering is a practice-oriented and applied ...
  • Lamba, Yash; Sureka, Ashish (Advisor) (2014-10-16)
    Software libraries and frameworks, consisting of a collection of Class and Interface de nitions, provide a mechanism for code reuse by providing methods, APIs, components (generic functionality) and a support structure ...

Search Repository


Advanced Search

Browse

My Account