IIIT-Delhi Institutional Repository

Browsing Computer Science and Engineering by Title

Browsing Computer Science and Engineering by Title

Sort by: Order: Results:

  • Aggarwal, Aayush; Das, Syamantak (Advisor) (IIIT Delhi, 2020-06-06)
    We are given a bipartite graph G(R, S, E) (|R| = |S|), where R denotes the set of requests and S being the set of servers. The requests R (given by an adversary) arrive sequentially along with their distances to each of ...
  • Yasvi, Maleeha Arif; Mutharaju, Vijaya Raghava (Advisor) (IIIT-Delhi, 2020-07)
    Ontologies evolve over time due to changes in the domain and the requirements of the application. Maintaining an ontology over time and keeping it up-to-date with respect to the changes in the domain and the requirements ...
  • Sachdeva, Nikhil; Mutharaju, Vijaya Raghava (Advisor) (IIIT-Delhi, 2020-06-08)
    Ontology Learning is the semi-automatic and automatic extraction of ontology from a natural language text, using text-mining and information extraction. Each ontology primarily represents some concepts and their corresponding ...
  • Gupta, Akanksha; Mallik, Anupama (Advisor) (2015-12-02)
    Past decade has seen a prominent rise in the number of e-commerce applications in the World Wide Web. Designing recommendation algorithms for predicting user interests is quite challenging for such systems. Several ...
  • Agarwal, Swati; Sureka, Ashish (Advisor); Goyal, Vikram (Advisor) (IIIT-Delhi, 2017-06)
    Online Social media platforms such as Tumblr, Twitter (micro-blogging website) and YouTube (video sharing website) contains information which is publicly available or open-source. Open source social media intelligence ...
  • Chug, Sezal; Kaushal, Priya; Kumaraguru, Ponnurangam (Advisor); Sethi, Tavpritesh (Advisor) (IIIT- Delhi, 2021-05)
    Data is expanding at an unimaginable rate, and with this development comes the responsibility of the quality of data. Data Quality refers to the relevance of the information present and helps in various operations like ...
  • Mithal, Aditi; Kumaraguru, Ponnurangam (Advisor) (2017-04-18)
    A tremendous amount of impact is generated through the images on social media as they account for more than 60% of the content available online. Understanding the textual content of the image is therefore significant for ...
  • Ishant; Arora, Chetan (Advisor) (IIIT-Delhi, 2020-08-13)
    Many computer vision problems can be formulated as finding the best labeling configuration. If labelings satisfy Markov property then finding best labeling configuration becomes MRF (Markov Random Field)- MAP (Maximum A ...
  • Jain, Saatvik; Biyani, Pravesh (Advisor) (IIITD-Delhi, 2019-07-10)
    Ride-sharing has been one of the emerging solutions to the ever-increasing problem of congestion and air pollution in cities. However, the effectiveness of ride-sharing in reducing private vehicles is contingent on its e ...
  • Sondhi, Devika; Singh, Pushpendra (Advisor) (2015-12-02)
    Sensors that come built in smartphones are extensively used by various apps and for analysis purpose. Some of these sensors, especially GPS and Microphone, are energy expensive. Hence, there is a need to use these judiciously. ...
  • Jain, Milan; Singh, Amarjeet (Advisor) (IIIT Delhi, 2014-09-05)
    Buildings account for a signi cant proportion of overall energy consumption across the world. Heating Ventilation and Air Conditioning (HVAC) typically consumes a major proportion (e.g. 32% in India) of the total building ...
  • Agarwal, Akshay; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (IIIT-Delhi, 2020-10)
    As the deployment and usage of computer vision systems increase, protecting these systems from malicious data has also become a critical task. The primary source of information in any computer vision system is the input ...
  • Gupta, Nisha; Sureka, Ashish (Advisor) (2015-02-16)
    Process mining consists of extracting knowledge and actionable information from event-logs recorded by Process Aware Information Systems (PAIS). PAIS are vulnerable to system failures, malfunctions, fraudulent and ...
  • Maini, Parikshit; Sujit, PB (Advisor) (IIIT-Delhi, 2020-09)
    Mobile robots have become ubiquitous today and are used widely in sensor networks. Their use in applications involving long-term operations, remote sensing and complex environments is a widely studied area of research due ...
  • Verma, Robin; Gupta, Gaurav (2014-12-25)
    The use of digital technology in conventional as well as new age crimes is increasing throughout the world, and researchers are working to develop digital forensics techniques to investigate such crimes. Digital forensic ...
  • Reddy, Kompelly Harshavardhan; Goyal, Vikram (Advisor) (2015-12-03)
    Graphs have always been an interesting structure to study in both mathematics and computer science , and have become even more interesting in the context of online social networks, recommendation networks whose underlying ...
  • Sikka, Utkrisht; Maity, Mukulika (Advisor) (IIIT-Delhi, 2022-12)
    High speed WiFi has become a necessity now-a-days. The latest standard of WiFi, IEEE 802.11ax, makes use of OFDMA, MU-MIMO, frame aggregation from different access categories, edca protocol, special Trigger frames that ...
  • Sinha, Mitali; Deb, Sujay (Advisor) (IIIT-Delhi, 2022-04)
    In recent years, as multi-core processors are emerging as a solution to the limitations of power scaling, the software domain is also experiencing a surge of compute and data-intensive applications. These applications are ...
  • Rastogi, Divyansh; Prasad, Ranjitha (Advisor) (IIIT-Delhi, 2022-12)
    Federated learning has been a popular research subject in allowing diverse people and businesses to collaborate on machine learning model training while maintaining privacy. Additionally, in today’s world there is an ...
  • Aggarwal, Anupama; Kumaraguru, Ponnurangam (Advisor) (2013-10-11)
    With the advent of online social media, phishers have started using social networks like Twitter, Facebook, and Foursquare to spread phishing scams. Twitter is an immensely popular micro- blogging network where people ...

Search Repository


Advanced Search

Browse

My Account