IIIT-Delhi Institutional Repository

Browsing Computer Science and Engineering by Title

Browsing Computer Science and Engineering by Title

Sort by: Order: Results:

  • Dhar, Aritra; Purandare, Rahul (Advisor) (2014-12-12)
    Programs are susceptible to malformed data coming from untrusted sources. Occasionally the programming logic or constructs used are inappropriate to handle all types of constraints that are imposed by legal and well-formed ...
  • Vinayakarao, Venkatesh; Purandare, Rahul (Advisor) (IIIT-Delhi, 2018-04)
    Code variants represent alternative implementations of a code snippet, where each alternative provides the same functionality, but has different properties that make some of them better suited to the overall project ...
  • Goel, Mansi; Garcia, David (Advisor); Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2017-11-16)
    In online social networks, users may choose to keep a lot of important information in the private domain. Users may choose to hide their location, gender, interests, and affiliations. With usage of social networks and ...
  • Lahiri, Shayan; Sujit, PB (Advisor) (2015-12-02)
    Robots have been successfully deployed during natural disasters to perform remote search and rescue missions. These robots are tasked under human operator supervision. For remote operations, network connectivity is ...
  • Khatri, Sagar; Goyal, Vikram (Advisor) (2017)
    We study two measures namely maximal information coefficient (MIC) and distance correlation (dCor) for the application anomaly detection. MIC is based on the concept of information theory and measures the mutual information ...
  • Sharma, Soumya; Naik, Vinayak (Advisor) (2016-11-17)
    With multiple mobile applications for a single function in the market, there is a need to look into the resources the application utilizes as well. In this study, we focus on which resources a particular mobile application ...
  • Rana, Anurag; Singh, Pushpendra (Advisor) (2015-12-03)
    Telephones have high reach both in developed and developing countries that have made it a preferred tool for collecting and disseminating information. Voice based information collection systems o ffers data collection ...
  • Saxena, Simran; Kumaraguru, Ponnurangam (Advisor); Dubey, Alpana (Advisor); Balaji, Arun (Advisor); Sachdeva, Niharika (Advisor) (IIIT-Delhi, 2018-04)
    Crowdsourcing is the practice of getting information or input for a task or project from a number of people by floating out the task at hand to a pool of people who are usually not full-time employees. Use of Crowdsourcing ...
  • Mishra, Shreemoy (2014-07-16)
    I study the market for consumer information. Firms cannot commit to privacy, so buyers anticipate disclosure of purchase history for targeted pricing. In the literature, strategic rejections of informative o ers make ...
  • Correa, Denzil; Sureka, Ashish (Advisor) (2014-12-24)
    There has been a proliferation of Web 2.0 sites on the Internet. Contemporary Web 2.0 sites like Facebook and Twitter are primarily driven by user generated content (UGC). On the other hand, the volume of content by such ...
  • Kalra, Harshvardhan; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIIT-Delhi, 2018-07-06)
    Current face recognition systems make extensive use of class-wise disparate features drawn from faces in order to achieve state-of-the-art performances. However, there exists a multitude of information in a given image ...
  • Asthana, Siddhartha; Singh, Pushpendra; Singh, Amarjeet; Naik, Vinayak (2012-03-26)
    Voice based telecommunication services are emerging as most appropriate medium for information dissemination in developing regions, as they overcome prevalent low literacy rate and are more reachable than any other ...
  • Chaudhary, Vidushi; Sureka, Ashish (Advisor) (2013-03-26)
    YouTube is one of the largest video sharing websites (with social networking features) on the Internet. The immense popularity of YouTube, anonymity and low publication barrier has resulted in several forms of misuse and ...
  • Agrawal, Praful; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (2014-05-19)
    With the advent of research, it has been established that many leading diseases among women, such as breast cancer, cervical cancer, and autoimmune diseases, can be prevented if diagnosed at initial stage. This research ...
  • Keswani, Sumit; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (2017-04)
    In past few years, cross-modal information retrieval has drawn much attention due to significant growth in the multimodal data. It takes one type of data as the query to retrieve relevant data of multiple modalities. For ...
  • Bhatt, Himanshu S; Singh, Richa; Vatsa, Mayank (2015-01-27)
    Face recognition has found several applications ranging from cross border security, surveillance, access control, multimedia to forensics. Face recognition under variations due to pose, illumination, and expression has ...
  • Apurupa, Nagasuri Venkata; Singh, Pushpendra (Advisor); Chakravarthy, Sambudhho (Advisor); Buduru, Arun Balaji (Advisor) (IIIT-Delhi, 2018-07)
    Energy conservation plays an important role in the economic development of a country. The total share of building ’s energy consumption in the country ’s energy consumption is increasing every year in India. Thus, it is ...
  • Gupta, Nikita; Gupta, Sanchit; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (2017-04-24)
    One of the challenging applications in face recognition is video surveillance, where unconstrained low-resolution video data is captured both in day and night time (visible and near-infrared) with multiple subjects in ...
  • Hasan, Munawar; Sanadhya, Somitra Kumar (Advisor) (2016-09-20)
  • Ujjainia, Anjali; Singhal, Nikhil; Babbar, Karishma; Upadhyaya, Utkarsh; Jha, Prashant (Advisor) (2017)
    This project is in continuation with the previous semester. The previous semester's work revolved around understanding the Indian health care system, with the primary focus on all aspects related to prescriptions. This is ...

Search Repository


Advanced Search

Browse

My Account