IIIT-Delhi Institutional Repository

Browsing Computer Science and Engineering by Title

Browsing Computer Science and Engineering by Title

Sort by: Order: Results:

  • Gangopadhyay, Rahul; Shannigrahi, Saswata (Advisor); Sharma, Anuradha (Advisor) (IIIT-Delhi, 2020-01)
    In this thesis, we study the d-dimensional rectilinear drawings of d-uniform hypergraphs in which each hyperedge contains exactly d vertices. A d-dimensional rectilinear drawing of a d-uniform hypergraph is a drawing of ...
  • Bagga, Shaurya; Shah, Rajiv Ratn (Advisor) (2021-03)
    A lot of people are learning English around the world and take assessments every year. With the rise of candidates taking these assessments and the shortage of qualified experts rating these assessments, there is a need ...
  • Jain, Monika; Subramanyam, A V (Advisor) (IIIT-Delhi, 2022-06)
    Correlation Filter based visual trackers have demonstrated tremendous progress in object tracking. These trackers primarily use hierarchical features learned from multiple layers of a deep network. However, issues related ...
  • Pal, Mayank Kumar; Kaul, Sanjit Krishnan (Advisor); Anand, Saket (Advisor) (IIITD-Delhi, 2018-11-23)
    We addressed the problem of jointly selecting communications and vehicular planning strategies with the goal of optimizing the driving utility like the speed of the car. Much related work assumes the communications channels ...
  • Thukral, Deepak; Goyal, Vikram (Advisor); Chakraborty, Tanmoy (Advisor) (IIIT-Delhi, 2018-04-18)
    Automatic estimation of relative difficulty of a pair of questions is an important and challenging problem in community question answering (CQA) services. There are limited studies which addressed this problem. Past studies ...
  • Pandey, Adesh; Thukral, Deepak; Gupta, Rishabh; Goyal, Vikram (Advisor); Chakraborty, Tanmoy (Advisor) (IIIT-Delhi, 2017-11-16)
    Given a question on a crowd sourced Q&A platform, we tried to gauge the difficulty of the question. Earlier, we tried various NLP based techniques for this purpose. Now, we tried various graph models in order to model ...
  • Sharma, Utkarsh; Sethi, Tavpritesh (Advisor) (IIIT-Delhi, 2022-05)
    We propose a platform that connects Doctors, Insurance and Patients and in doing so provides them value that won’t be possible otherwise. We use the platform to store the longitudinal health record of the patient (with ...
  • Gupta, Neha; Prakash, Naveen (Advisor) (IIIT-Delhi, 2020-05)
    Conventional data warehouse systems are implemented either on a multi-dimensional database or a relational database. While the earlier supports MOLAP operations, the other supports ROLAP operations. In this work, we used ...
  • Kochanthara, Sangeeth; Purandare, Rahul (Advisor) (2016-11-01)
    Real-time systems are becoming more complex and open, thus increasing their development and verification costs. Although several static verification tools have been proposed over the last decades, they suffer from scalability ...
  • Chowdhury, Anurag; Vatsa, Mayank (Advisor) (2016-09-20)
    Biometric analysis of surveillance videos carries inherent challenges in form of variations in pose, distance, illumination and expression. To address these variations, different methodologies are proposed, including ...
  • Nangia, Aditya; Bhupal, Saksham; Mohania, Mukesh (Advisor) (IIIT-Delhi, 2023-10-29)
    In an era marked by unprecedented data growth and pervasive digital influence, ensuring model privacy is imperative as machine learning models gain prominence in diverse domains like healthcare, finance, and business. ...
  • Mohit; Gupta, Anubha (Advisor) (IIIT-Delhi, 2023-11-28)
    This study aims to enhance the accuracy of predicting the 30-day mortality rate among patients following their first heart attack by leveraging machine learning and deep learning techniques. The current cardiac risk ...
  • Sharma, Piyush Kumar; Chaudhary, Shashwat; Hassija, Nikhil; Maity, Mukulika; Chakravarty, Sambuddho (IIIT-Delhi, 2019)
    Anonymous VoIP calls over the Internet holds great significance for privacy-conscious users, whistle-blowers and political activists alike. Prior research deems popular anonymization systems like Tor unsuitable for providing ...
  • Gupta, Madhvi; Nagaraja, Shishir (Advisor) (2012-10-17)
    With improved technology, every user now generates huge amount of data that requires ever increasing amount of space to store it. It is not economical for the users to purchase new storage device every time. As a remedy ...
  • Madan, Anish; Anand, Saket (Advisor) (IIITD-Delhi, 2019-04-16)
    Machine Learning models are deployed in various tasks including image classification, malware detection, network intrusion detection, etc. But recent work has demonstrated that even state-of-the-art deep neural networks, ...
  • Singh, Shashank Shekhar; Shah, Rajiv Ratn (Advisor) (IIIT-Delhi, 2023-11-29)
    This report explores the augmentation of the RanLayNet research paper by addressing limitations in existing datasets for domain adaptation. Through a comprehensive analysis of Ran- LayNet, PubLayNet, and DocLayNet papers, ...
  • Tiwari, Lokender; Anand, Saket (Advisor) (IIIT-Delhi, 2021)
    A scene can be interpreted from two perspectives: geometric and semantic. Geometric scene understanding requires inferring the3D layout of the scene from an image or video, while semantic scene understanding requires ...
  • Khan, Mohammad Aflah; Akhtar, Md. Shad (Advisor) (IIIT-Delhi, 2023-11-29)
    Despite the widespread adoption, there is a lack of research into how various critical aspects of LLMs affect their performance in hate speech detection. Through five research questions, our findings and recommendations ...
  • Mozumdar, Aaloke; Biyani, Pravesh (Advisor) (IIIT-Delhi, 2022-05)
    The bus location data received by Chartr from DTC does not have information about the route that buses are on at a particular time of the day. This information creates a major hindrance in unifying the data with the location ...
  • Mohindra, Mayank; Chakravarty, Sambuddho (Advisor) (IIITD-Delhi, 2019-04-21)
    Due to the proliferation of CDNs with edge networks, the known hierarchical model of the Internet is gradually changing. Very recently, it has been demonstrated that CDNs have become part of the Internet core [5]. There ...

Search Repository


Advanced Search

Browse

My Account