IIIT-Delhi Institutional Repository

Browsing Computer Science and Engineering by Title

Browsing Computer Science and Engineering by Title

Sort by: Order: Results:

  • Verma, Ishita; Saran, Nitika; Arora, Chetan (Advisor) (IIIT-Delhi, 2017-04-18)
    Pose estimation is a fundamental problem in computer vision and is prevalent in numerous applications such as object-detection, tracking etc. Generally, in pose estimation between two camera views, we have 6 degrees of ...
  • Lamba, Hemank; Sarkar, Ankit; Vatsa, Mayank; Singh, Richa (2012-03-26)
    One of the major challenges of face recognition is to de- sign a feature extractor that reduces the intra-class vari- ations and increases the inter-class variations. The fea- ture extraction algorithm has to be robust ...
  • Prasad, Yashdeep; Shukla, Jainendra (Advisor) (IIIT-Delhi, 2021-12)
    Billions of online video ads are viewed every month. We aim present a large scale dataset of the response of Indian audience to the online advertisements. The project is an attempt to find a causality between popularity ...
  • Nambiar, Pranav; Arora, Chetan (Advisor); Anand, Saket (Advisor) (IIITD-Delhi, 2018-04-30)
    Text-to-speech systems generally require large amounts of annotated speech data with the quality of both the annotations and speech being a huge factor. As a result, most of the research performed has been on highly curated ...
  • Dewan, Prateek; Gupta, Mayank; Kumaraguru, Ponnurangam (2012-03-14)
    While passwords, by de nition, are meant to be secret, recent trends in the Internet usage have witnessed an increasing number of people sharing their email passwords for both personal and professional purposes. As ...
  • Tyagi, Arjun; Subramanyam, A V (Advisor) (IIIT-Delhi, 2020-08)
    Correlation filter (CF) based tracker often disregard or weakly incorporate the importance of feature channels as well as channel similarity. To address this, we propose a channel-graph regularization correlation filter-based ...
  • Mrinal; Gautam, Prutyay; Ray, Arjun (Advisor) (IIIT-Delhi, 2020-12)
    The project is based on applying Machine Learning tools and di erent analysis techniques to identify which protein features in metagenomes sampled from Human and Non-Human (other mammal species) microbiomes help them impart ...
  • Yadav, Kuldeep; Kumar, Amit; Bharti, Aparna; Naik, Vinayak (2013-10-10)
    Location data collected from mobile phone users provide an ideal platform to generate human mobility patterns. These patterns give us insights into how people travel in their dayto- day lives.With availability of cellular ...
  • Grover, Karan; Kumaraguru, Ponnurangam (Advisor) (2017-04-18)
    In social psychology, a rumor is defined as a story or statement in general circulation without confirmation or certainty to facts. Rumors are known to arise in the context of ambiguity, when the meaning of a situation is ...
  • Rawat, Madhur; Chakravarty, Sambuddho (Advisor) (2017-06)
    Cyberwarfare remains a sparsely explored domain of cybersecurity research, most often involving targeted attacks by one nation against another, using botnets. These botnets use malware to launch various kinds of attacks ...
  • Dubey, Manisha; Goyal, Vikram (Advisor) (2016-09-15)
    Bloom’s Taxonomy is a framework which acts as a reference for classification of questions across different cognitive levels such as Knowledge, Comprehension, Application, Analysis, Synthesis, and Evaluation. It can be used ...
  • Vinayak (IIIT- Delhi, 2021-06)
    Clique counting is a well studied problem in low memory models like graph streaming. There are algorithms which provide good space complexity bounds for general graphs. For constant pass, approximation algorithms counting ...
  • Dhar, Aritra; Purandare, Rahul (Advisor) (2014-12-12)
    Programs are susceptible to malformed data coming from untrusted sources. Occasionally the programming logic or constructs used are inappropriate to handle all types of constraints that are imposed by legal and well-formed ...
  • Goel, Pulkit; Anand, Saket (Advisor); Fell, Alexander (Advisor) (IIITD-Delhi, 2019-04-28)
    Deep learning neural networks have revolutionized the elds of Computer Vision, Robotics, Artifi cial Intelligence. However, these State of the art algorithms come at a high computational cost, huge memory requirements and ...
  • Khan, Ruhma Mehek; Gupta, Ria; Shukla, Jainendra (Advisor); Bera, Aniket (Advisor) (IIIT-Delhi, 2021-12-14)
    Humans make use of gestures while interacting to enhance the effectiveness of their communication. With the increasing use of virtual agents and humanoid robots, researchers have been trying to make the virtual agents more ...
  • Khan, Ruhma Mehek; Gupta, Ria; Shukla, Jainendra (Advisor) (IIIT-Delhi, 2021-03-17)
    Humans make use of gestures while interacting to enhance the effectiveness of their communication. With the increasing use of humanoid robots and virtual agents, researchers have been trying to make the robots more human-like, ...
  • Malhotra, Hrithik; Purandare, Rahul (Advisor) (IIIT-Delhi, 2021-12)
    Code clones are duplicate code fragments that share (nearly) similar syntax or semantics. Code clone detection plays an important role in software maintenance, code refactoring, and reuse. Most of the techniques for code ...
  • Vinayakarao, Venkatesh; Purandare, Rahul (Advisor) (IIIT-Delhi, 2018-04)
    Code variants represent alternative implementations of a code snippet, where each alternative provides the same functionality, but has different properties that make some of them better suited to the overall project ...
  • Tanwar, Tanmay Prashansa; Gupta, Anubha (Advisor) (IIIT-Delhi, 2021-05)
    Working Memory is the small amount of information that is stored in the brain long enough for humans to use it. It is important in many cognitive functions and aids in problem solving. The Working memory task performance ...
  • Collab VR 
    Panchal, Dushyant; Kapur, Ishan; Parnami, Aman (Advisor) (IIIT-Delhi, 2022-05)
    Virtual 3D immersive collaborative systems for remote collaboration are on the rise due to the tough times of COVID 19, where people are forced to work remotely. However, it is a cumbersome task to explore and figure out ...

Search Repository


Advanced Search

Browse

My Account