IIIT-Delhi Institutional Repository

Browsing Computer Science and Engineering by Title

Browsing Computer Science and Engineering by Title

Sort by: Order: Results:

  • Khan, Ruhma Mehek; Gupta, Ria; Shukla, Jainendra (Advisor); Bera, Aniket (Advisor) (IIIT-Delhi, 2021-12-14)
    Humans make use of gestures while interacting to enhance the effectiveness of their communication. With the increasing use of virtual agents and humanoid robots, researchers have been trying to make the virtual agents more ...
  • Khan, Ruhma Mehek; Gupta, Ria; Shukla, Jainendra (Advisor) (IIIT-Delhi, 2021-03-17)
    Humans make use of gestures while interacting to enhance the effectiveness of their communication. With the increasing use of humanoid robots and virtual agents, researchers have been trying to make the robots more human-like, ...
  • Malhotra, Hrithik; Purandare, Rahul (Advisor) (IIIT-Delhi, 2021-12)
    Code clones are duplicate code fragments that share (nearly) similar syntax or semantics. Code clone detection plays an important role in software maintenance, code refactoring, and reuse. Most of the techniques for code ...
  • Vinayakarao, Venkatesh; Purandare, Rahul (Advisor) (IIIT-Delhi, 2018-04)
    Code variants represent alternative implementations of a code snippet, where each alternative provides the same functionality, but has different properties that make some of them better suited to the overall project ...
  • Tanwar, Tanmay Prashansa; Gupta, Anubha (Advisor) (IIIT-Delhi, 2021-05)
    Working Memory is the small amount of information that is stored in the brain long enough for humans to use it. It is important in many cognitive functions and aids in problem solving. The Working memory task performance ...
  • Collab VR 
    Panchal, Dushyant; Kapur, Ishan; Parnami, Aman (Advisor) (IIIT-Delhi, 2022-05)
    Virtual 3D immersive collaborative systems for remote collaboration are on the rise due to the tough times of COVID 19, where people are forced to work remotely. However, it is a cumbersome task to explore and figure out ...
  • Goel, Mansi; Garcia, David (Advisor); Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2017-11-16)
    In online social networks, users may choose to keep a lot of important information in the private domain. Users may choose to hide their location, gender, interests, and affiliations. With usage of social networks and ...
  • Anderson, Nihesh; Arora, Kushagra; Raman, Rajiv (Advisor); Das, Syamantak (Advisor) (IIITD-Delhi, 2019-04-15)
    Given a metric space X, a set of clients C X, and a set of facilities F X, such that X = F S C. the fault-tolerant k-median problem (FTM) requires to open k facilities in F so as to minimize the sum of distances from each ...
  • Lahiri, Shayan; Sujit, PB (Advisor) (2015-12-02)
    Robots have been successfully deployed during natural disasters to perform remote search and rescue missions. These robots are tasked under human operator supervision. For remote operations, network connectivity is ...
  • Agrawal, Chaitanya; Das, Syamantak (Advisor); Chakraborty, Tanmoy (Advisor) (IIIT-Delhi, 2019-11-15)
    We are trying to devise a community detection algorithm for networks through modularity maximization. In this semester we further studied and understood the modularity function. We have explored semi-supervised active ...
  • Khatri, Sagar; Goyal, Vikram (Advisor) (2017)
    We study two measures namely maximal information coefficient (MIC) and distance correlation (dCor) for the application anomaly detection. MIC is based on the concept of information theory and measures the mutual information ...
  • Sharma, Soumya; Naik, Vinayak (Advisor) (2016-11-17)
    With multiple mobile applications for a single function in the market, there is a need to look into the resources the application utilizes as well. In this study, we focus on which resources a particular mobile application ...
  • S, Tharun; Akhtar, Md. Shad (Advisor); Chakraborty, Tanmoy (Advisor) (IIIT-Delhi, 2022-05)
    Being a popular mode of text-based communication in multilingual communities, code-mixing in online social media has became an important subject to study. Learn- ing the semantics and morphology of code-mixed language ...
  • Raj, Yash; Bagler, Ganesh (Advisor) (IIIT-Delhi, 2023-06)
    Visual artwork is among the most salient forms of human expression. From prehistoric cave paintings to Renaissance and modern art, paintings have been a powerful medium for expressing emotions. With the advent of computing ...
  • Rana, Anurag; Singh, Pushpendra (Advisor) (2015-12-03)
    Telephones have high reach both in developed and developing countries that have made it a preferred tool for collecting and disseminating information. Voice based information collection systems o ffers data collection ...
  • Aggrawal, Palash; Anand, Saket (Advisor) (IIIT-Delhi, 2020)
    Monitoring of protected areas to curb illegal activities like poaching and animal trafficking is a monumental task. To augment existing manual patrolling efforts, unmanned aerial surveillance using visible and thermal ...
  • Saxena, Simran; Kumaraguru, Ponnurangam (Advisor); Dubey, Alpana (Advisor); Buduru, Arun Balaji (Advisor); Sachdeva, Niharika (Advisor) (IIIT-Delhi, 2018-04)
    Crowdsourcing is the practice of getting information or input for a task or project from a number of people by floating out the task at hand to a pool of people who are usually not full-time employees. Use of Crowdsourcing ...
  • Mishra, Shreemoy (2014-07-16)
    I study the market for consumer information. Firms cannot commit to privacy, so buyers anticipate disclosure of purchase history for targeted pricing. In the literature, strategic rejections of informative o ers make ...
  • Agarwal, Vani; Buduru, Arun Balaji (Advisor); Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2019-05)
    Social media systems provide a platform for users to freely express their thoughts and opinions. Although this property represents incredible and unique communication opportunities, it also brings along important challenges. ...
  • Correa, Denzil; Sureka, Ashish (Advisor) (2014-12-24)
    There has been a proliferation of Web 2.0 sites on the Internet. Contemporary Web 2.0 sites like Facebook and Twitter are primarily driven by user generated content (UGC). On the other hand, the volume of content by such ...

Search Repository


Advanced Search

Browse

My Account