IIIT-Delhi Institutional Repository

Browsing Computer Science and Engineering by Title

Browsing Computer Science and Engineering by Title

Sort by: Order: Results:

  • Sureka, Ashish (2012-03-26)
    Research shows that cyber-hate, illegal or malicious form of cyber-protest and cyber-activism in online social media and Web 2.0 platforms has become a common phenomenon. This is a growing concern and hence automated ...
  • Agarwal, Nidhi; Sharma, Ojaswa (Advisor) (2015-12-02)
    In this thesis work, we propose an algorithm for smooth 3D object reconstruction from un- organized planar cross sections. We address the problem in its full generality, and show its e ectiveness on sparse set of cutting ...
  • Pulkit; Attri, Mayank; Ruhela, Sahil; Khushalani, Manohar (Advisor) (IIIT-Delhi, 2017-04-29)
    The goal of our BTP is to make realistic looking residential society having 3D models of villas, apartments including the interior designing of the villas and apartments. Last Semester we made the autocad files of the ...
  • Hemani, Rakhi; Banerjee, Subhasis; Guha, Apala (2014-09-15)
    Simultaneous execution of multiple threads on multicores is necessary for good resource utilization. However, such utilization calls for accurate models to predict the impact on performance due to contention of shared ...
  • Verma, Sagar; Arora, Chetan (Advisor) (2017-07)
    With an increase in usage and availability of wearable devices like GoPro, Microsoft Hololens, Google Glass, etc, egocentric video analysis has become essential. An interesting application is action recognition in egocentric ...
  • Srivatsav, Deepak Magesh; Anand, Saket (Advisor) (IIIT-Delhi, 2020-05-30)
    Wildlife monitoring and tracking are vital for the preservation of various wildlife species. Activities such as poaching and loss of habitat have made wildlife monitoring and tracking increasingly tricky. Modern-day ...
  • Banerjee, Shisagnee; Majumdar, Angshul (Advisor) (2016-09-15)
    In the following three chapters of my thesis, I have applied several methods to solve the coldstart problem in Recommender Systems. The coldstart problem is the situation where a user or item is new to a website and ...
  • Goel, Akhil; Singh, Anirudh; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIITD-Delhi, 2019-04-30)
    Extensive research on attacks on deep learning models has shown that these models are not as robust as they seem. A carefully designed low magnitude perturbation is enough to cause havoc and completely confuse the model. ...
  • Gupta, Arushi; Sethi, Tavpritesh (Advisor) (IIIT- Delhi, 2021-05)
    The healthcare system is overburdened. There are just 1.34 doctors per 1000 patients in India. Intensive Care imposes the highest burden on healthcare systems all across the globe. A significant fraction of lives lost and ...
  • Agarwal, Aman; Jain, Atulya; Kogta, Saloni; Naik, Vinayak (Advisor) (2017-04-18)
    Delhi has been ranked the most polluted city in the world. The air quality has been reported to be far above the safe limits. Our project aims to bring forth insights into the aspects that affect the quality of the air. ...
  • Saini, Kunal; Subramanyam, A V (Advisor) (IIIT-Delhi, 2018-04-18)
    Visual tracking and person re-identification has gathered a lot of attention in computer vision due to its challenging nature and importance in surveillance applications. In this work, we explore the on-board visual tracking ...
  • Singhal, Sonali; Pandey, Tanisha; Kumaraguru, Ponnurangam (Advisor); Shah, Rajiv Ratn (Advisor) (IIIT- Delhi, 2020-05)
    The COVID19 pandemic, a public health emergency which broke out globally in December 2019 and is still going on, has put us all into an unprecedented situation where there are strict limitations on physical social interaction ...
  • Aneja, Joy; Singh, Pushpendra (Advisor) (2016)
    The wide deployment of IEEE 802.11 Wireless LAN in offices, colleges and other organizations makes it a prime solution for indoor localization. Wireless access point awareness and its small cell size helps in localizing ...
  • Agarwal, Mallika; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (2017-04-18)
    Recognizing people with their face has received a lot of attention from the research community. However, face recognition for newborns is in a nascent stage. The need for effective identification of newborns has been rising ...
  • Aggarwal, Gaurav; Shah, Rajiv Ratn (Advisor) (IIIT- Delhi, 2021-05)
    This study focuses on understanding content and coherence for Automated Oral Proficiency Scoring and Feedback Generating System in the context of spontaneous speech of non-native(L2) English learners. We aim to understand ...
  • Ghosh, Mohona; Sanadhya, Somitra Kumar (Advisor); Chang, Donghoon (Advisor) (2016-04-18)
    Cryptographic protocols have been a cornerstone of secure communications among armed forces and diplomatic missions since time immemorial. With easy availability and low cost of computing facilities and Internet, the domain ...
  • Mongia, Shreyans (IIITD-Delhi, 2018-11-26)
    With the increase in the usage of the Internet, there has been an exponential increase in the content generated on various platforms of the Internet, e.g. websites, blogs, Online Social Media (OSM), etc. Due to this increase ...
  • Aggarwal, Deepanker; Kiehn, Astrid (2015-09-10)
    The well-known coordinated snapshot algorithm of mutable checkpointing [7{9] is studied. We equip it with a concise formal model and analyze its operational behavior via an invariant characterizing the snapshot computation. ...
  • Mukherjee, Arpan; Chakraborty, Tanmoy (Advisor) (IIIT-Delhi, 2018-06)
    Understanding how users behave when they connect to social networking sites creates opportunities for better interface design, more productive studies of social interactions, and improved design of content distribution ...
  • Gupta, Shaifali; Garg, Rashi; Jain, Nikita; Naik, Vinayak; Kaul, Sanjit Krishnan (2013-10-31)
    The rapid adoption of smartphones has engendered a large ecosystem of mobile data applications. In fact, a large part of mobile tra c is now data and not voice. Many of these applications, for example VoIP clients, stay ...

Search Repository


Advanced Search

Browse

My Account