IIIT-Delhi Institutional Repository

Browsing MTech Theses by Title

Browsing MTech Theses by Title

Sort by: Order: Results:

  • Gupta, Srishti; Kumaraguru, Ponnurangam (Advisor) (2013-12-03)
    The awareness and sense of privacy has increased in the minds of people over the past few years. Earlier, people were not very restrictive in sharing their personal information, but now they are more cautious in sharing ...
  • Singh, Mridula; Kaul, Sanjit Krishnan (2014-07-04)
    While the density of access points in enterprise settings has increased, the sharing of the spatial resource amongst links in 802:11 wireless local area networks remains ine cient. Conservative mechanisms based on a ...
  • Singh, Kartikey; Chakravarty, Sambuddho (Advisor) (IIIT-Delhi, 2022-07)
    In this work we highlight the evolution of Internet censorship within the largest democracy i.e., India. We first report a new form of Internet censorship i.e., mobile app blocking and describe in detail the mechanics ...
  • Yasvi, Maleeha Arif; Mutharaju, Vijaya Raghava (Advisor) (IIIT-Delhi, 2020-07)
    Ontologies evolve over time due to changes in the domain and the requirements of the application. Maintaining an ontology over time and keeping it up-to-date with respect to the changes in the domain and the requirements ...
  • Gupta, Akanksha; Mallik, Anupama (Advisor) (2015-12-02)
    Past decade has seen a prominent rise in the number of e-commerce applications in the World Wide Web. Designing recommendation algorithms for predicting user interests is quite challenging for such systems. Several ...
  • Sondhi, Devika; Singh, Pushpendra (Advisor) (2015-12-02)
    Sensors that come built in smartphones are extensively used by various apps and for analysis purpose. Some of these sensors, especially GPS and Microphone, are energy expensive. Hence, there is a need to use these judiciously. ...
  • Jain, Milan; Singh, Amarjeet (Advisor) (IIIT Delhi, 2014-09-05)
    Buildings account for a signi cant proportion of overall energy consumption across the world. Heating Ventilation and Air Conditioning (HVAC) typically consumes a major proportion (e.g. 32% in India) of the total building ...
  • Gupta, Nisha; Sureka, Ashish (Advisor) (2015-02-16)
    Process mining consists of extracting knowledge and actionable information from event-logs recorded by Process Aware Information Systems (PAIS). PAIS are vulnerable to system failures, malfunctions, fraudulent and ...
  • Reddy, Kompelly Harshavardhan; Goyal, Vikram (Advisor) (2015-12-03)
    Graphs have always been an interesting structure to study in both mathematics and computer science , and have become even more interesting in the context of online social networks, recommendation networks whose underlying ...
  • Aggarwal, Anupama; Kumaraguru, Ponnurangam (Advisor) (2013-10-11)
    With the advent of online social media, phishers have started using social networks like Twitter, Facebook, and Foursquare to spread phishing scams. Twitter is an immensely popular micro- blogging network where people ...
  • Tripathi, Shreya; Anand, Saket (Advisor) (2016-09-15)
    3D registration of scenes is a widely researched topic. Since the availability of low cost sensors like the Kinect RGB-D cameras, they are being extensively used for additional depth information about the scene. Most of ...
  • Fazili, Sehban; Akhtar, Md. Shad (Advisor) (IIIT-Delhi, 2023-05)
    Privacy policies are often lengthy and complex, hindering individual’s ability to make informed decisions about their data privacy. Abstractive summarization techniques can improve accessibility and transparency, but there ...
  • Deepika; Singh, Amarjeet (Advisor) (2014-11-14)
    Energy has become basis of human life today. Practically, we rely on energy for everything we do every single day. As a result, the rate of consumption of energy has increased manifold and thereby has become a global ...
  • Gupta, Kunal; Sureka, Ashish (Advisor) (2015-05-05)
    Process-Aware Information Systems (PAIS) support business processes and generate large amounts of event logs from the execution of business processes. An event log is represented as a tuple of CaseID, Timestamp, Activity and ...
  • Dawar, Siddharth; Goyal, Vikram (Advisor) (2014-07-10)
    The rapid increase in popularity of location-based services have resulted in huge amount of spatial textual data being generated by applications like Foursquare, Facebook Places, Flickr etc. The location-based services ...
  • Jindal, Arun Kumar; Naik, Vinayak (Advisor) (2013-07-15)
    Bring Your Own Device (BYOD) is an IT policy being adopted by corporate organizations worldwide. It permits the employees to bring their own devices like smartphones, tablets, etc to their place of work and use them to ...
  • Manjunath, R Sumesh; Sanadhya, Somitra Kumar (Advisor) (2013-06-10)
    Privacy of the message and authenticity of the sender in a secure communication is a challenging concern. Tradionally these two aims were achieved by using di erent cryptographic primitives: by using encryption for privacy ...
  • Shanu; Bera, Debajyoti (Advisor) (IIIT-Delhi, 2018-07)
    Distinguishing between unitary operators is one of the fundamental problems in the field of quantum computing. In the operator identification problem, we are given access to unknown operator U as a black-box that implements ...
  • Kashif, Mohammed; Arora, Chetan (Advisor) (2017-06)
    Question-Answering systems are becoming increasingly popular, especially after the advent of Machine Learning. Such systems can be used in a wide variety of applications ranging from Open domain question answering or closed ...
  • Anwer, Samit; Purandare, Rahul (Advisor) (2014-12-12)
    Every Android application runs in its own virtual machine, with its own Linux user account and corresponding permissions. Although this ensures that permissions are given as per each application’s requirements, each ...

Search Repository


Advanced Search

Browse

My Account