Year-2016

 

Recent Submissions

  • Kochanthara, Sangeeth; Purandare, Rahul (Advisor) (2016-11-01)
    Real-time systems are becoming more complex and open, thus increasing their development and verification costs. Although several static verification tools have been proposed over the last decades, they suffer from scalability ...
  • Sharma, Veronica; Goyal, Vikram (Advisor) (2016-10-25)
    High Utility Itemset Mining (HUIM) has gained significant progress in recent years. The HUIM refers to the method of finding most relevant itemsets from a database and it finds its applications in the domain of senosor ...
  • Aneja, Joy; Singh, Pushpendra (Advisor) (2016)
    The wide deployment of IEEE 802.11 Wireless LAN in offices, colleges and other organizations makes it a prime solution for indoor localization. Wireless access point awareness and its small cell size helps in localizing ...
  • Chowdhury, Anurag; Vatsa, Mayank (Advisor) (2016-09-20)
    Biometric analysis of surveillance videos carries inherent challenges in form of variations in pose, distance, illumination and expression. To address these variations, different methodologies are proposed, including ...
  • Hasan, Munawar; Sanadhya, Somitra Kumar (Advisor) (2016-09-20)
  • Agarwal, Anshika; Chakravarty, Sambuddho (Advisor) (2016-09-15)
    Censorship of the Internet by government is a hotly contested topic. Some nations lean more towards free speech; others are much more conservative. How feasible is it for a government to censor the Internet? What mechanisms ...
  • Banerjee, Ruchika; Naik, Vinayak (Advisor) (2016-09-15)
    Wide proliferation of smart mobile phones has manifolded the bandwidth demand, as video streaming applications have significantly gained popularity. At the same time, technical challenges, such as requirements of resources, ...
  • Cheema, Gullal Singh; Anand, Saket (Advisor) (2016-09-15)
    Mean shift is a non-parametric mode seeking procedure widely used in many computer vision problems. Mean shift clustering in particular is a well studied and established algorithm, which has many merits over the classic ...
  • Srivastava, Shubham; Bera, Debajyoti (Advisor) (2016-09-15)
    The primary aim of any survey is to facilitate analysis of sensitive data to extract useful information, without jeopardizing privacy of the participants. Privacy models like k-anonymity do not guarantee privacy against ...
  • Tripathi, Shreya; Anand, Saket (Advisor) (2016-09-15)
    3D registration of scenes is a widely researched topic. Since the availability of low cost sensors like the Kinect RGB-D cameras, they are being extensively used for additional depth information about the scene. Most of ...
  • Banerjee, Shisagnee; Majumdar, Angshul (Advisor) (2016-09-15)
    In the following three chapters of my thesis, I have applied several methods to solve the coldstart problem in Recommender Systems. The coldstart problem is the situation where a user or item is new to a website and ...
  • Dubey, Manisha; Goyal, Vikram (Advisor) (2016-09-15)
    Bloom’s Taxonomy is a framework which acts as a reference for classification of questions across different cognitive levels such as Knowledge, Comprehension, Application, Analysis, Synthesis, and Evaluation. It can be used ...
  • Prasoon; Arora, Chetan (Advisor) (2016-09-13)
    Several tasks in computer vision and Machine Learning are modeled as MRF-MAP inference problems. The problem can often be modeled as minimizing sum of submodular functions. Since, sum of submodular functions (SoS) is also ...
  • Agrawal, Navin; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (2016-09-13)
    Gender classification is used in applications as a soft feature or attribute in biometrics to help identify people. Using gender classification as an indexing technique can boost the performance of facial-biometric. If the ...
  • Mittal, Yesha; Naik, Vinayak (Advisor); Gunturi, Venkata M. Viswanath (Advisor) (2016-09-13)
    We present an algorithm which suggests suitable locations for taxi stands on a city map. This is done using pickup locations information gathered from GPS devices installed on taxis. We aim at finding locations where taxi ...
  • Yadav, Shivangi; Vatsa, Mayank (Advisor) (2016-09-13)
    Face recognition is an important area of research due to its requirement in our day-to-day life, be it surveillance or authentication. Current advancements in technology and computational power have shown promising results ...
  • Mahajan, Sahil; Raman, Rajiv (Advisor) (2016-09-13)
    In guillotine cut problem, we are given non-intersecting convex sets in the plane and we are allowed straight line cuts. If a cut passes through an object, it kills that object. Can one always save a constant fraction or ...
  • Vij, Megha; Naik, Vinayak (Advisor); Gunturi, Venkata M. Viswanath (Advisor) (2016-07-18)
    We look at the problem of using accelerometer in smartphones to detect whether the user is at a metro train station or in a metro train. Currently, we have solutions to detect simple activities, such as sitting or walking. ...