Technical Reports

 

Instructions to Publish IIIT-D Technical Reports:

Purpose

Technical reports are written to convey recent research development to the community. There are several purposes that are served by a technical report.

· Timely dissemination: Journals and conference proceedings may take a long time in reviewing the papers and publishing them online. Getting a technical report for the work provides a mechanism of providing a date to the unpublished ideas, research results and intellectual property.

· Availability: IIIT-D will always provide online link to technical reports that will be available to all in the open forum.

· Supplement material: Any supplement material can be submitted later and it will be available with the report in the form of additional/supplement with the original report. The date of submission for the supplement material will also be made available.

Policy

To ensure the integrity of these technical reports, there are certain policies that the institute will follow.

· The institute will keep a record of the technical reports and ensure proper backup and maintenance.

· Once a report is published, its contents cannot be modified.

· Request for publishing technical reports can only be made by faculty members.

· Since the institute does not perform review of the technical reports, the institute cannot guarantee that authors will not post material that violates a copyright. It is up to the individual submitting a technical report to ensure that to the best of his or her knowledge, the publication does not violate any copyright constraints. The author will be responsible for any questions that may arise due to the work and IIIT-D does not have responsibility.

· If there is a request for the report to be withdrawn, IIIT-D will permit it and not make it available on the web. However, the title of the report, authors and technical report number will be listed online along with the notification that the report is withdrawn.

Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission. This copyright is identical to the standard copyright notice currently used on ACM publications.

Procedure

The technical report (in pdf format) should be submitted to the IIIT-D Library (library@iiitd.ac.in). There is no prescribed format to submit the report but it is expected that the report should have broad arrangement as Motivation/Introduction, Method, Results, and Conclusion. The librarian will assign the technical report number as IIITD-TR-Year-Num (e.g. IIITD-TR-2010-001). The last three digits represent the number of technical reports received in that particular year.

Collections in this community

Recent Submissions

  • Gosain, Devashish; Agarwal, Anshika; Acharya, HB; Chakravarty, Sambuddho (2016-09-23)
    Decoy Routing, the use of routers (rather than end hosts) as proxies, is a new direction in anti-censorship research. However, existing proposals require control of hundreds of Autonomous Systems (AS) to provide Decoy ...
  • Agarwal, Anshika; Gosain, Devashish; Acharya, HB; Chakravarty, Sambuddho (2016-09-23)
    Censorship of the Internet by government is a hotly contested topic. Some nations lean more toward free speech; others are much more conservative. How feasible is it for a government to censor the Internet? What mechanisms ...
  • Rastogi, Ayushi; Nagappan, Nachiappan; Gousios, Georgios (2016-01-11)
    Open source development has often been considered to be a level playing field for all developers. But there has been little work to investigate if bias plays any role in getting contributions accepted. The work presented ...
  • Soubam, Sonia; Naik, Vinayak; Banerjee, Dipyaman; Chakraborty, Dipanjan (2015-10-26)
    Finding a parking spot in a busy indoor parking lot is a daunting task. Retracing a parked vehicle can be equally frustrating. We present BluePark, a collaborative sensing mechanism using smartphone sensors to solve these ...
  • Aggarwal, Deepanker; Kiehn, Astrid (2015-09-10)
    The well-known coordinated snapshot algorithm of mutable checkpointing [7{9] is studied. We equip it with a concise formal model and analyze its operational behavior via an invariant characterizing the snapshot computation. ...
  • Hemani, Rakhi; Banerjee, Subhasis; Guha, Apala (2015-05-19)
    Cache contention modeling is necessary for good resource utilization on commercial multicore processors. Our goal is to build cache contention models that are sensitive to changes in, 1) the micro-architecture, 2) ...
  • Chang, Donghoon; Ghosh, Mohona; Sanadhya, Somitra Kumar (2015-03-23)
    In this work, we revisit the security analysis of AES-128 instantiated hash modes. We use biclique cryptanalysis technique as our basis for the attack. The traditional biclique approach used for key recovery in AES (and ...
  • Goyal, Vikram; Dawar, Siddharth (2015-02-11)
    High-utility itemset mining is an emerging research area in the field of Data Mining. Several algorithms were proposed to find high- utility itemsets from transaction databases and use a data structure called UP-tree ...
  • Sankaran, Anush; Vatsa, Mayank; Singh, Richa (2015-01-27)
    Latent fingerprint comparison evidences are used in the court of law for more than 100 years. Manual matching of latent fingerprints is challenged by subjectivity and inconsistency in terms of results and is not scalable ...
  • Bharadwaj, Samarth; Vatsa, Mayank; Singh, Richa (2015-01-27)
    Quality is an attribute or a property of an item that quantitatively measures specific aspect or content. The definition and correct method of measurement of quality of a biometric modality that is usually represented by ...
  • Bhatt, Himanshu S; Singh, Richa; Vatsa, Mayank (2015-01-27)
    Face recognition has found several applications ranging from cross border security, surveillance, access control, multimedia to forensics. Face recognition under variations due to pose, illumination, and expression has ...
  • Chakravarty, Sambuddho; Naik, Vinayak; Acharya, HB; Tanwar, Chaitanya Singh (2015-01-23)
    Network censorship and surveillance generally involves ISPs working under the orders of repressive regimes, monitoring (and sometimes filtering) users’ traffic, often using powerful networking devices, e.g. routers ...
  • Verma, Robin; Gupta, Gaurav (2014-12-25)
    The use of digital technology in conventional as well as new age crimes is increasing throughout the world, and researchers are working to develop digital forensics techniques to investigate such crimes. Digital forensic ...
  • Gautam, Alvika; Naik, Vinayak; Gupta, Archie; Sharma, SK (2014-09-17)
    Sleep quantity affects an individual’s personal health. The gold standard of measuring sleep and diagnosing sleep disorders is Polysomnography (PSG). Although PSG is accurate, it is expensive and it lacks portability. ...
  • Hemani, Rakhi; Banerjee, Subhasis; Guha, Apala (2014-09-15)
    Simultaneous execution of multiple threads on multicores is necessary for good resource utilization. However, such utilization calls for accurate models to predict the impact on performance due to contention of shared ...
  • Mishra, Shreemoy (2014-07-16)
    I study the market for consumer information. Firms cannot commit to privacy, so buyers anticipate disclosure of purchase history for targeted pricing. In the literature, strategic rejections of informative o ers make ...
  • Bharadwaj, Samarth; Dhamecha, Tejas I; Vatsa, Mayank; Singh, Richa (2014-06-03)
    For robust face biometrics, a reliable anti-spoofing approach has become an essential pre-requisite against attacks. While spoofing attacks are possible with any biometric modality, face spoofing attacks are relatively ...
  • Asthana, Siddhartha; Singh, Pushpendra (2014-04-28)
    Dialing a telephone number of an organization and coming across an automated system attending the call, instead of a human, has become common. These automated applications are known as Interactive Voice Response (IVR) ...
  • Gupta, Shaifali; Garg, Rashi; Jain, Nikita; Naik, Vinayak; Kaul, Sanjit (2013-10-31)
    The rapid adoption of smartphones has engendered a large ecosystem of mobile data applications. In fact, a large part of mobile tra c is now data and not voice. Many of these applications, for example VoIP clients, stay ...
  • Yadav, Kuldeep; Kumar, Amit; Bharti, Aparna; Naik, Vinayak (2013-10-10)
    Location data collected from mobile phone users provide an ideal platform to generate human mobility patterns. These patterns give us insights into how people travel in their dayto- day lives.With availability of cellular ...

View more