IIIT-Delhi Institutional Repository

Browsing Technical Reports by Title

Browsing Technical Reports by Title

Sort by: Order: Results:

  • Lamba, Hemank; Dhamecha, Tejas I; Vatsa, Mayank; Singh, Richa (2012-03-26)
    Subclass discriminant analysis is found to be applicable under various scenarios. However, it is computationally very expensive to update the between-class and within-class scatter matrices. This research presents an ...
  • Hemani, Rakhi; Banerjee, Subhasis; Guha, Apala (2015-05-19)
    Cache contention modeling is necessary for good resource utilization on commercial multicore processors. Our goal is to build cache contention models that are sensitive to changes in, 1) the micro-architecture, 2) ...
  • Sankaran, Anush; Vatsa, Mayank; Singh, Richa (2015-01-27)
    Latent fingerprint comparison evidences are used in the court of law for more than 100 years. Manual matching of latent fingerprints is challenged by subjectivity and inconsistency in terms of results and is not scalable ...
  • Yadav, Kuldeep; Naik, Vinayak; Singh, Amarjeet; Singh, Pushpendra (2012-03-14)
    Location-aware applications are steadily gaining popularity across the world. However lack of GPS in low-end programmable phones (< $100) and general absence of Wi-Fi infrastructure in developing countries prevents users ...
  • Gosain, Devashish; Rawat, Madhur; Sharma, Piyush Kumar; Acharya, Hrishikesh Bhatt (IIIT-Delhi, 2020-01)
    National governments know the Internet as both a blessing and a headache. On the one hand, it unlocks great economic and strategic opportunity. On the other hand, government, military, or emergency-services become vulnerable ...
  • Bhardwaj, Abhishek; Arjunan, Pandarasamy; Singh, Amarjeet; Naik, Vinayak; Singh, Pushpendra (2012-03-26)
    Ubiquitous availability of cellular network and cheap mobile phones have made them promising sensing platforms for various application domains including healthcare, environment, and astronomy among others. However, ...
  • Bhatt, Himanshu S; Bharadwaj, Samarth; Singh, Richa; Vatsa, Mayank (2012-03-26)
    One of the important cues in solving crimes and apprehending criminals is matching sketches with digital face images. This paper presents an automated algorithm that extracts discriminating information from local regions ...
  • Yadav, Kuldeep; Naik, Vinayak; Singh, Amarjeet (2012-10-12)
    In developing countries, smartphones and high bandwidth connections are not yet within the reach of majority of the people. To share multimedia content among themselves, people rely on manual local sharing mechanisms i.e. ...
  • Sankaran, Anush; Vatsa, Mayank; Singh, Richa (2012-03-14)
    Simultaneous latent fingerprints are a cluster of latent fingerprints that are concurrently deposited by the same person. Though ACE-V methodology provides the scientific basis for matching latent fingerprints, extending ...
  • Verma, Robin; Gupta, Gaurav (2014-12-25)
    The use of digital technology in conventional as well as new age crimes is increasing throughout the world, and researchers are working to develop digital forensics techniques to investigate such crimes. Digital forensic ...
  • Bera, Debajyoti; Goyal, Vikram; Saxena, Anuj S. (2012-03-26)
    There are many results on the possibilities of privacy leak in location-based services, and many remedies have also been suggested. In this paper, we look at this problem from an altogether different perspective - ...
  • Gosain, Devashish; Agarwal, Anshika; Acharya, Hrishikesh Bhatt; Chakravarty, Sambuddho (2016-09-23)
    Decoy Routing, the use of routers (rather than end hosts) as proxies, is a new direction in anti-censorship research. However, existing proposals require control of hundreds of Autonomous Systems (AS) to provide Decoy ...
  • Bhatt, Himanshu S; Bharadwaj, Samarth; Singh, Richa; Vatsa, Mayank (2012-03-14)
    Widespread acceptability and use of biometrics for person authentication has instigated several techniques for evading identification. One such technique is altering facial appearance using surgical procedures that has ...
  • Sharma, Piyush Kumar; Chaudhary, Shashwat; Hassija, Nikhil; Maity, Mukulika; Chakravarty, Sambuddho (IIIT-Delhi, 2019)
    Anonymous VoIP calls over the Internet holds great significance for privacy-conscious users, whistle-blowers and political activists alike. Prior research deems popular anonymization systems like Tor unsuitable for providing ...
  • Panjwani, Saurabh; Ghosh, Mohona; Kumaraguru, Ponnurangam; Singh, Soumya Vardhan (2012-07-25)
    Mobile-based branchless banking has become a key mech- anism for enabling financial inclusion in the developing re- gions of the world. A fundamental requirement of all branch- less banking systems is a mechanism to ...
  • Gautam, Alvika; Naik, Vinayak; Gupta, Archie; Sharma, SK (2014-09-17)
    Sleep quantity affects an individual’s personal health. The gold standard of measuring sleep and diagnosing sleep disorders is Polysomnography (PSG). Although PSG is accurate, it is expensive and it lacks portability. ...
  • Nagaraja, Shishir; Houmansadr, Amir; Kumar, Vijit; Agarwal, Pragya; Borisov, Nikita (2012-03-26)
    We propose Stegobot, a new generation botnet that communicates over probabilistically unobservable communication channels. It is designed to spread via social malware attacks and steal information from its victims. ...
  • Yadav, Kuldeep; Malhotra, Anshu; Kumaraguru, Ponnurangam; Khurana, Rushil; Singh, Dipesh Kumar (2012-07-25)
    In developing countries, Short Messaging Service (SMS) is one of the most widely used and cheapest modes of commu- nication. Hence, this medium is often exploited by advertis- ing companies to reach masses. The unsolicited ...
  • Chakravarty, Sambuddho; Naik, Vinayak; Acharya, Hrishikesh Bhatt; Tanwar, Chaitanya Singh (2015-01-23)
    Network censorship and surveillance generally involves ISPs working under the orders of repressive regimes, monitoring (and sometimes filtering) users’ traffic, often using powerful networking devices, e.g. routers ...
  • Asthana, Siddhartha; Kumaraguru, Ponnurangam; Singh, Pushpendra; Singh, Amarjeet (2012-03-14)
    In developing regions, voice based telecommunication services are one of the most appropriate medium for information dissemination as they overcome prevalent low literacy rate and are more reachable than any other medium. ...

Search Repository


Advanced Search

Browse

My Account