IIIT-Delhi Institutional Repository
Search
Login
Home
→
Computer Science and Engineering
→
Technical Reports
→
Search
JavaScript is disabled for your browser. Some features of this site may not work without it.
Search
Filters
Use filters to refine the search results.
Current Filters:
Title
Author
Subject
Date issued
Contains
Equals
ID
Not Contains
Not Equals
Not ID
New Filters:
Title
Author
Subject
Date issued
Contains
Equals
ID
Not Contains
Not Equals
Not ID
Showing 6 out of a total of 6 results for community: Technical Reports.
(0.295 seconds)
Now showing items 1-6 of 6
1
Sort Options:
Relevance
Title Asc
Title Desc
Issue Date Asc
Issue Date Desc
Results Per Page:
5
10
20
40
60
80
100
Perception of data privacy in digital forensic investigation
Verma, Robin
;
Gupta, Gaurav
(
2014-12-25
)
Consumer privacy and targeted pricing with stochastic valuations
Mishra, Shreemoy
(
2014-07-16
)
An smartphone-based algorithm to measure and model quantity of sleep
Gautam, Alvika
;
Naik, Vinayak
;
Gupta, Archie
;
Sharma, SK
(
2014-09-17
)
ACCORD : an analytical cache contention model using reuse distances for modern multiprocessors
Hemani, Rakhi
;
Banerjee, Subhasis
;
Guha, Apala
(
2014-09-15
)
Automated testing of interactive voice response applications
Asthana, Siddhartha
;
Singh, Pushpendra
(
2014-04-28
)
Face anti-spoofing via motion magnification and multifeature videolet aggregation
Bharadwaj, Samarth
;
Dhamecha, Tejas I
;
Vatsa, Mayank
;
Singh, Richa
(
2014-06-03
)
Now showing items 1-6 of 6
1
Sort Options:
Relevance
Title Asc
Title Desc
Issue Date Asc
Issue Date Desc
Results Per Page:
5
10
20
40
60
80
100
Browse
All of Repository
Communities & Collections
By Issue Date
Authors
Titles
Subjects
This Community
By Issue Date
Authors
Titles
Subjects
My Account
Login
Register
Discover
Author
Asthana, Siddhartha (1)
Banerjee, Subhasis (1)
Bharadwaj, Samarth (1)
Dhamecha, Tejas I (1)
Gautam, Alvika (1)
Guha, Apala (1)
Gupta, Archie (1)
Gupta, Gaurav (1)
Hemani, Rakhi (1)
Mishra, Shreemoy (1)
... View More
Subject
ACCORD model (1)
Anti-spoofing (1)
Consumer Privacy (1)
Data Privacy (1)
Digital Forensic Investigation (1)
Emulators (1)
Face recognition (1)
IVR (1)
LRU model (1)
Mobile Sensing (1)
... View More
Date Issued
2014 (6)