Browsing by Title

Sort by: Order: Results:

  • Gosain, Devashish; Agarwal, Anshika; Acharya, Hrishikesh Bhatt; Chakravarty, Sambuddho (2016-09-23)
    Decoy Routing, the use of routers (rather than end hosts) as proxies, is a new direction in anti-censorship research. However, existing proposals require control of hundreds of Autonomous Systems (AS) to provide Decoy ...
  • Shanu; Bera, Debajyoti (Advisor) (IIIT-Delhi, 2018-07)
    Distinguishing between unitary operators is one of the fundamental problems in the field of quantum computing. In the operator identification problem, we are given access to unknown operator U as a black-box that implements ...
  • Gosain, Devashish; Chakravarty, Sambuddho (Advisor) (IIIT-Delhi, 2020-07)
    The original design of the Internet was a resilient, distributed architecture, that should be able to route around (and therefore recover from) massive disruption — up to and including nuclear war. However, network routing ...
  • Kashif, Mohammed; Arora, Chetan (Advisor) (2017-06)
    Question-Answering systems are becoming increasingly popular, especially after the advent of Machine Learning. Such systems can be used in a wide variety of applications ranging from Open domain question answering or closed ...
  • Anwer, Samit; Purandare, Rahul (Advisor) (2014-12-12)
    Every Android application runs in its own virtual machine, with its own Linux user account and corresponding permissions. Although this ensures that permissions are given as per each application’s requirements, each ...
  • Badri, M.; Raman, Rajiv (Advisor); Ram, Shobha Sundar (Advisor) (IIIT- Delhi, 2021-05)
    This work aims at interference mitigation in recently booming automotive radar networks, via careful beam forming techniques based on Geometric Algorithms and Optimizations. We first thoroughly explore a relatively simple ...
  • Sharma, Rachesh; Majumdar, Angshul (Advisor); Kumar, Vibhor (Advisor) (IIIT-Delhi, 2019-04)
    A human body has billions of cells specialized with their own function and each cell carries genome in its nucleus. The activity of the genome is controlled by a multitude of molecular complexes called as epigenome. Previously ...
  • Vasisth, Aditya; Hashmi, Mohammad S. (Advisor); Jain, Abhishek (Advisor) (2015-12-05)
    Moving towards deep submicron technologies, consideration for design margin will increase. In these technologies, process variation will increase the requirements of design margins. Lower supply voltage and higher clock ...
  • Chaudhary, Shashwat; Hassija, Nikhil; Chakravarty, Sambuddho (Advisor) (IIITD-Delhi, 2019-04-26)
    Anonymous censorship-resistant communication systems are primarily designed keeping in mind semi real-time traffic such as web browsing. One such system, Tor [1], has gained prominence as the de-facto anonymity preserving ...
  • Pandey, Yogesh; Goyal, Vikram (Advisor) (IIIT-Delhi, 2019-12)
    Congestion is one of the biggest problems which affects life quality and has an impact on social and economic conditions. Tackling traffic congestion has always been a challenge. The situation is more aggravated for ...
  • Acharya B, Srikrishna; Sujit, PB (Advisor) (2014-07-10)
    Physics simulation o ers the option of truly receptive and realistic animation. Although wide ac- ceptance of physics simulation for the animation, commercial applications still relies on kinematics- based approaches for ...
  • Banerjee, Saptak; Saurabh, Sneh (Advisor) (IIIT-Delhi, 2018-07)
    In this thesis, a single Double-Gate Tunnel Field-Effect Transistor (DGTFET) is proposed to realize the AND functionality. Using two-dimensional device simulations, it is shown that a single DGTFET can realize logic ...
  • Bansal, Palash; Sharma, Ojaswa (Advisor) (IIITD-Delhi, 2018-11-26)
    The goal of this BTP is starting a venture by taking RealVol of as a technology company that strives to improve the best in class visualization of medical scans for better learning and diagnostics and to finally provide ...
  • Kochar, Komal; Sanadhya, Somitra Kumar (Advisor) (2012-07-25)
    Cryptographic hash Functions are widely used for a wide range of applications such as au- thentication of information, digital signatures and protection of pass-phrases. In the last few years, the cryptanalysis of hash ...
  • Bhatt, Himanshu S; Bharadwaj, Samarth; Singh, Richa; Vatsa, Mayank (2012-03-14)
    Widespread acceptability and use of biometrics for person authentication has instigated several techniques for evading identification. One such technique is altering facial appearance using surgical procedures that has ...
  • Bhattacharyya, Pramit; Mutharaju, Vijaya Raghava (Advisor) (2020-07)
    Building an ontology is not only a time-consuming process, but it is also confusing, especially for beginners and the inexperienced. Although ontology developers can take the help of domain experts in building an ontology, ...
  • Santosh, Siripurapu Venkata Sai; Darak, Sumit J. (Adviosr) (IIIT- Delhi, 2020-12)
    Multi-armed bandit (MAB) algorithms are designed to identify the best arm among several arms in an unknown environment. They guarantee optimal balance between exploration (select all arms sufficient number of times) and ...
  • Gangopadhyay, Rahul; Shannigrahi, Saswata (Advisor); Sharma, Anuradha (Advisor) (IIIT-Delhi, 2020-01)
    In this thesis, we study the d-dimensional rectilinear drawings of d-uniform hypergraphs in which each hyperedge contains exactly d vertices. A d-dimensional rectilinear drawing of a d-uniform hypergraph is a drawing of ...
  • Bagga, Shaurya; Shah, Rajiv Ratn (Advisor) (2021-03)
    A lot of people are learning English around the world and take assessments every year. With the rise of candidates taking these assessments and the shortage of qualified experts rating these assessments, there is a need ...
  • Kaur, Guntaas; Ram, Shobha Sundar (Advisor) (IIIT-Delhi, 2017-12)
    There has been a growing interest in building through-the-wall radars (TWR) for law enforcement, security and biomedical applications for tracking humans in urban environments. Designing the antennas for such systems is a ...

Search Repository

Browse

My Account