Browsing by Title

Sort by: Order: Results:

  • Gosain, Devashish; Agarwal, Anshika; Acharya, HB; Chakravarty, Sambuddho (2016-09-23)
    Decoy Routing, the use of routers (rather than end hosts) as proxies, is a new direction in anti-censorship research. However, existing proposals require control of hundreds of Autonomous Systems (AS) to provide Decoy ...
  • Shanu; Bera, Debajyoti (Advisor) (IIIT-Delhi, 2018-07)
    Distinguishing between unitary operators is one of the fundamental problems in the field of quantum computing. In the operator identification problem, we are given access to unknown operator U as a black-box that implements ...
  • Kashif, Mohammed; Arora, Chetan (Advisor) (2017-06)
    Question-Answering systems are becoming increasingly popular, especially after the advent of Machine Learning. Such systems can be used in a wide variety of applications ranging from Open domain question answering or closed ...
  • Anwer, Samit; Purandare, Rahul (Advisor) (2014-12-12)
    Every Android application runs in its own virtual machine, with its own Linux user account and corresponding permissions. Although this ensures that permissions are given as per each application’s requirements, each ...
  • Sharma, Rachesh; Majumdar, Angshul (Advisor); Kumar, Vibhor (Advisor) (IIIT-Delhi, 2019-04)
    A human body has billions of cells specialized with their own function and each cell carries genome in its nucleus. The activity of the genome is controlled by a multitude of molecular complexes called as epigenome. Previously ...
  • Vasisth, Aditya; Hashmi, Mohammad S. (Advisor); Jain, Abhishek (Advisor) (2015-12-05)
    Moving towards deep submicron technologies, consideration for design margin will increase. In these technologies, process variation will increase the requirements of design margins. Lower supply voltage and higher clock ...
  • Chaudhary, Shashwat; Hassija, Nikhil; Chakravarty, Sambuddho (Advisor) (IIITD-Delhi, 2019-04-26)
    Anonymous censorship-resistant communication systems are primarily designed keeping in mind semi real-time traffic such as web browsing. One such system, Tor [1], has gained prominence as the de-facto anonymity preserving ...
  • Acharya B, Srikrishna; Sujit, PB (Advisor) (2014-07-10)
    Physics simulation o ers the option of truly receptive and realistic animation. Although wide ac- ceptance of physics simulation for the animation, commercial applications still relies on kinematics- based approaches for ...
  • Banerjee, Saptak; Saurabh, Sneh (Advisor) (IIIT-Delhi, 2018-07)
    In this thesis, a single Double-Gate Tunnel Field-Effect Transistor (DGTFET) is proposed to realize the AND functionality. Using two-dimensional device simulations, it is shown that a single DGTFET can realize logic ...
  • Bansal, Palash; Sharma, Ojaswa (Advisor) (IIITD-Delhi, 2018-11-26)
    The goal of this BTP is starting a venture by taking RealVol of as a technology company that strives to improve the best in class visualization of medical scans for better learning and diagnostics and to finally provide ...
  • Kochar, Komal; Sanadhya, Somitra Kumar (Advisor) (2012-07-25)
    Cryptographic hash Functions are widely used for a wide range of applications such as au- thentication of information, digital signatures and protection of pass-phrases. In the last few years, the cryptanalysis of hash ...
  • Bhatt, Himanshu S; Bharadwaj, Samarth; Singh, Richa; Vatsa, Mayank (2012-03-14)
    Widespread acceptability and use of biometrics for person authentication has instigated several techniques for evading identification. One such technique is altering facial appearance using surgical procedures that has ...
  • Gangopadhyay, Rahul; Shannigrahi, Saswata (advisor); Sharma, Anuradha (advisor) (IIIT-Delhi, 2020-01)
    In this thesis, we study the d-dimensional rectilinear drawings of d-uniform hypergraphs in which each hyperedge contains exactly d vertices. A d-dimensional rectilinear drawing of a d-uniform hypergraph is a drawing of ...
  • Kaur, Guntaas; Sundar Ram, Shobha (Advisor) (IIIT-Delhi, 2017-12)
    There has been a growing interest in building through-the-wall radars (TWR) for law enforcement, security and biomedical applications for tracking humans in urban environments. Designing the antennas for such systems is a ...
  • Gupta, Kavya; Majumdar, Angshul (Advisor) (2016-11-09)
    Autoencoders are Neural Networks trained in order to map input to its output. Autoencoders are designed to enable the network to copy input to output as close as possible. Following this, the network will be able to learn ...
  • Pal, Mayank Kumar; Kaul, Sanjit K. (Advisor); Anand, Saket (Advisor) (IIITD-Delhi, 2018-11-23)
    We addressed the problem of jointly selecting communications and vehicular planning strategies with the goal of optimizing the driving utility like the speed of the car. Much related work assumes the communications channels ...
  • Thukral, Deepak; Goyal, Vikram (Advisor); Chakraborty, Tanmoy (Advisor) (IIIT-Delhi, 2018-04-18)
    Automatic estimation of relative difficulty of a pair of questions is an important and challenging problem in community question answering (CQA) services. There are limited studies which addressed this problem. Past studies ...
  • Pandey, Adesh; Thukral, Deepak; Gupta, Rishabh; Goyal, Vikram (Advisor); Chakraborty, Tanmoy (Advisor) (IIIT-Delhi, 2017-11-16)
    Given a question on a crowd sourced Q&A platform, we tried to gauge the difficulty of the question. Earlier, we tried various NLP based techniques for this purpose. Now, we tried various graph models in order to model ...
  • Rout, Sidhartha Sankar; Deb, Sujay (Advisor) (2014-07-10)
    The growing technology scaling and larger die size of multi-processor System-on-Chip (SoC) have increased the error rates for on-chip memories. Increased system speed for high performance, aggressive voltage scaling for ...
  • Raj, Ankita; Biyani, Pravesh (Advisor) (2016-09-13)
    This thesis addresses resource allocation problems in two different domains: G.fast and Wi-Fi. One of the key challenges in G.fast is to minimize power consumption at the distribution points. G.fast standards define ...

Search Repository

Browse

My Account