Browsing by Title

Sort by: Order: Results:

  • Aggarwal, Priya; Gupta, Anubha (Advisor) (IIIT-Delhi, 2018-12)
    Human brain is a large scale complex network of different but functionally coupled brain regions. These functionally coupled brain regions together form functional brain networks (fBNs). Identification of these networks ...
  • Mongia, Shreyans (IIITD-Delhi, 2018-11-26)
    With the increase in the usage of the Internet, there has been an exponential increase in the content generated on various platforms of the Internet, e.g. websites, blogs, Online Social Media (OSM), etc. Due to this increase ...
  • Aggarwal, Deepanker; Kiehn, Astrid (2015-09-10)
    The well-known coordinated snapshot algorithm of mutable checkpointing [7{9] is studied. We equip it with a concise formal model and analyze its operational behavior via an invariant characterizing the snapshot computation. ...
  • Mukherjee, Arpan; Chakraborty, Tanmoy (Advisor) (IIIT-Delhi, 2018-06)
    Understanding how users behave when they connect to social networking sites creates opportunities for better interface design, more productive studies of social interactions, and improved design of content distribution ...
  • Gupta, Shaifali; Garg, Rashi; Jain, Nikita; Naik, Vinayak; Kaul, Sanjit (2013-10-31)
    The rapid adoption of smartphones has engendered a large ecosystem of mobile data applications. In fact, a large part of mobile tra c is now data and not voice. Many of these applications, for example VoIP clients, stay ...
  • Sinha, Sanchit; Agarwal, Mohit; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (IIITD-Delhi, 2019-04-26)
    Deforestation and loss of habitat have resulted in a rapid decline of certain species of primates in forests. On the other hand, the uncontrolled growth of a few species of primates in urban areas has led to safety issues ...
  • Cheema, Gullal Singh; Anand, Saket (Advisor) (2016-09-15)
    Mean shift is a non-parametric mode seeking procedure widely used in many computer vision problems. Mean shift clustering in particular is a well studied and established algorithm, which has many merits over the classic ...
  • Mukherjee, Rajdeep; Chakravarty, Sambuddho (Advisor) (2017)
    Peer-to-peer (P2P) file sharing accounts for one of the major sources of the Internet traffic. As privacy and anonymity issues continue to grow due to constant censorship and network surveillance, more and more Internet ...
  • Atal, Ritika; Sureka, Ashish (Advisor) (2015-07-20)
    Software Engineering (SE) being a practice-oriented and applied field is taught primarily (at University Level) using instructor-driven classroom lectures as well as team-based projects requiring hands-on skills. In ...
  • Juneja, Prerna; Sureka, Ashish (Advisor) (2015-03-11)
    Issue Tracking Systems (ITS) such as Bugzilla can be viewed as Process Aware Information Systems (PAIS) generating event-logs during the lifecycle of a bug report. Process Mining consists of mining event logs generated from ...
  • Khan, Biswadeep; Bera, Debajyoti (Advisor); Bagler, Ganesh (Advisor) (IIIT-Delhi, 2018-07)
    Where does a particular food gets its flavor from? A food item is a complex combination of (flavor) molecules, in different proportions, each having their own distinctive flavors. This thesis takes a small step towards ...
  • Gupta, Priyanka; Sethi, Tavpritesh (Advisor); Goyal, Vikram (Advisor) (2017-07)
    Data analytics is not embedded into critical environments such as Intensive Care Unit. It is now realized that there is an untapped potential of Big-data in improving patient care. However, this is not taken into practice ...
  • Bharath, K; Fell, Alexander (Advisor) (2016-12)
    With the advancement in technology nodes, the number of components operating in different clock domains on System on Chip (SoC) increases. To support the processing of data between these components, the demand of an ...
  • Kumar, Ashish; Sanadhya, Somitra Kumar (2012-03-14)
    Many RFID protocols use cryptographic hash functions for their security. The resource constrained nature of RFID systems forces the use of light weight cryptographic algorithms. Tav-128 is one such light weight hash ...
  • Rathee, Gaurav; Pandey, Jalaj; Akhtar, Mohammad Hammad; Sharma, Ojaswa (Advisor) (2017-04-18)
    Usually in new places sign boards are used to provide directions or infrastructural information, this approach is quite rudimentary and limited. These boards can provide us with fixed and limited information and require ...
  • Jain, Paridhi; Kumaraguru, Ponnurangam (Advisor) (2016-04-28)
    Today, more than two hundred Online Social Networks (OSNs) exist where each OSN extends to offer distinct services to its users such as eased access to news or better business opportunities. To enjoy each distinct service, ...
  • Asthana, Siddhartha; Singh, Pushpendra (2014-04-28)
    Dialing a telephone number of an organization and coming across an automated system attending the call, instead of a human, has become common. These automated applications are known as Interactive Voice Response (IVR) ...
  • Kumar, K K Praveen; Fell, Alexander (Advisor) (2016-10-05)
    Achieving optimal floor-plans during the physical synthesis flow is an iterative and resource intensive process and its quality has a significant impact on subsequent synthesis stages in terms of runtime and quality of ...
  • Mishra, Akanksha; Sureka, Ashish (Advisor) (2015-08-24)
    Business Process and Model Notation (BPMN) is a graphical model of business processes and Semantic of Business Vocabulary and Business Rules (SBVR) provide business rules corresponding to that business process. Though both ...
  • Chang, Donghoon; Ghosh, Mohona; Sanadhya, Somitra Kumar (2013-05-31)
    Biclique cryptanalysis was proposed by Bogdanov et al. in Asiacrypt 2011 as a new tool for cryptanalysis of block ciphers. A major hurdle in carrying out biclique cryptanalysis is that it has a very high query complexity ...

Search Repository

Browse

My Account