Browsing by Title

Sort by: Order: Results:

  • Kochanthara, Sangeeth; Purandare, Rahul (Advisor) (2016-11-01)
    Real-time systems are becoming more complex and open, thus increasing their development and verification costs. Although several static verification tools have been proposed over the last decades, they suffer from scalability ...
  • Chowdhury, Anurag; Vatsa, Mayank (Advisor) (2016-09-20)
    Biometric analysis of surveillance videos carries inherent challenges in form of variations in pose, distance, illumination and expression. To address these variations, different methodologies are proposed, including ...
  • Sharma, Piyush Kumar; Chaudhary, Shashwat; Hassija, Nikhil; Maity, Mukulika; Chakravarty, Sambuddho (IIIT-Delhi, 2019)
    Anonymous VoIP calls over the Internet holds great significance for privacy-conscious users, whistle-blowers and political activists alike. Prior research deems popular anonymization systems like Tor unsuitable for providing ...
  • Gupta, Madhvi; Nagaraja, Shishir (Advisor) (2012-10-17)
    With improved technology, every user now generates huge amount of data that requires ever increasing amount of space to store it. It is not economical for the users to purchase new storage device every time. As a remedy ...
  • Mehta, Janki; Majumdar, Angshul (Advisor) (2016-09-13)
    An autoencoder is an artificial neural network used for learning efficient codings. The aim of an autoencoder is to learn a representation of data, which can then be used for better classification or any such application. ...
  • Madan, Anish; Anand, Saket (Advisor) (IIITD-Delhi, 2019-04-16)
    Machine Learning models are deployed in various tasks including image classification, malware detection, network intrusion detection, etc. But recent work has demonstrated that even state-of-the-art deep neural networks, ...
  • Tiwari, Lokender; Anand, Saket (supervisor) (IIIT-Delhi, 2021)
    A scene can be interpreted from two perspectives: geometric and semantic. Geometric scene understanding requires inferring the3D layout of the scene from an image or video, while semantic scene understanding requires ...
  • Mohindra, Mayank; Chakravarty, Sambuddho (Advisor) (IIITD-Delhi, 2019-04-21)
    Due to the proliferation of CDNs with edge networks, the known hierarchical model of the Internet is gradually changing. Very recently, it has been demonstrated that CDNs have become part of the Internet core [5]. There ...
  • Jain, Ritika; Sureka, Ashish (Advisor) (2014-02-19)
    User requirement speci cation (URS) documents written in the form of free-form natural lan- guage text contain system use-case descriptions as one of the elements in the URS. For few application domains, some of the ...
  • Jain, Varun; Singh, Pushpendra (Advisor) (IIIT-Delhi, 2018-04-19)
    The Government of India started its flagship programme 'ASHA' under the National Rural Health Mission (NRHM) which delivers health care services to the rural population and has a key focus on pregnable sections like women ...
  • Khattar, Manisha; Sureka, Ashish (Advisor) (2014-10-16)
    Software regression bugs are de ned as defects which occur, when a previously working software feature or functionality stops behaving as intended. One of the reasons for regression bugs is code changes or system patching ...
  • Gupta, Vivek; Goyal, Vikram (Advisor) (2015-05-27)
    Spatio-textual similarity join retrieves a set of pairs of objects wherein objects in each pair are close in spatial as well as textual dimensions. A lot of work has been done in the spatial dimension but no work has been ...
  • Ganguly, Antara; Deb, Sujay (Advisor) (2016-09-12)
    With the advent of many-core era, scalable hardware support for cache coherence has become vital to system performance. Cache coherence protocols are provided in order to ensure that multiple cached copies of a single ...
  • Bansal, Tarun Kumar; Sanadhya, Somitra Kumar (Advisor) (2013-07-11)
    In this work, we throw light on gaps between theoretical construction of cryptographic primitives and their practical instantiation. It is assumed that cryptographic primitives will not have any trapdoors in the given ...
  • Panjwani, Saurabh; Ghosh, Mohona; Kumaraguru, Ponnurangam; Singh, Soumya Vardhan (2012-07-25)
    Mobile-based branchless banking has become a key mech- anism for enabling financial inclusion in the developing re- gions of the world. A fundamental requirement of all branch- less banking systems is a mechanism to ...
  • Dwivedi, Purusharth; Chang, Donghoon (Advisor) (IIIT-Delhi, 2017-11-17)
    The following report discusses various facial recognition spoofing techniques in use today, and compares various algorithms, that have been developed for detecting the same. Continuing towards the previous semester’s ...
  • Goel, Lamha; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (IIITD-Delhi, 2019-04-15)
    The necessity of large labeled training database is ubiquitous now with the development of deep neural networks. But there are multiple challenges to collecting labeled data, with the primary concerns being time and cost ...
  • Arora, Kanchan; Bedathur, Srikanta (Advisor) (2014-12-12)
    Identifying semantic similarity between two texts has many applications in NLP including information extraction and retrieval, word sense disambigua- tion, text summarization and type classi cation. Similarity between ...
  • Venkadeswaran, Aravaida Kumaran; Anand, Saket (Advisor) (IIITD-Delhi, 2019-04-28)
    Automatic Speech Recognition which is aimed at enabling a more natural form of human-machine interaction has been an area of research for decades now and many breakthroughs have been made in this eld. The performance of ...
  • Sundriyal, Divyanshu; Vatsa, Mayank (advisor); Singh, Richa (advisor) (IIIT-Delhi, 2020-06)
    Deep learning systems require a large amount of labelled training dataset. However large amount of labelled data is not available in many cases as it requires considerable human effort to label each sample correctly. In ...

Search Repository

Browse

My Account