IIIT-Delhi Institutional Repository

Computer Science and Engineering

Computer Science and Engineering

 

Sub-communities within this community

Recent Submissions

  • Shanu; Bera, Debajyoti (Advisor) (IIIT-D, 2018-07)
    Distinguishing between unitary operators is one of the fundamental problems in the _eld of quantum computing. In the operator identi_cation problem, we are given access to unknown operator U as a black-box that implements ...
  • Sarika; Goyal, Vikram (Advisor); Chakraborty, Tanmoy (Advisor) (2018-06)
    Community detection has gained immense popularity in recent years. Real world networks consist of millions of nodes and edges. Groups of nodes exhibit interesting characteristics, whoseknowledge can be of great help in ...
  • Apurupa, Nagasuri Venkata; Singh, Pushpendra (Advisor); Chakravarthy, Sambudhho (Advisor); Buduru, Arun Balaji (Advisor) (IIIT-D, 2018-07)
    Energy conservation plays an important role in the economic development of a country. The total share of building ’s energy consumption in the country ’s energy consumption is increasing every year in India. Thus, it is ...
  • Bhatia, Gurpriya Kaur; Kumaraguru, Ponnurangam (Advisor); Dubey, Alpana (Advisor); Buduru, Arun Balaji(Advisor); Kaulgud, Vikrant(Advisor) (IIIT-D, 2018-07)
    Crowdsourcing is a process where an individual or an organization utilizes the talent pool presentover the Internet to accomplish their task(s). These platforms offer numerous advantages suchas reduced cost, better quality, ...
  • Tiwari, Abhiprayah; Kumar, Vivek (Advisor); Mitra, Gaurav(Advisor) (IIIT-D, 2018-07)
    With energy efficiency becoming a major concern in the HPC community, low-power alternatives such as heterogeneous Multi-Processor System-on-chip (MPSoC) are gainingpopularity. These devices house several different kinds ...
  • Saxena, Simran; Kumaraguru, Ponnurangam (Advisor); Dubey, Alpana (Advisor); Balaji, Arun (Advisor); Sachdeva, Niharika (Advisor) (IIIT-Delhi, 2018-04)
    Crowdsourcing is the practice of getting information or input for a task or project from a number of people by floating out the task at hand to a pool of people who are usually not full-time employees. Use of Crowdsourcing ...
  • Vinayakarao, Venkatesh; Purandare, Rahul (Advisor) (IIIT-Delhi, 2018-04)
    Code variants represent alternative implementations of a code snippet, where each alternative provides the same functionality, but has different properties that make some of them better suited to the overall project ...
  • Bansal, Tarun Kumar; Chang, Donghoon (Advisor); Pieprzyk, Josef (Advisor); Sanadhya, Somitra Kumar (Advisor); Boyen, Xavier (Advisor) (IIIT-Delhi, 2017-10)
    RSA-OAEP is being used in PKCS #1 2.0 standard for a long time. OAEP (optimal asymmetric encryption padding) provides security strength to RSA and other deterministic one-way asymmetric primitives (trapdoor one-way ...
  • Rawat, Madhur; Chakravarty, Sambuddho (Advisor) (2017-06)
    Cyberwarfare remains a sparsely explored domain of cybersecurity research, most often involving targeted attacks by one nation against another, using botnets. These botnets use malware to launch various kinds of attacks ...
  • Arjunan, Pandarasamy; Singh, Amarjeet (Advisor); Singh, Pushpendra (Advisor) (IIIT-Delhi, 2018-03)
    As one of the largest consumers of overall energy, buildings have emerged as attractive targets for using information and communications technologies to advance large-scale sustainability goals. With increasing availability ...
  • Verma, Sagar; Arora, Chetan (Advisor) (2017-07)
    With an increase in usage and availability of wearable devices like GoPro, Microsoft Hololens, Google Glass, etc, egocentric video analysis has become essential. An interesting application is action recognition in egocentric ...
  • Mishra, Sweta; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor) (IIIT-Delhi, 2017-10)
    Passwords are the most widely deployed means of human-computer authentication since the early 1960s. The use of passwords, which are usually low in entropy, is delicate in cryptography because of the possibility of launching ...
  • Mongia, Aanchal; Gunturi, Venkata M. V.; Naik, Vinayak (IIIT-Delhi, 2017-11-29)
    Our paper aims to build a classification-model which delineates the typical motion-related activities performed at a metro station using smart phone sensors. We focus on typical movements, such as climbing the stairs or ...
  • Dhamecha, Tejas Indulal; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (IIIT-Delhi, 2017-07)
    Due to the unconstrained nature of data capture and non-cooperative subjects, automatic face recognition is still a research challenge for application scenarios such as law enforcement. We observe that challenges of face ...
  • Dewan, Prateek; Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2017-08)
    Online Social Networks have become a cornerstone of Web 2.0 era. Internet users around the world use Online Social Networks as primary sources to consume news, updates, and information about events around the world. However, ...
  • Jain, Arushi; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (2017-04-18)
    Face Recognition involves a wide range of applications, many of which are centered around forensic applications. Dead bodies in large-scale calamities like foods and earthquakes require to be identified. However, the bodies ...
  • Gupta, Shuchita; Sharma, Yashovardhan; Naik, Vinayak (Advisor) (2016-11-17)
    We are building a low-cost and portable device, which can be controlled by patient's Android smartphone, to measure sleep. The device is easy to use and consists of Airow (Rate of respiration), Pulse Oximeter (Heart rate ...
  • Gupta, Tushar; Kumaraguru, Ponnurangam (Advisor) (2017-04-18)
    We study the use of creative content in the tweets made by Mumbai Police and its impact on user-engagement. Showing that the use of creative content by police departments actually helps them in reaching more number of ...
  • Maji, Kartik; Sinha, Shubham; Aggarwal, Taruvar; Singh, Pushpendra (Advisor) (2017-04-30)
    The present invention, generally relates to a navigation aid for visually challenged people, and is essentially an escort bot system and method for providing navigational aid to the visually challenged and senior citizens.
  • Keswani, Sumit; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (2017-04)
    In past few years, cross-modal information retrieval has drawn much attention due to significant growth in the multimodal data. It takes one type of data as the query to retrieve relevant data of multiple modalities. For ...

View more