IIIT-Delhi Institutional Repository

Browsing Computer Science and Engineering by Title

Browsing Computer Science and Engineering by Title

Sort by: Order: Results:

  • Anwer, Samit; Purandare, Rahul (Advisor) (2014-12-12)
    Every Android application runs in its own virtual machine, with its own Linux user account and corresponding permissions. Although this ensures that permissions are given as per each application’s requirements, each ...
  • Sharma, Rachesh; Majumdar, Angshul (Advisor); Kumar, Vibhor (Advisor) (IIIT-Delhi, 2019-04)
    A human body has billions of cells specialized with their own function and each cell carries genome in its nucleus. The activity of the genome is controlled by a multitude of molecular complexes called as epigenome. Previously ...
  • Chaudhary, Shashwat; Hassija, Nikhil; Chakravarty, Sambuddho (Advisor) (IIITD-Delhi, 2019-04-26)
    Anonymous censorship-resistant communication systems are primarily designed keeping in mind semi real-time traffic such as web browsing. One such system, Tor [1], has gained prominence as the de-facto anonymity preserving ...
  • Pandey, Yogesh; Goyal, Vikram (Advisor) (IIIT-Delhi, 2019-12)
    Congestion is one of the biggest problems which affects life quality and has an impact on social and economic conditions. Tackling traffic congestion has always been a challenge. The situation is more aggravated for ...
  • Bothra, Vedant; Shah, Rinku (Advisor); Maity, Mukulika (Advisor) (IIIT-Delhi, 2023-11-29)
    In the world of computer networks, if we think of the internet , there is always a tradeoff between speed and how much data can be sent through the network which often leads to the use of large storage areas called buffers. ...
  • Bansal, Palash; Sharma, Ojaswa (Advisor) (IIITD-Delhi, 2018-11-26)
    The goal of this BTP is starting a venture by taking RealVol of as a technology company that strives to improve the best in class visualization of medical scans for better learning and diagnostics and to finally provide ...
  • Bhalla, Raghav; Panwar, Ritesh; Sethi, Tavpritesh (Advisor) (IIIT-Delhi, 2022-12)
    Healthcare datasets are not easily available to researchers and innovators due to patients’ privacy and/or government regulations. We propose to create a novel pipeline for bespoke synthetic datasets matching original ...
  • Kochar, Komal; Sanadhya, Somitra Kumar (Advisor) (2012-07-25)
    Cryptographic hash Functions are widely used for a wide range of applications such as au- thentication of information, digital signatures and protection of pass-phrases. In the last few years, the cryptanalysis of hash ...
  • Bhatt, Himanshu S; Bharadwaj, Samarth; Singh, Richa; Vatsa, Mayank (2012-03-14)
    Widespread acceptability and use of biometrics for person authentication has instigated several techniques for evading identification. One such technique is altering facial appearance using surgical procedures that has ...
  • Bhattacharyya, Pramit; Mutharaju, Vijaya Raghava (Advisor) (2020-07)
    Building an ontology is not only a time-consuming process, but it is also confusing, especially for beginners and the inexperienced. Although ontology developers can take the help of domain experts in building an ontology, ...
  • Gangopadhyay, Rahul; Shannigrahi, Saswata (Advisor); Sharma, Anuradha (Advisor) (IIIT-Delhi, 2020-01)
    In this thesis, we study the d-dimensional rectilinear drawings of d-uniform hypergraphs in which each hyperedge contains exactly d vertices. A d-dimensional rectilinear drawing of a d-uniform hypergraph is a drawing of ...
  • Bagga, Shaurya; Shah, Rajiv Ratn (Advisor) (2021-03)
    A lot of people are learning English around the world and take assessments every year. With the rise of candidates taking these assessments and the shortage of qualified experts rating these assessments, there is a need ...
  • Jain, Monika; Subramanyam, A V (Advisor) (IIIT-Delhi, 2022-06)
    Correlation Filter based visual trackers have demonstrated tremendous progress in object tracking. These trackers primarily use hierarchical features learned from multiple layers of a deep network. However, issues related ...
  • Pal, Mayank Kumar; Kaul, Sanjit Krishnan (Advisor); Anand, Saket (Advisor) (IIITD-Delhi, 2018-11-23)
    We addressed the problem of jointly selecting communications and vehicular planning strategies with the goal of optimizing the driving utility like the speed of the car. Much related work assumes the communications channels ...
  • Thukral, Deepak; Goyal, Vikram (Advisor); Chakraborty, Tanmoy (Advisor) (IIIT-Delhi, 2018-04-18)
    Automatic estimation of relative difficulty of a pair of questions is an important and challenging problem in community question answering (CQA) services. There are limited studies which addressed this problem. Past studies ...
  • Pandey, Adesh; Thukral, Deepak; Gupta, Rishabh; Goyal, Vikram (Advisor); Chakraborty, Tanmoy (Advisor) (IIIT-Delhi, 2017-11-16)
    Given a question on a crowd sourced Q&A platform, we tried to gauge the difficulty of the question. Earlier, we tried various NLP based techniques for this purpose. Now, we tried various graph models in order to model ...
  • Sharma, Utkarsh; Sethi, Tavpritesh (Advisor) (IIIT-Delhi, 2022-05)
    We propose a platform that connects Doctors, Insurance and Patients and in doing so provides them value that won’t be possible otherwise. We use the platform to store the longitudinal health record of the patient (with ...
  • Gupta, Neha; Prakash, Naveen (Advisor) (IIIT-Delhi, 2020-05)
    Conventional data warehouse systems are implemented either on a multi-dimensional database or a relational database. While the earlier supports MOLAP operations, the other supports ROLAP operations. In this work, we used ...
  • Kochanthara, Sangeeth; Purandare, Rahul (Advisor) (2016-11-01)
    Real-time systems are becoming more complex and open, thus increasing their development and verification costs. Although several static verification tools have been proposed over the last decades, they suffer from scalability ...
  • Chowdhury, Anurag; Vatsa, Mayank (Advisor) (2016-09-20)
    Biometric analysis of surveillance videos carries inherent challenges in form of variations in pose, distance, illumination and expression. To address these variations, different methodologies are proposed, including ...

Search Repository


Advanced Search

Browse

My Account