Computer Science and Engineering: Recent submissions

  • Gupta, Akshat; Kumar, Sunil; Kumar, Vivek (Advisor); Bhalachandra, Sridutt (Advisor) (IIIT- Delhi, 2021-06)
    A low-cap power budget is challenging for exascale computing. Dynamic Voltage and Frequency Scaling (DVFS) and Uncore Frequency Scaling (UFS) are the two widely used techniques for limiting HPC application's energy footprint. ...
  • Singh, Monika; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor) (IIIT-Delhi, 2022-02)
    With the rapid growth of the World Wide Web and the Internet of Things, huge amounts of digital data are being produced everyday. Digital forensics investigators face an uphill battle when they have to manually screen ...
  • Pandey, Abhivandan; Sachdeva, Prince; Maity, Mukulika (Advisor); Bhattacharya, Arani (Advisor) (IIIT- Delhi, 2021-06)
    India has seen a rapid rise in the adoption of smart phones, with a majority of Indians accessing the Internet through smart phones. Smart phones have become one of the most important mediums of delivering essential services ...
  • Likhyani, Ankita; Bedathur, Srikanta (Advisor) (IIIT-Delhi, 2022-01)
    Over the past decade with the explosion of smartphones and pervasive usage of data connectivity, location-based services have increasingly become popular. As a result, Location- based Social Network(LBSN) such as Foursquare, ...
  • V, Sathish; Butail, Sachit (Advisor); Orkisz, Michal (Advisor) (IIIT-Delhi, 2021-02)
    Industrial robots are complex systems that require technical expertise for condition monitoring and diagnostics. In small and medium scale industries, adequate skilled resources may not be available to monitor the robots ...
  • Singh, Maneet; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (IIIT-Delhi, 2021-12)
    Automated facial analysis has widespread applicability in scenarios related to image tagging, access control, and surveillance. Initial research focused primarily on face recognition in constrained settings, where the ...
  • Gupta, Monika; Jalote, Pankaj (Advisor); Serebrenik, Alexander (Advisor) (IIIT-Delhi, 2019-12)
    Software maintenance refers to the modification of software product after delivery and is required to correct faults, to improve the performance or other attributes, or to adapt the product to a modified environment. It ...
  • Gupta, Krishan; Sengupta, Debarka (Advisor); Ghosh, Abhik (Advisor); Ahuja, Gaurav (Advisor) (IIIT-Delhi, 2021-10)
    Delineation of the complex layers of biological system requires a cumulative effort from multiple disciplines of science. The present thesis work utilizes some of the interdisciplinary approaches by combining the automation ...
  • Dutta, Hridoy Sankar; Chakraborty, Tanmoy (Advisor) (IIIT-Delhi., 2021-09)
    Online media platforms have enabled users to connect with individuals, organizations and share their thoughts. Other than connectivity, these platforms also serve multiple purposes - education, promotion, updates, awareness, ...
  • Kumar, Piyush; Chakravarty, Sambuddho (Advisor); Maity, Mukulika (Advisor) (IIIT- Delhi, 2021-08)
    Free and open communication over the Internet is essential for the overall advancement of modern societies. However, there are numerous ways with which malevolent adversaries try to control the flow of information, by ...
  • Sondhi, Devika; Purandare, Rahul (Advisor) (IIIT- Delhi, 2021-06)
    With the ever-growing dependency on software, testing for their unexpected behavior is as important as verifying for their known properties, to avoid potential losses. Existing software testing approaches assume either ...
  • Gosain, Devashish; Chakravarty, Sambuddho (Advisor) (IIIT-Delhi, 2020-07)
    The original design of the Internet was a resilient, distributed architecture, that should be able to route around (and therefore recover from) massive disruption — up to and including nuclear war. However, network routing ...
  • Yadav, Deepika; Singh, Pushpendra (Advisor) (IIIT-Delhi, 2021-08)
    Community health workers (CHWs) in low- and middle-income countries play a vital role in public healthcare. CHWs particularly assist in improving maternal and child health conditions of the poor and vulnerable who often ...
  • Garg, Surabhi; Chang, Donghoon (Advisor) (IIIT-Delhi, 2021-06)
    The biometric systems are widely deployed in various sectors for authentication purposes– India’s Aadhaar project (a multi-biometric database of above 1.3 billion of India’s population) being the prominent example. The ...
  • Maheshwary, Yashit; Kurian, Deepak; Buduru, Arun Balaji (Advisor) (IIIT-Delhi, 2020-05-29)
    Malware Detection is an important problem in modern day due to the increasing frequency of malware attacks using unknown malware strains. Unlike traditional detection techniques which require a signature for each sample, ...
  • Tomar, Yash; Singh, Pushpendra (Advisor) (IIIT-Delhi, 2020-06-03)
    Taboo is prohibition or restriction by social custom. So generally teaching a taboo topic is not easy for a teacher as well a student might feel hesitated to ask doubts for the taboo topics.We aim to study can VR help ...
  • Ahuja, Yajur; Das, Syamantak (Advisor) (IIIT-DElhi, 2020-06-03)
    We consider a generalization of the classical K-center problem with capacities, demands, and outliers. The capacitated K-center problem adds a constraint to the original K-center problem of every vertex having a capacity ...
  • Saini, Vipul; Mutharaju, Vijaya Raghava (Advisor); Chakraborty, Tanmoy (Advisor) (IIIT-Delhi, 2020-06-05)
    Knowledge graphs have become quite popular and their utility is increasing at a very fast rate. There exist numerous extensive knowledge graphs that contain information on a plethora of topics. With new information ...
  • Bhatia, Vedant; Sujit, PB (Advisor) (IIIT-Delhi, 2020-06-04)
    The shepherding problem is a problem setting in the multi-agent systems domain. The primary aim is to guide or ‘shepherd’ a swarm of unwilling agents to a destination, with the help of autonomous agents. We explore this ...
  • Ramanathan, Varun; Raman, Rajiv (Advisor) (IIIT-Delhi, 2020-06-01)
    Traditionally, algorithms try to find the optimal solution for a problem in a “three-phase” approach: fetch the input, run the algorithm, output the solution. But recently, there has been an interest in understanding ...

Search Repository


Advanced Search

Browse

My Account