Year-2011

 

Recent Submissions

  • Asthana, Siddhartha; Singh, Pushpendra; Singh, Amarjeet; Naik, Vinayak (2012-03-26)
    Voice based telecommunication services are emerging as most appropriate medium for information dissemination in developing regions, as they overcome prevalent low literacy rate and are more reachable than any other ...
  • Sureka, Ashish (2012-03-26)
    Research shows that cyber-hate, illegal or malicious form of cyber-protest and cyber-activism in online social media and Web 2.0 platforms has become a common phenomenon. This is a growing concern and hence automated ...
  • Bhatt, Himanshu S; Bharadwaj, Samarth; Singh, Richa; Vatsa, Mayank (2012-03-26)
    One of the important cues in solving crimes and apprehending criminals is matching sketches with digital face images. This paper presents an automated algorithm that extracts discriminating information from local regions ...
  • Gupta, Aditi; Kumaraguru, Ponnurangam (2012-03-26)
    Online social media has become an integral part of every Internet users' life. It has given common people a platform and forum to share information, post their opinions and promote campaigns. The threat of exploitation of ...
  • Bhardwaj, Abhishek; Arjunan, Pandarasamy; Singh, Amarjeet; Naik, Vinayak; Singh, Pushpendra (2012-03-26)
    Ubiquitous availability of cellular network and cheap mobile phones have made them promising sensing platforms for various application domains including healthcare, environment, and astronomy among others. However, ...
  • Lamba, Hemank; Sarkar, Ankit; Vatsa, Mayank; Singh, Richa (2012-03-26)
    One of the major challenges of face recognition is to de- sign a feature extractor that reduces the intra-class vari- ations and increases the inter-class variations. The fea- ture extraction algorithm has to be robust ...
  • Bera, Debajyoti; Goyal, Vikram; Saxena, Anuj S. (2012-03-26)
    There are many results on the possibilities of privacy leak in location-based services, and many remedies have also been suggested. In this paper, we look at this problem from an altogether different perspective - ...
  • Nagaraja, Shishir; Houmansadr, Amir; Kumar, Vijit; Agarwal, Pragya; Borisov, Nikita (2012-03-26)
    We propose Stegobot, a new generation botnet that communicates over probabilistically unobservable communication channels. It is designed to spread via social malware attacks and steal information from its victims. ...
  • Asthana, Siddhartha; Kumaraguru, Ponnurangam; Singh, Pushpendra; Singh, Amarjeet (2012-03-14)
    In developing regions, voice based telecommunication services are one of the most appropriate medium for information dissemination as they overcome prevalent low literacy rate and are more reachable than any other medium. ...
  • Gupta, Aditi; Kumaraguru, Ponnurangam (2012-03-14)
    Large amount of content is generated on online social net- working and micro-blogging services daily; Twitter is one such micro-blogging service. Twitter has evolved from be- ing used for conversing with friends and ...
  • Yadav, Kuldeep; Naik, Vinayak; Singh, Amarjeet; Singh, Pushpendra (2012-03-14)
    Location-aware applications are steadily gaining popularity across the world. However lack of GPS in low-end programmable phones (< $100) and general absence of Wi-Fi infrastructure in developing countries prevents users ...