IIIT-Delhi Institutional Repository

Browsing Year-2020 by Issue Date

Browsing Year-2020 by Issue Date

Sort by: Order: Results:

  • Gangopadhyay, Rahul; Shannigrahi, Saswata (advisor); Sharma, Anuradha (advisor) (IIIT-Delhi, 2020-01)
    In this thesis, we study the d-dimensional rectilinear drawings of d-uniform hypergraphs in which each hyperedge contains exactly d vertices. A d-dimensional rectilinear drawing of a d-uniform hypergraph is a drawing of ...
  • Kansal, Kajal; Subramanyam, A.V. (supervisor) (IIIT-Delhi, 2020-05)
    The rise of surveillance cameras has led to a significant focus on large scale deployment of intelligent surveillance systems. Person re-identification (Re-ID) is one of the quintessential surveillance problems. Person ...
  • Mondal, Sutapa; Mutharaju, Raghava (advisor); Bhatia, Sumit (advisor) (IIIT-Delhi, 2020-07)
    Knowledge graph (KG) embedding models have recently gained increased attention. However, most of the existing models for KG embeddings ignore the structure and characteristics of the underlying ontology. KGs are not ...
  • Ishant; Arora, Chetan (Supervisor) (IIIT-Delhi, 2020-08-13)
    Many computer vision problems can be formulated as finding the best labeling configuration. If labelings satisfy Markov property then finding best labeling configuration becomes MRF (Markov Random Field)- MAP (Maximum A ...
  • Maini, Parikshit; Sujit, P. B. (advisor) (IIIT-Delhi, 2020-09)
    Mobile robots have become ubiquitous today and are used widely in sensor networks. Their use in applications involving long-term operations, remote sensing and complex environments is a widely studied area of research due ...
  • Mongia, Aanchal; Majumdar, Angshul (Supervisor) (IIIT-Delhi, 2020-09)
    Data analytics and computational techniques applied to biological sciences aid rapid technological advances, swift discoveries, and reliable analysis. A broad range of bountiful tools and algorithms have played pivotal ...
  • Agrawal, Megha; Chan, Donghoon (supervisor); Sanadhy, Somitra (supervisor) (IIIT-Delhi, 2020-09)
    It is common knowledge that encryption is a useful tool for providing confidentiality. Authentication, however, is often overlooked. Authentication provides data integrity; it helps ensure that any tampering with or ...
  • Kaushal, Rishabh; Kumaraguru, Ponnurangam (supervisor) (IIIT-Delhi, 2020-10)
    Online Social Networks (OSNs) have become popular platforms for online users. Users typically register and maintain their accounts (user identities) across different OSNs to share a variety of content and remain connected ...
  • Agarwal, Akshay; Singh, Richa (supervisor); Vatsa, Mayank (supervisor) (IIIT-Delhi, 2020-10)
    As the deployment and usage of computer vision systems increase, protecting these systems from malicious data has also become a critical task. The primary source of information in any computer vision system is the input ...

Search Repository


Advanced Search

Browse

My Account