Student |
Title |
Aadirupa Saha | Learning Score Systems for Patient Mortality Prediction in Intensive Care Units via Orthogonal Matching Pursuit
|
Abhinav Agarwal | Uncovering Hidden Micro-architectural Details of NVIDIA GPUs
|
Abhishek sahu | Genome Sequencing using GPU
|
Aelkatwad Abhijeet Hanumantrao | Question-Answer System for Passage Comprehension
|
Afsal K | CrowdSim: A Simulation Tool for Crowdsourcing Experiments
|
Ajay Pandurang Adsul | Jensen Tsallis kernels and its application to clustering
|
Akanksha Meghlan | Preference Modelling and Aggregation in Social Networks
|
Amit Kumar | PU Microbenchmarking : Thread Block Scheduling Algorithms
|
Ankur Gupta | Big Data Testing Environments
|
Anup Kumar Sah | Coordination issues in virtualisation technology : Two case studies
|
Anup Lal Gupta | Optimized Allocation of SSD Cache for Virtual Machines
|
Arpita Biswas | A Novel Budgeted Multi-Armed Bandit Mechanism
|
Arpit Agarwal | GEV-Canonical Regression for Accurate Binary Class Probability Estimation when One Class is Rare
|
Arun Bhatia | Abstraction of Standard and Non-Standard Content
|
Arun Kumar | Parametric Optimization in CSMA Multiaccess Communication Protocols
|
Arunkumar K | Longevity of Digital Data - A Viable Solution
|
Arupratan Ray | Prior-free Mechanism Design for Multi-unit Reverse Auctions
|
Ayush Dubey | A Markov Decision Process Framework for Predictable Job Completion Times on Crowdsourcing Platforms.
|
Balvant Yadav | Outlier Detection Applied to the Classification Problem in attribute-value dataset and Social Network datasets
|
Bhupendra Singh Solanki | Predictive Caching for Boosting Cache/Main-Memory Utilization
|
Binu Jasim T | Detecting Semantic Paths in Surveillance Videos with Topic Models
|
Dilesh Kumar Verma | Precise Slicing by using Weakest Preconditions
|
Disha Makhija. | S2LINC : Semi-supervised Learning for Intra network Classification
|
Gagandeep Singh | Design and Analysis of OCPA Secure Encrypted Databases
|
Georgy Mathew | Scalable Algorithms for Classification
|
Govind Patidar | Verifiable Computation on Outsourced Data
|
Hemanth Kumar A N | Multi-agent Reinforcement Learning for Traffic Signal Control
|
Maisagoni Chaithanya | Systematic Testing of Android Applications
|
Malay Sanghi | Probabilistic Model of Multilevel Data Cache Behavior for Multicore Processors
|
Manish Khandelwal | Learning Classification Ontologies using Short Documents
|
Meshram Lomesh Vasant | Verification Of Multicore Version Of FreeRTOS
|
Modhalay Sravanthi | Semi-Supervised feature selection
|
Mrinal Ekka | Establishment of Pairwise Keys in Wireless Sensor Networks
|
Prashant Bhardwaj | Mining graphics workload for Performance Optimization:Grouping Similar Shaders for IPC Analysis.
|
Prateek Nagwanshi | Automatic Identification of Sarcasm using Sentiment and Semantic based features
|
Priyanka Bhatt | A Stackelberg Game Approach for Improving Instructor-Student Interactions in Online Eductional Forums
|
Rahul Pawar | Generative Maximum Entropy Based Multi-Label Classification
|
Sabale Narendra Murlidhar | Augmented Hash Chains for Salted Password Recovery
|
Santosh Ravi Kiran P | Sampling for Top-K Frequent Itemsets Mining
|
Soham Ghosh | Privacy Preserving Static Analysis
|
Solanki Swapnil Ashokbhai | Rewriting with stylistic changes
|
Sudarshan Singh Shyamal | A Practical, Online Transferable Ecash System with Identity Split based Anonymity
|
Sumit Neelam | Design and Implementation Techniques for Plan Bouquet
|
Suprovat Ghoshal | Ranking from Pairwise Preferences : A New Algorithm that Focuses on Accuracy at the Top of the List
|
Surabhi Punjabi | Simultaneous Elicitation of Community Structure and Node Roles in Social Networks : From the Lens of Information Diffusion
|
Varun Mohan | q-Gaussian Kernels for Support Vector Clustering
|
Varun T V | Coordination issues in virtualisation technology : Two case studies
|
Vivek Patidar | WCET Estimation of multi-core programs using Measurement-based Approach
|
Yasar K | Variational Gaussian Process Ordinal Regression
|
Yash Bagadia | Empirical study of RCU callbacks as a source of OS Jitter
|
Maj Abhishek Singh Maurya | A Practical eCach System for ubiquitous Android based Mobile Platforms
|
Sqn Ldr Shivendra Nath | An Energy Efficient Key Management Scheme for Wireless Sensor Networks
|
Sqn Ldr Aayush Tiwary | Aggregate Signature : Multi-user security and Synchronised aggregation
|
Manoj Kumar | A Security Scheme For The Power Industry Using Role-Based Encryption
|
Shibu kumar K B | A Multi-core Version of FreeRTOS
|
Rajeev K.K | Hierarchically Structured P2P Systems for File Sharing with Localized Load Balancing
|
Jinu Krishnan | Experimental Evaluation of q-Gaussian Mixture Models for Clustering and Outlier Detection
|