Student |
Title |
Aakar Deora | Verifiable Secret Sharing With Honest Majority
|
Abhinav Site | Solid State Drive As Swap Device
|
Abhishek Jaiswal | Implementation Of Deep Learning Methods For Classification Of Image And Audio Data
|
Aditya Cherla | Formal Verification Of Freertos Queue Apis
|
Amit Kumar Mandal | Private Set Intersection In Malicious Model
|
Anurag Tomer | Parameter Tuning And Feature Adaptation For Traffic Signal Control
|
Arnab Sen | S-Blac: A Scalable Blacklistable Anonymous Credential System
|
Arshed Nabeel M P | On The Parameterized Complexity Of Minmax Approval Voting
|
Arti Bhat | Atomicity Semantics And Violation Detection For Android Applications
|
Arunkumar S | Checking Thread Safety Of Freertos Apis
|
Ashoke S | Design And Implementation Of Codd 1.0
|
Badavath Prathap | Impact Of Mobility Model On The Performance Of Routing Protocols In Mobile Ad Hoc Network
|
Bibaswan Kumar Chatterjee | Computing Lovasz Thela And Learning The Optimal Unit Sphere Embedding For Graph Transduction
|
Chandana D | Discrimination Phrase Detection For Effective Text Classification
|
Ganesh Bellikar [Defence] | A Three-Tier Architecture For Pseudonym-Based Anonymous Authentication In Vanets
|
Harichand M V [ISRO] | Storage Cache Optimization Using Maching Learning
|
Indrajeet Kumar | Actor-Critic Reinforcement Learning Based Energy Management Policies For A Single Sensor Node With Finite Buffer
|
Jaiprakash | Recommendation Using Equal Information With Non-Random Missing Data
|
Jaswant Meena | Overlapping Community Detection In Social Network Using Disjoint Community Detection
|
Karrotu Santosh Srinivas | Resource Allocation Algorithms For Cloud Computing Platforms With Strategic Agents
|
Lakhpat Meena | Prototype Selection On Large And Streaming Data
|
Lawqueen Kanesh | Sleeping Policies For Intrusion Detection In Sensor Networks
|
Mahajan Chetas Subhash | Using Anipqo To Produce Anorexic Plan Diagrams On The Fly
|
Manish Kesarwani | Securely Processing Range Predicates On Cloud Database
|
Mohd Aqil [ISRO] | Probabilistic Models Of Natural Source Code
|
Mukesh Singh | Algorithms For Large Scale Classification
|
Namboodiri Lohit Krishnan | Improving Worst-Case Bounds For Plan Bouquet Based Techniques
|
Pankaj Kumar Gautam | Design And Analysis Of Aes-Based Energy Efficient Block Cipher
|
Pankhuri | Improving Postgresql Cost Model
|
Parixit Prasad | Memoization Scheme Suggester For Java Methods
|
Patel Arth Kausheybhai | Improving Memory Hierarchy Performance In Heterogeneous System Architecture (HSA)
|
Pawan Kumar | Large Scale Algorithms In Topic Models
|
Priyank Parihar | Performance Optimisation Of Hadoop Mapreduce
|
Priyanka Mondal | Extended Atomicity Checking With Blame Assignment For Android Applications
|
Puneet Pahuja | Optimising Social Utility In Networks With Respect To Flow Control
|
Purshotam | Machine Learning Models For Tunning Storage System Configuration
|
Rajmohan C |
|
Rishabh Singla | Finite Horizon Markov Decision Process For Resource Allocation In Crowdsourcing Platforms
|
Sachin Kumar Srivastava | Generating Quantified Invariants From Scalar Invariants
|
Sajith B [QIP] | A Simulation Tool For Performance Analysis Of Multiarmed Bandit Mechanisms
|
Sayan Biswas | Bitcoin: A Survey With Studies On Stability And Anonymity
|
Shaifali Gupta | Multi-Campaign Influence Maximization In Social Networks
|
Sravya Vankayala | Algorithms For Matrix Completion
|
Suman Kumar Datta | Maximum Volume Clustering On Multiple Graphs
|
Surabhi Akotiya | Multi-Phase Information Diffusion In Social Networks
|
Suvita | Precise Slicing By Using Weakest Pre-Condition
|
Tarun Bansal | Development Of A Graphical Interface For Endoscopy Simulator
|
Toms Varghese | Intrumenting Virtualized Storage Infrastructure
|
Vibhuti Shali | Optimal Omni-Channel E-Retail
|
Vijaikumar M | Citation Analysis Using Influence Link Weight
|