Student |
Title |
Abdullah Jawhari S | 3-Colorable Triangulation Of Planar Point Sets
|
Anjali Jain | Comparative Shopping; Product Reviews: Mining Aspects, Sentiments & Ratings
|
Anubhav Gupta | Ranking Institutiions In Heterogeneous Bibliographic Networks
|
Anupam Sanghi | Performance Testing For Database Systems
|
Arabinda Moni | Timeminer: Automated Temporal Scoping Of Relational Facts
|
Ashish Srivastava | Probabilistic Topic Modeling Of Text-Rich Heterogeneous Information Networks
|
Ashwin Tv | Performance Optimizations In Glusterfs Filesystem
|
Bagul Pankaj Asaram | Verifying Invariants Of Kernel Data Structures Of Freertos Using Vcc
|
Bhosale Yogesh Vasant | Efficient Causally Precedes Race Detection
|
Birendra Yadav | Semantic Analysis Of Self Citations In Bibliographic Network
|
Cressida Hamlet | Blind Signatures Using Functional Encryption
|
D Raghu Ram Bharadwaj | Novel Sensor Scheduling Scheme For Intruder Tracking In Energy Efficient Sensor Networks
|
Deshant Kumar | Prediction Of Private Information Of Social-Network Users
|
Dheeraj Ram | Scalable Secure Computation
|
Dhoot Prerak Jagadish | Bounds For 0-1 Matrices Excluding A Given Forbidden Sub-Matrix.
|
Divya Ravi | Secure Computation In Hybrid Network
|
Gopu R Unnithan | A Hedonic Analysis Model For Product Review Representation And Aspect-Rating By Mining Consumer Product Reviews
|
Hariom Gautam | Topic Modeling Using Genetic Algorithm
|
Harit Vishwakarma | Discovering Latent Purchase Influence Graph (Grip) Using Hawkes Process.
|
Jawad T | An Information Flow Based Microkernel
|
Jay Ilesh Oza | Off-Policy Learning And Evaluation For Push Notifications
|
Kuntal Ghosh | Robust Query Processing
|
Lucky Dhakad | Finding Personal Styles In Long-Tail Of Lifestyle Products
|
Maddineni Manohar | Coordianted Online Resource Allocation In Cloud Computing
|
Madhusudan L | Learning Semantically Coherent And Reusable Kernels In Convolution Neural Nets For Sentence Classification
|
Maj. K S Tanwar | Scalable Malware Triage Using Efficient Common Behaviour Detection
|
Marilyn George | Fully-Secure Predicate Only Encryption Implies Searchable Symmetric Encryption
|
Muhammed Fazal E | An Information Flow Based Microkernel
|
Niranjan Singh | A Method To Mitigate Code Reuse Attacks
|
Nithin V Nath | Secure Deduplication Across Files
|
Parth Verma | Document Classification Using Community Detection
|
Pathak Harshil Sandeepbhai | Optimization And Acceleration Of Convolutional Neural Network Computations
|
Pradeep Kumar Kudikala | Clustering Semantically Equivalent Segments Of Incorrect Programs
|
Pradeep Kumar Pandey | Music Mood Classification Based On Audio Features And Lyrics
|
Rahul Hasija | Executing Database Query On Modern Cpu-Gpu Heterogeneous Architecture
|
Raman Preet Kaur | Tracking Change In Topology During Downsampling
|
Ramit Hansda | Data Forwarding In Opportunistic Networks
|
Rohit Kumar | Mining And Analyzing Less Explored Aspects Of Citation Network
|
Saravanan K | Online Single Source Ride Sharing
|
Shinjini Biswas | Parallelization of Multi Label Classification for Large Data Sets
|
Shreyas S | Orthogonal Representations
|
Siddharth Shakya | Analysing Evolution Of Sleeping Beauty In Heterogenous Citation Network
|
Sqn. Ldr. Ns Bharath Kumar | Aggregation Of Digital Signature In Vanets
|
Sqn. Ldr. Oruganti Sudhir Babu | Design Of Incentives And Resource Allocation In Geosensing Applications
|
Vamshi Pasunuru | Predicting Query Execution Time Using Statistical Techniques
|
Vemula Srimithra | Accelerating Data Deduplication Using Shingling
|
Vipin Nagar | Trace Generation For Asynchronous Events In Event Driven Programs
|
Vishal | A Sparse Non-Linear Classifier Design Using Auc Optimization
|