Student |
Title |
Aashraya Sachdeva | Learning Joint Representations of Android Applications and Privacy Policies
|
Abhinav Anil Sharma | A Hybrid Model for Predicting Performance in Heterogeneous System Architecture
|
Abhishek Bansal | Design of Neural Networks under budget using Configurational Entropy
|
Agrawal Siddharth Sanjay | Deep Variational Inference without Pixel-wise Reconstruction
|
Akshay Verma | Contextual Bandits for News Article Recommendation
|
Ansari T K | Unsupervised Language Independent Subword Modelling using Deep Learning Approaches
|
Anoop J S | An automatic Tile Size Selection Model for Polly in LLVM
|
Apoorv Neema | Protein Secondary Structure Prediction using Bi-LSTM Conditional Neural Fields and Semi Supervised Learning
|
Arjun Dhakad | Dynamic Allocation Of Resources In Cloud Using Reinforcement Learning
|
Arvind M | Developing a Model for Loop Fusion in LLVM/Polly
|
Ashish Kumar Sen | Randomized Counter based Algorithms for Heavy Hitters Problems
|
Balbari Sai Sandeep | Generating Plan Diagrams for High Dimensions and Higher Resolution
|
Davinder Singh | SpillBound Implementation in QUEST
|
Gaurav Sharma (Def) | Path Life Time Based Improved AODV Protocol for Mobile Ad Hoc Networks
|
Himanshi Sinha | Overlapping Community Detection in Networks
|
Indumathy J | Sports Quiz System Based on Automatic Information Extraction from Sports News Articles in Tamil Language
|
Jagan P M | Characterization of Program Behaviour
|
Jaipreet Singh | Scalable Methods For Visualizing Flow in a Pellet Filled Reactor
|
Jayam Chittaranjan Modi | Wildcard Search over Encrypted Data with High Accuracy
|
Kshitij Bhardwaj (Def) | Secure Convoy Tracking and Short Messaging Using Hierarchical Identity-based Key Agreement Scheme
|
Lakshmi Bansal | Impact of Visual features on recommending fashion in Long-tail of products
|
Musunuri Prathima | Intelligent Signal Control by Modelling Junctions for Noisy Events
|
Neeraj Balotia | A Two Phase approach to Influence Limitation in Social Networks
|
Neethu P M | Modelling gaze strategies in a change blindness attention paradigm
|
Nirmalendu Prakash Diwakar | Empatheyes : Immersive Virtual Reality Simulation of Visual Impairments Using Smart Phones
|
Pankaj Raina | Ranking of Institutes in a Bibliographic Network using Link Prediction
|
Peyush Sopori | Temporal Action Localization on Untrimmed Videos for Action Recognition
|
Pinky Budania | Discovery of Motifs and Qualitative Rules from Multi-variate Time Series
|
Poonam Kashyap | An Information Seeding Approach to Scale Static Taint Analysis
|
Prateek Patel | Siamese Neural Network for Document Similarity
|
Prince Jain | CESI: Canonicalizing open Knowledge Bases using Embeddings and Side Information
|
Priyanka Gandhara | A Multi-Armed Bandit Approach for Enhancing Student Learning and Participation through Online Discussion Forums
|
Priyanka Sharma | Predicting Query Execution Time using Statistical Techniques
|
Puran Deo Ojha (Def) | Improvising MINA Algorithm to Detect MPLS L3 VPN Misconfiguration in Multi-homed, Multi-VRF, Site-redundant CE Environments
|
Raghav Sood | Synthetic Regeneration of Relational Data at Scale
|
Rajaguru (DRDO) | A Lightweight Authentication Protocol for RFID Security
|
Ramteke Swapnil Moreshwar | Large Scale Linear Classification
|
Ranjesh Sisodia | Geometric Hitting Set via Local Search
|
Ravindra Panchotiya | Outliers Detection on Time Series Data
|
Rubee Tanden | Dynamic Task Allocation in Clould Using CloudSim Simulator
|
Sakina Bohra | Hawkes Process for modelling urban traffic congestion
|
Seba Ann Kuruvilla | Prototype Selection and Dimensionality Reduction on MultiLabel Data
|
Shipra Chauhan | Private Set Intersection in Multi-Interaction Setting
|
Shivam Gupta | Analytical Model to Evaluate the Performance of GPU using a Two-Tier Regression-Based Design Space Exploration
|
Shivangi Agarwal | Multicore Algorithm for AUC Optimization
|
Shreyans Dhankar | Memory Networks for Question Answer Tasks
|
Soham Pal | SymFix: Repair and Representation Learning of Symbolic Expressions
|
Sourabh Dalodia | Core Affinities and their impact on Hard Drive Interrupt Handling in Multicore Environment
|
Sudeep Chatterjee | Empirical analysis on k-means, kmeans++ on different intializations
|
Sujeet Kumar | Performance Study of Consensus Protocols for Distributed Applications
|
Sunil Kumar Potnuru | Query Focused Document Summarization
|
Suraj Kaushal | Detecting Topological Similarity/Dissimilarity in Multi-field Data
|
Sushma Vithal Tingare | Traffic Signal Time Optimization With Co-operative multi-agents Round Robin Scheduling
|
Swapnil Khanderao Kakade | Adaptive Junction Controller for Vehicular and Pedestrian Integrated Traffic Using Multi-Agent Reinforcement Learning
|
Sweta Sharma | Adversarial Machine Learning
|
Vikash Kumar Boran | Adaptive Approach to Improve Page Replacement Algorithms
|
Vinay Kumar Rijhwani | Database Query Execution on Heterogeneous Architecture
|