Student |
Title |
Adicherla Mallesh | Computational Particle Swarm Optimization Using Selection and Crossover Operations like Genetic Algorithm
|
Adhineth Mahanama V | Designing a Seamless Connectivity Algorithm for Ubiquitous Multimedia Service Delivery System
|
Aditya Manthramurthy | Query-load Agnostic Pre-processing for Multi-dimensional Data Sets
|
Adway Mitra | Efficient Covariance-based Algorithms for Appearance Modeling in Computer Vision
|
Anshuman Dutt | Efficient Identification of Roubust Plans and Efficient Generation of Plan Diagrams
|
Arunachalam E V | A Dual Coordinate Descent Method for Two View Learning
|
Ashish Tiwari [DRDO] | A Public Key System for Authenticated Key Establishment Between Peers and its Application to Peer-to-peer Networks
|
Bale Mahesh Rajesham | Power Profiling of Database Engines
|
Biswanath Halder | On the Acyclic Edge Coloring of Cubic Graphs
|
Dapme Passah | Design and Development of an Intelligent Subsystem (ISS) for Grouping and Aggregating Queries in Semantic Web
|
Edukondalu C H | Decision Trees Using the Weighted Sum of Information Gains
|
Gilesh M P [QIP] | An Adaptive Reliable Transport Protocol Based on Automatic Resend Request (ASQ) Technique for Wireless Sensor Networks
|
Hari Shankar Gupta | Locating Service Descriptions in Existing Systems
|
Harish Kumar Ande | Non-volatile Memories in Buffer Cache Management and Synchronization Operations
|
Himabindu L V N K | Exploring Topic Models for Facet and Sentiment Extraction from Customer Reviews
|
Jagannatham B [DRDO] | Accounting for Interrupts on Multiprocessors using Two-level Scheduling of Hard Real-time Tasks
|
Janardhan Dattatreya Kulkarni | New E-net Constructions
|
Jyothi Korra | Object Categorization using Genetic Programming
|
Karmveer Sharma | Erdos-szekeres Problem: J-convex K-gons Variants
|
Kaushik B V | Improving Ext2 Filesystem Reliability Using Dif
|
Kunjir Mayuresh Prakash | Exploring Opportunities of Power Savings in Database Query Optimizers
|
Mangesh Dattatray Pujari | On Wiener Index of Special Classes of Graphs
|
Mayur Diliprao Mohite | Incentive Compatible Influence Maximization in Social Networks
|
Parmar Siddharthkumar Jagdishbhai | Spam Mail Filtering using Positive and Unlabeled Examples
|
Paul Victor Raj G | Analyzing Scalability of Parallel Programs using Program Analysis
|
Pavanakumar V N | Scalable Lock-free FIFO Queues using Efficient Elimination Techniques
|
Rahul Kumar S | Discovering Business Process Model from Unstructured Activity Logs
|
Ravichandhran Kandhadai Madhavan | Scalable Null Dereference Analysis for Java Programs
|
Ravindrababu Ravula | Implementation of MPI Programs in a Cloud Computing Environment
|
Sanjay Kumar | Efficient Key Distribution Schemes for Wireless Sensor Networks using LDU' Composition Of Symmetric Matrices
|
Satish Dinakar B | Moving Goal Search in Dynamic Environments
|
Shoban Babu B | Study of Subset Selection Method for Combining Classifiers
|
Shweta Jain | Efficient Algorithms for Online SVM Classifier Design
|
Sivabhavani J | Automated Checkpointing for Malleable Parallel Applications
|
Srikanth K Krishna [Maj] | ECBRF: An Efficient Cluster Based Reputation Framework for Wireless Sensor Networks
|
Srividya Ramanathan | Enhancing Transactional Memory Performance by Improving Transaction Scheduling
|
Sudha Balodia | Policy Inference and Anomaly Detection for Iptables using Segmentation
|
Tilak Raj G | K-cozy Problem
|
Varun Kumar Reddy Bobbala | Automatic Text Summarization: Statistical vs Cognitive Analysis
|
Vijeth D | Uncertainty Visualization using High Dynamic Range Volume Rendering
|
Vikram M Tankasali | Iterative Rigidity Checking and Inference for 3D Pointset Matching
|