| Student |
Title |
| Aakar Deora | Verifiable Secret Sharing With Honest Majority
|
| Abhinav Site | Solid State Drive As Swap Device
|
| Abhishek Jaiswal | Implementation Of Deep Learning Methods For Classification Of Image And Audio Data
|
| Aditya Cherla | Formal Verification Of Freertos Queue Apis
|
| Amit Kumar Mandal | Private Set Intersection In Malicious Model
|
| Anurag Tomer | Parameter Tuning And Feature Adaptation For Traffic Signal Control
|
| Arnab Sen | S-Blac: A Scalable Blacklistable Anonymous Credential System
|
| Arshed Nabeel M P | On The Parameterized Complexity Of Minmax Approval Voting
|
| Arti Bhat | Atomicity Semantics And Violation Detection For Android Applications
|
| Arunkumar S | Checking Thread Safety Of Freertos Apis
|
| Ashoke S | Design And Implementation Of Codd 1.0
|
| Badavath Prathap | Impact Of Mobility Model On The Performance Of Routing Protocols In Mobile Ad Hoc Network
|
| Bibaswan Kumar Chatterjee | Computing Lovasz Thela And Learning The Optimal Unit Sphere Embedding For Graph Transduction
|
| Chandana D | Discrimination Phrase Detection For Effective Text Classification
|
| Ganesh Bellikar [Defence] | A Three-Tier Architecture For Pseudonym-Based Anonymous Authentication In Vanets
|
| Harichand M V [ISRO] | Storage Cache Optimization Using Maching Learning
|
| Indrajeet Kumar | Actor-Critic Reinforcement Learning Based Energy Management Policies For A Single Sensor Node With Finite Buffer
|
| Jaiprakash | Recommendation Using Equal Information With Non-Random Missing Data
|
| Jaswant Meena | Overlapping Community Detection In Social Network Using Disjoint Community Detection
|
| Karrotu Santosh Srinivas | Resource Allocation Algorithms For Cloud Computing Platforms With Strategic Agents
|
| Lakhpat Meena | Prototype Selection On Large And Streaming Data
|
| Lawqueen Kanesh | Sleeping Policies For Intrusion Detection In Sensor Networks
|
| Mahajan Chetas Subhash | Using Anipqo To Produce Anorexic Plan Diagrams On The Fly
|
| Manish Kesarwani | Securely Processing Range Predicates On Cloud Database
|
| Mohd Aqil [ISRO] | Probabilistic Models Of Natural Source Code
|
| Mukesh Singh | Algorithms For Large Scale Classification
|
| Namboodiri Lohit Krishnan | Improving Worst-Case Bounds For Plan Bouquet Based Techniques
|
| Pankaj Kumar Gautam | Design And Analysis Of Aes-Based Energy Efficient Block Cipher
|
| Pankhuri | Improving Postgresql Cost Model
|
| Parixit Prasad | Memoization Scheme Suggester For Java Methods
|
| Patel Arth Kausheybhai | Improving Memory Hierarchy Performance In Heterogeneous System Architecture (HSA)
|
| Pawan Kumar | Large Scale Algorithms In Topic Models
|
| Priyank Parihar | Performance Optimisation Of Hadoop Mapreduce
|
| Priyanka Mondal | Extended Atomicity Checking With Blame Assignment For Android Applications
|
| Puneet Pahuja | Optimising Social Utility In Networks With Respect To Flow Control
|
| Purshotam | Machine Learning Models For Tunning Storage System Configuration
|
| Rajmohan C |
|
| Rishabh Singla | Finite Horizon Markov Decision Process For Resource Allocation In Crowdsourcing Platforms
|
| Sachin Kumar Srivastava | Generating Quantified Invariants From Scalar Invariants
|
| Sajith B [QIP] | A Simulation Tool For Performance Analysis Of Multiarmed Bandit Mechanisms
|
| Sayan Biswas | Bitcoin: A Survey With Studies On Stability And Anonymity
|
| Shaifali Gupta | Multi-Campaign Influence Maximization In Social Networks
|
| Sravya Vankayala | Algorithms For Matrix Completion
|
| Suman Kumar Datta | Maximum Volume Clustering On Multiple Graphs
|
| Surabhi Akotiya | Multi-Phase Information Diffusion In Social Networks
|
| Suvita | Precise Slicing By Using Weakest Pre-Condition
|
| Tarun Bansal | Development Of A Graphical Interface For Endoscopy Simulator
|
| Toms Varghese | Intrumenting Virtualized Storage Infrastructure
|
| Vibhuti Shali | Optimal Omni-Channel E-Retail
|
| Vijaikumar M | Citation Analysis Using Influence Link Weight
|