| Student |
Title |
| Abdullah Jawhari S | 3-Colorable Triangulation Of Planar Point Sets
|
| Anjali Jain | Comparative Shopping; Product Reviews: Mining Aspects, Sentiments & Ratings
|
| Anubhav Gupta | Ranking Institutiions In Heterogeneous Bibliographic Networks
|
| Anupam Sanghi | Performance Testing For Database Systems
|
| Arabinda Moni | Timeminer: Automated Temporal Scoping Of Relational Facts
|
| Ashish Srivastava | Probabilistic Topic Modeling Of Text-Rich Heterogeneous Information Networks
|
| Ashwin Tv | Performance Optimizations In Glusterfs Filesystem
|
| Bagul Pankaj Asaram | Verifying Invariants Of Kernel Data Structures Of Freertos Using Vcc
|
| Bhosale Yogesh Vasant | Efficient Causally Precedes Race Detection
|
| Birendra Yadav | Semantic Analysis Of Self Citations In Bibliographic Network
|
| Cressida Hamlet | Blind Signatures Using Functional Encryption
|
| D Raghu Ram Bharadwaj | Novel Sensor Scheduling Scheme For Intruder Tracking In Energy Efficient Sensor Networks
|
| Deshant Kumar | Prediction Of Private Information Of Social-Network Users
|
| Dheeraj Ram | Scalable Secure Computation
|
| Dhoot Prerak Jagadish | Bounds For 0-1 Matrices Excluding A Given Forbidden Sub-Matrix.
|
| Divya Ravi | Secure Computation In Hybrid Network
|
| Gopu R Unnithan | A Hedonic Analysis Model For Product Review Representation And Aspect-Rating By Mining Consumer Product Reviews
|
| Hariom Gautam | Topic Modeling Using Genetic Algorithm
|
| Harit Vishwakarma | Discovering Latent Purchase Influence Graph (Grip) Using Hawkes Process.
|
| Jawad T | An Information Flow Based Microkernel
|
| Jay Ilesh Oza | Off-Policy Learning And Evaluation For Push Notifications
|
| Kuntal Ghosh | Robust Query Processing
|
| Lucky Dhakad | Finding Personal Styles In Long-Tail Of Lifestyle Products
|
| Maddineni Manohar | Coordianted Online Resource Allocation In Cloud Computing
|
| Madhusudan L | Learning Semantically Coherent And Reusable Kernels In Convolution Neural Nets For Sentence Classification
|
| Maj. K S Tanwar | Scalable Malware Triage Using Efficient Common Behaviour Detection
|
| Marilyn George | Fully-Secure Predicate Only Encryption Implies Searchable Symmetric Encryption
|
| Muhammed Fazal E | An Information Flow Based Microkernel
|
| Niranjan Singh | A Method To Mitigate Code Reuse Attacks
|
| Nithin V Nath | Secure Deduplication Across Files
|
| Parth Verma | Document Classification Using Community Detection
|
| Pathak Harshil Sandeepbhai | Optimization And Acceleration Of Convolutional Neural Network Computations
|
| Pradeep Kumar Kudikala | Clustering Semantically Equivalent Segments Of Incorrect Programs
|
| Pradeep Kumar Pandey | Music Mood Classification Based On Audio Features And Lyrics
|
| Rahul Hasija | Executing Database Query On Modern Cpu-Gpu Heterogeneous Architecture
|
| Raman Preet Kaur | Tracking Change In Topology During Downsampling
|
| Ramit Hansda | Data Forwarding In Opportunistic Networks
|
| Rohit Kumar | Mining And Analyzing Less Explored Aspects Of Citation Network
|
| Saravanan K | Online Single Source Ride Sharing
|
| Shinjini Biswas | Parallelization of Multi Label Classification for Large Data Sets
|
| Shreyas S | Orthogonal Representations
|
| Siddharth Shakya | Analysing Evolution Of Sleeping Beauty In Heterogenous Citation Network
|
| Sqn. Ldr. Ns Bharath Kumar | Aggregation Of Digital Signature In Vanets
|
| Sqn. Ldr. Oruganti Sudhir Babu | Design Of Incentives And Resource Allocation In Geosensing Applications
|
| Vamshi Pasunuru | Predicting Query Execution Time Using Statistical Techniques
|
| Vemula Srimithra | Accelerating Data Deduplication Using Shingling
|
| Vipin Nagar | Trace Generation For Asynchronous Events In Event Driven Programs
|
| Vishal | A Sparse Non-Linear Classifier Design Using Auc Optimization
|