| Student |
Title |
| Aashraya Sachdeva | Learning Joint Representations of Android Applications and Privacy Policies
|
| Abhinav Anil Sharma | A Hybrid Model for Predicting Performance in Heterogeneous System Architecture
|
| Abhishek Bansal | Design of Neural Networks under budget using Configurational Entropy
|
| Agrawal Siddharth Sanjay | Deep Variational Inference without Pixel-wise Reconstruction
|
| Akshay Verma | Contextual Bandits for News Article Recommendation
|
| Ansari T K | Unsupervised Language Independent Subword Modelling using Deep Learning Approaches
|
| Anoop J S | An automatic Tile Size Selection Model for Polly in LLVM
|
| Apoorv Neema | Protein Secondary Structure Prediction using Bi-LSTM Conditional Neural Fields and Semi Supervised Learning
|
| Arjun Dhakad | Dynamic Allocation Of Resources In Cloud Using Reinforcement Learning
|
| Arvind M | Developing a Model for Loop Fusion in LLVM/Polly
|
| Ashish Kumar Sen | Randomized Counter based Algorithms for Heavy Hitters Problems
|
| Balbari Sai Sandeep | Generating Plan Diagrams for High Dimensions and Higher Resolution
|
| Davinder Singh | SpillBound Implementation in QUEST
|
| Gaurav Sharma (Def) | Path Life Time Based Improved AODV Protocol for Mobile Ad Hoc Networks
|
| Himanshi Sinha | Overlapping Community Detection in Networks
|
| Indumathy J | Sports Quiz System Based on Automatic Information Extraction from Sports News Articles in Tamil Language
|
| Jagan P M | Characterization of Program Behaviour
|
| Jaipreet Singh | Scalable Methods For Visualizing Flow in a Pellet Filled Reactor
|
| Jayam Chittaranjan Modi | Wildcard Search over Encrypted Data with High Accuracy
|
| Kshitij Bhardwaj (Def) | Secure Convoy Tracking and Short Messaging Using Hierarchical Identity-based Key Agreement Scheme
|
| Lakshmi Bansal | Impact of Visual features on recommending fashion in Long-tail of products
|
| Musunuri Prathima | Intelligent Signal Control by Modelling Junctions for Noisy Events
|
| Neeraj Balotia | A Two Phase approach to Influence Limitation in Social Networks
|
| Neethu P M | Modelling gaze strategies in a change blindness attention paradigm
|
| Nirmalendu Prakash Diwakar | Empatheyes : Immersive Virtual Reality Simulation of Visual Impairments Using Smart Phones
|
| Pankaj Raina | Ranking of Institutes in a Bibliographic Network using Link Prediction
|
| Peyush Sopori | Temporal Action Localization on Untrimmed Videos for Action Recognition
|
| Pinky Budania | Discovery of Motifs and Qualitative Rules from Multi-variate Time Series
|
| Poonam Kashyap | An Information Seeding Approach to Scale Static Taint Analysis
|
| Prateek Patel | Siamese Neural Network for Document Similarity
|
| Prince Jain | CESI: Canonicalizing open Knowledge Bases using Embeddings and Side Information
|
| Priyanka Gandhara | A Multi-Armed Bandit Approach for Enhancing Student Learning and Participation through Online Discussion Forums
|
| Priyanka Sharma | Predicting Query Execution Time using Statistical Techniques
|
| Puran Deo Ojha (Def) | Improvising MINA Algorithm to Detect MPLS L3 VPN Misconfiguration in Multi-homed, Multi-VRF, Site-redundant CE Environments
|
| Raghav Sood | Synthetic Regeneration of Relational Data at Scale
|
| Rajaguru (DRDO) | A Lightweight Authentication Protocol for RFID Security
|
| Ramteke Swapnil Moreshwar | Large Scale Linear Classification
|
| Ranjesh Sisodia | Geometric Hitting Set via Local Search
|
| Ravindra Panchotiya | Outliers Detection on Time Series Data
|
| Rubee Tanden | Dynamic Task Allocation in Clould Using CloudSim Simulator
|
| Sakina Bohra | Hawkes Process for modelling urban traffic congestion
|
| Seba Ann Kuruvilla | Prototype Selection and Dimensionality Reduction on MultiLabel Data
|
| Shipra Chauhan | Private Set Intersection in Multi-Interaction Setting
|
| Shivam Gupta | Analytical Model to Evaluate the Performance of GPU using a Two-Tier Regression-Based Design Space Exploration
|
| Shivangi Agarwal | Multicore Algorithm for AUC Optimization
|
| Shreyans Dhankar | Memory Networks for Question Answer Tasks
|
| Soham Pal | SymFix: Repair and Representation Learning of Symbolic Expressions
|
| Sourabh Dalodia | Core Affinities and their impact on Hard Drive Interrupt Handling in Multicore Environment
|
| Sudeep Chatterjee | Empirical analysis on k-means, kmeans++ on different intializations
|
| Sujeet Kumar | Performance Study of Consensus Protocols for Distributed Applications
|
| Sunil Kumar Potnuru | Query Focused Document Summarization
|
| Suraj Kaushal | Detecting Topological Similarity/Dissimilarity in Multi-field Data
|
| Sushma Vithal Tingare | Traffic Signal Time Optimization With Co-operative multi-agents Round Robin Scheduling
|
| Swapnil Khanderao Kakade | Adaptive Junction Controller for Vehicular and Pedestrian Integrated Traffic Using Multi-Agent Reinforcement Learning
|
| Sweta Sharma | Adversarial Machine Learning
|
| Vikash Kumar Boran | Adaptive Approach to Improve Page Replacement Algorithms
|
| Vinay Kumar Rijhwani | Database Query Execution on Heterogeneous Architecture
|