S. No. | Title of the paper | Name of the conference with venue, date and year, page nos. | Name of the authors |
---|---|---|---|
1 | An Improved Forward Secure Elliptic Curve Signcryption Key Management Scheme for Wireless Sensor Networks | International Conference on IT Convergence and Security, Kyeong Chang, Korea, December 5-7, 2012 , Springer, IT Convergence and Security 2012-LNEE, Vol. 215, pp. 141-149, 2013 | Suman Bala, Gaurav Sharma, A.K.Verma |
2 | Optimized Elliptic Curve Cryptography for Wireless Sensor Networks | 2nd IEEE International Conference on Parallel Distributed and Grid Computing pp. 89-94, 6-8 Dec. 2012 | Suman Bala, Gaurav Sharma, A.K.Verma |
3 | Identity- based Ring Signcryption Schemes-A Review | The 2012 FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing, Jeju, Korea, Nov 22-25 | Gaurav Sharma, Suman Bala, A.K.Verma |
4 | An Identity-based Ring Signcryption Scheme for Wireless Sensor Networks | International Conference on IT Convergence and Security, Kyeong Chang, Korea, December 5-7, 2012 , Springer, IT Convergence and Security 2012-LNEE, Vol. 215, pp. 151-157, 2013 | Gaurav Sharma, Suman Bala, A.K.Verma |
5 | A Survey and Taxonomy of Symmetric Key Management Schemes for Wireless Sensor Networks | Proceedings of the CUBE International Information Technology Conference,CUBE-2012, pp. 585-592, Sep 3-5, 2012 | Suman Bala, Gaurav Sharma, A.K.Verma |
6 | Cryptanalysis of certificateless signature scheme | The Sixth International Conference on Information, Tokyo, Japan, May 8 - 11, 2013 | Gaurav Sharma, Suman Bala and Anil K. Verma |
7 | Breaking the RSA-based Certificateless Signature Scheme | Breaking the RSA-based Certificateless Signature Scheme | Gaurav Sharma and Anil K. Verma |
8 | Power-Aware Virtual Machine Scheduling-policy for Virtualized Heterogeneous Multicore Systems | Second International Conference on Advances In Electronics, Electrical And Computer Engineering (EEC-2013), Dehradun, 22-23 June, 2013. | Taranpreet Kaur and Inderveer Chana |
9 | Securing Virtual machines in Cloud Environment using OVF | Second International Conference on Advances In Electronics, Electrical And Computer Engineering,Dehradun, India, 2013. | Rajinder Sandhu and Inderveer Chana |
10 | Formal Specification Language Based Cloud Workload Regression Analysis | IEEE International Conference on Control, Computing, Communication and Materials-2013 (ICCCCM-2013), United Institute of Technology, Allahabad, India. | Sukhpal Singh, Inderveer Chana, |
11 | Consistency Verification and Quality Assurance (CVQA) Traceability Framework for SaaS | Ajay Kumar Garg Engineering College, Ghazibad, India, IEEE Xplore Digital Library Catalog No: CFP1339F-CDR ISBN: 978-1-4673-4528-6, Feb 2013 | Sukhpal Singh, Inderveer Chana, |
12 | A novel Hybrid approach for web caching. | Sixth International conference on Innovative Mobile and Internet Services In Ubiquitous Computing, Palermo, Italy,4thto 6th July 2012,pp. 512-517. | Rajeev Tiwari, Neeraj Kumar |
13 | Morphological Analysis of Punjabi Verbs for UNL Based Machine Translation System | International Conference on Global Innovations in Technology and Sciences - 2013”,organized by SAINTGITS College of Engineering 4th to 6th April 2013 Kottayam, Kerala, India |
Parteek Kumar, R.K. Sharma |
14 | Agile Software Process Model: A Comparative View | International Conference on Advances in Management and Technology (iCAMT-2013), Feb 2013, held at PIET, Patiala, Punjab, India, on , Published in International Journal of Computer Applications,(0975-8887), pp. 10-14. | P. Joshi, A. Aggarwal and S. Goel |
15 | CBSE versus COTS Based Software Development | International Conference on Recent trends in Computing (ICRTC-2012), held at SRM University, NCR Campus, Modinagar, Ghaziabad, India, ISBN: 978-93-81583-67-8, October 04, 2012, pp. 135-138. | S. Singh and S. Goel |
16 | Learning through ERP in Technical Educational Institutions | Interactive Collaborative Learning 2012 Conference in Villach, Austria, 26-28 September 2012, pp. 388-391 | Shivani Goel, Ravi Kiran, Deepak Garg |
17 | Technologies for Cost Efficient ERP: A theoretical Perspective | Proceedings of ICAdC, SPRINGER, AISC 174, pp. 113-120 | Shivani Goel, Ravi Kiran, Deepak Garg |
18 | Comparison of HMM and DTW for Isolated Word Recognition of Punjabi Language | Proceedings of Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, Sao Paulo, Brazil. Volume 6419 of Lecture Notes in Computer Science (LNCS), Page 244 – 252, Springer Verlag. | Ravinder Kumar |
19 | Spoken isolated Word Recognition of Punjabi Language Using dynamic time Warping Technique | Demo in Proceedings of Information System for Indian Languages, Punjabi University, Patiala, India, Volume 139 of Communication in Computer and Information Science (CCIS), Page 301, Springer Verlag. | Ravinder Kumar, Mohanjit Singh |
20 | Fingerprint and Minutiae points Technique | Proceedings of the Second International Conference on Soft Computing for Problem Solving, (SocProS 2012), December 28-30, 2012 | Karun Verma, Ishdeep Singla |
21 | A Contrast and Comparison of Modern Software Process Models. | International Conference on Advances in Management and Technology iCAMT: Patiala College of Engineering, Patiala 23-27, February 2013. IJCA Proceedings on International Conference on Advances in Management and Technology 2013 Published by Foundation of Computer Science, New York, USA,23-27 | Pankaj Vohra and Ashima |
22 | Autonomic Fault Tolerance using VM Migration in Cloud Computing | GCA’13 Las,Vegas ,accepted in May 2013 | Anju Bala and Inderveer Chana |
23 | Detecting Clone and Redesigning | International Conference on Evolution of Science and Technology, PPIMT Hisar, March 2013. | Kanika Raheja and Rajkumar Tekchandani |
24 | Cognition Based Selection and Categorization of Maintenance Engineer (Agent) using Artificial neural net and Data mining methods | , Indore, India, IEEE Xplore – Software Engineering, pp. 1-11, 2012. | Ashutosh Mishra and Vinayak Srivastava |
25 | Cognitive complexity measure for perfective software maintenance | International Conference on Artificial Intelligence and Soft Computing (AISC-2012), Computer Engineering Department, IIT (BHU) – Varanasi, India, 2012. In proceeding. | Ashutosh Mishra and Vinayak Srivastava |
26 | Source code comprehension using data mining methods | National Conference on Frontiers of Research and Development in Computational Sciences(FRDCS-2012), Mahatma Gandhi Kashi Vidhyapeeth, Varanasi, pp. 28-32, 2012. | Ashutosh Mishra and Vinayak Srivastava |
27 | Multi Agent Paradigm for Software Maintenance | National Conference on Artificial Intelligence and Agents: Theory & Applications-(AIATA-2011), December 2011, IT-BHU Varanasi, pp.122-130, 2011. | Ashutosh Mishra and Vinayak Srivastava |
28 | Trust-Based Grid Resource Management | LNEE., vol. 150, Vinu V. Das.(Ed): Springer-Verlag, 2012, pp. 415-423,doi:10.1007/978-1-4614-3363-7_47. | Damandeep Kaur and Jyotsna Sengupta |
29 | A Trust Model based on P2P Trust Models for Secure Global Grids | Proc. IEEE Conf. Trust, Security and Privacy in Computing and Communications (TRUSTCOM -2012), IEEE Press, Sept. 2012, pp. 1103–1108 | Damandeep Kaur and Jyotsna Sengupta |
30 | “P2P Trust and Reputation Based Model for Securing Grid” | Proc. IEEE Conf. Advances in Engineering, Science and Management (ICAESM2012), Jun. 2012, pp. 524–529. | Damandeep Kaur and Jyotsna Sengupta |
31 | “Proposed P2P Trust and Reputation Based Model to Secure Grid” | Proc IJCA Conf., Recent Advances and Future Trends in Information Technology (iRAFIT 2012), vol. iRAFIT (2), Apr. 2012, pp. 19-24. | Damandeep Kaur and Jyotsna Sengupta |
32 | A review of power aware routing in Wireless sensor networks | National Conference of Wireless Sensor Networks and its Applications(NCWSNA)Tamilnadu,March22, 2012 | A.K. Verma and Sukhchandan Randhaw |