1 |
Virtualization of Large-Scale Data Storage System to Achieve Dynamicity and Scalability in Grid Computing |
Advances in Intelligent and Soft Computing, ISSN: 1867-5662, Springer, 233 SPRING STREET, NEW YORK, USA, NY, 10013. Springer, Vol. 167, page 323-331 |
Ajay Kumar, Seema Bawa, |
2 |
A Survey of Search and Retrirval of Components from Software Repositories |
International Journal of Engineering research and Technology, ISSN : 2278 – 0181, Vol 2, Issue 4, April 2013. |
Amandeep Bakshi, Seema Bawa |
3 |
Key features of research portal for stimulating research in institutions of higher technical education |
EGITIM ARASTIRMALARI-EURASIAN JOURNAL OF EDUCATIONAL RESEARCH, Vol. 48, No. 12, pp. 155-174, 2012 |
Parul Dharmani, Ravi Kiran, Anil K Verma |
4 |
Simulation and analysis of AODV routing protocol in VANET |
International Journal of Soft Computing and Engineering, Vol. 2, No. 3, 293-301, July 2012 |
Tajinder Kaur, K Cheema, Anil K Verma |
5 |
Agent enriched distributed association rules mining- A review |
Agents and Data Mining Interaction-LNCS, Vol. 7103, pp. 30-45, 2012 |
G S Bhamra, R B Patel, Anil K Verma |
6 |
Simulation and analysis of dropped packets for DSR protocol in VANET |
International Journal of Computing, Intelligent and Communication Technologies, Vol. 1, No. 1, Oct 2012 |
Avleen Kaur, Anil K Verma |
7 |
Simulation and Comparison of AODV and DSR Routing Protocols in VANETs |
International Journal of Computing, Intelligent and Communication Technologies, Vol. 1, No. 1, Oct 2012 |
Tajinder Kaur, Avleen Kaur, Anil K Verma |
8 |
Computation of Pheromone Values in AntNet Algorithm |
International Journal of Computer Network and Information Security, Vol. 9, pp. 47-54, Aug 2012 |
Anuj Gupta, H Sadawarti, Anil K Verma |
9 |
Simulation and analysis of DSR protocol in VANETs |
International Journal of Research in Computer and Communication Technology Vol. 1 No. 3, pp. 50-59, Aug. 2012 |
Avleen Kaur, Anil K Verma |
10 |
SNMP, ICMP: A Collaborative Approach to Network Discovery and Monitoring |
International Journal of Smart Sensors and Ad Hoc Networks (IJSSAN) ISSN No. 2248-9738 Volume-1, Issue-3, 2012 |
Aman Mahajan, Sahil Khajuria, Haresh Joshi, Anil K Verma |
11 |
Classification of Symmetric Key Management Schemes for Wireless Sensor Networks-Extended |
International Journal of Security and its Application, Vol. 7. No. 2, Mar 2013 |
Suman Bala, Gaurav Sharma, Anil K Verma |
12 |
MFZLP: Multihop Far Zone Leach Protocol for WSNs |
Journal of Computational Intelligence and Electronic Systems, Vol. 2, No. 1, pp. 45-49, 2013 |
Virender Ranga;Mayank Dave;Anil Kumar Verma |
13 |
Implementation of DYMO routing protocol |
International Journal of Information Technology, Modeling and Computing, Vol. 1, No. 2, pp. 49-57, May 2013 |
Anuj K. Gupta, Harsh Sadawarti, Anil K. Verma |
14 |
Security Issues in Manet: A Survey on Attacks and Defense Mechanisms |
International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, No. 6, pp. 1382-1394, Jun 2013 |
T Bhatia, Anil K Verma |
15 |
Performance Analysis of MANETS Routing Protocols in Different Mobility Models |
International Journal of Information Technology and Computer Science, Vol. 6, May 2013 |
K Gupta Anuj, Harsh Sadawarti, Anil K Verma |
16 |
Knowledge Management Role of Thought Leaders and Junior Academia in Enhancing Research and Curriculum in Institutions of Higher Technical Education |
SAGE Open, pp. 1-13, June 2013 |
Ravi Kiran, Parul Agarwal, Anil K Verma |
17 |
How the Two Wireless Networks Can Be Different: WSNS and VANETS |
Journal of Basic and Applied Scientific Research, 2013 |
Vandana Jindal, A.K.Verma, Seema Bawa |
18 |
Multi-Core Scheduling in Cloud Computing, |
International Journal of Applied Information Systems (IJAIS) – ISSN : 2249-0868, Volume 4– No.9, |
Abhishek Kaushik and Inderveer Chana, |
19 |
Heterogeneous Workload Consolidation for Efficient Management of Data Centers in Cloud Computing” |
International Journal of Computer Applications, IJCA Journal, pp.13-17, Vol 50, No 10 Year of Publication: 2013 |
Deep Mann and Inderveer Chana, |
20 |
Empirical Evaluation of Cloud-based Testing Techniques:A Systematic Review |
International Journal of Computer Information Systems and Industrial Management Applications, pp. 466 - 473 ,Vol 6
|
Priyanka, Inderveer Chana and Ajay Rana |
21 |
Existing Load Balancing Techniques in Cloud Computing : A Systematic Review |
International Journal in Foundations of Computer Science & Technology(IJFCST), Volume 3, No.3, May, 2013 |
Kansal J. N., Chana I. |
22 |
Fault Tolerance- Challenges, Techniques and Implementation in Cloud Computing |
International Journal of Cloud Computing and Services Science (IJ-CLOSER), Vol.2, No.2, pp. 123~133, ISSN: 2089-3337. |
Anju Bala, Inderveer Chana |
23 |
Cloud Load Balancing Techniques: A Step Towards Green Computing |
International Journal of Cloud Computing and Services Science (IJ-CLOSER), pp. 291~302,Vol.2, No.1, |
Kansal J. N., Chana I. |
24 |
An Enhanced Run Length Coding for JPEG Image Compression |
International Journal of Computer Applications , 72(20), 2013 |
Amritpal Singh, V. P Singh |
25 |
Adaptive Distributed Intrusion Detection using Hybrid k-means SVM Algorithm |
International Journal of Enhanced Research in Management & Computer Applications, Vol. 2 Issue 6, June-2013, pp: (10-14), |
V. P. Singh, Parneet Kaur |
26 |
Steganography : A modern day Art and Science for Data Hiding |
International Journals of latest research in Science and Technology (IJLRST), Volume 2 Issue 4 ,2013 (Accepted) |
Roopam Bansal and V. P. Singh |
27 |
Modeling and Querying Data in MongoDB |
International Journal of Scientific and Engineering Research Vol. 4, No. 2 pp. 141-144 |
Rupali Arora Rinkle Aggarwal |
28 |
Implementation of relation queries in graph databases |
International Journal on Information & Communication Technologies Vol. 6 no.1 pp.354-357 |
Rupali Arora Rinkle Aggarwal |
29 |
Simulating wireless sensor networks using opnet |
International Journal on Information & Communication Technologies Vol. 6 no.1 pp. 366-371 |
Abhinandan Gupta Rinkle Aggarwal |
30 |
Design and Performance Evaluation of a New Irregular Fault- Tolerant Multistage Interconnection Network |
International Journal of Computer Science Issues Vol. 9, No. 2 pp. 108-113 |
Rinkle Aggarwal |
31 |
Design and Reliability Analysis of a Class of Irregular Fault-tolerant Multistage Interconnection Networks |
International Journal of Computer Applications Vol. 39, No.8, pp. 8-14 |
Rinkle Aggarwal |
32 |
An Efficient Algorithm for Data Cleaning of Log File using File Extensions |
International Journal of Computer Applications Vol. 48, No.8, pp. 13-18 |
Surbhi Anand Rinkle Aggarwal |
33 |
Reference Scan Algorithm for Path Traversal Patterns |
International Journal of Computer Applications Vol. 48, No.7, pp. 20-25 |
Chintandeep Kaur Rinkle Aggarwal |
34 |
An Efficient Algorithm for Web Page Change Detection |
International Journal of Computer Applications Vol. 48, No.10, pp. 28-33 |
Srishti Goel Rinkle Aggarwal |
35 |
A Modified Algorithm to Handle Dangling Pages using Hypothetical Node |
International Journal of Computer Applications Vol. 48, No.7, pp. 26-32 |
Shipra Srivastava Rinkle Aggarwal |
36 |
A Short Survey of Key Distribution Techniques for Namespace Load Balancing |
International Journal of Emerging Technologies in Computational and Applied Sciences, Issue 4, Vol. 1, 2 & 3, pp. 532-536, May, 2013 |
Ravneet Kaur, Shalini Batra |
37 |
Phases of Testing An Online Application |
International Journal of Advanced Research in Computer Science and Software Engineering, Vol 3, No. 6, June 2013 |
Sandeep Singh and Shivani Goel |
38 |
Testing Techniques for COTS |
International Journal of Advanced Research in Computer Science and Software Engineering, Vol 3, No. 4, pp. 829-833, April 2013 |
Jagdeep Singh and Shivani Goel |
39 |
COTS and OSS: A Comparative View |
The International Journal of Computer Science and Applications Vol 1, No. 12, pp. 55-59, Feb 2013 |
Jagdeep Singh and Shivani Goel |
40 |
Selection of Component Models: A Comparative view |
International Journal of Computer Engineering and Software Technology, Vol 3, No. 2, pp. 166-173, July-Dec 2012 |
Jyotsna, Shivani Goel |
41 |
Vulnerability Management for an Enterprise Resource Planning System |
International Journal of Computer Applications, ISSN: 0975 – 8887, Vol 53, No. 4, September 2012, pp. 19-22 |
Shivani Goel, Ravi Kiran, Deepak Garg |
42 |
UNL-ization of Numbers and Ordinals in Punjabi with IAN, |
International Journal on Natural Language Computing (IJNLC), Vol. 2, No. 3, June 2013: 61,69. |
Vaibhav Agarwal, Parteek Kumar |
43 |
NLization of Nouns, Pronouns and Prepositions in Punjabi With EUGENE, |
International Journal on Natural Language Computing (IJNLC), Vol. 2, No. 2, April 2013: 33,42 |
Ashutosh Verma, Parteek Kumar |
44 |
Development of Mobile Application for Transliteration of Roman Script to Gurmukhi Script, |
International Journal of Computational Linguistics and Natural Language Processing, Vol. 1, No. 1, Aug 2012: 6-11. |
Maninder Singh, Parteek Kumar, Ms. Rupinderdeep Kaur |
45 |
Web Page Categorization: Tools, Techniques and Evaluation |
International Journal of Advances in Computing and Information Technology, ISSN 2277-9140, Vol. 1, Issue-2, pp. 212-219, 2012 |
K. Taneja, and V. K. Bhalla |
46 |
Analysis the Performance of MANET Protocols by Varying the Number of Connections |
International Journal of Mobile & Adhoc Network, ISSN 2231–6825, Vol 2, issue 2, pp.185-191,2012 |
Shivender Taneja and Vinod K Bhalla |
47 |
Optimization of Hamilton Path Tournament Schedule |
International Journal of Advanced Research in Computer Engineering & Technology, Volume 2 Issue 6 of (ISSN: 2278-1323) , 2013 |
Trinetra Kumar Pathak and Vinod K. Bhalla |
48 |
Android Internals |
International Journal of Advanced Research in Computer Science and Software Engineering,” Vol. 3, Issue 6, pp. 143-147, 2013 |
Vaibhav Kumar Sarkania, Vinod Kumar Bhalla |
49 |
ANN Based Scheme to Predict Number of Zombies involved in a DDoS Attack |
International Journal of Network Security (IJNS), vol. 14, no. 1, ISSN 1816-3548, pp. 36-45 |
B. B. Gupta, R. C. Joshi, Manoj Misra |
50 |
Phishing Dynamic Evolving Neural Fuzzy Framework for Online Detection “Zero-day” Phishing Email, |
Indian Journal of Science and Technology, Vol. 6, issue 1, pp. 1-5 (ISI Thomson Router) |
A. ALmomani, B. B. Gupta, T. Wan, A. Altaher, S. Manickam |
51 |
Predicting Number of Zombies in DDoS Attacks Using Pace Regression Model |
Journal of Computing and Information Technology (CIT) , Vol. 20, no. 1, ISSN 1846-3908, pp. 1–8 |
B. B. Gupta |
52 |
Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art |
International Journal of Computer Applications, Vol. 49, no. 7, pp. 24-32, 2012 |
E. Alomari, S. Manickam, B. B. Gupta, S. Karuppayah, R. Alfaris |
53 |
Enhanced CBF Packet Filtering Method to Detect DDoS Attack in Cloud Computing Environment |
International Journal of Computer Science Issues(IJCSI), vol. 10, issue 2, pp. 142-146 |
P. Negi, a. Mishra, B. B. Gupta |
54 |
Mutation Operators corresponding Conditions Contributing in Deporting them Equivalently |
Vol. 4(2), 656-658, 2013 IJCST |
Tannu Singala Ajay Kumar |
<55 |
Rule based Normalization of Regular Expressions |
International Journal of Advanced Research in Computer Science and Software Engineering, 3(5), 2013 |
J. S. Khedar, Ajay Kumar |
56 |
Ambiguity detection algorithm for context free grammar |
IJCST, 4(3), 2013 |
S. K. Jain, Ajay Kumar |
57 |
Text to Speech Synthesis for numerals into Punjabi Language |
International Journal of Computational Linguistics and Natural Language Processing Vol 2 Issue 7 July 2013 |
Karun Verma, Maninder Singh |
58 |
Workflow Management in Cloud Computing |
IJAIS, Vol no:4, page no: 21-26., Oct.2012 |
Monika Bharti, Anju Bala |
59 |
Automatic Fragmentation and Storage of Code in Component Repository w.r.t. their Input and Output Interfaces: A Tool” |
International Journal of Innovative Technology and Exploring Engineering (IJITEETM) ISSN: 2278-3075, Volume-2, Issue-3, Page: 235-238 February 2013 |
Pankaj Vohra Ashima Singh |
60 |
A Tool incorporation different Techniques for Effective Component Storage and Retrieval |
International Journal. of Scientific and Engineering Research, vol. 4, no. 7, pp. 1134-1137, 2013. |
Pankaj Vohra Ashima Singh |
61 |
Iterative and Non–Iterative Approaches for Architecture Based Software Development |
CiiT International Journal of Software Engineering and Technology Vol 5, January 2013 |
Navneet Rathour Ashima Singh |
62 |
Generating More Reusable Components while Development : A Technique |
International Journal of Innovative Technology and Exploring Engineering(IJITEE) Volume-2 Issue-3, 2013 |
Navneet Rathour Ashima Singh |
63 |
A Complexity Metric for Black Box Components |
International Journal of Soft Computing and Engineering Volume-3 Issue-2, ,10,179-184, June 2013 |
Navneet Rathour Ashima Singh |
64 |
A Technique for Component Based Software Development |
International Journal of Computer Science and Engineering ( IJCSE ) Volume-2, Issue 2, 123-134, May 2013 |
Navneet Rathour Ashima Singh |
65 |
Component Complexity Metrics: A Survey |
International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, no. 6,pp. 1056-1061, June 2013 |
Navneet Rathour Ashima Singh |
66 |
A metric for Assessing Black Box Component Reusability |
International Journal of Scientific and Engineering Research, vol 4 ,no. 7, pp. 1114-1121, 2013 |
Navneet Rathour Ashima Singh |
67 |
Design and Deployment of Workflows in Cloud Environment |
IJCA Vol No: 51 Issue 11 pp:9-15, August 2012 |
Anju Bala and Inderveer Chana |
68 |
Autonomic Data Replication in Cloud Environment |
IJECSE, Vol.2, page no: 459-464, Jan,2013 |
Dhananjya Gupta, Anju Bala |
69 |
Autonomic Fault Tolerant Framework for Web Applications |
IJCST Vol. 4, Issue 2,pp: 528-533 April - June 2013 |
Dhananjya Gupta, Anju Bala |
70 |
An Emerging approach towards Clone Detection: Metric based Approach on byte code. |
International Journal of Advance Research in Computer Science and Software Engineering, Vol 3, pp:881-888, May 2013 |
Kanika Raheja and Rajkumar Tekchandani |
71 |
Evaluation of Flow Graph and Dependence Graphs for Program Representation |
International Journal of Computer Applications, Vol. 56, Issue.14, pp. 18-23, October 2012 |
Vinay Arora, Rajesh Kumar Bhatia, Maninder Singh |
72 |
Literature Analysis on Model based Slicing |
International Journal of Computer Applications, Vol. 70, Issue.16, pp. 45-51, May 2013 |
Rupinder Singh, Vinay Arora |
73 |
Technique for Extracting Subpart from UML Sequence Diagram |
International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, Issue 6, pp. 593-596, June 2013 |
Rupinder Singh, Vinay Arora |
74 |
Conceptual and Semantic measures for cohesion in Software Maintenance |
International Journal of computer applications (IJCA),USA, Vol. 47, No. 22, pp. 40-45, 2012. |
Ashutosh Mishra and Vinayak Srivastava |
75 |
Extracting a knowledge from source code comprehension using data mining methods |
Int. J. knowledge Engineering and Data mining, InderScience Publication, UK, Vol. 2, NOS. 2/3, 2012 |
Ashutosh Mishra and Vinayak Srivastava |
76 |
Intelligent Computing Methods for Software Maintenance: a Review |
Journal of Software Engineering and Technology,Vol. 4, issue 1, pp.1-12, 2012 |
Ashutosh Mishra and Vinayak Srivastava |
77 |
Data mining methods for Program Comprehension |
International Journal on Computer Science and Technology (IJCST), Vol. 3, issue- 2, pp. 110-116, 2012. |
Ashutosh Mishra and Vinayak Srivastava |
78 |
Use of Semantic Relatedness for Intelligent Access to Cultural Information |
International Journal of Computer Applications, Volume 64 – No. 15, February 2013, pp. 21-28 |
Harkiran Kaur, Dr. Seema Bawa |
79 |
Creating Digital Archives of Ancient Scriptures using CAPTCHAs |
International Journal of Computer Applications, Volume 64 – No. 15, February 2013, pp. 29-37 |
Harkiran Kaur, Dr. Seema Bawa |