S. No. | Title of the paper | Name of the conference with venue, date and year, page nos. | Name of the authors |
---|---|---|---|
1 | An Improved Forward Secure Elliptic Curve Signcryption Key Management Scheme for Wireless Sensor Networks | International Conference on IT Convergence and Security, Kyeong Chang, Korea, December 5-7, 2012 , Springer, IT Convergence and Security 2012-LNEE, Vol. 215, pp. 141-149, 2013 | Suman Bala, Gaurav Sharma, A.K.Verma |
2 | Optimized Elliptic Curve Cryptography for Wireless Sensor Networks | 2nd IEEE International Conference on Parallel Distributed and Grid Computing, pp. 89-94, 6-8 Dec. 2012 | Suman Bala, Gaurav Sharma, A.K.Verma |
3 | Identity- based Ring Signcryption Schemes-A Review | The 2012 FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing, Jeju, Korea, Nov 22-25 | Gaurav Sharma, Suman Bala, A.K.Verma |
4 | An Identity-based Ring Signcryption Scheme for Wireless Sensor Networks | International Conference on IT Convergence and Security, Kyeong Chang, Korea, December 5-7, 2012 , Springer, IT Convergence and Security 2012-LNEE, Vol. 215, pp. 151-157, 2013 | Gaurav Sharma, Suman Bala, A.K.Verma |
5 | A Survey and Taxonomy of Symmetric Key Management Schemes for Wireless Sensor Networks | Proceedings of the CUBE International Information Technology Conference,CUBE-2012, pp. 585-592, Sep 3-5, 2012 | Suman Bala, Gaurav Sharma, A.K.Verma |
6 | Cryptanalysis of certificateless signature scheme | The Sixth International Conference on Information, Tokyo, Japan, May 8 - 11, 2013 | Gaurav Sharma, Suman Bala and Anil K. Verma |
7 | Breaking the RSA-based Certificateless Signature Scheme | Breaking the RSA-based Certificateless Signature Scheme | Gaurav Sharma and Anil K. Verma |
8 | Power-Aware Virtual Machine Scheduling-policy for Virtualized Heterogeneous Multicore Systems | Second International Conference on Advances In Electronics, Electrical And Computer Engineering (EEC-2013), Dehradun, 22-23 June, 2013. | Taranpreet Kaur and Inderveer Chana |
9 | Securing Virtual machines in Cloud Environment using OVF | Second International Conference on Advances In Electronics, Electrical And Computer Engineering,Dehradun, India, 2013. | Rajinder Sandhu and Inderveer Chana |
10 | Formal Specification Language Based Cloud Workload Regression Analysis | IEEE International Conference on Control, Computing, Communication and Materials-2013 (ICCCCM-2013), United Institute of Technology, Allahabad, India. | Sukhpal Singh, Inderveer Chana, |
11 | Consistency Verification and Quality Assurance (CVQA) Traceability Framework for SaaS | Ajay Kumar Garg Engineering College, Ghazibad, India, IEEE Xplore Digital Library Catalog No: CFP1339F-CDR ISBN: 978-1-4673-4528-6, Feb 2013 | Sukhpal Singh, Inderveer Chana, |
12 | A novel Hybrid approach for web caching. | Sixth International conference on Innovative Mobile and Internet Services In Ubiquitous Computing, Palermo, Italy,4thto 6th July 2012,pp. 512-517. | Rajeev Tiwari, Neeraj Kumar |
13 | Morphological Analysis of Punjabi Verbs for UNL Based Machine Translation System | International Conference on Global Innovations in Technology and Sciences - 2013”,organized by SAINTGITS College of Engineering 4th to 6th April 2013 Kottayam, Kerala, India | Parteek Kumar, R.K. Sharma |
14 | Agile Software Process Model: A Comparative View | International Conference on Advances in Management and Technology (iCAMT-2013), Feb 2013, held at PIET, Patiala, Punjab, India, on , Published in International Journal of Computer Applications,(0975-8887), pp. 10-14. | P. Joshi, A. Aggarwal and S. Goel |
15 | CBSE versus COTS Based Software Development | International Conference on Recent trends in Computing (ICRTC-2012), held at SRM University, NCR Campus, Modinagar, Ghaziabad, India, ISBN: 978-93-81583-67-8, October 04, 2012, pp. 135-138. | S. Singh and S. Goel |
16 | Learning through ERP in Technical Educational Institutions | International Conference on Interactive Collaborative Learning 2012 Conference in Villach, Austria, 26-28 September 2012, pp. 388-391 | Shivani Goel, Ravi Kiran, Deepak Garg |
17 | Technologies for Cost Efficient ERP: A theoretical Perspective | International Conference on Advances in Computing, Bangalore, 3-4 July, 2012, Proceedings of ICAdC, SPRINGER, AISC 174, pp. 113-120 | Shivani Goel, Ravi Kiran, Deepak Garg |
18 | Comparison of HMM and DTW for Isolated Word Recognition of Punjabi Language | Proceedings of Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, Sao Paulo, Brazil. Volume 6419 of Lecture Notes in Computer Science (LNCS), Page 244 – 252, Springer Verlag. | Ravinder Kumar |
19 | Spoken isolated Word Recognition of Punjabi Language Using dynamic time Warping Technique | Demo in Proceedings of Information System for Indian Languages, Punjabi University, Patiala, India, Volume 139 of Communication in Computer and Information Science (CCIS), Page 301, Springer Verlag. | Ravinder Kumar, Mohanjit Singh |
20 | Fingerprint and Minutiae points Technique | Proceedings of the Second International Conference on Soft Computing for Problem Solving, (SocProS 2012), December 28-30, 2012 | Karun Verma, Ishdeep Singla |
21 | A Contrast and Comparison of Modern Software Process Models. | International Conference on Advances in Management and Technology iCAMT: Patiala College of Engineering, Patiala 23-27, February 2013. IJCA Proceedings on International Conference on Advances in Management and Technology 2013 Published by Foundation of Computer Science, New York, USA,23-27 | Pankaj Vohra and Ashima |
22 | Autonomic Fault Tolerance using VM Migration in Cloud Computing | GCA’13 Las,Vegas ,accepted in May 2013 | Anju Bala and Inderveer Chana |
23 | Detecting Clone and Redesigning | International Conference on Evolution of Science and Technology, PPIMT Hisar, March 2013. | Kanika Raheja and Rajkumar Tekchandani |
24 | Cognition Based Selection and Categorization of Maintenance Engineer (Agent) using Artificial neural net and Data mining methods | CSI 6th International Conference on Software Engineering (CONSEG-2012), Indore, India, IEEE Xplore – Software Engineering, pp. 1-11, 2012. | Ashutosh Mishra and Vinayak Srivastava |
25 | Cognitive complexity measure for perfective software maintenance | International Conference on Artificial Intelligence and Soft Computing (AISC-2012), Computer Engineering Department, IIT (BHU) – Varanasi, India, 2012. In proceeding. | Ashutosh Mishra and Vinayak Srivastava |
26 | Source code comprehension using data mining methods | National Conference on Frontiers of Research and Development in Computational Sciences(FRDCS-2012), Mahatma Gandhi Kashi Vidhyapeeth, Varanasi, pp. 28-32, 2012. | Ashutosh Mishra and Vinayak Srivastava |
27 | Multi Agent Paradigm for Software Maintenance | National Conference on Artificial Intelligence and Agents: Theory & Applications-(AIATA-2011), December 2011, IT-BHU Varanasi, pp.122-130, 2011. | Ashutosh Mishra and Vinayak Srivastava |
28 | Trust-Based Grid Resource Management | Proc. Springer Conf. on Trends in Information, Telecommunication and Computing (ITC2012), LNEE., vol. 150, Vinu V. Das.(Ed): Springer-Verlag, 2012, pp. 415-423,doi:10.1007/978-1-4614-3363-7_47. | Damandeep Kaur and Jyotsna Sengupta |
29 | A Trust Model based on P2P Trust Models for Secure Global Grids | Proc. IEEE Conf. Trust, Security and Privacy in Computing and Communications (TRUSTCOM -2012), IEEE Press, Sept. 2012, pp. 1103–1108 | Damandeep Kaur and Jyotsna Sengupta |
30 | “P2P Trust and Reputation Based Model for Securing Grid” | Proc. IEEE Conf. Advances in Engineering, Science and Management (ICAESM2012), Jun. 2012, pp. 524–529. | Damandeep Kaur and Jyotsna Sengupta |
31 | “Proposed P2P Trust and Reputation Based Model to Secure Grid” | Proc IJCA Conf., Recent Advances and Future Trends in Information Technology (iRAFIT 2012), vol. iRAFIT (2), Apr. 2012, pp. 19-24. | Damandeep Kaur and Jyotsna Sengupta |
32 | A review of power aware routing in Wireless sensor networks | National Conference of Wireless Sensor Networks and its Applications(NCWSNA)Tamilnadu,March22, 2012 | A.K. Verma and Sukhchandan Randhawa |
S. No. | Title of the paper | Name of the Journal with volume, page nos., year | Name of the authors |
---|---|---|---|
1 | Resource Scheduling Techniques in Utility Computing- A Survey | International Journal of Systems and Service-Oriented Engineering (IJSSOE), (Accepted on 20th December, 2013). | Inderveer Chana, Tarandeep Kaur |
2 | Cloud Computing standardization initiatives: State of Play | International Journal of Cloud Computing and Services Science (IJ-CLOSER),Vol 2, no 5, Dec 2013 | Rajinder Sandhu, Inderveer Chana |
3 | Power-Aware Virtual Machine Scheduling-policy for Virtualized Heterogeneous Multicore Systems, | UACEE International Journal of Advances in Computer Science and its Applications – IJCSIA, Volume 3 : Issue 3 [ISSN 2250 – 3765], Publication Date : 09 September 2013, pp109-114 | Taranpreet Kaur and Inderveer Chana |
4 | Survey of Load Balancing Technique | International journal of scientific and innovative technology, vol-1, issue-1,2013 | Neeraj Kumar Rathore and Dr. Inderveer Chana |
5 | Securing Virtual machines in Cloud Environment using OVF | UACEE International Journal of Advances in Computer Science and its Applications – IJCSIA, Volume 3 : Issue 3 [ISSN 2250 – 3765],Publication Date : 09 September 2013, pp7-11 | Rajinder Sandhu and Inderveer Chana |
6 | Report on Hierarchal Load Balancing Technique in Grid Environment” | International journal of Scientific and Innovative Technology, i-manager’s Journal on Information Technology, Vol. 2, No. 4, ISSN Print: 2277-5110 , ISSN Online: 2277-5250, pp-21-35, Sep - Nov 2013 | Neeraj Kumar Rathore and Inderveer Chana |
7 | “ Grid Scheduling Heuristic methods : State-of-the-Art | International Journal of Computer Information Systems and Industrial Management Applications, pp. 466 - 473 ,Vol 6, 2014 | Rajni Aron, Inderveer Chana |
8 | Network Security & Ethical Hacking Against Cyber Crime | International journal of scientific and innovative technology, vol-1, issue-1, 2013 | Neeraj Kumar Rathore and Dr. Inderveer Chana |
9 | Introducing Agility in Cloud Based Software Development through ASD | International Journal of u- and e- Service, Science and Technology, Vol.6, No.5 (2013), pp.191-202 | Sukhpal Singh, Inderveer Chana |
10 | A secure and energy efficient data dissemination protocol for wireless sensor networks | International journal of network security, Vol. 15, Issue 6, pp. 490-500, 2013 | N. Kumar, M. Kumar, R. B. Patel |
11 | A survey of approaches to secure vehicular networks with identity based cryptography | International journal of advanced engineering and computing technologies. special edition of December 2013. ISSN 2249-4928 | Avleen kaur Malhi, Shalini Batra |
12 | Comparison of KNN and Slope one Algorithm in Sparse Environment | International Journal of Advanced Research in Computer Science and Software Engineering Vol. 4 Issue 4, April 2014 | A. Kaleroun and S. Batra |
13 | A short survey of Advantages and Applications of Skip Graphs | International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-3, Issue-5, Nov., 2013 | Amritpal Singh, Shalini Batra |
14 | Performance Comparison of Routing Protocols of MANET in Real World Scenario using NS3 | International Journal of Computer Applications (IJCA), 99(14):17-23 | Supriya Singla and Sushma Jain |
15 | Does Porfolio Mix Influence the Mutual Fund Performance? | Asia-Pacific Journal of Management Research and Innovation, Vol No. 9 Issue No. 4, December 2013 | Nidhi Walia, Ravinder Kumar |
16 | Big Data Analysis with Dataset Scaling in Yet Another Resource Negotiator (YARN) | International Journal of Computer Applications (IJCA), vol. 92, no. 5, pp. 46-50, April 2014. Published by Foundation of Computer Science, New York, USA. | Gurpreet Singh Bedi, Ashima Singh |
17 | Analysis of Search Engine Optimization (SEO) Techniques | International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE), vol.4, issue 3, pp. 563-566, 2014. | Gurpreet Singh Bedi, Ashima Singh |
18 | Survey Paper on Workflow Scheduling Algorithms Used in Cloud Computing | International Journal of Information & Computation Technology (IJICT), ISSN 0974-2239 Vol. 4, No. 10, pp. 997-1002, 2014 | M. M. Sharma and A. Bala |
19 | Test sequence generation for Java7 fork/join using interference dependence | Journal on Today’s Ideas – Tomorrow’s Technologies, Vol. 2, Issue. 1, 2014 | Vipin Verma and Vinay Arora |
20 | A Survey Paper on Web Page Change Detection | Engineering Sciences – International research journal, Vol.2, pp. 241-245, 2014 | Vishnu Goel and Vinay Arora |
21 | WSN Routing Challenges : A Methodological Analysis | International Journal of Advanced Research in Computer Engineering & Technology. Vol.3, Issue 3, March 2014. | Sukhchandan Randhawa |
22 | Simulation and Comparative Analysis of Single Path and Multipath Routing Protocol for MANET. | Anveshanam - The Journal Of Computer Science & Applications, 2(1), August 2013, pp. 30-35. | Tarunpreet Bhatia, A.K. Verma |
23 | Performance Evaluation of AODV under Blackhole Attack | International Journal Computer Network and Information Security, 5 (2), 2013, pp 35-44. | Tarunpreet Bhatia, A.K. Verma |