Year 2012-13 Conferences

Publication of papers in conference proceedings and other publications

S. No. Title of the paper Name of the conference with venue, date and year, page nos. Name of the authors
1 An Improved Forward Secure Elliptic Curve Signcryption Key Management Scheme for Wireless Sensor Networks International Conference on IT Convergence and Security, Kyeong Chang, Korea, December 5-7, 2012 , Springer, IT Convergence and Security 2012-LNEE, Vol. 215, pp. 141-149, 2013 Suman Bala, Gaurav Sharma, A.K.Verma  
2 Optimized Elliptic Curve Cryptography for Wireless Sensor Networks 2nd IEEE International Conference on Parallel Distributed and Grid Computing pp. 89-94, 6-8 Dec. 2012 Suman Bala, Gaurav Sharma, A.K.Verma
3 Identity- based Ring Signcryption Schemes-A Review The 2012 FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing, Jeju, Korea, Nov 22-25 Gaurav Sharma, Suman Bala, A.K.Verma
4 An Identity-based Ring Signcryption Scheme for Wireless Sensor Networks International Conference on IT Convergence and Security, Kyeong Chang, Korea, December 5-7, 2012 , Springer, IT Convergence and Security 2012-LNEE, Vol. 215, pp. 151-157, 2013 Gaurav Sharma, Suman Bala, A.K.Verma
5 A Survey and Taxonomy of Symmetric Key Management Schemes for Wireless Sensor Networks Proceedings of the CUBE International Information Technology Conference,CUBE-2012, pp. 585-592, Sep 3-5, 2012 Suman Bala, Gaurav Sharma, A.K.Verma  
6 Cryptanalysis of certificateless signature scheme The Sixth International Conference on Information, Tokyo, Japan, May 8 - 11, 2013 Gaurav Sharma, Suman Bala and Anil K. Verma
7 Breaking the RSA-based Certificateless Signature Scheme Breaking the RSA-based Certificateless Signature Scheme Gaurav Sharma and Anil K. Verma
8  Power-Aware Virtual Machine Scheduling-policy for Virtualized Heterogeneous Multicore Systems Second International Conference on Advances In Electronics, Electrical And Computer Engineering (EEC-2013), Dehradun, 22-23 June, 2013. Taranpreet Kaur and Inderveer Chana
9 Securing Virtual machines in Cloud Environment using OVF Second International Conference on Advances In Electronics, Electrical And Computer Engineering,Dehradun, India, 2013. Rajinder Sandhu and Inderveer Chana
10 Formal Specification Language Based Cloud Workload Regression Analysis IEEE International Conference on Control, Computing, Communication and Materials-2013 (ICCCCM-2013), United Institute of Technology, Allahabad, India. Sukhpal Singh, Inderveer Chana,  
11 Consistency Verification and Quality Assurance (CVQA) Traceability Framework for SaaS Ajay Kumar Garg Engineering College, Ghazibad, India, IEEE Xplore Digital Library Catalog No: CFP1339F-CDR      ISBN: 978-1-4673-4528-6, Feb 2013 Sukhpal Singh, Inderveer  Chana,
12 A novel Hybrid approach for web caching.   Sixth International  conference on Innovative Mobile and Internet Services In Ubiquitous Computing, Palermo, Italy,4thto 6th July 2012,pp. 512-517. Rajeev Tiwari, Neeraj Kumar
13 Morphological Analysis of Punjabi Verbs for UNL Based Machine Translation System  International Conference on Global Innovations in Technology and Sciences - 2013”,organized by SAINTGITS College of Engineering 4th   to  6th April 2013 
Kottayam, Kerala, India
Parteek Kumar, R.K. Sharma
14 Agile Software Process Model: A Comparative View International Conference on Advances in Management and Technology (iCAMT-2013), Feb 2013, held at PIET, Patiala, Punjab, India, on , Published in International Journal of Computer Applications,(0975-8887), pp. 10-14. P. Joshi, A. Aggarwal and  S. Goel
15 CBSE versus COTS Based Software Development International Conference on Recent trends in Computing (ICRTC-2012), held at SRM University, NCR Campus, Modinagar, Ghaziabad, India, ISBN: 978-93-81583-67-8, October 04, 2012, pp. 135-138. S. Singh and S. Goel
16 Learning through ERP in Technical Educational Institutions Interactive Collaborative Learning 2012 Conference in Villach, Austria, 26-28 September 2012, pp. 388-391 Shivani Goel, Ravi Kiran, Deepak Garg
17 Technologies for Cost Efficient ERP: A theoretical Perspective Proceedings of ICAdC, SPRINGER, AISC 174, pp. 113-120 Shivani Goel, Ravi Kiran, Deepak Garg
18 Comparison of HMM and DTW for Isolated Word Recognition of Punjabi Language Proceedings of Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, Sao Paulo, Brazil. Volume 6419 of Lecture Notes in Computer Science (LNCS), Page 244 – 252, Springer Verlag. Ravinder Kumar
19 Spoken isolated Word Recognition of Punjabi Language Using dynamic time Warping Technique Demo in Proceedings of Information System for Indian Languages, Punjabi University, Patiala, India, Volume 139 of Communication in Computer and Information Science (CCIS), Page 301, Springer Verlag. Ravinder Kumar, Mohanjit Singh
20 Fingerprint and Minutiae points Technique Proceedings of the Second International Conference on Soft Computing for Problem Solving, (SocProS 2012), December 28-30, 2012 Karun Verma, Ishdeep Singla
21 A Contrast and Comparison of Modern Software Process Models.  International Conference on Advances in Management and Technology iCAMT: Patiala College of Engineering, Patiala 23-27, February 2013. IJCA Proceedings on International Conference on Advances in Management and Technology 2013  Published by Foundation of Computer Science, New York, USA,23-27 Pankaj Vohra and Ashima
22 Autonomic Fault Tolerance using VM Migration in Cloud Computing GCA’13 Las,Vegas ,accepted in May 2013 Anju Bala and Inderveer Chana
23 Detecting Clone and Redesigning International Conference on Evolution of Science and Technology, PPIMT Hisar, March 2013. Kanika Raheja and Rajkumar Tekchandani
24 Cognition Based Selection and Categorization of Maintenance Engineer (Agent) using Artificial neural net and Data mining methods , Indore, India, IEEE Xplore – Software Engineering, pp. 1-11, 2012. Ashutosh Mishra and Vinayak Srivastava      
25 Cognitive complexity measure for perfective software maintenance International Conference on Artificial Intelligence and Soft Computing (AISC-2012), Computer Engineering Department, IIT (BHU) – Varanasi, India, 2012. In proceeding. Ashutosh Mishra and Vinayak Srivastava
26 Source code comprehension using data mining methods   National Conference on Frontiers of Research and Development in Computational Sciences(FRDCS-2012), Mahatma Gandhi Kashi Vidhyapeeth, Varanasi, pp. 28-32, 2012.   Ashutosh Mishra and Vinayak Srivastava  
27 Multi Agent Paradigm for Software Maintenance   National Conference on Artificial Intelligence and Agents: Theory & Applications-(AIATA-2011), December 2011, IT-BHU Varanasi, pp.122-130, 2011. Ashutosh Mishra and Vinayak Srivastava  
28 Trust-Based Grid Resource Management LNEE., vol. 150, Vinu V. Das.(Ed): Springer-Verlag, 2012, pp.  415-423,doi:10.1007/978-1-4614-3363-7_47. Damandeep Kaur and Jyotsna Sengupta
29 A Trust Model based on P2P Trust Models for Secure Global Grids Proc. IEEE Conf. Trust, Security and Privacy in Computing and Communications (TRUSTCOM -2012), IEEE Press, Sept. 2012, pp. 1103–1108 Damandeep Kaur and Jyotsna Sengupta
30 “P2P Trust and Reputation Based Model for Securing Grid” Proc. IEEE Conf. Advances in Engineering, Science and Management (ICAESM2012), Jun. 2012, pp. 524–529. Damandeep Kaur and Jyotsna Sengupta
31 “Proposed P2P Trust and Reputation Based Model to Secure Grid” Proc IJCA Conf., Recent Advances and Future Trends in Information Technology (iRAFIT 2012), vol. iRAFIT (2), Apr. 2012, pp. 19-24.   Damandeep Kaur and Jyotsna Sengupta
32 A review of power aware routing in Wireless sensor networks National Conference of Wireless Sensor Networks and its Applications(NCWSNA)Tamilnadu,March22, 2012 A.K. Verma and Sukhchandan Randhaw