1 |
Singh, R. M., Awasthi, L. K., & Sikka, G. (2019, November). In International Conference on Futuristic Trends in Networks and Computing Technologies (pp. 673-685). |
Techniques for Task Scheduling in Cloud and Fog Environment: A Survey |
2 |
Islam, T. U., Awasthi, L. K., & Garg, U. International Conference on Innovative Computing and Communications (pp. 947-962). |
Gender and Age Estimation from Gait: A Review |
3 |
Agarwal N., Sikka G., Awasthi L.K. (2021) Web Service Clustering Approaches to Enhance Service Discovery: A Review. In: Singh P.K., Singh Y., Kolekar M.H., Kar A.K., Chhabra J.K., Sen A. (eds) Recent Innovations in Computing. ICRIC 2020. Lecture Notes in Electrical Engineering, vol 701. Springer, Singapore. |
Web Service Clustering Approaches to Enhance Service Discovery: A Review |
4 |
Agarwal, N., Sikka, G., & Awasthi, L. K. (2021, November). In 2021 International Conference on Technological Advancements and Innovations (ICTAI) (pp. 617-621). IEEE. |
Web Service Clustering Technique based on Contextual Word Embedding for Service Representation. |
5 |
Agarwal, N., Sikka, G., & Awasthi, L. K. (2021, August). In 2021 Thirteenth International Conference on Contemporary Computing (IC3-2021) (pp. 309-313). |
Comparative Study of Topic Modeling and Word Embedding Approaches for Web Service Clustering |
6 |
Sheikh, D., Vansh, A. R., Verma, H., Chauhan, N., Kumar, R., Sharma, R., ... & Awasthi, L. K. (2021, December). In 2021 3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N) (pp. 515-520). IEEE. |
An ECG Heartbeat Classification Strategy using Deep Learning for Automated Cardiocare Application. |
7 |
Prajapati, V. K., Sharma, T. P., & Awasthi, L. (2022). In International Conference on Emerging Technologies in Computer Engineering (pp. 169-181). Springer, Cham. |
A Theoretical Aspect on Fault-Tolerant Data Dissemination in IoT Enabled Systems |
8 |
Singh, A. B., Awasthi, L. K., & Bansal, U. (2022). |
Chained Dual-GAN: A Generalized Defense against Adversarial Attacks. |
9 |
National Symposium on Recent Trends/Emerging Techniques in Biophysics at Banaras Hindu University, Varansi |
Comparative molecular modelling study of mitoxantrone and its analogue ametantrone with hexameric DNA sequences d-CGATCG and d-ATCGAT |
10 |
2010 International Conference on Computational Intelligence and Communication Networks |
Stable link based multicast routing scheme for MANET |
11 |
National Conference FCPC’ 09 at H.I.E.T, Kaithal |
Multicast Routing Protocol for MANET: A Survey |
12 |
National Conference on Emerging Trends in Computing and Communication (ETCC’08) Computer Science & Engineering Department, National Institute of Technology, Hamirpur, Himachal Pradesh |
Molecular modelling study of Mitrxantrone and its Analogues with D-5’ ACGG 3’ DNA Tetrameric Sequence |
13 |
National Conference on Emerging Trends in Computing and Communication (ETCC’08) at Computer Science & Engineering Department, National Institute of Technology, Hamirpur, Himachal Pradesh |
Interfacing of Phonocardiogram with Mobile Devices |
14 |
National Conference on Emerging Trends in Computing and Communication (ETCC’08) at Computer Science & Engineering Department, National Institute of Technology, Hamirpur, Himachal Pradesh |
Check pointing in Mobile Computing Environment – An Analysis |
15 |
National Conference on Mechanism Science and Technology: from Theory to Application (NCMSTA’08) at Computer Science & Engineering Department, National Institute of Technology, Hamirpur, Himachal Pradesh |
Interactions of mitoxantrone and its analogues with DNA tetramer sequences – A Computer Aided Drug Design (CADD) Approach |
16 |
ISTE Section Annual Convention at Computer Science & Engineering Department, National Institute of Technology, Hamirpur, Himachal Pradesh |
New Research Directions in Computer and Communication Technology |
17 |
ISTE Section Annual Convention at Computer Science & Engineering Department, National Institute of Technology, Hamirpur, Himachal Pradesh |
Use of IT Tools for Enhancing Quality of Teaching and Learning |
18 |
ISTE Section Annual Convention at Computer Science & Engineering Department, National Institute of Technology, Hamirpur, Himachal Pradesh |
Curriculum Development – A Discipline-Specific Methodology |
19 |
National Conference on Emerging Trends in Computing and Communication (ETCC’07) at Computer Science & Engineering Department, National Institute of Technology, Hamirpur, Himachal Pradesh |
New Routing Protocol for Wireless Sensor Networks |
20 |
National Conference on Emerging Trends in Computing and Communication (ETCC’07) at Computer Science & Engineering Department, National Institute of Technology, Hamirpur, Himachal Pradesh |
Data Indexing and Scheduling for Heterogeneous Multiple Broadcast Channels |
21 |
National Conference on Emerging Trends in Computing and Communication (ETCC’07) at Computer Science & Engineering Department, National Institute of Technology, Hamirpur, Himachal Pradesh |
Data Replication in Mobile Ad hoc Networks |
22 |
National Conference on Innovative Applications of IT and Management for Economic Growth of India at Apeejay Institute of Management, Jalandhar, Punjab |
Fault Tolerance, Checkpointing and Ad-Hoc Networks |
23 |
National Symposium at Kurukshetra University, Kurukshetra, Haryana, India |
Transputer – A Landmark in high performance computing |
24 |
Agarwal N., Sikka G., Awasthi L.K. (2021) Web Service Clustering Approaches to Enhance Service Discovery: A Review. In: Singh P.K., Singh Y., Kolekar M.H., Kar A.K., Chhabra J.K., Sen A. (eds) Recent Innovations in Computing. ICRIC 2020. Lecture Notes in Electrical Engineering, vol 701. Springer, Singapore. |
Web Service Clustering Approaches to Enhance Service Discovery: A Review |
25 |
Sharma, P., & Awasthi, L. K. (2021, May). In 2021 2nd International Conference on Secure Cyber Computing and Communications (ICSCCC) (pp. 546-550). IEEE. |
Big Data Storage and Decentralization: A Review. |
26 |
Sharma, V., & Awasthi, L. K. (2021, May). In 2021 2nd International Conference on Secure Cyber Computing and Communications (ICSCCC) (pp. 212-217). IEEE. |
Divergent applications of Blockchain Security: A Survey |
27 |
Islam, T. U., Awasthi, L. K., & Garg, U. International Conference on Innovative Computing and Communications (pp. 947-962). |
Gender and Age Estimation from Gait: A Review |
28 |
Singh, R. M., Awasthi, L. K., & Sikka, G. (2019, November). In International Conference on Futuristic Trends in Networks and Computing Technologies (pp. 673-685). |
Techniques for Task Scheduling in Cloud and Fog Environment: A Survey |
29 |
Nayyer, A., Sharma, A. K., & Awasthi, L. K. (2018, December). First International Conference on Secure Cyber Computing and Communication (ICSCCC) (pp. 333-339). IEEE. |
A Study of Performance Evaluators for Software Defined Networking |
30 |
Kaur, S., Sikka, G., & Awasthi, L. K. (2018, December). First International Conference on Secure Cyber Computing and Communication (ICSCCC) (pp. 1-4). IEEE. |
Sentiment Analysis Approach Based on N-gram and KNN Classifier |
31 |
Nayyer, A., Sharma, A. K., & Awasthi, L. K. (2018, December). First International Conference on Secure Cyber Computing and Communication (ICSCCC) (pp. 333-339). IEEE. |
A Study of Performance Evaluators for Software Defined Networking |
32 |
Sharma, A., & Awasthi, L. K. (2018, December). First International Conference on Secure Cyber Computing and Communication (ICSCCC) (pp. 556-560). IEEE. |
A Comparative Survey on Information Dissemination in Heterogeneous Vehicular Communication Networks |
33 |
Nayyer, A., Sharma, A. K., & Awasthi, L. K. (2019). In Proceedings of 2nd International Conference on Communication, Computing and Networking (pp. 989-997). Springer, Singapore. |
Issues in Software Defined Networking |
34 |
Choudhary, A., Govil, M. C., Singh, G., Awasthi, L. K., & Pilli, E. S. (2018, June). IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS) (pp. 968-973). IEEE. |
Task clustering-based Energy-aware Workflow Scheduling in Cloud environment |
35 |
Sahota, K. K., Awasthi, L. K., & Verma, H. K. (2017, December). International Conference on Intelligent Communication and Computational Techniques (ICCT) (pp. 228-232). IEEE. |
An empirical enhancement using scale invariant feature transform in text extraction from images |
36 |
Aidan, J. S., Verma, H. K., & Awasthi, L. K. (2017, December). International Conference on Next Generation Computing and Information Systems (ICNGCIS) (pp. 122-125). IEEE. |
Comprehensive Survey on Petya Ransomware Attack |
37 |
Sharma, R., Awasthi, L. K., & Chauhan, N. (2017). Computer Communication, Networking and Internet Security (pp. 461-470). Springer, Singapore. |
Rolling Circle Algorithm for Routing Along the Boundaries of Wireless Sensor Networks |
38 |
Choudhary, A., Govil, M. C., Singh, G., & Awasthi, L. K. (2016, December). Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC) (pp. 617-624). IEEE. |
Workflow scheduling algorithms in cloud environment: A review, taxonomy, and challenges |
39 |
Choudhary, A., Govil, M. C., Singh, G., & Awasthi, L. K. (2016, December). Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC) (pp. 182-187). IEEE. |
Energy-efficient resource allocation approaches with optimum virtual machine migrations in cloud environment |
40 |
Choudhary, A., Govil, M. C., Singh, G., Awasthi, L. K., Pilli, E. S., & Kumar, N. (2016, October). International conference on cloud computing in emerging markets (CCEM) (pp. 17-24). IEEE. |
Improved Virtual Machine Migration Approaches in Cloud Environment |
41 |
Thakur Jawahar, Kalia Arvind and Awasthi Lalit, International Conference organized by (CMAI) and in academic participation with HELP University of Malaysia in Kulalalumpur, Malaysia |
Checkpointing based Rollback Recovery Techniques in Wireless Ad-hoc Networks |
42 |
Brij Bihari Dubey, Naveen Chauhan, Narottam Chand, Lalit K. Awasthi, Proceedings of SCI indexed of Springer Journal of Wireless Networks, NIT Hamirpur |
Priority Based Efficient Data Scheduling Technique for VANETs |
43 |
Thakur, J., Kalia, A., & Awasthi, L. K. (2015, December). Third International Conference on Image Information Processing (ICIIP) (pp. 220-224). IEEE. |
Cluster based coordinated Checkpointing in Wireless Adhoc Network |
44 |
Dubey, B. B., Chauhan, N., Chand, N., & Awasthi, L. K. (2014, October). International Conference on Information and Communication Technology for Competitive Strategies (pp. 1-5). |
NRNDD: Nearest Relay Node based Data Dissemination Technique for VANETs |
45 |
Singh, V., & Awasthi, L. K. (2014). International Conference on Internet Computing and Information Communications (pp. 251-256). Springer, New Delhi. |
A Review Paper on IEEE 802.11 WLAN |
46 |
Dayal, N., & Aswathi, L. K. (2014). International Conference on Internet Computing and Information Communications (pp. 103-110). Springer, New Delhi. |
Solutions for security in mobile agent system |
47 |
Nanda, A. K., & Awasthi, L. K. (2013, January). International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (pp. 706-718). Springer, Berlin, Heidelberg. |
A Proposal for SMS Security Using NTRU Cryptosystem |
48 |
Ravi Kant Sahu, Abhishek Mohta, and Lalit Kumar Awasthi , 2nd International Conference on Advances in Engineering and Technology-ICAET-2012 at Chennai |
Grid Based Data Dissemination Scheme for Handling Sink Mobility in Wireless Sensor Networks |
49 |
Sahu, R. K., Mohta, A., & Awasthi, L. K. (2012). IJCA Proceedings on International Conference on Recent Advances and Future Trends in Information Technology (iRAFIT 2012), iRAFIT (7) (pp. 23-27). |
Energy-efficient grid-based data dissemination in wireless sensor networks |
50 |
Chauhan, N., Awasthi, L. K., & Chand, N. (2012, September). International Conference on Latest Computational Technologies (pp. 85-89). |
Cluster Based Efficient Caching Technique for Wireless Sensor Networks |
51 |
Ravi Kant Sahu, and Lalit Kumar Awasthi, IEEE Students' Conference on Engineering and Systems (SCES-2012), MNNIT Allahabad, pp. 169-174 |
EGDD: Energy-Aware Grid-Based Data Dissemination to Mobile Sinks in Wireless Sensor Networks |
52 |
Ravi Kant Sahu, and Lalit Kumar Awasthi, IEEE Students’ Conference on Electrical, Electronics and Computer Science (SCEECS 2012) at MANIT Bhopal |
A Novel Strategy for Grid-Based Data Dissemination in Wireless Sensor Networks |
53 |
Chauhan, N., & Awasthi, L. K. (2012, March). International Conference on Emerging Trends in Computer and Electronics Engineering (ICETCEE‟ 2012) (pp. 24-25). |
Prefetching based Cooperative Caching in Mobile Adhoc Networks |
54 |
Abhishek Mohta, Ravi Kant Sahu, LK Awasthi, 1st International Conference and 5th CSI National Conference on Education & Research (confER-2012) at Lingaya’s University, Faridabad |
Robust Data Integration while using Third Party Auditor for Cloud Data Storage Services |
55 |
Ammari, H. M., & Das, S. K. (2005, November). IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005. (pp. 8-pp). IEEE. |
Data dissemination to mobile sinks in wireless sensor networks: an information theoretic approach. |
56 |
Awasthi, L. K. (2011, December). International Conference on Advanced Computing, Networking and Security (pp. 375-380). Springer, Berlin, Heidelberg. |
Distributed Localization of Anisotropic Wireless Sensor Networks using Spatial Clustering |
57 |
Chauhan, N., Awasthi, L. K., & Chand, N. (2011, December). World Congress on Information and Communication Technologies (pp. 235-239). IEEE. |
Global Cooperative Caching for Wireless Sensor Networks |
58 |
Nanda, A. K., & Awasthi, L. K. (2011, December). World Congress on Information and Communication Technologies (pp. 1282-1287). IEEE. |
Encryption Based Channel Coding Algorithm for Secure SMS |
59 |
Nanda, A. K., & Awasthi, L. K. (2011, September). International Siberian Conference on Control and Communications (SIBCON) (pp. 51-55). IEEE. |
Joint Channel Coding and Cryptography for SMS |
60 |
Anurag Singh, Narottam Chand and Lalit Awasthi, International Conference on Parallel, Distributed Computing Technologies and Applications (PDCTA) |
A Novel Technique for Cache Invalidation in IVANETs |
61 |
Dubey, B. B., Chauhan, N., Awasthi, L. K., Chand, N., & Pant, S. (2011, August). International Conference on Contemporary Computing (pp. 415-425). Springer, Berlin, Heidelberg. |
Efficient VANET - based Traffic Information Dissemination using Centralized Fixed Infrastructure |
62 |
Pant, S., Chauhan, N., Chand, N., Awasthi, L. K., & Dubey, B. B. (2011, August). International Conference on Contemporary Computing (pp. 395-402). Springer, Berlin, Heidelberg. |
Improving Fading Aware Routing with Circular Cache Layers in Wireless Sensor Networks |
63 |
Singh, A., Chand, N., & Awasthi, L. K. (2011, July). International Conference on Advances in Computing and Communications (pp. 609-614). Springer, Berlin, Heidelberg. |
Cache Invalidation for Location dependent and independent data in IVANETS |
64 |
Chauhan, N., Awasthi, L. K., & Chand, N. (2011, July). International Conference on High Performance Architecture and Grid Computing (pp. 594-602). Springer, Berlin, Heidelberg. |
Data Mining Techniques for Prefetching in Mobile Ad Hoc Networks |
65 |
Narottam Chand, Naveen Chauhan and Lalit Kumar Awasthi, International Conference on Mobile Communications, Networking and Applications (MobiCONA 2011) Singapore |
Cooperative Caching and Replacement in MANETs |
66 |
Chauhan, N., Awasthi, L. K., & Chand, N. (2011, June). International Conference on Communication Systems and Network Technologies (pp. 71-75). IEEE. |
Data Caching with Intelligent Prefetching" in Mobile Ad Hoc Networks |
67 |
Srikanth, R., & Awasthi, L. K. (2011, June). International Conference on Communication Systems and Network Technologies (pp. 139-143). IEEE. |
Voronoi-based continuous query processing for mobile users |
68 |
Singh, A., Chand, N., & Awasthi, L. K. (2011, June). International Conference on Communication Systems and Network Technologies (pp. 135-138). IEEE. |
Enhancing Cache Invalidation Techniques in IVANET |
69 |
Chauhan, N., Awasthi, L. K., & Chand, N. (2011, June). International Conference on Communication Systems and Network Technologies (pp. 71-75). IEEE. |
Data Caching with Intelligent Prefetching in Mobile Ad Hoc Networks |
70 |
L. K. Awasthi, R. Srikanth. International Conference on Advanced Computing, Communication and Networks [ICACCN-11] at Hotel Aroma, Chandigarh, India |
A Novel approach for query processing in Location based services |
71 |
Srikanth. R and Lalit Kumar Awasthi, 2nd International Conference on Information Systems and Technology (ICIST – 2011) and MES Journal of Technology and Management, pp. 93-98 |
Privacy for mobile users in Location-Based Services |
72 |
Singh, A., & Awasthi, L. K. (2011, April). International Conference on Emerging Trends in Networks and Computer Communications (ETNCC) (pp. 438-443). IEEE. |
Performance comparisons and scheduling of load balancing strategy in Grid Computing |
73 |
Ajay Guleria, Narottam Chand and Lalit Awasthi, International Conference on Advances in Computing and Communication (ICACC), pp. 235-240, NIT Hamirpur, India. |
Integrated Push Pull Algorithm with Accomplishment Assurance in VANET |
74 |
Ram, B., Chauhan, N., Chand, N., & Awasthi, L. K. (2011, April). 3rd International Conference on Electronics Computer Technology (Vol. 4, pp. 250-253). IEEE. |
A new mechanism to query latency minimization for cache invalidation in vehicular ad hoc networks |
75 |
Ram, B., Chauhan, N., Chand, N., & Awasthi, L. K. (2011, April). 3rd International Conference on Electronics Computer Technology (Vol. 4, pp. 250-253). IEEE. |
A New Mechanism to Query Latency Minimization for Cache Invalidation in Vehicular Ad Hoc Network (VANETs) |
76 |
Ashok Kumar Nanda and Lalit Awasthi, International Conference on Advances in Computing and Communication (ICACC), pp. 296-303, NIT Hamirpur, India. |
SMS Security |
77 |
Siddhartha Chauhan, Lalit Awasthi and Sumit Kumar, International Conference on Advances in Computing and Communication (ICACC), pp. 42-47, NIT Hamirpur, India. |
TDMA Based MAC Layer Protocols for Wireless Sensor Networks: A Survey |
78 |
Anurag Singh, Srikanth R. and Lalit Awasthi, International Conference on Advances in Computing and Communication (ICACC), pp. 112-117, NIT Hamirpur, India. |
Node Security in the WSN using Quantum Cryptography |
79 |
Abhishek Mohta, Ravi Kant Sahoo and Lalit Awasthi, International Conference on Advances in Computing and Communication (ICACC), pp. 132-138, NIT Hamirpur, India. |
A Review of Routing Protocols on Wireless Sensor Networks |
80 |
Sudhanshu Pant, Naveen Chauhan, Lalit Awasthi and N. Chand, International Conference on Advances in Computing and Communication (ICACC), pp. 149-155, NIT Hamirpur, India. |
A Cooperative Caching Strategy in Wireless Sensor Networks |
81 |
Srikanth R. Anurag Singh and Lalit Awasthi, International Conference on Advances in Computing and Communication (ICACC), pp. 156-160, NIT Hamirpur, India. |
Privacy in Location-Based Services for Mobile Users |
82 |
Babu Ram, Naveen Chauhan, Narottam Chand and Lalit Awasthi, International Conference on Advances in Computing and Communication (ICACC), pp. 161-164, NIT Hamirpur, India. |
A mechanism to reduce Query latency during Cache Invalidation in Vehicular Ad Hoc Networks |
83 |
BB Dubey, Naveen Chauhan, Lalit Awasthi and Narottam Chand, International Conference on Advances in Computing and Communication (ICACC), pp. 181-185, NIT Hamirpur, India. |
Push-Pull Queue Dependent Data Dissemination in VANETs |
84 |
Yash Pal, AJ Singh and Lalit Awasthi, International Conference on Advances in Computing and Communication (ICACC), pp. 186-191, NIT Hamirpur, India. |
A Survey on Energy Efficient Routing in Wireless Sensor Networks |
85 |
Rajesh Sharma and Lalit Awasthi, International Conference on Advances in Computing and Communication (ICACC), pp. 206-215, NIT Hamirpur, India. |
A Log Based Recovery Protocol for Mobile Distributed Computing Systems |
86 |
Prashant Jain, Kamal Kant, Mohit Batra and Lalit Awasthi, International Conference on Advances in Computing and Communication (ICACC), pp. 591-597, NIT Hamirpur, India. |
Analytical Study of Cross Site Scripting (XSS) |
87 |
Ashok Kumar Nanda and Lalit Awasthi, International Conference on Advances in Computing and Communication (ICACC), pp. 192-196, NIT Hamirpur, India. |
Mobile ICT Learning Using Advanced Technology |
88 |
Chauhan, N., Awasthi, L. K., & Chand, N. (2011, March). International Conference on Advances in Communication, Network, and Computing (pp. 628-630). Springer, Berlin, Heidelberg. |
Cooperative Caching Strategy in Mobile Ad Hoc Networks |
89 |
Ashok Kumar Nanda and Lalit Kumar Awasthi, International Conference on Digital Convergence (ICDC - 2011) at Chennai, India, pp. 364 – 367 |
Proposal for Enhancing The Security System of SEESMS |
90 |
Dubey, B. B., Chauhan, N., & Awasthi, L. K. (2011, February). International Conference on Communication, Computing & Security (pp. 96-99). |
NILDD- Nearest Intersection Location Dependent Dissemination of Traffic Information in VANETs |
91 |
Chauhan, N., Awasthi, L. K., Chand, N., Joshi, R. C., & Mishra, M. (2011, February). International Conference on Communication, Computing & Security (pp. 17-20). |
A Cooperative Caching Strategy in Mobile Ad Hoc Networks Based on Clusters |
92 |
Pamita Awasthi, Shilpa Dogra,Lalit Kumar Awasthi and Ritu Barthwal, 7th Asian Biophysics Association (ABA) Symposium & Annual Meeting of Indian Biophysics Society at Indian Habitat Center, P-57 New Delhi, India |
Comparative study of mitoxantrone and its analogues with C-methylation and C-non-methylation of tetramer DNA sequences by Molecular Modeling |
93 |
International Conference on Information Systems and Technology(ICIST), 2011 Proceedings published by International Journal of Computer Applications |
Enhanced Query Processing Technique for Location based Services |
94 |
Chaurasia, S., Chauhan, S., & Awasthi, L. K. (2010, December). International Conference on Industrial Electronics, Control and Robotics (pp. 263-268). IEEE. |
Energy efficient protocol for providing QoS for Wireless Sensor Network |
95 |
Anurag Singh, Srikanth R and Lalit Kumar Awasthi, 3rd National Conference on Next-Generation Computing and Information Systems (NGCIS'10) at Model Institute of Engineering & Technology, Kot Bhalwal, Jammu, India |
Node Authentication in WSN using Quantum Cryptography |
96 |
Srikanth R, Anurag Singh and Lalit Kumar Awasthi, 3rd National Conference on Next-Generation Computing and Information Systems (NGCIS'10) at Model Institute of Engineering & Technology, Kot Bhalwal, Jammu, India |
Providing Security in WSN using mobile Agents |
97 |
Chauhan, N., Awasthi, L. K., Chand, N., & Chugh, A. (2011, March). International Conference on Advances in Communication, Network, and Computing (pp. 147-151). Springer, Berlin, Heidelberg. |
A Distributed Weighted Cluster Based Routing Protocol for MANETs |
98 |
Kant, K., & Awasthi, L. K. (2010, October). International Conference on Advances in Communication, Network, and Computing (pp. 248-252). IEEE Computer Society. |
A Multicast Routing Protocol for MANETS Based on Node Stability |
99 |
Kant, K., & Awasthi, L. K. (2010, October). In Proceedings of the 2010 International Conference on Advances in Communication, Network, and Computing (pp. 248-252). IEEE Computer Society. |
Multicast Routing Protocol for MANETs Based on Node Stability |
100 |
Kamal Kant and Lalit Awasthi, 3rd International Conference Transport Science and Technology Congress (TRANSTEC 2010), New Delhi |
Efficient Traffic Protocol for Highly Populated Cities |
101 |
Yash Pal, A. J. Singh and Lalit Kumar Awasthi, International Conference on Data Management (ICDM 2010) at Institute of Management Technology (IMT) Ghaziabad, UP, India, pp. 46-59 |
QoS in Wireless Sensor Network with Node-to-Node Activation Scheme |
102 |
Kamal Kant, Kiran Maraiya, and Lalit Awasthi, Role of Application of Information and Communication Technology in Inaccessible Areas (RAICTA-2010), pp. 94-98, Hisar, India |
Mobile Database Systems: A New Steering of Research Issues |
103 |
Amrik Singh and Lalit Awasthi, International Conference on Advance Computing and Creating Entrepreneurs (ICOACCE’10), Udaipur, India |
P2P To Grid Computing: Possibilities, Challenges and Solutions |
104 |
Kamal Kant and Lalit Awasthi, International Conference on Recent Trends in Soft Computing and Information Technology (RTSCIT-09), pp. 405 - 411 Bhopal, India |
A Survey on Routing Protocols for MANETs and Comparisons |
105 |
Yash Pal, Lalit Kumar Awasthi and A. J. Singh, 5th International Conference on Intelligent Sensors, Sensor Networks and Information Processing - Symposium on Adaptive Sensing, Control, and Optimization in Sensor Networks (ISSNIP 2009) at Melbourne, Australia |
Energy Efficient Object Tracking Sensor Network |
106 |
Yash Pal, Lalit Kumar Awasthi and A. J. Singh, International Conference on Global Computing and Communication, pp. 13-18 |
Data Aggregation in Object Tracking Sensor Network with Node-to-Node Activation Scheme |
107 |
Devendra Kumar Jain, Lalit Kumar Awasthi and Manish Kumar Yadav, International Conference on Pervasive Computing and Governance (ICPCG 09) |
Research Directions in Mobile Databases |
108 |
Gupta, A., & Awasthi, L. K. (2009, December). In 2009 IEEE International Conference on Internet Multimedia Services Architecture and Applications (IMSAA) (pp. 1-6). IEEE. |
Peer Enterprises: A Viable Alternative to Cloud Computing? |
109 |
Pamita Awasthi, Shilpa Dogra, Lalit Kumar Awasthi and Ritu Barthwal, International Conference on frontiers in prevention, diagnosis and therapy of cancer (FPDTC – 2009) at Department of Pathology, Moti Lal Nehru Medical College, Allahabad, India |
A comparative molecular modeling study of mitoxantrone and its analogues with 5’-CCCGGG-3’ and 5’-ATCGAT-3’ DNA hexamer sequences |
110 |
Gupta, A., & Awasthi, L. K. (2009, August). In International Conference on Contemporary Computing (pp. 422-433). Springer, Berlin, Heidelberg. |
Security Issues in Cross-Organizational Peer-to-Peer Applications and Some Solutions |
111 |
Chauhan, N., Awasthi, L. K., & Chand, N. (2009, November). In 2009 First Asian Himalayas International Conference on Internet (pp. 1-4). IEEE. |
Cooperative Data Caching with Prefetching in Mobile Ad-Hoc Networks |
112 |
Awasthi, P., Dogra, S., Awasthi, L. K., & Barthwal, R. (2009). In BIOCOMP (pp. 121-128). |
Interactions of mitoxantrone and its analogues with DNA tetramer sequences – A Molecular Modeling Study |
113 |
Gupta, A., Awasthi, L.K. Awasthi, IEEE International Conference on Advanced Computing, pp. 3543–3548. IEEE Press, Los Alamitos (2009) |
Peer Enterprises: Enabling Advanced Computing and Collaboration Across Organizationsv |
114 |
Nayyer, A., Sharma, R., Nayyer, M., & Awasthi, L. K. (2009, March). n 2009 IEEE International Advance Computing Conference (pp. 1141-1145). IEEE. |
Wait and Watch Technique: Removing Time synchronization overhead in Wireless Sensor Network |
115 |
Pal, Y., Awasthi, L. K., & Singh, A. J. (2009, March). In 2009 IEEE International Advance Computing Conference (pp. 1200-1205). IEEE. |
Maximize the Lifetime of Object Tracking Sensor Network with Node-to-Node Activation Scheme |
116 |
A. Guleria, N. Chand and Lalit Kumar Awasthi, 3rd Chandigarh Science Congress (CHASCON - 2009), pp. 84 - 8 |
Effective Data Scheduling for Road Side Access in VANETs |
117 |
Gupta, A., Malhotra, D., & Awasthi, L. K. (2008, December). In 2008 16th IEEE International Conference on Networks (pp. 1-6). IEEE. |
NeighborTrust: A Trust-based Scheme for Countering Distributed Denial-of-Service Attacks in P2P Networks |
118 |
Agarwal, K., & Awasthi, L. K. (2008, December). In 2008 16th IEEE International Conference on Networks (pp. 1-5). IEEE. |
Enhanced AODV routing protocol for Ad hoc Networks |
119 |
Ankur Gupta and Lalit. Awasthi, International Conference and Symposium on Storage Technologies (ICSST) at NMAM Institute of Technology, NITTE, Mangalore, Karnataka |
PStore: A Scalable Peer-to-Peer Based Data Storage Framework |
120 |
D. K. Jain and Lalit Awasthi, International Conference on Wireless Networks & Embedded Systems (WECON 2008), pp. 235-237, Chitkara Institute of Engineering & Technology, Rajpura, Patiala, India |
Hybrid Multicast Routing Protocol for MANENTs using Multipoint Relay |
121 |
Yash Pal, Lalit Awasthi, and A.J. Singh, International Conference on Wireless Networks & Embedded Systems (WECON 2008), pp. 182-184, Chitkara Institute of Engineering & Technology, Rajpura, Patiala, India |
Node-to-node Activation Scheme for Energy Saving in Object Tracking Sensor Networks |
122 |
Gupta, A., & Awasthi, L. K. (2008, July). In GCA (pp. 140-146). |
Secure Thyself”: Securing Individual Peers in collaborative Peer-to-Peer Environments |
123 |
Ankur Gupta and Lalit Awasthi, International Conference on Data Management (ICDM’08), pp. 622-630, Institute of Management Technology (IMT) Ghaziabad, UP, India |
Parch: A Peer-to-Peer Based Email Archival Application |
124 |
Gupta, A., & Awasthi, L. K. (2007, November). In OTM Confederated International Conferences" On the Move to Meaningful Internet Systems" (pp. 1011-1020). Springer, Berlin, Heidelberg. |
Peer Enterprises: Possibilities, Challenges and Some Ideas Towards Their Realization |
125 |
Lalit Kumar Awasthi, International Conference on Information Processing (ICIP), pp. 288 - 297 |
Challenges in Check pointing Ad hoc Networks |
126 |
Gupta, A., & Awasthi, L. K. (2007, June). In GCA (pp. 151-158). |
P4P: Ensuring Fault-Tolerance for Cycle-Stealing P2P Applications |
127 |
Lalit Awasthi, Ankur Gupta and Nimrita Koul, International Conference on Network Security (ICON’07) |
A Secure and Highly Available Architecture for SNMP Based Monitoring of Network Devices |
128 |
Kuldeep Singh, R. B. Patel and Lalit Kumar Awasthi, Asian Conference on Intelligent Systems & Networks (AISN-2006), pp. 250 - 258 |
Mobility Management in Mobile Computing Environments |
129 |
Parveen Kumar, Lalit Kumar Awasthi, R. K. Chauhan and A. Nayyer, International Conference on Wireless Communication and Sensor Network (WCSN) at IIIT- Allahabad |
Minimum-Process Coordinated Checkpointing Scheme for Mobile Computing Environments |
130 |
Kumar, P., Kumar, L., Chauhan, R. K., & Gupta, V. K. (2005, January). In 2005 IEEE International Conference on Personal Wireless Communications, 2005. ICPWC 2005. (pp. 491-495). IEEE. |
A Non-Intrusive Minimum Process Synchronous Checkpointing Protocol for Mobile Distributed Systems |
131 |
Kumar, P., Kumar, L., & Chauhan, R. K. (2005). Proceedings of IEEE ICPWC-2005. |
Process Synchronous Checkpointing Protocol for Mobile Distributed Systems |
132 |
P. Kumar and Lalit Awasthi, Advances in Computer Communication Networks (CCN 2004), pp. 172-175, IIT Roorkee, India |
Mobile Ad Hoc Networks and Issues: A Survey |
133 |
Kumar, L., Mishra, M., & Joshi, R. C. (2003, March). In Proceedings 19th International Conference on Data Engineering (Cat. No. 03CH37405) (pp. 686-688). IEEE. |
Low overhead Optimal Check pointing for Mobile Distributed Systems |
134 |
Lalit Kumar Awasthi, M. Misra and R.C. Joshi, International conference on High Performance Computing (HiPC) at Bangalore, India |
Non-intrusive Recovery in Mobile Distributed Systems |
135 |
Kumar, L., Misra, M., & Mitrani, I. (2002, April). International Conference on Modelling Techniques and Tools for Computer Performance Evaluation (pp. 279-288). Springer, Berlin, Heidelberg. |
Analysis of a Transaction System with Check pointing, Failures and Rollback |
136 |
Lalit Kumar Awasthi, M. Misra and R.C. Joshi, International Conference on Computer Applications in Electrical Engineering (CERA-2002) at Indian Institute of Technology, Roorkee |
Checkpointing and Recovery for Mobile Distributed Systems: A New Approach |
137 |
Lalit Kumar Awasthi, Manoj Misra and R. C. Joshi, All India Seminar on Recent Trends in Computer Networks, E&C Department, Indian Institute of Technology, Roorkee |
Check pointing Mobile Distributed Systems |
138 |
Awasthi, L. K., Misra, M., & Joshi, R. C. (2002). Concurrency in Dependable Computing, Kluwer Academic Publishers, 273-288. |
Check pointing and Recovery for Distributed Computing Systems |
139 |
Lalit Kumar Awasthi, M. Mishra and R.C. Joshi, International conference on Advances in computing and Communication (ADCOM-2000) Cochin, India |
Probabilistic Check pointing and Recovery for Mobile Distributed Systems |
140 |
Lalit Kumar Awasthi, International Conference on Cognitive Systems at Delhi, India |
Digital Multimedia & Virtual Reality ) |