default search action
Narottam Chand
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j27]Himanshu Verma, Naveen Chauhan, Narottam Chand, Lalit Kumar Awasthi:
Buffer-loss estimation to address congestion in 6LoWPAN based resource-restricted 'Internet of Healthcare Things' network. Comput. Commun. 181: 236-256 (2022) - [j26]Nishant Sharma, Naveen Chauhan, Narottam Chand, Lalit Kumar Awasthi:
Secure authentication and session key management scheme for Internet of Vehicles. Trans. Emerg. Telecommun. Technol. 33(5) (2022) - 2021
- [j25]Tanuj Wala, Narottam Chand, Ajay K. Sharma:
Identification of optimal location points for efficient data gathering in IoT environment. Int. J. Commun. Syst. 34(11) (2021) - 2020
- [j24]Rajeev Kumar, Vibha Jain, Naveen Chauhan, Narottam Chand:
An Adaptive Prediction Strategy with Clustering in Wireless Sensor Network. Int. J. Wirel. Inf. Networks 27(4): 575-587 (2020) - [c13]Deepa Rani, Narottam Chand Kaushal:
Supervised Machine Learning Based Network Intrusion Detection System for Internet of Things. ICCCNT 2020: 1-7
2010 – 2019
- 2018
- [j23]Prashant Kumar, Naveen Chauhan, Narottam Chand, Lalit Kumar Awasthi:
SF-APP: A Secure Framework for Authentication and Privacy Preservation in Opportunistic Networks. Int. J. Web Serv. Res. 15(2): 47-66 (2018) - 2017
- [j22]Brij Bihari Dubey, Naveen Chauhan, Narottam Chand, Lalit Kumar Awasthi:
Incentive based scheme for improving data availability in vehicular ad-hoc networks. Wirel. Networks 23(6): 1669-1687 (2017) - 2016
- [j21]Brij Bihari Dubey, Naveen Chauhan, Narottam Chand, Lalit Kumar Awasthi:
Priority based efficient data scheduling technique for VANETs. Wirel. Networks 22(5): 1641-1657 (2016) - 2015
- [j20]Ajay Guleria, Kuldip Singh Atwal, Narottam Chand:
QoS Aware Service Scheduling Scheme for VANETs. Int. J. Distributed Sens. Networks 11: 282978:1-282978:11 (2015) - [j19]Pushpender Kumar Dhiman, Narottam Chand:
Lifetime Enhancement of Wireless Multimedia Sensor Networks Using Data Compression. Int. J. Wirel. Networks Broadband Technol. 4(2): 56-78 (2015) - [j18]Brij Bihari Dubey, Naveen Chauhan, Narottam Chand, Lalit Kumar Awasthi:
Analyzing and reducing impact of dynamic obstacles in vehicular ad-hoc networks. Wirel. Networks 21(5): 1631-1645 (2015) - 2014
- [j17]Prashant Kumar, Naveen Chauhan, Lalit Kumar Awasthi, Narottam Chand:
Cooperative Cache Replacement Policy for MANETs. Int. J. Adv. Pervasive Ubiquitous Comput. 6(2): 36-47 (2014) - 2012
- [j16]Naveen Chauhan, Lalit Kumar Awasthi, Narottam Chand:
Cache Replacement in Mobile Adhoc Networks. Int. J. Distributed Syst. Technol. 3(2): 22-38 (2012) - [j15]Ajay Guleria, Narottam Chand Kaushal, Lalit Kumar Awasthi:
Integrated Push Pull Algorithm with Accomplishment Assurance in VANETs. Int. J. Next Gener. Comput. 3(3) (2012) - 2011
- [j14]Naveen Chauhan, Lalit Kumar Awasthi, Narottam Chand, Ramesh Chandra Joshi, Manoj Misra:
Cooperative Caching in Mobile Ad Hoc Networks. Int. J. Mob. Comput. Multim. Commun. 3(3): 20-35 (2011) - [j13]Surender Kumar Soni, Vivek Katiyar, Narottam Chand:
An Energy-Efficient Multilevel Clustering Algorithm for Heterogeneous Wireless Sensor Networks. Int. J. Mob. Comput. Multim. Commun. 3(3): 62-79 (2011) - [j12]Prashant Kumar, Naveen Chauhan, Lalit Kumar Awasthi, Narottam Chand:
Enhancing Data Availability in MANETs with Cooperative Caching. Int. J. Mob. Comput. Multim. Commun. 3(4): 53-66 (2011) - [j11]Vivek Katiyar, Narottam Chand, Surender Kumar Soni:
Lifetime Maximization in Wireless Sensor Networks. Int. J. Wirel. Networks Broadband Technol. 1(2): 16-29 (2011) - [j10]Ashwani K. Rana, Narottam Chand, Vinod Kapoor:
Modeling gate Current for nano Scale MOSFET with Different gate spacer. J. Circuits Syst. Comput. 20(8): 1659-1675 (2011) - [j9]Naveen Chauhan, Lalit Kumar Awasthi, Narottam Chand, Vivek Katiyar, Ankit Chugh:
A Distributed Weighted Cluster Based Routing Protocol for MANETs. Wirel. Sens. Netw. 3(2): 54-60 (2011) - [j8]Vivek Katiyar, Narottam Chand, Surender Kumar Soni:
Lifetime Maximization of Wireless Sensor Networks through Energy Map: A Review. Wirel. Sens. Netw. 3(10): 329-337 (2011) - [c12]Vivek Katiyar, Narottam Chand, Surender Kumar Soni:
Grey System Theory-Based Energy Map Construction for Wireless Sensor Networks. ACC (3) 2011: 122-131 - [c11]Anurag Singh, Narottam Chand, Lalit Kumar Awasthi:
Cache Invalidation for Location Dependent and Independent Data in IVANETS. ACC (3) 2011: 609-614 - [c10]Naveen Chauhan, Lalit Kumar Awasthi, Narottam Chand:
Data Mining Techniques for Prefetching in Mobile Ad Hoc Networks. HPAGC 2011: 594-602 - [c9]Sudhanshu Pant, Naveen Chauhan, Narottam Chand, Lalit Kumar Awasthi, Brij Bihari Dubey:
Improving Fading-Aware Routing with Circular Cache Layers in Wireless Sensor Networks. IC3 2011: 395-402 - [c8]Brij Bihari Dubey, Naveen Chauhan, Lalit Kumar Awasthi, Narottam Chand, Sudhanshu Pant:
Efficient VANET-Based Traffic Information Dissemination Using Centralized Fixed Infrastructure. IC3 2011: 415-425 - [c7]Vivek Katiyar, Narottam Chand, Surender Kumar Soni:
Efficient multilevel clustering for large-scale heterogeneous wireless sensor networks. ICCCS 2011: 1-6 - [c6]Naveen Chauhan, Lalit Kumar Awasthi, Narottam Chand, Ramesh Chandra Joshi, Manoj Misra:
A cooperative caching strategy in mobile ad hoc networks based on clusters. ICCCS 2011: 17-20 - 2010
- [i1]Surender Kumar Soni, Narottam Chand:
Energy Efficient Multi-Level Clustering To Prolong The Lifetime of Wireless Sensor Networks. CoRR abs/1005.4031 (2010)
2000 – 2009
- 2007
- [j7]Narottam Chand, Ramesh C. Joshi, Manoj Misra:
Supporting cooperative caching in mobile ad hoc networks using clusters. Int. J. Ad Hoc Ubiquitous Comput. 2(1/2): 58-72 (2007) - [j6]Narottam Chand, Ramesh Chandra Joshi, Manoj Misra:
Energy efficient cache invalidation in a disconnected wireless mobile environment. Int. J. Ad Hoc Ubiquitous Comput. 2(1/2): 83-91 (2007) - [j5]Narottam Chand, Ramesh C. Joshi, Manoj Misra:
Cooperative caching in mobile ad hoc networks based on data utility. Mob. Inf. Syst. 3(1): 19-37 (2007) - [j4]Narottam Chand, Ramesh C. Joshi, Manoj Misra:
Exploiting caching in heterogeneous mobile environment. Wirel. Commun. Mob. Comput. 7(7): 835-848 (2007) - [j3]Narottam Chand, Ramesh C. Joshi, Manoj Misra:
Cooperative Caching Strategy in Mobile Ad Hoc Networks Based on Clusters. Wirel. Pers. Commun. 43(1): 41-63 (2007) - 2006
- [j2]Narottam Chand, Ramesh C. Joshi, Manoj Misra:
A zone co-operation approach for efficient caching in mobile ad hoc networks. Int. J. Commun. Syst. 19(9): 1009-1028 (2006) - [c5]Narottam Chand, Ramesh C. Joshi, Manoj Misra:
Efficient cooperative caching in ad hoc networks. COMSWARE 2006: 1-8 - [c4]Narottam Chand, Ramesh C. Joshi, Manoj Misra:
Efficient Cache Replacement in Mobile Environment Using Data Profit. ICPADS (1) 2006: 203-212 - 2005
- [j1]Narottam Chand, Ramesh Chandra Joshi, Manoj Misra:
Energy Efficient Cache Invalidation in a Mobile Environment. J. Digit. Inf. Manag. 3(2): 119-125 (2005) - [c3]Narottam Chand, Ramesh C. Joshi, Manoj Misra:
Efficient Mobility Management for Cache Invalidation in Wireless Mobile Environment. IWDC 2005: 536-541 - 2004
- [c2]Narottam Chand, Ramesh C. Joshi, Manoj Misra:
Broadcast Based Cache Invalidation and Prefetching in Mobile Environment. HiPC 2004: 410-419 - [c1]Narottam Chand, Ramesh C. Joshi, Manoj Misra:
Energy Efficient Cache Invalidation in a Disconnected Mobile Environment. ICDCIT 2004: 85-95
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint