Skip Ribbon Commands
Skip to main content
Parallel and Distributed Computing Group

Introduction:

The group focuses on state of the art research topics in parallel and distributed computing domain including mobile cloud computing, cloud storage and services, ontology based distributed computation and code optimization for parallel computing.

Group Head:

  • Dr. Naima Iltaf
  • Group Members

  • Asst Prof Dr Tauseef Ahmad Rana 
  • Lec Mobeena Shazad
  • Research Students

  • Muhammad Sajid Khan
  • Sajjad Ali
  • Mukhtar Ahmad
  • Research Facilities

  •  Virtual Reality Lab
  •  Database Lab
  • Publications:

     

  • F. Javeed, A. Naz, T.Naeem, A. Basit, and N.Iltaf, “A Review on Variant Clustering Designs in Heterogeneous WSNs” .National Software Engineering Conference (NSEC), IEEE 2015.
  • T. Rana, “Incremental Construction: A study based on Refinement and Composition based Approaches”, In Proceedings of National Software Engineering Conference 2014 (NSEC2014), MCS, NUST, Pakistan.
  • M.S. Khan, N.Iltaf, A.Rashdi, “Collusion-Resistant Sybil Attack Detection Scheme in Mobile Ad hoc Networks,” National Software Engineering Conference (NSEC), IEEE 2014.
  • Naima Iltaf, Dr Abdul Ghafoor, Dr Mukhtar Hussain, Usman Zia,”An Effective Model for Indirect Trust Computation in Pervasive Computing Environment”, Wireless Personal Communications, Springer, July,2013.
  • Naima Iltaf, Dr Abdul Ghafoor, Usman Zia, “A Mechanism for Detecting Dishonest Recommendation in Indirect Trust Computation”,“EURASIP Journal on Wireless Communication and Networking”, Springer, August 2013.
  • Naima Iltaf, Dr Abdul Ghafoor, “A recommendation exchange protocol between smart devices in pervasive computing environment”, 27th International Conference on Advanced Information Networking and Applications” IEEE March 2013.
  • Naima Iltaf, Dr Abdul Ghafoor, Dr Mukhtar Hussain, “A fuzzy based credibility evaluation of recommended trust in pervasive computing environment”, “The 10h Annual IEEE Consumer Communications and Networking Conference, Las Vagas, USA, 2013”, IEEE Communication Society, Jan 2013.
  • T. Rana “Incremental Construction of Component-based Systems”, K.-K. Lau, K.-Y. Ng, T. and C.M. Tran. In Proceedings of Fifteenth International ACM SIGSOFT Symposium on Component-based Software Engineering, pages 41-50, ACM, 2012.
  • Naima Iltaf, Dr Abdul Ghafoor, Dr Mukhtar Hussain, “An Attack Resistant Method for Detecting Dishonest Recommendations in Pervasive Computing Environment”, “The 18th international conference on networks (ICON 2012),” IEEE Computer Society, Dec 2012.
  • Naima Iltaf, Dr Abdul Ghafoor, Dr Mukhtar Hussain, “An Adaptive Framework for Trust based Security in Pervasive Computing Environment”, “The 9th Annual IEEE Consumer Communications and Networking Conference”, IEEE Communication Society, Jan 2012.
  • Naima Iltaf  Dr Abdul Ghafoor, Dr Mukhtar Hussain, “Modelling interaction using trust and recommendation in ubiquitous computing environment”,EURASIP Journal on Wireless Communication and Networking,Springer April, 2012.
  • Naima Iltaf, Dr Abdul Ghafoor, Dr Mukhtar Hussain, “An Algorithmic Approach towards Trust based security in Pervasive Computing Environment”, “On Trust Management for Multimedia P2P Applications in Autonomic Networking”, IEEE Computer Society, Dec 2011.
  • Naima Iltaf, Dr Abdul Ghafoor, Dr Mukhtar Hussain, “On Trust Management for Multimedia P2P Applications in Autonomic Networking”, IEEE Computer Society, Dec 2011.
  • T. Rana and F. Taweel “Constructing Component-based Systems Directly from Requirements using Incremental Composition”, K.-K. Lau, A. Nordin, T., In Proceedings of Thirty-sixth Euromicro Conference on Software Engineering and Advanced Applications, pages 85-93, IEEE, 2010.
  • T. Rana “A Taxonomy of Software Composition Mechanisms”,K.-K. Lau and T, In Proceedings of Thirty-sixth Euromicro Conference on Software Engineering and Advanced Applications, pages -, IEEE, 2010.
  • Tauseef Ahmad Rana, (Behavioural){Design} patterns as composition operators, K.-K. Lau, I. Ntalamagkas, C. Tran and T. Rana. In L. Grunske, R. Reussner and F. Plasil, editors, Proceedings of Thirteenth International Symposium on Component-based Software Engineering, Lecture Notes in Computer Science 6092(232-251), Springer-Verlag, 2010.
  • Tauseef Ahmad Rana,  Mobile agent's host security with access control, International Conference on Computational Intelligence for Modelling, Control and Automation - CIMCA'2006 and International Conference on Intelligent Agents, Web Technologies and Internet Commerce – IAWTIC'2006, Sydney, Australia, 2006, Proceedings will be published by IEEE.
  • Naima Iltaf, Dr Mukhtar Hussain, Dr Farrukh Kamran, “A Mathematical Approach towards Trust based security in Pervasive Computing Environment”, “3rd International Conference on Information Security and Assurance (ISA 2009), Springer LNCS”, June2009.
  • Tauseef Ahmad Rana, Kaleem Iqbal Siddiqui, “Manual data entry forms to XML-based profiles”, First National Information Technology Symposium (NITS 2006) Bridging the Digital Divide: Challenges and Solutions, King Saud University, Riydah, Kingdom of Saudi Arabia, February 5-7, 2006.
  • Naima Iltaf, Dr Farrukh Kamran, Umar Mehmood, “Security & Trust Enforcement in Pervasive Computing Environments”,“High Capacity Optical Networks & Enabling Technologies (HONET 2006)”, IEEE, 2006.
  • Kaleem Iqbal Siddiqui, Raja Iqbal, Tauseef Ahmad Rana,” Qualifier-based access to Web Services for Portal-to-Portal Communication”, International Conference on Intelligent Agents, Web Technologies and Internet Commerce, vinna, Austria, 2005, Proceedings published by IEEE.
  • Suleiman Ali Khan, Tauseef Rana, Shoaib Ahmed, Humayun Feroze, Raashid Kiani, Usman Burki, “Distributing the HLA-RTI to manage increasingly complex simulations”, International Conference on HLA Simulation Methodology and Applications, Lerici (La Spezia), Italy, June 23, 2005. 
  • Contact (Focal Person)

    Dr.Naima Iltaf

    E-mail:  naima@gmail.com

    Tel :03215565221