Author

As an accomplished author, Varun has undertaken multiple best seller books in the domain 

Books

Excellence Unlocked in Singapore

Recognizing and Nurturing Talent in Singapore

Relentless Persuit of Excellence

52 Stories of Fintech Entrepreneurs  in Singapore

Six international research publications and peer reviewer and evaluator at 100+ IEEE conferences in the domains of artificial intelligence, digital security, heuristic algorithms, and inter-process communications

V. Mittal and C. Chopra, "Potter Model - A Change Compliant Software Development Lifecycle Model," 2011 Second International Conference on Intelligent Systems, Modelling and Simulation, Kuala Lumpur, 2011, pp. 66-70, doi: 10.1109/ISMS.2011.22.

Abstract: A software development life cycle model based on predicting and deciding maximum possible changes which can come in the time line of project completion has been proposed. The model makes it easy for developers to manage the constantly changing requirements and specifications. This model instead of focusing on people and resources focuses on architecture. It is not a replacement for Agile and other iterative models. It is addition of a new perspective of architecture to the existing software development life cycle methodologies.

P. M. Agarwal and V. Mittal, "Open Mobile Gateway O.M.G. for Accessing Enterprise Applications," 2012 UKSim 14th International Conference on Computer Modelling and Simulation, Cambridge, 2012, pp. 566-568, doi: 10.1109/UKSim.2012.86.

Abstract: Open Mobile Gateway (OMG) will provide secure and controlled access to multiple Enterprise Applications via the Mobile Devices. OMG will comprise of Open Mobile Gateway Components (OMGC) which is deployed behind the firewall of the enterprise and Open Mobile Gateway Adaptors (OMGA) which is in front of the firewall. The OMGC will communicate with one or multiple enterprise application while the OMGA will be configured for communication with the Mobile Network Operator 

S. Gupta, V. Mittal and S. Kumar, "Inter process communication and prioritization to enable desktop advertisement mechanism," 2009 IEEE Student Conference on Research and Development (SCOReD), Serdang, 2009, pp. 118-123, doi: 10.1109/SCORED.2009.5443260.

Abstract: This research paper tries to bring a new concept of desktop advertising mechanism by synchronization it with running processes and data on users' side. This proposed approach works on basis of inter process communication interaction, scheduling, prioritization, desktop crawling and system calls. The running process status and data is fetched by proposed process, which will then seek relevant information from the remote ad server and display advertisements fetched based on keywords on user machine. 

V. Mittal and P. M. Agarwal, "An encryption and decryption algorithm for messages transmitted by phonetic alphabets," 2011 International Conference of Soft Computing and Pattern Recognition (SoCPaR), Dalian, 2011, pp. 1-4, doi: 10.1109/SoCPaR.2011.6089104.

Abstract: The algorithm pertains to creation of a middle level message transmission mechanism between the highly sophisticated encryption technique and the messages transmitted by phonetic alphabet codes. The algorithm suggests two levels in the language with each level varying in complexity and advantages. 

V. Mittal, "Selective Data Stream Blocking Mechanism for Networks," 2011 UkSim 13th International Conference on Computer Modelling and Simulation, Cambridge, 2011, pp. 168-170, doi: 10.1109/UKSIM.2011.40.

Abstract: A customized mechanism to detect, monitor and block the data packets according to the definitions submitted to the mechanism. The mechanism is robust easy to implement, maintain, update and enhance. The mechanism takes input as sample data packets which are to be blocked and checks those definitions with the data packets according to the protocols and algorithms which are a part of the mechanism. 

C. Sharma and V. Mittal,  "Heuristic User Behavior based Hard Disk Defragmentation Mechanism," in Computer Modeling and Simulation, UKSIM European Symposium on, Pisa, Italy, 2010 pp. 43-45, doi: 10.1109/EMS.2010.106

Abstract: The algorithm pertains to creation of a middle level message transmission mechanism between the highly sophisticated encryption technique and the messages transmitted by phonetic alphabet codes. The algorithm suggests two levels in the language with each level varying in complexity and advantages.