Search the dblp DataBase
Sanjeev Setia :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Sampath Rangarajan , Sanjeev Setia , Satish K. Tripathi A Fault-Tolerant Algorithm for Replicated Data Management. [Citation Graph (3, 15)][DBLP ] ICDE, 1992, pp:230-237 [Conf ] Sencun Zhu , Chao Yao , Donggang Liu , Sanjeev Setia , Sushil Jajodia Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution. [Citation Graph (0, 0)][DBLP ] ACNS, 2005, pp:40-55 [Conf ] Sencun Zhu , Sanjeev Setia , Sushil Jajodia LEAP: efficient security mechanisms for large-scale distributed sensor networks. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:62-72 [Conf ] Bo Zhu , Sanjeev Setia , Sushil Jajodia Providing witness anonymity in peer-to-peer systems. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:6-16 [Conf ] Sushil Jajodia , Luigi V. Mancini , Sanjeev Setia A Fair Locking Protocol for Multilevel Secure Databases. [Citation Graph (0, 0)][DBLP ] CSFW, 1998, pp:168-178 [Conf ] Samir Koussih , Anurag Acharya , Sanjeev Setia Dodo: A User-level System for Exploiting Idle Memory in Workstation Clusters. [Citation Graph (0, 0)][DBLP ] HPDC, 1999, pp:- [Conf ] Lisa D. Nicklas , Robert W. Atkins , Sanjeev Setia , Pearl Y. Wang A Parallel Solution to the Cutting Stock Problem for a Cluster of Workstations. [Citation Graph (0, 0)][DBLP ] HPDC, 1996, pp:521-530 [Conf ] Abdur Chowdhury , Lisa D. Nicklas , Sanjeev Setia , Elizabeth L. White Supporting Dynamic Space-sharing on Clusters of Non-dedicated Workstations. [Citation Graph (0, 0)][DBLP ] ICDCS, 1997, pp:0-0 [Conf ] Sencun Zhu , Sanjeev Setia , Sushil Jajodia Performance Optimizations for Group Key Management Scheme. [Citation Graph (0, 0)][DBLP ] ICDCS, 2003, pp:163-0 [Conf ] Sencun Zhu , Shouhuai Xu , Sanjeev Setia , Sushil Jajodia LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICDCS Workshops, 2003, pp:749-0 [Conf ] Sencun Zhu , Shouhuai Xu , Sanjeev Setia , Sushil Jajodia Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach. [Citation Graph (0, 0)][DBLP ] ICNP, 2003, pp:326-335 [Conf ] Sanjeev Setia Trace-driven Analysis of Migration-based Gang Scheduling Policies for Parallel Computers. [Citation Graph (0, 0)][DBLP ] ICPP, 1997, pp:489-0 [Conf ] Etienne Godard , Sanjeev Setia , Elizabeth L. White DyRecT: Software Support for Adaptive Parallelism on NOWs. [Citation Graph (0, 0)][DBLP ] IPDPS Workshops, 2000, pp:1168-1175 [Conf ] Sanjeev Setia The Interaction between Memory Allocation and Adaptive Partitioning in Message-Passing Multicomputers. [Citation Graph (0, 0)][DBLP ] JSSPP, 1995, pp:146-164 [Conf ] Sanjeev Setia , Satish K. Tripathi A Comparative Analysis of Static Processor Partitioning Policies for Parallel Computers. [Citation Graph (0, 0)][DBLP ] MASCOTS, 1993, pp:283-286 [Conf ] Sencun Zhu , Sanjeev Setia , Shouhuai Xu , Sushil Jajodia GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] MobiQuitous, 2004, pp:42-51 [Conf ] Sencun Zhu , Sanjeev Setia , Sushil Jajodia Adding Reliable and Self-healing Key Distribution to the Subset Difference Group Rekeying Method for Secure Multicast. [Citation Graph (0, 0)][DBLP ] Networked Group Communication, 2003, pp:107-118 [Conf ] Vijay K. Naik , Sanjeev Setia , Mark S. Squillante Scheduling of Large Scientific Applications on Distributed Memory Multiprocessor Systems. [Citation Graph (0, 0)][DBLP ] PPSC, 1993, pp:913-922 [Conf ] Sanjeev Setia , Abdur Chowdhury , Lisa D. Nicklas , Elizabeth L. White Supporting Dynamic Reconfiguration of Parallel Applications on Clusters of Non-dedicated Workstations. [Citation Graph (0, 0)][DBLP ] PPSC, 1997, pp:- [Conf ] Sankardas Roy , Sanjeev Setia , Sushil Jajodia Attack-resilient hierarchical data aggregation in sensor networks. [Citation Graph (0, 0)][DBLP ] SASN, 2006, pp:71-82 [Conf ] Vijay K. Naik , Sanjeev Setia , Mark S. Squillante Performance analysis of job scheduling policies in parallel supercomputing environments. [Citation Graph (0, 0)][DBLP ] SC, 1993, pp:824-833 [Conf ] Sencun Zhu , Sanjeev Setia , Sushil Jajodia LEAP - efficient security mechanisms for large-scale distributed sensor networks. [Citation Graph (0, 0)][DBLP ] SenSys, 2003, pp:308-309 [Conf ] Anurag Acharya , Sanjeev Setia Using Idle Memory for Data-Intensive Computations (Extended Abstract). [Citation Graph (0, 0)][DBLP ] SIGMETRICS, 1998, pp:278-279 [Conf ] Anurag Acharya , Sanjeev Setia Availability and Utility of Idle Memory in Workstation Clusters. [Citation Graph (0, 0)][DBLP ] SIGMETRICS, 1999, pp:35-46 [Conf ] Sanjeev Setia , Mark S. Squillante , Satish K. Tripathi Processor Scheduling on Multiprogrammed, Distributed Memory Parallel Computers. [Citation Graph (0, 0)][DBLP ] SIGMETRICS, 1993, pp:158-170 [Conf ] Sanjeev Setia , Samir Koussih , Sushil Jajodia , Eric Harder Kronos: A Scalable Group Re-Keying Approach for Secure Multicast. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2000, pp:215-228 [Conf ] Sencun Zhu , Sanjeev Setia , Sushil Jajodia , Peng Ning An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2004, pp:259-271 [Conf ] Sencun Zhu , Shouhuai Xu , Sanjeev Setia , Sushil Jajodia LHAP: A lightweight network access control protocol for ad hoc networks. [Citation Graph (0, 0)][DBLP ] Ad Hoc Networks, 2006, v:4, n:5, pp:567-585 [Journal ] Lisa D. Nicklas , Robert W. Atkins , Sanjeev Setia , Pearl Y. Wang Design and implementation of a parallel solution to the cutting stock problem. [Citation Graph (0, 0)][DBLP ] Concurrency - Practice and Experience, 1998, v:10, n:10, pp:783-805 [Journal ] Scott D. Carson , Sanjeev Setia Optimal Write Batch Size in Log-Structured File Systems. [Citation Graph (0, 0)][DBLP ] Computing Systems, 1994, v:7, n:2, pp:263-281 [Journal ] Sencun Zhu , Sanjeev Setia , Shouhuai Xu , Sushil Jajodia GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2006, v:14, n:4, pp:301-325 [Journal ] Vijay K. Naik , Sanjeev Setia , Mark S. Squillante Processor Allocation in Multiprogrammed Distributed-Memory Parallel Computer Systems. [Citation Graph (0, 0)][DBLP ] J. Parallel Distrib. Comput., 1997, v:46, n:1, pp:28-47 [Journal ] Sanjeev Setia , Sencun Zhu , Sushil Jajodia A comparative performance analysis of reliable group rekey transport protocols for secure multicast. [Citation Graph (0, 0)][DBLP ] Perform. Eval., 2002, v:49, n:1/4, pp:21-41 [Journal ] Sanjeev Setia , Mark S. Squillante , Vijay K. Naik The impact of job memory requirements on gang-scheduling performance. [Citation Graph (0, 0)][DBLP ] SIGMETRICS Performance Evaluation Review, 1999, v:26, n:4, pp:30-39 [Journal ] Sencun Zhu , Sanjeev Setia , Sushil Jajodia LEAP+: Efficient security mechanisms for large-scale distributed sensor networks. [Citation Graph (0, 0)][DBLP ] TOSN, 2006, v:2, n:4, pp:500-528 [Journal ] Sampath Rangarajan , Sanjeev Setia , Satish K. Tripathi A Fault-Tolerant Algorithm for Replicated Data Management. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Parallel Distrib. Syst., 1995, v:6, n:12, pp:1271-1282 [Journal ] Sanjeev Setia , Mark S. Squillante , Satish K. Tripathi Analysis of Processor Allocation in Multiprogrammed, Distributed-Memory Parallel Processing Systems. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Parallel Distrib. Syst., 1994, v:5, n:4, pp:401-420 [Journal ] Scott D. Carson , Sanjeev Setia Analysis of the Periodic Update Write Policy For Disk Cache. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1992, v:18, n:1, pp:44-54 [Journal ] Sencun Zhu , Chao Yao , Donggang Liu , Sanjeev Setia , Sushil Jajodia Efficient security mechanisms for overlay multicast based content delivery. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2007, v:30, n:4, pp:793-806 [Journal ] Sencun Zhu , Sanjeev Setia , Sushil Jajodia , Peng Ning Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. [Citation Graph (0, 0)][DBLP ] TOSN, 2007, v:3, n:3, pp:- [Journal ] Efficient Distributed Detection of Node Replication Attacks in Sensor Networks. [Citation Graph (, )][DBLP ] CORD: Energy-Efficient Reliable Bulk Data Dissemination in Sensor Networks. [Citation Graph (, )][DBLP ] Secure median computation in wireless sensor networks. [Citation Graph (, )][DBLP ] Search in 0.021secs, Finished in 0.023secs