The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Sanjeev Setia: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Sampath Rangarajan, Sanjeev Setia, Satish K. Tripathi
    A Fault-Tolerant Algorithm for Replicated Data Management. [Citation Graph (3, 15)][DBLP]
    ICDE, 1992, pp:230-237 [Conf]
  2. Sencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia
    Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:40-55 [Conf]
  3. Sencun Zhu, Sanjeev Setia, Sushil Jajodia
    LEAP: efficient security mechanisms for large-scale distributed sensor networks. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:62-72 [Conf]
  4. Bo Zhu, Sanjeev Setia, Sushil Jajodia
    Providing witness anonymity in peer-to-peer systems. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:6-16 [Conf]
  5. Sushil Jajodia, Luigi V. Mancini, Sanjeev Setia
    A Fair Locking Protocol for Multilevel Secure Databases. [Citation Graph (0, 0)][DBLP]
    CSFW, 1998, pp:168-178 [Conf]
  6. Samir Koussih, Anurag Acharya, Sanjeev Setia
    Dodo: A User-level System for Exploiting Idle Memory in Workstation Clusters. [Citation Graph (0, 0)][DBLP]
    HPDC, 1999, pp:- [Conf]
  7. Lisa D. Nicklas, Robert W. Atkins, Sanjeev Setia, Pearl Y. Wang
    A Parallel Solution to the Cutting Stock Problem for a Cluster of Workstations. [Citation Graph (0, 0)][DBLP]
    HPDC, 1996, pp:521-530 [Conf]
  8. Abdur Chowdhury, Lisa D. Nicklas, Sanjeev Setia, Elizabeth L. White
    Supporting Dynamic Space-sharing on Clusters of Non-dedicated Workstations. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1997, pp:0-0 [Conf]
  9. Sencun Zhu, Sanjeev Setia, Sushil Jajodia
    Performance Optimizations for Group Key Management Scheme. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2003, pp:163-0 [Conf]
  10. Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia
    LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2003, pp:749-0 [Conf]
  11. Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia
    Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach. [Citation Graph (0, 0)][DBLP]
    ICNP, 2003, pp:326-335 [Conf]
  12. Sanjeev Setia
    Trace-driven Analysis of Migration-based Gang Scheduling Policies for Parallel Computers. [Citation Graph (0, 0)][DBLP]
    ICPP, 1997, pp:489-0 [Conf]
  13. Etienne Godard, Sanjeev Setia, Elizabeth L. White
    DyRecT: Software Support for Adaptive Parallelism on NOWs. [Citation Graph (0, 0)][DBLP]
    IPDPS Workshops, 2000, pp:1168-1175 [Conf]
  14. Sanjeev Setia
    The Interaction between Memory Allocation and Adaptive Partitioning in Message-Passing Multicomputers. [Citation Graph (0, 0)][DBLP]
    JSSPP, 1995, pp:146-164 [Conf]
  15. Sanjeev Setia, Satish K. Tripathi
    A Comparative Analysis of Static Processor Partitioning Policies for Parallel Computers. [Citation Graph (0, 0)][DBLP]
    MASCOTS, 1993, pp:283-286 [Conf]
  16. Sencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jajodia
    GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    MobiQuitous, 2004, pp:42-51 [Conf]
  17. Sencun Zhu, Sanjeev Setia, Sushil Jajodia
    Adding Reliable and Self-healing Key Distribution to the Subset Difference Group Rekeying Method for Secure Multicast. [Citation Graph (0, 0)][DBLP]
    Networked Group Communication, 2003, pp:107-118 [Conf]
  18. Vijay K. Naik, Sanjeev Setia, Mark S. Squillante
    Scheduling of Large Scientific Applications on Distributed Memory Multiprocessor Systems. [Citation Graph (0, 0)][DBLP]
    PPSC, 1993, pp:913-922 [Conf]
  19. Sanjeev Setia, Abdur Chowdhury, Lisa D. Nicklas, Elizabeth L. White
    Supporting Dynamic Reconfiguration of Parallel Applications on Clusters of Non-dedicated Workstations. [Citation Graph (0, 0)][DBLP]
    PPSC, 1997, pp:- [Conf]
  20. Sankardas Roy, Sanjeev Setia, Sushil Jajodia
    Attack-resilient hierarchical data aggregation in sensor networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2006, pp:71-82 [Conf]
  21. Vijay K. Naik, Sanjeev Setia, Mark S. Squillante
    Performance analysis of job scheduling policies in parallel supercomputing environments. [Citation Graph (0, 0)][DBLP]
    SC, 1993, pp:824-833 [Conf]
  22. Sencun Zhu, Sanjeev Setia, Sushil Jajodia
    LEAP - efficient security mechanisms for large-scale distributed sensor networks. [Citation Graph (0, 0)][DBLP]
    SenSys, 2003, pp:308-309 [Conf]
  23. Anurag Acharya, Sanjeev Setia
    Using Idle Memory for Data-Intensive Computations (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 1998, pp:278-279 [Conf]
  24. Anurag Acharya, Sanjeev Setia
    Availability and Utility of Idle Memory in Workstation Clusters. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 1999, pp:35-46 [Conf]
  25. Sanjeev Setia, Mark S. Squillante, Satish K. Tripathi
    Processor Scheduling on Multiprogrammed, Distributed Memory Parallel Computers. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 1993, pp:158-170 [Conf]
  26. Sanjeev Setia, Samir Koussih, Sushil Jajodia, Eric Harder
    Kronos: A Scalable Group Re-Keying Approach for Secure Multicast. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:215-228 [Conf]
  27. Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning
    An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2004, pp:259-271 [Conf]
  28. Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia
    LHAP: A lightweight network access control protocol for ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Ad Hoc Networks, 2006, v:4, n:5, pp:567-585 [Journal]
  29. Lisa D. Nicklas, Robert W. Atkins, Sanjeev Setia, Pearl Y. Wang
    Design and implementation of a parallel solution to the cutting stock problem. [Citation Graph (0, 0)][DBLP]
    Concurrency - Practice and Experience, 1998, v:10, n:10, pp:783-805 [Journal]
  30. Scott D. Carson, Sanjeev Setia
    Optimal Write Batch Size in Log-Structured File Systems. [Citation Graph (0, 0)][DBLP]
    Computing Systems, 1994, v:7, n:2, pp:263-281 [Journal]
  31. Sencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jajodia
    GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2006, v:14, n:4, pp:301-325 [Journal]
  32. Vijay K. Naik, Sanjeev Setia, Mark S. Squillante
    Processor Allocation in Multiprogrammed Distributed-Memory Parallel Computer Systems. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 1997, v:46, n:1, pp:28-47 [Journal]
  33. Sanjeev Setia, Sencun Zhu, Sushil Jajodia
    A comparative performance analysis of reliable group rekey transport protocols for secure multicast. [Citation Graph (0, 0)][DBLP]
    Perform. Eval., 2002, v:49, n:1/4, pp:21-41 [Journal]
  34. Sanjeev Setia, Mark S. Squillante, Vijay K. Naik
    The impact of job memory requirements on gang-scheduling performance. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS Performance Evaluation Review, 1999, v:26, n:4, pp:30-39 [Journal]
  35. Sencun Zhu, Sanjeev Setia, Sushil Jajodia
    LEAP+: Efficient security mechanisms for large-scale distributed sensor networks. [Citation Graph (0, 0)][DBLP]
    TOSN, 2006, v:2, n:4, pp:500-528 [Journal]
  36. Sampath Rangarajan, Sanjeev Setia, Satish K. Tripathi
    A Fault-Tolerant Algorithm for Replicated Data Management. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 1995, v:6, n:12, pp:1271-1282 [Journal]
  37. Sanjeev Setia, Mark S. Squillante, Satish K. Tripathi
    Analysis of Processor Allocation in Multiprogrammed, Distributed-Memory Parallel Processing Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 1994, v:5, n:4, pp:401-420 [Journal]
  38. Scott D. Carson, Sanjeev Setia
    Analysis of the Periodic Update Write Policy For Disk Cache. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1992, v:18, n:1, pp:44-54 [Journal]
  39. Sencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia
    Efficient security mechanisms for overlay multicast based content delivery. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:4, pp:793-806 [Journal]
  40. Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning
    Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. [Citation Graph (0, 0)][DBLP]
    TOSN, 2007, v:3, n:3, pp:- [Journal]

  41. Efficient Distributed Detection of Node Replication Attacks in Sensor Networks. [Citation Graph (, )][DBLP]


  42. CORD: Energy-Efficient Reliable Bulk Data Dissemination in Sensor Networks. [Citation Graph (, )][DBLP]


  43. Secure median computation in wireless sensor networks. [Citation Graph (, )][DBLP]


Search in 0.904secs, Finished in 0.907secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002