default search action
Sanjeev Setia
Person information
- affiliation: George Mason University, Fairfax VA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [c35]Jeff Offutt, Paul Ammann, Kinga Dobolyi, Chris Kauffmann, Jaime Lester, Upsorn Praphamontripong, Huzefa Rangwala, Sanjeev Setia, Pearl Y. Wang, Liz White:
A Novel Self-Paced Model for Teaching Programming. L@S 2017: 177-180 - 2014
- [j20]Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia:
Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact. IEEE Trans. Inf. Forensics Secur. 9(4): 681-694 (2014) - 2013
- [c34]Eric Swankoski, Sanjeev Setia:
EPIC: Efficient path-independent capabilities in mobile ad hoc networks. SECON 2013: 43-50 - 2012
- [j19]Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia:
Secure Data Aggregation in Wireless Sensor Networks. IEEE Trans. Inf. Forensics Secur. 7(3): 1040-1052 (2012) - 2011
- [j18]Andrea Gabrielli, Luigi V. Mancini, Sanjeev Setia, Sushil Jajodia:
Securing Topology Maintenance Protocols for Sensor Networks. IEEE Trans. Dependable Secur. Comput. 8(3): 450-465 (2011) - 2010
- [j17]Leijun Huang, Sanjeev Setia, Robert Simon:
McTorrent: Using multiple communication channels for efficient bulk data dissemination in wireless sensor networks. J. Syst. Softw. 83(1): 108-120 (2010) - [j16]Bo Zhu, Sanjeev Setia, Sushil Jajodia, Lingyu Wang:
Providing witness anonymity under peer-to-peer settings. IEEE Trans. Inf. Forensics Secur. 5(2): 324-336 (2010) - [j15]Bo Zhu, Sanjeev Setia, Sushil Jajodia, Sankardas Roy, Lingyu Wang:
Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks. IEEE Trans. Mob. Comput. 9(7): 913-926 (2010)
2000 – 2009
- 2009
- [j14]Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia:
Secure median computation in wireless sensor networks. Ad Hoc Networks 7(8): 1448-1462 (2009) - 2008
- [c33]Leijun Huang, Sanjeev Setia:
CORD: Energy-Efficient Reliable Bulk Data Dissemination in Sensor Networks. INFOCOM 2008: 574-582 - [c32]Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia:
Securely computing an approximate median in wireless sensor networks. SecureComm 2008: 6 - 2007
- [j13]Sencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia:
Efficient security mechanisms for overlay multicast based content delivery. Comput. Commun. 30(4): 793-806 (2007) - [j12]Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning:
Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. ACM Trans. Sens. Networks 3(3): 14 (2007) - [c31]Bo Zhu, Venkata Gopala Krishna Addada, Sanjeev Setia, Sushil Jajodia, Sankardas Roy:
Efficient Distributed Detection of Node Replication Attacks in Sensor Networks. ACSAC 2007: 257-267 - 2006
- [j11]Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia:
LHAP: A lightweight network access control protocol for ad hoc networks. Ad Hoc Networks 4(5): 567-585 (2006) - [j10]Sencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jajodia:
GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. J. Comput. Secur. 14(4): 301-325 (2006) - [j9]Sencun Zhu, Sanjeev Setia, Sushil Jajodia:
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks. ACM Trans. Sens. Networks 2(4): 500-528 (2006) - [c30]Bo Zhu, Sanjeev Setia, Sushil Jajodia:
Providing witness anonymity in peer-to-peer systems. CCS 2006: 6-16 - [c29]Sankardas Roy, Sanjeev Setia, Sushil Jajodia:
Attack-resilient hierarchical data aggregation in sensor networks. SASN 2006: 71-82 - 2005
- [c28]Sencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia:
Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution. ACNS 2005: 40-55 - [c27]Robert Simon, Leijun Huang, Emerson Farrugia, Sanjeev Setia:
Using multiple communication channels for efficient data dissemination in wireless sensor networks. MASS 2005: 10 - [c26]Sankardas Roy, Venkata Gopala Krishna Addada, Sanjeev Setia, Sushil Jajodia:
Securing MAODV: attacks and countermeasures. SECON 2005: 521-532 - [c25]Andrea Gabrielli, Luigi V. Mancini, Sanjeev Setia, Sushil Jajodia:
Securing Topology Maintenance Protocols for Sensor Networks. SecureComm 2005: 101-112 - 2004
- [c24]Sencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jajodia:
GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. MobiQuitous 2004: 42-51 - [c23]Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning:
An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. S&P 2004: 259-271 - [e2]Sanjeev Setia, Vipin Swarup:
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2004, Washington, DC, USA, October 25, 2004. ACM 2004, ISBN 1-58113-972-1 [contents] - 2003
- [c22]Sencun Zhu, Sanjeev Setia, Sushil Jajodia:
LEAP: efficient security mechanisms for large-scale distributed sensor networks. CCS 2003: 62-72 - [c21]Sencun Zhu, Sanjeev Setia, Sushil Jajodia:
Performance Optimizations for Group Key Management Scheme. ICDCS 2003: 163- - [c20]Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia:
LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks. ICDCS Workshops 2003: 749- - [c19]Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia:
Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach. ICNP 2003: 326-335 - [c18]Sencun Zhu, Sanjeev Setia, Sushil Jajodia:
Adding Reliable and Self-healing Key Distribution to the Subset Difference Group Rekeying Method for Secure Multicast. Networked Group Communication 2003: 107-118 - [c17]Sencun Zhu, Sanjeev Setia, Sushil Jajodia:
LEAP - efficient security mechanisms for large-scale distributed sensor networks. SenSys 2003: 308-309 - [e1]Sanjeev Setia, Vipin Swarup:
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2003, Fairfax, Virginia, USA, 2003. ACM 2003, ISBN 1-58113-783-4 [contents] - 2002
- [j8]Sanjeev Setia, Sencun Zhu, Sushil Jajodia:
A comparative performance analysis of reliable group rekey transport protocols for secure multicast. Perform. Evaluation 49(1/4): 21-41 (2002) - 2000
- [c16]Etienne Godard, Sanjeev Setia, Elizabeth L. White:
DyRecT: Software Support for Adaptive Parallelism on NOWs. IPDPS Workshops 2000: 1168-1175 - [c15]Sanjeev Setia, Samir Koussih, Sushil Jajodia, Eric Harder:
Kronos: A Scalable Group Re-Keying Approach for Secure Multicast. S&P 2000: 215-228
1990 – 1999
- 1999
- [j7]Sanjeev Setia, Mark S. Squillante, Vijay K. Naik:
The impact of job memory requirements on gang-scheduling performance. SIGMETRICS Perform. Evaluation Rev. 26(4): 30-39 (1999) - [c14]Samir Koussih, Anurag Acharya, Sanjeev Setia:
Dodo: A User-level System for Exploiting Idle Memory in Workstation Clusters. HPDC 1999: 301-308 - [c13]Anurag Acharya, Sanjeev Setia:
Availability and Utility of Idle Memory in Workstation Clusters. SIGMETRICS 1999: 35-46 - 1998
- [j6]Lisa D. Nicklas, Robert W. Atkins, Sanjeev Setia, Pearl Y. Wang:
Design and implementation of a parallel solution to the cutting stock problem. Concurr. Pract. Exp. 10(10): 783-805 (1998) - [c12]Sushil Jajodia, Luigi V. Mancini, Sanjeev Setia:
A Fair Locking Protocol for Multilevel Secure Databases. CSFW 1998: 168-178 - [c11]Anurag Acharya, Sanjeev Setia:
Using Idle Memory for Data-Intensive Computations (Extended Abstract). SIGMETRICS 1998: 278-279 - 1997
- [j5]Vijay K. Naik, Sanjeev Setia, Mark S. Squillante:
Processor Allocation in Multiprogrammed Distributed-Memory Parallel Computer Systems. J. Parallel Distributed Comput. 46(1): 28-47 (1997) - [c10]Abdur Chowdhury, Lisa D. Nicklas, Sanjeev Setia, Elizabeth L. White:
Supporting Dynamic Space-sharing on Clusters of Non-dedicated Workstations. ICDCS 1997: 149-158 - [c9]Sanjeev Setia:
Trace-driven Analysis of Migration-based Gang Scheduling Policies for Parallel Computers. ICPP 1997: 489-492 - [c8]Sanjeev Setia, Abdur Chowdhury, Lisa D. Nicklas, Elizabeth L. White:
Supporting Dynamic Reconfiguration of Parallel Applications on Clusters of Non-dedicated Workstations. PP 1997 - 1996
- [c7]Lisa D. Nicklas, Robert W. Atkins, Sanjeev Setia, Pearl Y. Wang:
A Parallel Solution to the Cutting Stock Problem for a Cluster of Workstations. HPDC 1996: 521-530 - 1995
- [j4]Sampath Rangarajan, Sanjeev Setia, Satish K. Tripathi:
A Fault-Tolerant Algorithm for Replicated Data Management. IEEE Trans. Parallel Distributed Syst. 6(12): 1271-1282 (1995) - [c6]Sanjeev Setia:
The Interaction between Memory Allocation and Adaptive Partitioning in Message-Passing Multicomputers. JSSPP 1995: 146-164 - 1994
- [j3]Scott D. Carson, Sanjeev Setia:
Optimal Write Batch Size in Log-Structured File Systems. Comput. Syst. 7(2): 263-281 (1994) - [j2]Sanjeev Setia, Mark S. Squillante, Satish K. Tripathi:
Analysis of Processor Allocation in Multiprogrammed, Distributed-Memory Parallel Processing Systems. IEEE Trans. Parallel Distributed Syst. 5(4): 401-420 (1994) - 1993
- [c5]Sanjeev Setia, Satish K. Tripathi:
A Comparative Analysis of Static Processor Partitioning Policies for Parallel Computers. MASCOTS 1993: 283-286 - [c4]Vijay K. Naik, Sanjeev Setia, Mark S. Squillante:
Scheduling of Large Scientific Applications on Distributed Memory Multiprocessor Systems. PPSC 1993: 913-922 - [c3]Vijay K. Naik, Sanjeev Setia, Mark S. Squillante:
Performance analysis of job scheduling policies in parallel supercomputing environments. SC 1993: 824-833 - [c2]Sanjeev Setia, Mark S. Squillante, Satish K. Tripathi:
Processor Scheduling on Multiprogrammed, Distributed Memory Parallel Computers. SIGMETRICS 1993: 158-170 - 1992
- [j1]Scott D. Carson, Sanjeev Setia:
Analysis of the Periodic Update Write Policy For Disk Cache. IEEE Trans. Software Eng. 18(1): 44-54 (1992) - [c1]Sampath Rangarajan, Sanjeev Setia, Satish K. Tripathi:
A Fault-Tolerant Algorithm for Replicated Data Management. ICDE 1992: 230-237
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-07 21:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint