Name
Affiliation
Papers
SANJEEV SETIA
Department of Computer Science, George Mason University, USA
45
Collaborators
Citations 
PageRank 
43
1134
119.78
Referers 
Referees 
References 
2104
887
684
Search Limit
1001000
Title
Citations
PageRank
Year
A Novel Self-Paced Model for Teaching Programming.00.342017
Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact320.932014
Secure Data Aggregation in Wireless Sensor Networks70.482012
Securing Topology Maintenance Protocols for Sensor Networks80.612011
Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks331.032010
McTorrent: Using multiple communication channels for efficient bulk data dissemination in wireless sensor networks30.392010
Providing Witness Anonymity Under Peer-to-Peer Settings30.422010
Secure median computation in wireless sensor networks60.472009
Securely computing an approximate median in wireless sensor networks.150.762008
CORD: Energy-Efficient Reliable Bulk Data Dissemination in Sensor Networks421.462008
Efficient Distributed Detection of Node Replication Attacks in Sensor Networks491.942007
Interleaved hop-by-hop authentication against false data injection attacks in sensor networks281.222007
Efficient security mechanisms for overlay multicast based content delivery60.492007
Providing witness anonymity in peer-to-peer systems60.462006
Attack-resilient hierarchical data aggregation in sensor networks261.292006
LHAP: A lightweight network access control protocol for ad hoc networks170.832006
Using multiple communication channels for efficient data dissemination in wireless sensor networks.110.762005
Efficient security mechanisms for overlay multicast-based content distribution60.532005
GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks301.292004
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2004, Washington, DC, USA, October 25, 2004123.602004
Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach1887.872003
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2003, Fairfax, Virginia, USA, 2003143.822003
LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks412.132003
Performance Optimizations for Group Key Management Schemes110.652003
A comparitive performance analysis of reliable group rekey transport protocols for secure multicast271.202002
Kronos: A Scalable Group Re-Keying Approach for Secure Multicast1156.002000
DyRecT: Software Support for Adaptive Parallelism on NOWs70.632000
Dodo: A User-Level System for Exploiting Idle Memory in Workstation Clusters181.341999
The impact of job memory requirements on gang-scheduling performance231.051999
Availability and utility of idle memory in workstation clusters743.831999
Using idle memory for data-intensive computations (extended abstract)30.461998
Design And Implementation Of A Parallel Solution To The Cutting Stock Problem50.531998
Supporting Dynamic Space-sharing on Clusters of Non-dedicated Workstations81.031997
Supporting Dynamic Reconfiguration of Parallel Applications on Clusters of Non-dedicated Workstations00.341997
Processor allocation in multiprogrammed distributed-memory parallel computer systems331.951997
Trace-driven Analysis of Migration-based Gang Scheduling Policies for Parallel Computers90.691997
The Interaction between Memory Allocation and Adaptive Partitioning in Message-Passing Multicomputers252.371995
Analysis of Processor Allocation in Multiprogrammed, Distributed-Memory Parallel Processing Systems211.781994
Optimal write batch size in log-structured file systems106.521994
Scheduling Of Large Scientific Applications On Distributed Memory Multiprocessor Systems122.841993
Performance analysis of job scheduling policies in parallel supercomputing environments385.251993
Processor scheduling on multiprogrammed, distributed memory parallel computers201.721993
A Comparative Analysis of Static Processor Partitioning Policies for Parallel Computers203.881993
A Fault-Tolerant Algorithm for Replicated Data Management5039.951992
Analysis of the periodic update write policy for disk cache222.661992