Year |
Citation |
Score |
2020 |
Natarajan A, Ramachandran A, Mittal N. FEAST: A Lightweight Lock-free Concurrent Binary Search Tree Acm Transactions On Parallel Computing. 7: 1-64. DOI: 10.1145/3391438 |
0.459 |
|
2020 |
Mills KA, Chandrasekaran R, Mittal N. Algorithms for optimal replica placement under correlated failure in hierarchical failure domains Theoretical Computer Science. 809: 482-518. DOI: 10.1016/J.Tcs.2020.01.004 |
0.322 |
|
2020 |
Platz K, Mittal N, Venkatesan S. Practical concurrent unrolled linked lists using lazy synchronization Journal of Parallel and Distributed Computing. 139: 110-134. DOI: 10.1016/J.Jpdc.2019.11.005 |
0.4 |
|
2016 |
Zeng Y, Mills KA, Gokhale S, Mittal N, Venkatesan S, Chandrasekaran R. Robust neighbor discovery in multi-hop multi-channel heterogeneous wireless networks Journal of Parallel and Distributed Computing. 92: 15-34. DOI: 10.1016/J.Jpdc.2016.02.001 |
0.617 |
|
2016 |
Mittal N, Singh U, Sohi BS. A stable energy efficient clustering protocol for wireless sensor networks Wireless Networks. 1-13. DOI: 10.1007/s11276-016-1255-6 |
0.31 |
|
2014 |
Natarajan A, Mittal N. Fast concurrent lock-free binary search trees Acm Sigplan Notices. 49: 317-328. DOI: 10.1145/2555243.2555256 |
0.391 |
|
2014 |
Natarajan A, Chauhan H, Mittal N, Garg VK. Efficient abstraction algorithms for predicate detection Theoretical Computer Science. DOI: 10.1016/J.Tcs.2015.12.037 |
0.5 |
|
2014 |
Novales RL, Mittal N, Sarac K. SKAIT: A parameterized key assignment scheme for confidential communication in resource constrained ad hoc wireless networks Ad Hoc Networks. 20: 163-181. DOI: 10.1016/j.adhoc.2014.04.006 |
0.616 |
|
2013 |
Yazd SA, Venkatesan S, Mittal N. Boosting energy efficiency with mirrored data block replication policy and energy scheduler Operating Systems Review. 47: 33-40. DOI: 10.1145/2506164.2506171 |
0.357 |
|
2013 |
Natarajan A, Mittal N. Brief announcement: A concurrent lock-free red-black tree Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8205: 565-566. |
0.34 |
|
2011 |
Novales R, Mittal N. Parameterized key assignment for confidential communication in wireless networks Ad Hoc Networks. 9: 1186-1201. DOI: 10.1016/j.adhoc.2011.01.009 |
0.419 |
|
2010 |
Mittal N, Novales R. Cluster-based key predistribution using deployment knowledge Ieee Transactions On Dependable and Secure Computing. 7: 329-335. DOI: 10.1109/Tdsc.2009.34 |
0.598 |
|
2010 |
Natarajan A, Mittal N. False conflict reduction in the Swiss Transactional Memory (SwissTM) system Proceedings of the 2010 Ieee International Symposium On Parallel and Distributed Processing, Workshops and Phd Forum, Ipdpsw 2010. DOI: 10.1109/IPDPSW.2010.5470942 |
0.393 |
|
2009 |
Mittal N, Belagodu TR. On maximum key pool size for A key pre-distribution scheme in wireless sensor networks International Journal of Computers and Applications. 31: 30-35. DOI: 10.2316/Journal.202.2009.1.202-2424 |
0.453 |
|
2009 |
Novales R, Mittal N. TASK: Template-based key assignment for confidential communication in wireless networks Proceedings of the Ieee Symposium On Reliable Distributed Systems. 209-216. DOI: 10.1109/SRDS.2009.30 |
0.409 |
|
2009 |
Vu H, Nguyen T, Mittal N, Venkatesan S. PEQ: A privacy-preserving scheme for exact query evaluation in distributed sensor data networks Proceedings of the Ieee Symposium On Reliable Distributed Systems. 189-198. DOI: 10.1109/SRDS.2009.14 |
0.325 |
|
2009 |
Johnson P, Mittal N. A distributed termination detection algorithm for dynamic asynchronous systems Proceedings - International Conference On Distributed Computing Systems. 343-351. DOI: 10.1109/ICDCS.2009.16 |
0.328 |
|
2009 |
Krishnamurthy S, Mittal N, Chandrasekaran R, Venkatesan S. Neighbour discovery in multi-receiver cognitive radio networks International Journal of Computers and Applications. 31: 50-57. DOI: 10.1080/1206212X.2009.11441924 |
0.436 |
|
2009 |
Mittal N, Krishnamurthy S, Chandrasekaran R, Venkatesan S, Zeng Y. On neighbor discovery in cognitive radio networks Journal of Parallel and Distributed Computing. 69: 623-637. DOI: 10.1016/J.Jpdc.2009.03.008 |
0.632 |
|
2008 |
Peri S, Mittal N. Improving the efficacy of a termination detection algorithm Journal of Information Science and Engineering. 24: 159-174. DOI: 10.6688/Jise.2008.24.1.11 |
0.602 |
|
2008 |
Mittal N, Freiling FC, Venkatesan S, Penso LD. On termination detection in crash-prone distributed systems with failure detectors Journal of Parallel and Distributed Computing. 68: 855-875. DOI: 10.1016/J.Jpdc.2008.02.001 |
0.342 |
|
2008 |
Krishnamurthy S, Thoppian M, Kuppa S, Chandrasekaran R, Mittal N, Venkatesan S, Prakash R. Time-efficient distributed layer-2 auto-configuration for cognitive radio networks Computer Networks. 52: 831-849. DOI: 10.1016/J.Comnet.2007.11.013 |
0.464 |
|
2008 |
Vu H, Kulkarni A, Sarac K, Mittal N. WORMEROS: A new framework for defending against wormhole attacks on wireless ad hoc networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5258: 491-502. DOI: 10.1007/978-3-540-88582-5-46 |
0.336 |
|
2007 |
Mittal N. Space-efficient keying in wireless communication networks 3rd Ieee International Conference On Wireless and Mobile Computing, Networking and Communications, Wimob 2007. DOI: 10.1109/WIMOB.2007.4390869 |
0.449 |
|
2007 |
Mittal N, Sen A, Garg VK. Solving Computation Slicing Using Predicate Detection Ieee Transactions On Parallel and Distributed Systems. 18: 1700-1713. DOI: 10.1109/Tpds.2007.1077 |
0.333 |
|
2007 |
Atreya R, Mittal N, Peri S. A quorum-based group mutual exclusion algorithm for a distributed system with dynamic group set Ieee Transactions On Parallel and Distributed Systems. 18: 1345-1360. DOI: 10.1109/Tpds.2007.1072 |
0.611 |
|
2007 |
Mittal N, Mohan PK. A priority-based distributed group mutual exclusion algorithm when group access is non-uniform Journal of Parallel and Distributed Computing. 67: 797-815. DOI: 10.1016/J.Jpdc.2007.02.005 |
0.325 |
|
2007 |
Atreya R, Mittal N, Kshemkalyani AD, Garg VK, Singhal M. Efficient detection of a locally stable predicate in a distributed system Journal of Parallel and Distributed Computing. 67: 369-385. DOI: 10.1016/J.Jpdc.2006.12.004 |
0.372 |
|
2007 |
Mittal N, Venkatesan S, Peri S. A family of optimal termination detection algorithms Distributed Computing. 20: 141-162. DOI: 10.1007/S00446-007-0031-3 |
0.615 |
|
2007 |
Garg VK, Skawratananond C, Mittal N. Timestamping messages and events in a distributed system using synchronous communication Distributed Computing. 19: 387-402. DOI: 10.1007/S00446-006-0018-5 |
0.384 |
|
2006 |
Krishnamurthy S, Chandrasekaran R, Mittal N, Venkatesan S. Brief announcement: Synchronous distributed algorithms for node discovery and configuration in multi-channel cognitive radio networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4167: 572-574. |
0.307 |
|
2005 |
Mittal N, Garg VK. Techniques and applications of computation slicing Distributed Computing. 17: 251-277. DOI: 10.1007/S00446-004-0117-0 |
0.324 |
|
2005 |
Peri S, Mittal N. Monitoring stable properties in dynamic peer-to-peer distributed systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3821: 420-431. DOI: 10.1007/11590156_34 |
0.568 |
|
2004 |
Mittal N, Garg VK. Finding missing synchronization in a distributed computation using controlled re-execution Distributed Computing. 17: 107-130. DOI: 10.1007/S00446-003-0104-X |
0.332 |
|
Show low-probability matches. |