2008 |
24 | EE | Animashree Anandkumar,
Chatschik Bisdikian,
Dakshi Agrawal:
Tracking in a spaghetti bowl: monitoring transactions using footprints.
SIGMETRICS 2008: 133-144 |
23 | EE | Sandeep Gopisetty,
Sandip Agarwala,
Eric Butler,
Divyesh Jadav,
Stefan Jaquet,
Madhukar R. Korupolu,
Ramani Routray,
Prasenjit Sarkar,
Aameek Singh,
Miriam Sivan-Zimet,
Chung-Hao Tan,
Sandeep Uttamchandani,
David Merbach,
Sumant Padbidri,
Andreas Dieberger,
Eben M. Haber,
Eser Kandogan,
Cheryl A. Kieliszewski,
Dakshi Agrawal,
Murthy V. Devarakonda,
Kang-Won Lee,
Kostas Magoutis,
Dinesh C. Verma,
Norbert G. Vogl:
Evolution of storage management: Transforming raw data into information.
IBM Journal of Research and Development 52(4-5): 341-352 (2008) |
2007 |
22 | EE | Dakshi Agrawal,
Selçuk Baktir,
Deniz Karakoyunlu,
Pankaj Rohatgi,
Berk Sunar:
Trojan Detection using IC Fingerprinting.
IEEE Symposium on Security and Privacy 2007: 296-310 |
21 | EE | Dakshi Agrawal,
Seraphin B. Calo,
Kang-Won Lee,
Jorge Lobo:
Issues in Designing a Policy Language for Distributed Management of IT Infrastructures.
Integrated Network Management 2007: 30-39 |
20 | EE | Dakshi Agrawal,
Mandis Beigi,
Chatschik Bisdikian,
Kang-Won Lee:
Planning and Managing the IPTV Service Deployment.
Integrated Network Management 2007: 353-362 |
19 | EE | Dakshi Agrawal,
T. McGiffen,
Thomas J. Richardson,
Rüdiger L. Urbanke,
D. Cox:
Correction to "Multiple-Antenna Signal Constellations for Fading Channels".
IEEE Transactions on Information Theory 53(1): 440 (2007) |
2006 |
18 | EE | Dogan Kesdogan,
Dakshi Agrawal,
Vinh Pham,
Dieter Rautenbach:
Fundamental Limits on the Anonymity Provided by the MIX Technique.
IEEE Symposium on Security and Privacy 2006: 86-99 |
2005 |
17 | EE | Dakshi Agrawal,
Josyula R. Rao,
Pankaj Rohatgi,
Kai Schramm:
Templates as Master Keys.
CHES 2005: 15-29 |
16 | EE | Dakshi Agrawal,
Seraphin B. Calo,
James Giles,
Kang-Won Lee,
Dinesh C. Verma:
Policy management for networked systems and applications.
Integrated Network Management 2005: 455-468 |
15 | EE | Dakshi Agrawal,
James Giles,
Kang-Won Lee,
Jorge Lobo:
Policy Ratification.
POLICY 2005: 223-232 |
2004 |
14 | EE | Dakshi Agrawal,
James Giles,
Kang-Won Lee,
Kaladhar Voruganti,
Khalid Filali-Adib:
Policy-Based Validation of SAN Configuration.
POLICY 2004: 77-86 |
13 | EE | David P. Olshefski,
Jason Nieh,
Dakshi Agrawal:
Using certes to infer client response time at the web server.
ACM Trans. Comput. Syst. 22(1): 49-93 (2004) |
2003 |
12 | EE | Dakshi Agrawal,
Josyula R. Rao,
Pankaj Rohatgi:
Multi-channel Attacks.
CHES 2003: 2-16 |
11 | EE | Dakshi Agrawal,
Dogan Kesdogan,
Stefan Penz:
Probabilistic Treatment of MIXes to Hamper Traffic Analysis.
IEEE Symposium on Security and Privacy 2003: 16-27 |
10 | EE | Charu C. Aggarwal,
Dakshi Agrawal:
On nearest neighbor indexing of nonlinear trajectories.
PODS 2003: 252-259 |
9 | EE | Dakshi Agrawal,
Dogan Kesdogan:
Measuring Anonymity: The Disclosure Attack.
IEEE Security & Privacy 1(6): 27-34 (2003) |
2002 |
8 | EE | Dakshi Agrawal,
Bruce Archambeault,
Josyula R. Rao,
Pankaj Rohatgi:
The EM Side-Channel(s).
CHES 2002: 29-45 |
7 | EE | Dogan Kesdogan,
Dakshi Agrawal,
Stefan Penz:
Limits of Anonymity in Open Environments.
Information Hiding 2002: 53-69 |
6 | EE | David P. Olshefski,
Jason Nieh,
Dakshi Agrawal:
Inferring client response time at the web server.
SIGMETRICS 2002: 160-171 |
2001 |
5 | EE | Dakshi Agrawal,
Charu C. Aggarwal:
On the Design and Quantification of Privacy Preserving Data Mining Algorithms.
PODS 2001 |
4 | | Dakshi Agrawal,
Alexander Vardy:
The turbo decoding algorithm and its phase trajectories.
IEEE Transactions on Information Theory 47(2): 699-722 (2001) |
3 | | Dakshi Agrawal,
Thomas J. Richardson,
Rüdiger L. Urbanke:
Multiple-antenna signal constellations for fading channels.
IEEE Transactions on Information Theory 47(6): 2618-2626 (2001) |
2000 |
2 | | Dakshi Agrawal,
Alexander Vardy:
Generalized minimum distance decoding in Euclidean space: Performance analysis.
IEEE Transactions on Information Theory 46(1): 60-83 (2000) |
1995 |
1 | | Rüdiger L. Urbanke,
Dakshi Agrawal:
A counterexample to a Voronoi region conjecture.
IEEE Transactions on Information Theory 41(4): 1195-1196 (1995) |