2008 | ||
---|---|---|
24 | EE | Animashree Anandkumar, Chatschik Bisdikian, Dakshi Agrawal: Tracking in a spaghetti bowl: monitoring transactions using footprints. SIGMETRICS 2008: 133-144 |
23 | EE | Sandeep Gopisetty, Sandip Agarwala, Eric Butler, Divyesh Jadav, Stefan Jaquet, Madhukar R. Korupolu, Ramani Routray, Prasenjit Sarkar, Aameek Singh, Miriam Sivan-Zimet, Chung-Hao Tan, Sandeep Uttamchandani, David Merbach, Sumant Padbidri, Andreas Dieberger, Eben M. Haber, Eser Kandogan, Cheryl A. Kieliszewski, Dakshi Agrawal, Murthy V. Devarakonda, Kang-Won Lee, Kostas Magoutis, Dinesh C. Verma, Norbert G. Vogl: Evolution of storage management: Transforming raw data into information. IBM Journal of Research and Development 52(4-5): 341-352 (2008) |
2007 | ||
22 | EE | Dakshi Agrawal, Selçuk Baktir, Deniz Karakoyunlu, Pankaj Rohatgi, Berk Sunar: Trojan Detection using IC Fingerprinting. IEEE Symposium on Security and Privacy 2007: 296-310 |
21 | EE | Dakshi Agrawal, Seraphin B. Calo, Kang-Won Lee, Jorge Lobo: Issues in Designing a Policy Language for Distributed Management of IT Infrastructures. Integrated Network Management 2007: 30-39 |
20 | EE | Dakshi Agrawal, Mandis Beigi, Chatschik Bisdikian, Kang-Won Lee: Planning and Managing the IPTV Service Deployment. Integrated Network Management 2007: 353-362 |
19 | EE | Dakshi Agrawal, T. McGiffen, Thomas J. Richardson, Rüdiger L. Urbanke, D. Cox: Correction to "Multiple-Antenna Signal Constellations for Fading Channels". IEEE Transactions on Information Theory 53(1): 440 (2007) |
2006 | ||
18 | EE | Dogan Kesdogan, Dakshi Agrawal, Vinh Pham, Dieter Rautenbach: Fundamental Limits on the Anonymity Provided by the MIX Technique. IEEE Symposium on Security and Privacy 2006: 86-99 |
2005 | ||
17 | EE | Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi, Kai Schramm: Templates as Master Keys. CHES 2005: 15-29 |
16 | EE | Dakshi Agrawal, Seraphin B. Calo, James Giles, Kang-Won Lee, Dinesh C. Verma: Policy management for networked systems and applications. Integrated Network Management 2005: 455-468 |
15 | EE | Dakshi Agrawal, James Giles, Kang-Won Lee, Jorge Lobo: Policy Ratification. POLICY 2005: 223-232 |
2004 | ||
14 | EE | Dakshi Agrawal, James Giles, Kang-Won Lee, Kaladhar Voruganti, Khalid Filali-Adib: Policy-Based Validation of SAN Configuration. POLICY 2004: 77-86 |
13 | EE | David P. Olshefski, Jason Nieh, Dakshi Agrawal: Using certes to infer client response time at the web server. ACM Trans. Comput. Syst. 22(1): 49-93 (2004) |
2003 | ||
12 | EE | Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi: Multi-channel Attacks. CHES 2003: 2-16 |
11 | EE | Dakshi Agrawal, Dogan Kesdogan, Stefan Penz: Probabilistic Treatment of MIXes to Hamper Traffic Analysis. IEEE Symposium on Security and Privacy 2003: 16-27 |
10 | EE | Charu C. Aggarwal, Dakshi Agrawal: On nearest neighbor indexing of nonlinear trajectories. PODS 2003: 252-259 |
9 | EE | Dakshi Agrawal, Dogan Kesdogan: Measuring Anonymity: The Disclosure Attack. IEEE Security & Privacy 1(6): 27-34 (2003) |
2002 | ||
8 | EE | Dakshi Agrawal, Bruce Archambeault, Josyula R. Rao, Pankaj Rohatgi: The EM Side-Channel(s). CHES 2002: 29-45 |
7 | EE | Dogan Kesdogan, Dakshi Agrawal, Stefan Penz: Limits of Anonymity in Open Environments. Information Hiding 2002: 53-69 |
6 | EE | David P. Olshefski, Jason Nieh, Dakshi Agrawal: Inferring client response time at the web server. SIGMETRICS 2002: 160-171 |
2001 | ||
5 | EE | Dakshi Agrawal, Charu C. Aggarwal: On the Design and Quantification of Privacy Preserving Data Mining Algorithms. PODS 2001 |
4 | Dakshi Agrawal, Alexander Vardy: The turbo decoding algorithm and its phase trajectories. IEEE Transactions on Information Theory 47(2): 699-722 (2001) | |
3 | Dakshi Agrawal, Thomas J. Richardson, Rüdiger L. Urbanke: Multiple-antenna signal constellations for fading channels. IEEE Transactions on Information Theory 47(6): 2618-2626 (2001) | |
2000 | ||
2 | Dakshi Agrawal, Alexander Vardy: Generalized minimum distance decoding in Euclidean space: Performance analysis. IEEE Transactions on Information Theory 46(1): 60-83 (2000) | |
1995 | ||
1 | Rüdiger L. Urbanke, Dakshi Agrawal: A counterexample to a Voronoi region conjecture. IEEE Transactions on Information Theory 41(4): 1195-1196 (1995) |