|
Search the dblp DataBase
Dakshi Agrawal:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Dakshi Agrawal, Bruce Archambeault, Josyula R. Rao, Pankaj Rohatgi
The EM Side-Channel(s). [Citation Graph (0, 0)][DBLP] CHES, 2002, pp:29-45 [Conf]
- Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi
Multi-channel Attacks. [Citation Graph (0, 0)][DBLP] CHES, 2003, pp:2-16 [Conf]
- Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi, Kai Schramm
Templates as Master Keys. [Citation Graph (0, 0)][DBLP] CHES, 2005, pp:15-29 [Conf]
- Dogan Kesdogan, Dakshi Agrawal, Stefan Penz
Limits of Anonymity in Open Environments. [Citation Graph (0, 0)][DBLP] Information Hiding, 2002, pp:53-69 [Conf]
- Charu C. Aggarwal, Dakshi Agrawal
On nearest neighbor indexing of nonlinear trajectories. [Citation Graph (0, 0)][DBLP] PODS, 2003, pp:252-259 [Conf]
- Dakshi Agrawal, Charu C. Aggarwal
On the Design and Quantification of Privacy Preserving Data Mining Algorithms. [Citation Graph (0, 0)][DBLP] PODS, 2001, pp:- [Conf]
- Dakshi Agrawal, James Giles, Kang-Won Lee, Jorge Lobo
Policy Ratification. [Citation Graph (0, 0)][DBLP] POLICY, 2005, pp:223-232 [Conf]
- Dakshi Agrawal, James Giles, Kang-Won Lee, Kaladhar Voruganti, Khalid Filali-Adib
Policy-Based Validation of SAN Configuration. [Citation Graph (0, 0)][DBLP] POLICY, 2004, pp:77-86 [Conf]
- David P. Olshefski, Jason Nieh, Dakshi Agrawal
Inferring client response time at the web server. [Citation Graph (0, 0)][DBLP] SIGMETRICS, 2002, pp:160-171 [Conf]
- Dakshi Agrawal, Dogan Kesdogan, Stefan Penz
Probabilistic Treatment of MIXes to Hamper Traffic Analysis. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2003, pp:16-27 [Conf]
- Dogan Kesdogan, Dakshi Agrawal, Vinh Pham, Dieter Rautenbach
Fundamental Limits on the Anonymity Provided by the MIX Technique. [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:86-99 [Conf]
- Dakshi Agrawal, Selçuk Baktir, Deniz Karakoyunlu, Pankaj Rohatgi, Berk Sunar
Trojan Detection using IC Fingerprinting. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2007, pp:296-310 [Conf]
- Dakshi Agrawal, Dogan Kesdogan
Measuring Anonymity: The Disclosure Attack. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2003, v:1, n:6, pp:27-34 [Journal]
- Dakshi Agrawal, Thomas J. Richardson, Rüdiger L. Urbanke
Multiple-antenna signal constellations for fading channels. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2001, v:47, n:6, pp:2618-2626 [Journal]
- Dakshi Agrawal, Alexander Vardy
Generalized minimum distance decoding in Euclidean space: Performance analysis. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2000, v:46, n:1, pp:60-83 [Journal]
- Dakshi Agrawal, Alexander Vardy
The turbo decoding algorithm and its phase trajectories. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2001, v:47, n:2, pp:699-722 [Journal]
- Rüdiger L. Urbanke, Dakshi Agrawal
A counterexample to a Voronoi region conjecture. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1995, v:41, n:4, pp:1195-1196 [Journal]
- Dakshi Agrawal, T. McGiffen, Thomas J. Richardson, Rüdiger L. Urbanke, D. Cox
Correction to "Multiple-Antenna Signal Constellations for Fading Channels". [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2007, v:53, n:1, pp:440- [Journal]
- David P. Olshefski, Jason Nieh, Dakshi Agrawal
Using certes to infer client response time at the web server. [Citation Graph (0, 0)][DBLP] ACM Trans. Comput. Syst., 2004, v:22, n:1, pp:49-93 [Journal]
- Dakshi Agrawal, Seraphin B. Calo, James Giles, Kang-Won Lee, Dinesh C. Verma
Policy management for networked systems and applications. [Citation Graph (0, 0)][DBLP] Integrated Network Management, 2005, pp:455-468 [Conf]
- Dakshi Agrawal, Mandis Beigi, Chatschik Bisdikian, Kang-Won Lee
Planning and Managing the IPTV Service Deployment. [Citation Graph (0, 0)][DBLP] Integrated Network Management, 2007, pp:353-362 [Conf]
- Dakshi Agrawal, Seraphin B. Calo, Kang-Won Lee, Jorge Lobo
Issues in Designing a Policy Language for Distributed Management of IT Infrastructures. [Citation Graph (0, 0)][DBLP] Integrated Network Management, 2007, pp:30-39 [Conf]
A metadata calculus for secure information sharing. [Citation Graph (, )][DBLP]
A universal method for composing business transaction models using logs. [Citation Graph (, )][DBLP]
Learning, indexing, and diagnosing network faults. [Citation Graph (, )][DBLP]
Tracking in a spaghetti bowl: monitoring transactions using footprints. [Citation Graph (, )][DBLP]
Seeing Through Black Boxes : Tracking Transactions through Queues under Monitoring Resource Constraints [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.325secs
|