The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Dakshi Agrawal: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Dakshi Agrawal, Bruce Archambeault, Josyula R. Rao, Pankaj Rohatgi
    The EM Side-Channel(s). [Citation Graph (0, 0)][DBLP]
    CHES, 2002, pp:29-45 [Conf]
  2. Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi
    Multi-channel Attacks. [Citation Graph (0, 0)][DBLP]
    CHES, 2003, pp:2-16 [Conf]
  3. Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi, Kai Schramm
    Templates as Master Keys. [Citation Graph (0, 0)][DBLP]
    CHES, 2005, pp:15-29 [Conf]
  4. Dogan Kesdogan, Dakshi Agrawal, Stefan Penz
    Limits of Anonymity in Open Environments. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2002, pp:53-69 [Conf]
  5. Charu C. Aggarwal, Dakshi Agrawal
    On nearest neighbor indexing of nonlinear trajectories. [Citation Graph (0, 0)][DBLP]
    PODS, 2003, pp:252-259 [Conf]
  6. Dakshi Agrawal, Charu C. Aggarwal
    On the Design and Quantification of Privacy Preserving Data Mining Algorithms. [Citation Graph (0, 0)][DBLP]
    PODS, 2001, pp:- [Conf]
  7. Dakshi Agrawal, James Giles, Kang-Won Lee, Jorge Lobo
    Policy Ratification. [Citation Graph (0, 0)][DBLP]
    POLICY, 2005, pp:223-232 [Conf]
  8. Dakshi Agrawal, James Giles, Kang-Won Lee, Kaladhar Voruganti, Khalid Filali-Adib
    Policy-Based Validation of SAN Configuration. [Citation Graph (0, 0)][DBLP]
    POLICY, 2004, pp:77-86 [Conf]
  9. David P. Olshefski, Jason Nieh, Dakshi Agrawal
    Inferring client response time at the web server. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 2002, pp:160-171 [Conf]
  10. Dakshi Agrawal, Dogan Kesdogan, Stefan Penz
    Probabilistic Treatment of MIXes to Hamper Traffic Analysis. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:16-27 [Conf]
  11. Dogan Kesdogan, Dakshi Agrawal, Vinh Pham, Dieter Rautenbach
    Fundamental Limits on the Anonymity Provided by the MIX Technique. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:86-99 [Conf]
  12. Dakshi Agrawal, Selçuk Baktir, Deniz Karakoyunlu, Pankaj Rohatgi, Berk Sunar
    Trojan Detection using IC Fingerprinting. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:296-310 [Conf]
  13. Dakshi Agrawal, Dogan Kesdogan
    Measuring Anonymity: The Disclosure Attack. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:6, pp:27-34 [Journal]
  14. Dakshi Agrawal, Thomas J. Richardson, Rüdiger L. Urbanke
    Multiple-antenna signal constellations for fading channels. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2001, v:47, n:6, pp:2618-2626 [Journal]
  15. Dakshi Agrawal, Alexander Vardy
    Generalized minimum distance decoding in Euclidean space: Performance analysis. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2000, v:46, n:1, pp:60-83 [Journal]
  16. Dakshi Agrawal, Alexander Vardy
    The turbo decoding algorithm and its phase trajectories. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2001, v:47, n:2, pp:699-722 [Journal]
  17. Rüdiger L. Urbanke, Dakshi Agrawal
    A counterexample to a Voronoi region conjecture. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1995, v:41, n:4, pp:1195-1196 [Journal]
  18. Dakshi Agrawal, T. McGiffen, Thomas J. Richardson, Rüdiger L. Urbanke, D. Cox
    Correction to "Multiple-Antenna Signal Constellations for Fading Channels". [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2007, v:53, n:1, pp:440- [Journal]
  19. David P. Olshefski, Jason Nieh, Dakshi Agrawal
    Using certes to infer client response time at the web server. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Comput. Syst., 2004, v:22, n:1, pp:49-93 [Journal]
  20. Dakshi Agrawal, Seraphin B. Calo, James Giles, Kang-Won Lee, Dinesh C. Verma
    Policy management for networked systems and applications. [Citation Graph (0, 0)][DBLP]
    Integrated Network Management, 2005, pp:455-468 [Conf]
  21. Dakshi Agrawal, Mandis Beigi, Chatschik Bisdikian, Kang-Won Lee
    Planning and Managing the IPTV Service Deployment. [Citation Graph (0, 0)][DBLP]
    Integrated Network Management, 2007, pp:353-362 [Conf]
  22. Dakshi Agrawal, Seraphin B. Calo, Kang-Won Lee, Jorge Lobo
    Issues in Designing a Policy Language for Distributed Management of IT Infrastructures. [Citation Graph (0, 0)][DBLP]
    Integrated Network Management, 2007, pp:30-39 [Conf]

  23. A metadata calculus for secure information sharing. [Citation Graph (, )][DBLP]


  24. A universal method for composing business transaction models using logs. [Citation Graph (, )][DBLP]


  25. Learning, indexing, and diagnosing network faults. [Citation Graph (, )][DBLP]


  26. Tracking in a spaghetti bowl: monitoring transactions using footprints. [Citation Graph (, )][DBLP]


  27. Seeing Through Black Boxes : Tracking Transactions through Queues under Monitoring Resource Constraints [Citation Graph (, )][DBLP]


Search in 0.013secs, Finished in 0.015secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002