Dakshi Agrawal

According to our database1, Dakshi Agrawal authored at least 47 papers between 1995 and 2019.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2012, "For contributions to theory, analysis, and design of efficient, secure, and privacy-preserving communication systems".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
STB: space time boxes.
CCF Trans. Pervasive Comput. Interact., 2019

2016
MP-trie: Fast Spatial Queries on Moving Objects.
Proceedings of the Industrial Track of the 17th International Middleware Conference, 2016

2015
SparkBench - A Spark Performance Testing Suite.
Proceedings of the Performance Evaluation and Benchmarking: Traditional to Big Data to Internet of Things, 2015

2014
A BSP approach to composite network analysis.
Proceedings of the 2014 IEEE International Conference on Pervasive Computing and Communication Workshops, 2014

2013
Seeing through black boxes: Tracking transactions through queues under monitoring resource constraints.
Perform. Evaluation, 2013

Platform and applications for massive-scale streaming network analytics.
IBM J. Res. Dev., 2013

Protection Against Hardware Trojan Attacks: Towards a Comprehensive Solution.
IEEE Des. Test, 2013

2012
Limitations of Generating a Secret Key Using Wireless Fading Under Active Adversary.
IEEE/ACM Trans. Netw., 2012

Microscopic Social Influence.
Proceedings of the Twelfth SIAM International Conference on Data Mining, 2012

2011
Modeling data flow in socio-information networks: a risk estimation approach.
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011

Index-based sampling policies for tracking dynamic networks under sampling constraints.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

2010
Risk based Access Control with Uncertain and Time-dependent Sensitivity.
Proceedings of the SECRYPT 2010, 2010

Modelling Uncertain and Time-Dependent Security Labels in MLS Systems.
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010

Spatio-temporal patterns in network events.
Proceedings of the 2010 ACM Conference on Emerging Networking Experiments and Technology, 2010

2009
Selectively retrofitting monitoring in distributed systems.
SIGMETRICS Perform. Evaluation Rev., 2009

Learning, indexing, and diagnosing network faults.
Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28, 2009

A universal method for composing business transaction models using logs.
Proceedings of the Integrated Network Management, 2009

A metadata calculus for secure information sharing.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

A note on information-theoretic secret key exchange over wireless channels.
Proceedings of the 47th Annual Allerton Conference on Communication, 2009

2008
Evolution of storage management: Transforming raw data into information.
IBM J. Res. Dev., 2008

Tracking in a spaghetti bowl: monitoring transactions using footprints.
Proceedings of the 2008 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2008

2007
Correction to "Multiple-Antenna Signal Constellations for Fading Channels".
IEEE Trans. Inf. Theory, 2007

Utility Sampling for Trust Metrics in PKI.
IACR Cryptol. ePrint Arch., 2007

Trojan Detection using IC Fingerprinting.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

Issues in Designing a Policy Language for Distributed Management of IT Infrastructures.
Proceedings of the Integrated Network Management, 2007

Planning and Managing the IPTV Service Deployment.
Proceedings of the Integrated Network Management, 2007

2006
Fundamental Limits on the Anonymity Provided by the MIX Technique.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

2005
Policy-based management of networked computing systems.
IEEE Commun. Mag., 2005

Policy Ratification.
Proceedings of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), 2005

Policy management for networked systems and applications.
Proceedings of the Integrated Network Management, 2005

Templates as Master Keys.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29, 2005

2004
Using certes to infer client response time at the web server.
ACM Trans. Comput. Syst., 2004

Policy-Based Validation of SAN Configuration.
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004

2003
Joint noncoherent demodulation and decoding for the block fading channel: a practical framework for approaching Shannon capacity.
IEEE Trans. Commun., 2003

Measuring Anonymity: The Disclosure Attack.
IEEE Secur. Priv., 2003

Probabilistic Treatment of MIXes to Hamper Traffic Analysis.
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003

On nearest neighbor indexing of nonlinear trajectories.
Proceedings of the Twenty-Second ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, 2003

Multi-channel Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003

2002
Inferring client response time at the web server.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2002

Limits of Anonymity in Open Environments.
Proceedings of the Information Hiding, 5th International Workshop, 2002

The EM Side-Channel(s).
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002

2001
The turbo decoding algorithm and its phase trajectories.
IEEE Trans. Inf. Theory, 2001

Multiple-antenna signal constellations for fading channels.
IEEE Trans. Inf. Theory, 2001

On the Design and Quantification of Privacy Preserving Data Mining Algorithms.
Proceedings of the Twentieth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, 2001

2000
Generalized minimum distance decoding in Euclidean space: Performance analysis.
IEEE Trans. Inf. Theory, 2000

1999
GMD Decoding of Euclidean -Space Codes and Iterative Decoding of Turbo Codes
PhD thesis, 1999

1995
A counterexample to a Voronoi region conjecture.
IEEE Trans. Inf. Theory, 1995


  Loading...