default search action
Dakshi Agrawal
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i3]Talia Gershon, Seetharami Seelam, Brian Belgodere, Milton Bonilla, Lan Hoang, Danny Barnett, I-Hsin Chung, Apoorve Mohan, Ming-Hung Chen, Lixiang Luo, Robert Walkup, Constantinos Evangelinos, Shweta Salaria, Marc Dombrowa, Yoonho Park, Apo Kayi, Liran Schour, Alim Alim, Ali Sydney, Pavlos Maniotis, Laurent Schares, Bernard Metzler, Bengi Karacali-Akyamac, Sophia Wen, Tatsuhiro Chiba, Sunyanan Choochotkaew, Takeshi Yoshimura, Claudia Misale, Tonia Elengikal, Kevin O. Connor, Zhuoran Liu, Richard Molina, Lars Schneidenbach, James Caden, Christopher Laibinis, Carlos Fonseca, Vasily Tarasov, Swaminathan Sundararaman, Frank B. Schmuck, Scott Guthridge, Jeremy Cohn, Marc Eshel, Paul Muench, Runyu Liu, William Pointer, Drew Wyskida, Bob Krull, Ray Rose, Brent Wolfe, William Cornejo, John Walter, Colm Malone, Clifford Perucci, Frank Franco, Nigel Hinds, Bob Calio, Pavel Druyan, Robert Kilduff, John Kienle, Connor McStay, Andrew Figueroa, Matthew Connolly, Edie Fost, Gina Roma, Jake Fonseca, Ido Levy, Michele Payne, Ryan Schenkel, Amir Malki, Lion Schneider, Aniruddha Narkhede, Shekeba Moshref, Alexandra Kisin, Olga Dodin, Bill Rippon, Henry Wrieth, John Ganci, Johnny Colino, Donna Habeger-Rose, Rakesh Pandey, Aditya Gidh, Aditya Gaur, Dennis Patterson, Samsuddin Salmani, Rambilas Varma, Rumana Rumana, Shubham Sharma, Mayank Mishra, Rameswar Panda, Aditya Prasad, Matt Stallone, Gaoyuan Zhang, Yikang Shen, David Cox, Ruchir Puri, Dakshi Agrawal, Drew Thorstensen, Joel Belog, Brent Tang:
The infrastructure powering IBM's Gen AI model development. CoRR abs/2407.05467 (2024)
2010 – 2019
- 2019
- [j16]Dakshi Agrawal, Raghu K. Ganti, Jeff Jonas, Mudhakar Srivatsa:
STB: space time boxes. CCF Trans. Pervasive Comput. Interact. 1(2): 114-124 (2019) - 2016
- [c29]Raghu K. Ganti, Mudhakar Srivatsa, Dakshi Agrawal, Petros Zerfos, Jorge Ortiz:
MP-trie: Fast Spatial Queries on Moving Objects. Middleware Industry 2016: 1 - 2015
- [c28]Dakshi Agrawal, Ali Raza Butt, Kshitij A. Doshi, Josep Lluís Larriba-Pey, Min Li, Frederick R. Reiss, Francois Raab, Berni Schiefer, Toyotaro Suzumura, Yinglong Xia:
SparkBench - A Spark Performance Testing Suite. TPCTC 2015: 26-44 - 2014
- [c27]Mudhakar Srivatsa, Raghu K. Ganti, Steven A. Borbash, Dakshi Agrawal:
A BSP approach to composite network analysis. PerCom Workshops 2014: 407-412 - 2013
- [j15]Swarup Bhunia, Miron Abramovici, Dakshi Agrawal, Paul Bradley, Michael S. Hsiao, Jim Plusquellic, Mohammad Tehranipoor:
Protection Against Hardware Trojan Attacks: Towards a Comprehensive Solution. IEEE Des. Test 30(3): 6-17 (2013) - [j14]Petros Zerfos, Mudhakar Srivatsa, Hao Yu, D. Dennerline, Hubertus Franke, Dakshi Agrawal:
Platform and applications for massive-scale streaming network analytics. IBM J. Res. Dev. 57(3/4): 11 (2013) - [j13]Animashree Anandkumar, Ting He, Chatschik Bisdikian, Dakshi Agrawal:
Seeing through black boxes: Tracking transactions through queues under monitoring resource constraints. Perform. Evaluation 70(12): 1090-1110 (2013) - 2012
- [j12]Murtaza Zafer, Dakshi Agrawal, Mudhakar Srivatsa:
Limitations of Generating a Secret Key Using Wireless Fading Under Active Adversary. IEEE/ACM Trans. Netw. 20(5): 1440-1451 (2012) - [c26]Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling Liu:
Microscopic Social Influence. SDM 2012: 129-140 - 2011
- [c25]Ting He, Animashree Anandkumar, Dakshi Agrawal:
Index-based sampling policies for tracking dynamic networks under sampling constraints. INFOCOM 2011: 1233-1241 - [c24]Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling Liu:
Modeling data flow in socio-information networks: a risk estimation approach. SACMAT 2011: 113-122 - 2010
- [c23]Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling Liu:
Spatio-temporal patterns in network events. CoNEXT 2010: 3 - [c22]John A. Clark, Juan E. Tapiador, John A. McDermid, Pau-Chen Cheng, Dakshi Agrawal, Natalie Ivanic, Dave Slogget:
Modelling Uncertain and Time-Dependent Security Labels in MLS Systems. ICETE (Selected Papers) 2010: 158-171 - [c21]John A. Clark, Juan E. Tapiador, John A. McDermid, Pau-Chen Cheng, Dakshi Agrawal, Natalie Ivanic, Dave Slogget:
Risk based Access Control with Uncertain and Time-dependent Sensitivity. SECRYPT 2010: 5-13 - [i2]Animashree Anandkumar, Ting He, Chatschik Bisdikian, Dakshi Agrawal:
Seeing Through Black Boxes : Tracking Transactions through Queues under Monitoring Resource Constraints. CoRR abs/1006.1674 (2010)
2000 – 2009
- 2009
- [j11]Animashree Anandkumar, Chatschik Bisdikian, Ting He, Dakshi Agrawal:
Selectively retrofitting monitoring in distributed systems. SIGMETRICS Perform. Evaluation Rev. 37(2): 6-8 (2009) - [c20]Murtaza Zafer, Dakshi Agrawal, Mudhakar Srivatsa:
A note on information-theoretic secret key exchange over wireless channels. Allerton 2009: 754-761 - [c19]Mudhakar Srivatsa, Dakshi Agrawal, Steffen Reidt:
A metadata calculus for secure information sharing. CCS 2009: 488-499 - [c18]Joel W. Branch, Chatschik Bisdikian, Ho Yin Starsky Wong, Dakshi Agrawal:
A universal method for composing business transaction models using logs. Integrated Network Management 2009: 17-24 - [c17]Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling Liu:
Learning, indexing, and diagnosing network faults. KDD 2009: 857-866 - 2008
- [j10]Sandeep Gopisetty, Sandip Agarwala, Eric Butler, Divyesh Jadav, Stefan Jaquet, Madhukar R. Korupolu, Ramani Routray, Prasenjit Sarkar, Aameek Singh, Miriam Sivan-Zimet, Chung-Hao Tan, Sandeep Uttamchandani, David Merbach, Sumant Padbidri, Andreas Dieberger, Eben M. Haber, Eser Kandogan, Cheryl A. Kieliszewski, Dakshi Agrawal, Murthy V. Devarakonda, Kang-Won Lee, Kostas Magoutis, Dinesh C. Verma, Norbert G. Vogl:
Evolution of storage management: Transforming raw data into information. IBM J. Res. Dev. 52(4-5): 341-352 (2008) - [c16]Animashree Anandkumar, Chatschik Bisdikian, Dakshi Agrawal:
Tracking in a spaghetti bowl: monitoring transactions using footprints. SIGMETRICS 2008: 133-144 - 2007
- [j9]Dakshi Agrawal, Tom McGiffen, Thomas J. Richardson, Rüdiger L. Urbanke, Donald C. Cox:
Correction to "Multiple-Antenna Signal Constellations for Fading Channels". IEEE Trans. Inf. Theory 53(1): 440 (2007) - [c15]Dakshi Agrawal, Seraphin B. Calo, Kang-Won Lee, Jorge Lobo:
Issues in Designing a Policy Language for Distributed Management of IT Infrastructures. Integrated Network Management 2007: 30-39 - [c14]Dakshi Agrawal, Mandis Beigi, Chatschik Bisdikian, Kang-Won Lee:
Planning and Managing the IPTV Service Deployment. Integrated Network Management 2007: 353-362 - [c13]Dakshi Agrawal, Selçuk Baktir, Deniz Karakoyunlu, Pankaj Rohatgi, Berk Sunar:
Trojan Detection using IC Fingerprinting. S&P 2007: 296-310 - [i1]Dakshi Agrawal, Charanjit S. Jutla:
Utility Sampling for Trust Metrics in PKI. IACR Cryptol. ePrint Arch. 2007: 178 (2007) - 2006
- [c12]Dogan Kesdogan, Dakshi Agrawal, Dang Vinh Pham, Dieter Rautenbach:
Fundamental Limits on the Anonymity Provided by the MIX Technique. S&P 2006: 86-99 - 2005
- [j8]Dakshi Agrawal, Kang-Won Lee, Jorge Lobo:
Policy-based management of networked computing systems. IEEE Commun. Mag. 43(10): 69-75 (2005) - [c11]Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi, Kai Schramm:
Templates as Master Keys. CHES 2005: 15-29 - [c10]Dakshi Agrawal, Seraphin B. Calo, James Giles, Kang-Won Lee, Dinesh C. Verma:
Policy management for networked systems and applications. Integrated Network Management 2005: 455-468 - [c9]Dakshi Agrawal, James Giles, Kang-Won Lee, Jorge Lobo:
Policy Ratification. POLICY 2005: 223-232 - 2004
- [j7]David P. Olshefski, Jason Nieh, Dakshi Agrawal:
Using certes to infer client response time at the web server. ACM Trans. Comput. Syst. 22(1): 49-93 (2004) - [c8]Dakshi Agrawal, James Giles, Kang-Won Lee, Kaladhar Voruganti, Khalid Filali-Adib:
Policy-Based Validation of SAN Configuration. POLICY 2004: 77-86 - 2003
- [j6]Dakshi Agrawal, Dogan Kesdogan:
Measuring Anonymity: The Disclosure Attack. IEEE Secur. Priv. 1(6): 27-34 (2003) - [j5]Rong-Rong Chen, Ralf Koetter, Upamanyu Madhow, Dakshi Agrawal:
Joint noncoherent demodulation and decoding for the block fading channel: a practical framework for approaching Shannon capacity. IEEE Trans. Commun. 51(10): 1676-1689 (2003) - [c7]Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi:
Multi-channel Attacks. CHES 2003: 2-16 - [c6]Charu C. Aggarwal, Dakshi Agrawal:
On nearest neighbor indexing of nonlinear trajectories. PODS 2003: 252-259 - [c5]Dakshi Agrawal, Dogan Kesdogan, Stefan Penz:
Probabilistic Treatment of MIXes to Hamper Traffic Analysis. S&P 2003: 16-27 - 2002
- [c4]Dakshi Agrawal, Bruce Archambeault, Josyula R. Rao, Pankaj Rohatgi:
The EM Side-Channel(s). CHES 2002: 29-45 - [c3]Dogan Kesdogan, Dakshi Agrawal, Stefan Penz:
Limits of Anonymity in Open Environments. Information Hiding 2002: 53-69 - [c2]David P. Olshefski, Jason Nieh, Dakshi Agrawal:
Inferring client response time at the web server. SIGMETRICS 2002: 160-171 - 2001
- [j4]Dakshi Agrawal, Alexander Vardy:
The turbo decoding algorithm and its phase trajectories. IEEE Trans. Inf. Theory 47(2): 699-722 (2001) - [j3]Dakshi Agrawal, Thomas J. Richardson, Rüdiger L. Urbanke:
Multiple-antenna signal constellations for fading channels. IEEE Trans. Inf. Theory 47(6): 2618-2626 (2001) - [c1]Dakshi Agrawal, Charu C. Aggarwal:
On the Design and Quantification of Privacy Preserving Data Mining Algorithms. PODS 2001 - 2000
- [j2]Dakshi Agrawal, Alexander Vardy:
Generalized minimum distance decoding in Euclidean space: Performance analysis. IEEE Trans. Inf. Theory 46(1): 60-83 (2000)
1990 – 1999
- 1999
- [b1]Dakshi Agrawal:
GMD Decoding of Euclidean -Space Codes and Iterative Decoding of Turbo Codes. University of Illinois Urbana-Champaign, USA, 1999 - 1995
- [j1]Rüdiger L. Urbanke, Dakshi Agrawal:
A counterexample to a Voronoi region conjecture. IEEE Trans. Inf. Theory 41(4): 1195-1196 (1995)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-14 23:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint