Dakshi Agrawal

ORCID: 0000-0002-1641-4705
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Peer-to-Peer Network Technologies
  • Access Control and Trust
  • Network Security and Intrusion Detection
  • Cryptography and Data Security
  • Advanced Wireless Communication Techniques
  • Distributed systems and fault tolerance
  • Advanced Database Systems and Queries
  • Service-Oriented Architecture and Web Services
  • Software System Performance and Reliability
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Security and Verification in Computing
  • Caching and Content Delivery
  • Wireless Communication Networks Research
  • Internet Traffic Analysis and Secure E-voting
  • Data Management and Algorithms
  • Network Traffic and Congestion Control
  • Advanced Queuing Theory Analysis
  • Cryptographic Implementations and Security
  • Cloud Computing and Resource Management
  • Chaos-based Image/Signal Encryption
  • Complex Network Analysis Techniques
  • Human Mobility and Location-Based Analysis
  • Mobile Agent-Based Network Management
  • Advanced Data Storage Technologies
  • Coding theory and cryptography

IBM (United States)
2006-2016

IBM Research - Thomas J. Watson Research Center
2001-2016

Massachusetts Institute of Technology
2010

Pohang University of Science and Technology
2006

University of Illinois Urbana-Champaign
2000-2002

The increasing ability to track and collect large amounts of data with the use current hardware technology has lead an interest in development mining algorithms which preserve user privacy. A recently proposed technique addresses issue privacy preservation by perturbing reconstructing distributions at aggregate level order perform mining. This method is able retain while accessing information implicit original attributes. distribution reconstruction process naturally leads some loss...

10.1145/375551.375602 article EN 2001-05-01

Hardware manufacturers are increasingly outsourcing their IC fabrication work overseas due to much lower cost structure. This poses a significant security risk for ICs used critical military and business applications. Attackers can exploit this loss of control substitute Trojan genuine ones or insert circuit into the design mask fabrication. We show that technique borrowed from side-channel cryptanalysis be mitigate problem. Our approach uses noise modeling construct set fingerprints/or an...

10.1109/sp.2007.36 article EN 2022 IEEE Symposium on Security and Privacy (SP) 2007-05-01

There has been an increasing interest in providing high data-rate services such as video-conferencing, multimedia Internet access and wide area network over wideband wireless channels. Wideband channels available the PCS band (2 GHz) have envisioned to be used by mobile (high Doppler) stationary (low units a variety of delay spread profiles. This is challenging task, given limited link budget severity environment, calls for development novel robust bandwidth efficient techniques which work...

10.1109/vetec.1998.686154 article EN 2002-11-27

With the increasing disintegration of design and manufacturing chain our microelectronic products, we should not only worry about including unintentional, unwanted hardware features (“bugs”), but also intentional malicious features: “Trojan Horses,”which act as spies or terrorists. This article provides an overview Trojans countermeasures.

10.1109/mdt.2012.2196252 article EN IEEE Design and Test 2012-04-27

In this correspondence, we show that the problem of designing efficient multiple-antenna signal constellations for fading channels can be related to finding packings with large minimum distance in complex Grassmannian space. We describe a numerical optimization procedure good space and report best found by procedure. These improve significantly upon previously known results.

10.1109/18.945279 article EN IEEE Transactions on Information Theory 2001-01-01

This article provides an overview of the Policy Management for Autonomic Computing (PMAC) platform, and shows how it can be used management networked systems. We present policy information model adopted by PMAC system interaction between manager managed resource. also main components creation, storage, evaluation, enforcement, practical applications in networks management.

10.1109/mcom.2005.1522127 article EN IEEE Communications Magazine 2005-10-01

The paper contains a systematic investigation of practical coding strategies for noncoherent communication over fading channels, guided by explicit comparisons with information-theoretic benchmarks. Noncoherent reception is interpreted as joint data and channel estimation, assuming that the time varying priori unknown. We consider iterative decoding serial concatenation standard binary outer code an inner modulation amenable to detection. For information rate about 1/2 bit per use, proposed...

10.1109/tcomm.2003.818087 article EN IEEE Transactions on Communications 2003-10-01

It is not sufficient to merely check the syntax of new policies before they are deployed in a system; need be analyzed for their interactions with each other and local environment. That is, go through ratification process. We believe policy becomes an essential part system management as number increases administration more decentralized. In this paper, we focus on basic tasks involved ratification. To large degree, these can performed independent model language require little domain-specific...

10.1109/policy.2005.25 article EN 2005-06-28

Recently, many research studies have explored the use of wireless fading to generate an information-theoretic shared secret key over open channel. While this line is now mature enough be built into demonstrative working systems for scenarios involving a (limited) passive/eavesdropping adversary model, case active (jamming) has not been sufficiently studied. Under adversary, information-bits that need exchanged during process setup will only subject eavesdropping, but also message disruptions...

10.1109/tnet.2012.2183146 article EN IEEE/ACM Transactions on Networking 2012-01-25

Anonymity services hide user identity at the network or address level but are vulnerable to attacks involving repeated observations of user. Quantifying number required for an attack is a useful measure anonymity.

10.1109/msecp.2003.1253565 article EN IEEE Security & Privacy 2003-11-01

This research systematically investigates the complicated social dynamics inside Indian culture, with a particular emphasis on intersections of identity, marriage, and caste, using an internet survey as its major instrument. Drawing Peter Berger Thomas Luckmann’s theoretical framework production reality, seeks to explain growing shifts in urban society. The merging caste is still deeply embedded feature culture today. Traditional markers such religion frequently impact position demarcation,...

10.59231/sari7790 article EN Shodh Sari-An International Multidisciplinary Journal 2025-01-01

This paper analyzes phase trajectories and fixed points of the turbo decoding algorithm as a function signal-to-noise ratio (SNR). By exploiting large length codes, is treated single-parameter dynamical system, parameterized (approximately) by SNR. parameterization, along "with" extensive simulations at practical SNRs asymptotic analysis SNR goes to zero infinity, used subdivide entire range into three regions with "waterfall region" in middle. The has distinctive convergence properties...

10.1109/18.910583 article EN IEEE Transactions on Information Theory 2001-01-01

We present a detailed analysis of generalized minimum distance (GMD) decoding algorithms for Euclidean space codes. In particular, we completely characterize GMD regions in terms receiver front-end properties. This characterization is used to show that have intricate geometry. prove although these are polyhedral, they essentially always nonconvex. furthermore conventional performance parameters, such as error-correction radius and effective error coefficient, do not capture the essential...

10.1109/18.817509 article EN IEEE Transactions on Information Theory 2000-01-01

In recent years, the problem of indexing mobile objects has assumed great importance because its relevance to a wide variety applications. Most previous results in this area have proposed schemes for with linear trajectories one or two dimensions. paper, we present methods nonlinear trajectories. Specifically, identify useful condition called convex hull property and show that any trajectory satisfying can be indexed by storing careful representation these traditional index structure. Since...

10.1145/773153.773178 article EN 2003-06-09

The MIX technique forms the basis of many popular services that offer anonymity communication in open and shared networks such as Internet. In this paper, fundamental limits on provided by are found considering two different settings. First, we consider an information theoretic setting to determine extent inherent observations traffic passing through MIX. We show if size sender sets is less than total user population, contained sufficient deduce all relationships between senders receivers...

10.1109/sp.2006.17 article EN 2006-01-01

As businesses continue to grow their World Wide Web presence, it is becoming increasingly vital for them have quantitative measures of the client perceived response times web services. We present Certes (CliEnt Response Time Estimated by Server), an online server-based mechanism servers measure time, as if measured at client. based on a model TCP that quantifies effect connection drops using three simple server-side measurements: drop rate, accept rate and completion rate. The does not...

10.1145/511334.511355 article EN 2002-06-01

The deployment of converged services TV, telephony, and Internet access over IP entails a significant initial investment for service providers. This is not only the underlying network infrastructure but also provisioning managing vast data centers needed to provide sophisticated IP-based TV (IPTV) experience, including multiple camera views, live (broadcast) on demand programming, etc., large number viewers. Thus providers need carefully plan manage IPTV maximize return-on-investment while...

10.1109/inm.2007.374800 article EN 2007-05-01

The objectives of this paper are twofold. First, we introduce a novel policy language, called CIM-SPL (simple language for CIM) that complies with the CIM (common information model) Policy Model and fully incorporates constructs. Currently, standards from distributed management task force (DMTF) include model, but there is no satisfactory way to render model. has been defined purpose. Second, address design implementation issues languages in general, particular. was inspired by our previous...

10.1109/inm.2007.374767 article EN 2007-05-01

The problem of tracking end-to-end service-level transactions in the absence instrumentation support is considered. transaction instances progress through a state-transition model and generate time-stamped footprints on entering each state model. goal to track individual using these even when may not contain any tokens uniquely identifying that generated them. Assuming semi-Markov process for transitions, are tracked probabilistically by matching them available according maximum likelihood...

10.1145/1375457.1375473 article EN 2008-06-02

Historically, storage has been directly connected to servers for fast local access and easy configuration. In recent years, area networks (SANs) have defined an alternative paradigm that allows be shared among using interconnects. One of the key challenges SAN management is large number configuration problems are encountered in a typical deployment. These can addressed by software. However, hard-coding rules into software not viable option since it possible easily modify or replace old...

10.1109/policy.2004.1309152 article EN 2004-01-01
Coming Soon ...