Follow
Anthony D. Joseph
Anthony D. Joseph
Verified email at eecs.berkeley.edu
Title
Cited by
Cited by
Year
A view of cloud computing
M Armbrust, A Fox, R Griffith, AD Joseph, R Katz, A Konwinski, G Lee, ...
Communications of the ACM 53 (4), 50-58, 2010
143062010
Above the clouds: A berkeley view of cloud computing
M Armbrust, A Fox, R Griffith, AD Joseph, RH Katz, A Konwinski, G Lee, ...
Technical Report UCB/EECS-2009-28, EECS Department, University of California …, 2009
87212009
Tapestry: An infrastructure for fault-tolerant wide-area location and routing
BY Zhao, J Kubiatowicz, AD Joseph
Computer Science Division, University of California, 2001
3884*2001
Tapestry: A resilient global-scale overlay for service deployment
BY Zhao, L Huang, J Stribling, SC Rhea, AD Joseph, JD Kubiatowicz
IEEE Journal on selected areas in communications 22 (1), 41-53, 2004
28542004
Mesos: A platform for {Fine-Grained} resource sharing in the data center
B Hindman, A Konwinski, M Zaharia, A Ghodsi, AD Joseph, R Katz, ...
8th USENIX Symposium on Networked Systems Design and Implementation (NSDI 11), 2011
25622011
Improving MapReduce performance in heterogeneous environments.
M Zaharia, A Konwinski, AD Joseph, RH Katz, I Stoica
Osdi 8 (4), 7, 2008
24362008
Adversarial machine learning
L Huang, AD Joseph, B Nelson, BIP Rubinstein, JD Tygar
Proceedings of the 4th ACM workshop on Security and artificial intelligence …, 2011
14832011
Bayeux: An architecture for scalable and fault-tolerant wide-area data dissemination
SQ Zhuang, BY Zhao, AD Joseph, RH Katz, JD Kubiatowicz
Proceedings of the 11th international workshop on Network and operating …, 2001
12152001
Can machine learning be secure?
M Barreno, B Nelson, R Sears, AD Joseph, JD Tygar
Proceedings of the 2006 ACM Symposium on Information, computer and …, 2006
11862006
The security of machine learning
M Barreno, B Nelson, AD Joseph, JD Tygar
Machine learning 81, 121-148, 2010
10742010
Above the clouds: A berkeley view of cloud computing
A Fox, R Griffith, A Joseph, R Katz, A Konwinski, G Lee, D Patterson, ...
Dept. Electrical Eng. and Comput. Sciences, University of California …, 2009
1066*2009
Toil enables reproducible, open source, big biomedical data analyses
J Vivian, AA Rao, FA Nothaft, C Ketchum, J Armstrong, A Novak, J Pfeil, ...
Nature biotechnology 35 (4), 314-316, 2017
10312017
An architecture for a secure service discovery service
SE Czerwinski, BY Zhao, TD Hodes, AD Joseph, RH Katz
Proceedings of the 5th annual ACM/IEEE international conference on Mobile …, 1999
9671999
A taxonomy of cyber attacks on SCADA systems
B Zhu, A Joseph, S Sastry
2011 International conference on internet of things and 4th international …, 2011
6922011
The Ninja architecture for robust Internet-scale systems and services
SD Gribble, M Welsh, R Von Behren, EA Brewer, D Culler, N Borisov, ...
Computer Networks 35 (4), 473-497, 2001
5282001
Understanding TCP incast throughput collapse in datacenter networks
Y Chen, R Griffith, J Liu, RH Katz, AD Joseph
Proceedings of the 1st ACM workshop on Research on enterprise networking, 73-82, 2009
5052009
Exploiting machine learning to subvert your spam filter.
B Nelson, M Barreno, FJ Chi, AD Joseph, BIP Rubinstein, U Saini, ...
LEET 8 (1-9), 16-17, 2008
4752008
Antidote: understanding and defending against poisoning of anomaly detectors
BIP Rubinstein, B Nelson, L Huang, AD Joseph, S Lau, S Rao, N Taft, ...
Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement, 1-14, 2009
4732009
Rover: A toolkit for mobile information access
AD Joseph, AF de Lespinasse, JA Tauber, DK Gifford, MF Kaashoek
Proceedings of the fifteenth ACM symposium on Operating systems principles …, 1995
4671995
A Markov-based channel model algorithm for wireless networks
A Konrad, BY Zhao, AD Joseph, R Ludwig
Proceedings of the 4th ACM international workshop on Modeling, analysis and …, 2001
3942001
The system can't perform the operation now. Try again later.
Articles 1–20