Anthony D. Joseph
Anthony D. Joseph
Verified email at
Cited by
Cited by
A view of cloud computing
M Armbrust, A Fox, R Griffith, AD Joseph, R Katz, A Konwinski, G Lee, ...
Communications of the ACM 53 (4), 50-58, 2010
Above the clouds: A berkeley view of cloud computing
M Armbrust, A Fox, R Griffith, AD Joseph, RH Katz, A Konwinski, G Lee, ...
Technical Report UCB/EECS-2009-28, EECS Department, University of California …, 2009
Tapestry: An infrastructure for fault-tolerant wide-area location and routing
BY Zhao, J Kubiatowicz, AD Joseph
Computer Science Division, University of California, 2001
Tapestry: A resilient global-scale overlay for service deployment
BY Zhao, L Huang, J Stribling, SC Rhea, AD Joseph, JD Kubiatowicz
IEEE Journal on selected areas in communications 22 (1), 41-53, 2004
Mesos: A platform for {Fine-Grained} resource sharing in the data center
B Hindman, A Konwinski, M Zaharia, A Ghodsi, AD Joseph, R Katz, ...
8th USENIX Symposium on Networked Systems Design and Implementation (NSDI 11), 2011
Improving MapReduce performance in heterogeneous environments.
M Zaharia, A Konwinski, AD Joseph, RH Katz, I Stoica
Osdi 8 (4), 7, 2008
Adversarial machine learning
L Huang, AD Joseph, B Nelson, BIP Rubinstein, JD Tygar
Proceedings of the 4th ACM workshop on Security and artificial intelligence …, 2011
Bayeux: An architecture for scalable and fault-tolerant wide-area data dissemination
SQ Zhuang, BY Zhao, AD Joseph, RH Katz, JD Kubiatowicz
Proceedings of the 11th international workshop on Network and operating …, 2001
Can machine learning be secure?
M Barreno, B Nelson, R Sears, AD Joseph, JD Tygar
Proceedings of the 2006 ACM Symposium on Information, computer and …, 2006
The security of machine learning
M Barreno, B Nelson, AD Joseph, JD Tygar
Machine learning 81, 121-148, 2010
Above the clouds: A berkeley view of cloud computing
A Fox, R Griffith, A Joseph, R Katz, A Konwinski, G Lee, D Patterson, ...
Dept. Electrical Eng. and Comput. Sciences, University of California …, 2009
Toil enables reproducible, open source, big biomedical data analyses
J Vivian, AA Rao, FA Nothaft, C Ketchum, J Armstrong, A Novak, J Pfeil, ...
Nature biotechnology 35 (4), 314-316, 2017
An architecture for a secure service discovery service
SE Czerwinski, BY Zhao, TD Hodes, AD Joseph, RH Katz
Proceedings of the 5th annual ACM/IEEE international conference on Mobile …, 1999
A taxonomy of cyber attacks on SCADA systems
B Zhu, A Joseph, S Sastry
2011 International conference on internet of things and 4th international …, 2011
The Ninja architecture for robust Internet-scale systems and services
SD Gribble, M Welsh, R Von Behren, EA Brewer, D Culler, N Borisov, ...
Computer Networks 35 (4), 473-497, 2001
Understanding TCP incast throughput collapse in datacenter networks
Y Chen, R Griffith, J Liu, RH Katz, AD Joseph
Proceedings of the 1st ACM workshop on Research on enterprise networking, 73-82, 2009
Exploiting machine learning to subvert your spam filter.
B Nelson, M Barreno, FJ Chi, AD Joseph, BIP Rubinstein, U Saini, ...
LEET 8 (1-9), 16-17, 2008
Antidote: understanding and defending against poisoning of anomaly detectors
BIP Rubinstein, B Nelson, L Huang, AD Joseph, S Lau, S Rao, N Taft, ...
Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement, 1-14, 2009
Rover: A toolkit for mobile information access
AD Joseph, AF de Lespinasse, JA Tauber, DK Gifford, MF Kaashoek
Proceedings of the fifteenth ACM symposium on Operating systems principles …, 1995
A Markov-based channel model algorithm for wireless networks
A Konrad, BY Zhao, AD Joseph, R Ludwig
Proceedings of the 4th ACM international workshop on Modeling, analysis and …, 2001
The system can't perform the operation now. Try again later.
Articles 1–20