Follow
Anthony D. Joseph
Anthony D. Joseph
Verified email at eecs.berkeley.edu
Title
Cited by
Cited by
Year
A view of cloud computing
M Armbrust, A Fox, R Griffith, AD Joseph, R Katz, A Konwinski, G Lee, ...
Communications of the ACM 53 (4), 50-58, 2010
146792010
Above the Clouds: A Berkeley View of Cloud Computing
M Armbrust
88162009
Tapestry: An infrastructure for fault-tolerant wide-area location and routing
BY Zhao, J Kubiatowicz, AD Joseph
Computer Science Division, University of California, 2001
3892*2001
Tapestry: A resilient global-scale overlay for service deployment
BY Zhao, L Huang, J Stribling, SC Rhea, AD Joseph, JD Kubiatowicz
IEEE Journal on selected areas in communications 22 (1), 41-53, 2004
28662004
Mesos: A platform for {Fine-Grained} resource sharing in the data center
B Hindman, A Konwinski, M Zaharia, A Ghodsi, AD Joseph, R Katz, ...
8th USENIX Symposium on Networked Systems Design and Implementation (NSDI 11), 2011
26292011
Improving MapReduce performance in heterogeneous environments.
M Zaharia, A Konwinski, AD Joseph, RH Katz, I Stoica
Osdi 8 (4), 7, 2008
24582008
Adversarial machine learning
L Huang, AD Joseph, B Nelson, BIP Rubinstein, JD Tygar
Proceedings of the 4th ACM workshop on Security and artificial intelligence …, 2011
15662011
Can machine learning be secure?
M Barreno, B Nelson, R Sears, AD Joseph, JD Tygar
Proceedings of the 2006 ACM Symposium on Information, computer and …, 2006
12302006
Bayeux: An architecture for scalable and fault-tolerant wide-area data dissemination
SQ Zhuang, BY Zhao, AD Joseph, RH Katz, JD Kubiatowicz
Proceedings of the 11th international workshop on Network and operating …, 2001
12192001
The security of machine learning
M Barreno, B Nelson, AD Joseph, JD Tygar
Machine learning 81, 121-148, 2010
11182010
Toil enables reproducible, open source, big biomedical data analyses
J Vivian, AA Rao, FA Nothaft, C Ketchum, J Armstrong, A Novak, J Pfeil, ...
Nature biotechnology 35 (4), 314-316, 2017
11042017
Above the clouds: A berkeley view of cloud computing
A Fox, R Griffith, A Joseph, R Katz, A Konwinski, G Lee, D Patterson, ...
Dept. Electrical Eng. and Comput. Sciences, University of California …, 2009
1092*2009
An architecture for a secure service discovery service
SE Czerwinski, BY Zhao, TD Hodes, AD Joseph, RH Katz
Proceedings of the 5th annual ACM/IEEE international conference on Mobile …, 1999
9691999
A taxonomy of cyber attacks on SCADA systems
B Zhu, A Joseph, S Sastry
2011 International conference on internet of things and 4th international …, 2011
7112011
The Ninja architecture for robust Internet-scale systems and services
SD Gribble, M Welsh, R Von Behren, EA Brewer, D Culler, N Borisov, ...
Computer Networks 35 (4), 473-497, 2001
5282001
Understanding TCP incast throughput collapse in datacenter networks
Y Chen, R Griffith, J Liu, RH Katz, AD Joseph
Proceedings of the 1st ACM workshop on Research on enterprise networking, 73-82, 2009
5162009
Exploiting machine learning to subvert your spam filter.
B Nelson, M Barreno, FJ Chi, AD Joseph, BIP Rubinstein, U Saini, ...
LEET 8 (1-9), 16-17, 2008
4952008
Antidote: understanding and defending against poisoning of anomaly detectors
BIP Rubinstein, B Nelson, L Huang, AD Joseph, S Lau, S Rao, N Taft, ...
Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement, 1-14, 2009
4912009
Rover: A toolkit for mobile information access
AD Joseph, AF de Lespinasse, JA Tauber, DK Gifford, MF Kaashoek
Proceedings of the fifteenth ACM symposium on Operating systems principles …, 1995
4671995
A Markov-based channel model algorithm for wireless networks
A Konrad, BY Zhao, AD Joseph, R Ludwig
Proceedings of the 4th ACM international workshop on Modeling, analysis and …, 2001
3942001
The system can't perform the operation now. Try again later.
Articles 1–20