Anthony D. Joseph
Anthony D. Joseph
Verified email at eecs.berkeley.edu
Title
Cited by
Cited by
Year
A view of cloud computing
M Armbrust, A Fox, R Griffith, AD Joseph, R Katz, A Konwinski, G Lee, ...
Communications of the ACM 53 (4), 50-58, 2010
116212010
Above the clouds: A berkeley view of cloud computing
A Fox, R Griffith, A Joseph, R Katz, A Konwinski, G Lee, D Patterson, ...
Dept. Electrical Eng. and Comput. Sciences, University of California …, 2009
82622009
Above the clouds: A berkeley view of cloud computing
A Fox, R Griffith, A Joseph, R Katz, A Konwinski, G Lee, D Patterson, ...
Dept. Electrical Eng. and Comput. Sciences, University of California …, 2009
80692009
Tapestry: An infrastructure for fault-tolerant wide-area location and routing
BY Zhao, J Kubiatowicz, AD Joseph
Computer Science Division, University of California, 2001
33482001
Tapestry: An infrastructure for fault-tolerant wide-area location and routing
BY Zhao, J Kubiatowicz, AD Joseph
Computer Science Division, University of California, 2001
32582001
Tapestry: A resilient global-scale overlay for service deployment
BY Zhao, L Huang, J Stribling, SC Rhea, AD Joseph, JD Kubiatowicz
IEEE Journal on selected areas in communications 22 (1), 41-53, 2004
25572004
Improving MapReduce performance in heterogeneous environments.
M Zaharia, A Konwinski, AD Joseph, RH Katz, I Stoica
Osdi 8 (4), 7, 2008
20612008
Mesos: A platform for fine-grained resource sharing in the data center.
B Hindman, A Konwinski, M Zaharia, A Ghodsi, AD Joseph, RH Katz, ...
NSDI 11 (2011), 22-22, 2011
18602011
Bayeux: An architecture for scalable and fault-tolerant wide-area data dissemination
SQ Zhuang, BY Zhao, AD Joseph, RH Katz, JD Kubiatowicz
Proceedings of the 11th international workshop on Network and operating …, 2001
11232001
An architecture for a secure service discovery service
SE Czerwinski, BY Zhao, TD Hodes, AD Joseph, RH Katz
Proceedings of the 5th annual ACM/IEEE international conference on Mobile …, 1999
9111999
Adversarial machine learning
L Huang, AD Joseph, B Nelson, BIP Rubinstein, JD Tygar
Proceedings of the 4th ACM workshop on Security and artificial intelligence …, 2011
7322011
Can machine learning be secure?
M Barreno, B Nelson, R Sears, AD Joseph, JD Tygar
Proceedings of the 2006 ACM Symposium on Information, computer and …, 2006
6902006
The security of machine learning
M Barreno, B Nelson, AD Joseph, JD Tygar
Machine Learning 81 (2), 121-148, 2010
5522010
The Ninja architecture for robust Internet-scale systems and services
SD Gribble, M Welsh, R Von Behren, EA Brewer, D Culler, N Borisov, ...
Computer Networks 35 (4), 473-497, 2001
4882001
The Ninja architecture for robust Internet-scale systems and services
SD Gribble, M Welsh, R Von Behren, EA Brewer, D Culler, N Borisov, ...
Computer Networks 35 (4), 473-497, 2001
4882001
Tapestry: An Infrastructure for Fault-Resilient Wide-Ares Location and Routing
BY Zhao
Technical Report UCB/CSD-01-1141, 2001
487*2001
A taxonomy of cyber attacks on SCADA systems
B Zhu, A Joseph, S Sastry
2011 International conference on internet of things and 4th international …, 2011
4742011
Rover: A toolkit for mobile information access
AD Joseph, AF de Lespinasse, JA Tauber, DK Gifford, MF Kaashoek
Proceedings of the fifteenth ACM symposium on Operating systems principles …, 1995
4341995
Understanding TCP incast throughput collapse in datacenter networks
Y Chen, R Griffith, J Liu, RH Katz, AD Joseph
Proceedings of the 1st ACM workshop on Research on enterprise networking, 73-82, 2009
4082009
A Markov-based channel model algorithm for wireless networks
A Konrad, BY Zhao, AD Joseph, R Ludwig
Wireless Networks 9 (3), 189-199, 2003
3792003
The system can't perform the operation now. Try again later.
Articles 1–20