2009 | ||
---|---|---|
56 | Benjamin I. P. Rubinstein, Blaine Nelson, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Satish Rao, Nina Taft, J. D. Tygar: ANTIDOTE: understanding and defending against poisoning of anomaly detectors. Internet Measurement Conference 2009: 1-14 | |
55 | Yanpei Chen, Rean Griffith, Junda Liu, Randy H. Katz, Anthony D. Joseph: Understanding TCP incast throughput collapse in datacenter networks. WREN 2009: 73-82 | |
54 | James A. Landay, Anthony D. Joseph, Franklin Reynolds: Guest Editors' Introduction: Smarter Phones. IEEE Pervasive Computing 8(2): 12-13 (2009) | |
2008 | ||
53 | Marco Barreno, Peter L. Bartlett, Fuching Jack Chi, Anthony D. Joseph, Blaine Nelson, Benjamin I. P. Rubinstein, Udam Saini, J. Doug Tygar: Open problems in the security of learning. AISec 2008: 19-26 | |
52 | XuanLong Nguyen, Ling Huang, Anthony D. Joseph: Support Vector Machines, Data Reduction, and Approximate Kernel Matrices. ECML/PKDD (2) 2008: 137-153 | |
51 | Blaine Nelson, Marco Barreno, Fuching Jack Chi, Anthony D. Joseph, Benjamin I. P. Rubinstein, Udam Saini, Charles Sutton, J. Doug Tygar, Kai Xia: Exploiting Machine Learning to Subvert Your Spam Filter. LEET 2008 | |
50 | Matei Zaharia, Andy Konwinski, Anthony D. Joseph, Randy H. Katz, Ion Stoica: Improving MapReduce Performance in Heterogeneous Environments. OSDI 2008: 29-42 | |
49 | Benjamin I. P. Rubinstein, Blaine Nelson, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Nina Taft, J. Doug Tygar: Evading Anomaly Detection through Variance Injection Attacks on PCA. RAID 2008: 394-395 | |
2007 | ||
48 | Ling Huang, Minos N. Garofalakis, Anthony D. Joseph, Nina Taft: Communication-Efficient Tracking of Distributed Cumulative Triggers. ICDCS 2007: 54 | |
47 | Ling Huang, XuanLong Nguyen, Minos N. Garofalakis, Joseph M. Hellerstein, Michael I. Jordan, Anthony D. Joseph, Nina Taft: Communication-Efficient Online Detection of Network-Wide Anomalies. INFOCOM 2007: 134-142 | |
2006 | ||
46 | Anthony D. Joseph, Ralf Steinmetz, Klaus Wehrle: Peer-to-Peer-Systems and -Applications, 26.03. - 29.03.2006 Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2006 | |
45 | Marco Barreno, Blaine Nelson, Russell Sears, Anthony D. Joseph, J. D. Tygar: Can machine learning be secure? ASIACCS 2006: 16-25 | |
44 | Ling Huang, Minos N. Garofalakis, Joseph M. Hellerstein, Anthony D. Joseph, Nina Taft: Toward sophisticated detection with distributed triggers. MineNet 2006: 311-316 | |
43 | Ling Huang, XuanLong Nguyen, Minos N. Garofalakis, Michael I. Jordan, Anthony D. Joseph, Nina Taft: In-Network PCA and Anomaly Detection. NIPS 2006: 617-624 | |
42 | Anthony D. Joseph, Ralf Steinmetz, Ion Stoica, Klaus Wehrle: 06131 Abstracts Collection -- Peer-to -Peer -Systems and -Applications. Peer-to-Peer-Systems and -Applications 2006 | |
41 | Anthony D. Joseph, Ralf Steinmetz, Ion Stoica, Klaus Wehrle: 06131 Executive Summary -- Peer-to-Peer-Systems and -Applications. Peer-to-Peer-Systems and -Applications 2006 | |
40 | Terry Benzel, Robert Braden, Dongho Kim, Cliford Neuman, Anthony D. Joseph, Keith Sklower: Experience with deter: A testbed for security research. TRIDENTCOM 2006 | |
39 | Anthony D. Joseph, Almudena Díaz, Pedro Merino, F. Javier Rivas, Umakanth P. Kulkarni, J. V. Vadavi, G. S. Thyagaraju, S. M. Joshi, Anil R. Yardi: Mobile and Ubiquitous Objects. IEEE Pervasive Computing 5(3): 57-59 (2006) | |
38 | Anthony D. Joseph, Alastair R. Beresford, Jean Bacon, David N. Cottingham, Jonathan J. Davies, Brian D. Jones, Haitao Guo, Wei Guan, Yong Lin, Houbing Song, Liviu Iftode, Simone Fuchs, Bernhard Lamprecht, Kyandoghere Kyamakya, Jorge González Fernández, Juan Carlos Yelmo García, Yod Samuel Martín García, Jorge de Gracia Santos, Milind Nimesh, Gang Pan, Zhaohui Wu, Qing Wu, Zhenyu Shan, Jie Sun, Jian Lu, Guoqing Yang, Muhammad Khurram Khan, Jiashu Zhang: Intelligent Transportation Systems. IEEE Pervasive Computing 5(4): 63-67 (2006) | |
37 | Almudena Konrad, Ben Y. Zhao, Anthony D. Joseph: Determining model accuracy of network traces. J. Comput. Syst. Sci. 72(7): 1156-1171 (2006) | |
2005 | ||
36 | Steve Martin, Blaine Nelson, Anil Sewani, Karl Chen, Anthony D. Joseph: Analyzing Behavioral Features for Email Classification. CEAS 2005 | |
35 | Almudena Konrad, Ben Y. Zhao, Anthony D. Joseph: Choosing an Accurate Network Model using Domain Analysis. ICPADS (2) 2005: 100-104 | |
34 | Nitin H. Vaidya, Anthony D. Joseph: Guest Editorial. Wireless Networks 11(4): 361-361 (2005) | |
2004 | ||
33 | Ben Y. Zhao, Ling Huang, Anthony D. Joseph, John Kubiatowicz: Rapid Mobility via Type Indirection. IPTPS 2004: 64-74 | |
32 | Kevin D. Simler, Steven E. Czerwinski, Anthony D. Joseph: Analysis of Wide Area User Mobility Patterns. WMCSA 2004: 30-40 | |
31 | Ruzena Bajcsy, Terry Benzel, Matt Bishop, Robert Braden, Carla E. Brodley, Sonia Fahmy, Sally Floyd, W. Hardaker, Anthony D. Joseph, George Kesidis, Karl N. Levitt, Robert Lindell, Peng Liu, David Miller, Russ Mundy, Cliford Neuman, Ron Ostrenga, Vern Paxson, Phillip A. Porras, Catherine Rosenberg, J. Doug Tygar, Shankar Sastry, Daniel F. Sterne, Shyhtsun Felix Wu: Cyber defense technology networking and evaluation. Commun. ACM 47(3): 58-61 (2004) | |
30 | Ben Y. Zhao, Ling Huang, Jeremy Stribling, Sean C. Rhea, Anthony D. Joseph, John Kubiatowicz: Tapestry: a resilient global-scale overlay for service deployment. IEEE Journal on Selected Areas in Communications 22(1): 41-53 (2004) | |
2003 | ||
29 | David B. Johnson, Anthony D. Joseph, Nitin H. Vaidya: Proceedings of the Ninth Annual International Conference on Mobile Computing and Networking, MOBICOM 2003, 2003, San Diego, CA, USA, September 14-19, 2003 ACM 2003 | |
28 | Ben Y. Zhao, Ling Huang, Jeremy Stribling, Anthony D. Joseph, John Kubiatowicz: Exploiting Routing Redundancy via Structured Peer-to-Peer Overlays. ICNP 2003: 246-257 | |
27 | Feng Zhou, Li Zhuang, Ben Y. Zhao, Ling Huang, Anthony D. Joseph, John Kubiatowicz: Approximate Object Location and Spam Filtering on Peer-to-Peer Systems. Middleware 2003: 1-20 | |
26 | Almudena Konrad, Anthony D. Joseph: Choosing an accurate network path model. SIGMETRICS 2003: 314-315 | |
25 | Almudena Konrad, Ben Y. Zhao, Anthony D. Joseph, Reiner Ludwig: A Markov-Based Channel Model Algorithm for Wireless Networks. Wireless Networks 9(3): 189-199 (2003) | |
2002 | ||
24 | Ben Y. Zhao, Yitao Duan, Ling Huang, Anthony D. Joseph, John Kubiatowicz: Brocade: Landmark Routing on Overlay Networks. IPTPS 2002: 34-44 | |
23 | Bhaskaran Raman, Sharad Agarwal, Yan Chen, Matthew Caesar, Weidong Cui, Per Johansson, Kevin Lai, Tal Lavian, Sridhar Machiraju, Zhuoqing Morley Mao, George Porter, Timothy Roscoe, Mukund Seshadri, Jimmy S. Shih, Keith Sklower, Lakshminarayanan Subramanian, Takashi Suzuki, Shelley Zhuang, Anthony D. Joseph, Randy H. Katz, Ion Stoica: The SAHARA Model for Service Composition across Multiple Providers. Pervasive 2002: 1-14 | |
22 | Ben Y. Zhao, John Kubiatowicz, Anthony D. Joseph: Tapestry: a fault-tolerant wide-area application infrastructure. Computer Communication Review 32(1): 81 (2002) | |
21 | Steven J. Ross, Jason L. Hill, Michael Y. Chen, Anthony D. Joseph, David E. Culler, Eric A. Brewer: A Composable Framework for Secure Multi-Modal Access to Internet Services from Post-PC Devices. MONET 7(5): 389-406 (2002) | |
20 | Todd D. Hodes, Steven E. Czerwinski, Ben Y. Zhao, Anthony D. Joseph, Randy H. Katz: An Architecture for Secure Wide-Area Service Discovery. Wireless Networks 8(2-3): 213-230 (2002) | |
19 | Reiner Ludwig, Almudena Konrad, Anthony D. Joseph, Randy H. Katz: Optimizing the End-to-End Performance of Reliable Flows over Wireless Links. Wireless Networks 8(2-3): 289-299 (2002) | |
2001 | ||
18 | Almudena Konrad, Ben Y. Zhao, Anthony D. Joseph, Reiner Ludwig: A Markov-based channel model algorithm for wireless networks. MSWiM 2001: 28-36 | |
17 | Steven E. Czerwinski, Anthony D. Joseph: Using Simple Remote Evaluation to Enable Efficient Application Protocols in Mobile Environments. NCA 2001: 162-173 | |
16 | Shelley Zhuang, Ben Y. Zhao, Anthony D. Joseph, Randy H. Katz, John Kubiatowicz: Bayeux: an architecture for scalable and fault-tolerant wide-area data dissemination. NOSSDAV 2001: 11-20 | |
15 | Amoolya Singh, Almudena Konrad, Anthony D. Joseph: Performance evaluation of UDP lite for cellular video. NOSSDAV 2001: 117-124 | |
14 | Steven D. Gribble, Matt Welsh, J. Robert von Behren, Eric A. Brewer, David E. Culler, Nikita Borisov, Steven E. Czerwinski, Ramakrishna Gummadi, Jon R. Hill, Anthony D. Joseph, Randy H. Katz, Zhuoqing Morley Mao, Steven J. Ross, Ben Y. Zhao: The Ninja architecture for robust Internet-scale systems and services. Computer Networks 35(4): 473-497 (2001) | |
2000 | ||
13 | J. Robert von Behren, Steven E. Czerwinski, Anthony D. Joseph, Eric A. Brewer, John Kubiatowicz: NinjaMail: The Design of a High-Performance Clustered, Distributed E-Mail System. ICPP Workshops 2000: 151- | |
12 | Helen J. Wang, Anthony D. Joseph, Randy H. Katz: A Signaling System Using Lightweight Call Sessions. INFOCOM 2000: 697-706 | |
11 | Steven J. Ross, Jason L. Hill, Michael Y. Chen, Anthony D. Joseph, David E. Culler, Eric A. Brewer: A Composable Framework for Secure Multi-Modal Access to Internet Services from Post-PC Devices. WMCSA 2000: 171-182 | |
10 | Bhaskaran Raman, Randy H. Katz, Anthony D. Joseph: Universal Inbox: providing extensible personal mobility and service mobility in an integrated communication network. WMCSA 2000: 95- | |
1999 | ||
9 | Reiner Ludwig, Almudena Konrad, Anthony D. Joseph: Optimizing the End-to-End Performance of Reliable Flows Over Wireless Links. MOBICOM 1999: 113-119 | |
8 | Steven E. Czerwinski, Ben Y. Zhao, Todd D. Hodes, Anthony D. Joseph, Randy H. Katz: An Architecture for a Secure Service Discovery Service. MOBICOM 1999: 24-35 | |
7 | Reiner Ludwig, Bela Rathonyi, Almudena Konrad, Kimberly Oden, Anthony D. Joseph: Multi-Layer Tracing of TCP over a Reliable Wireless Link. SIGMETRICS 1999: 144-154 | |
1998 | ||
6 | Anthony D. Joseph, B. R. Badrinath, Randy H. Katz: The Case for Services over Cascaded Networks. WOWMOM 1998: 2-10 | |
1997 | ||
5 | Anthony D. Joseph, Joshua A. Tauber, M. Frans Kaashoek: Mobile Computing with the Rover Toolkit. IEEE Trans. Computers 46(3): 337-352 (1997) | |
4 | Anthony D. Joseph, M. Frans Kaashoek: Building reliable mobile-aware applications using the Rover toolkit. Wireless Networks 3(5): 405-419 (1997) | |
1996 | ||
3 | Anthony D. Joseph, M. Frans Kaashoek: Building Reliable Mobile-Aware Applications Using the Rover Toolkit. MOBICOM 1996: 117-129 | |
1995 | ||
2 | Anthony D. Joseph, Alan F. deLespinasse, Joshua A. Tauber, David K. Gifford, M. Frans Kaashoek: Rover: A Toolkit for Mobile Information Access. SOSP 1995: 156-171 | |
1992 | ||
1 | William E. Weihl, Eric A. Brewer, Adrian Colbrook, Chrysanthos Dellarocas, Wilson C. Hsieh, Anthony D. Joseph, Carl A. Waldspurger, Paul Wang: PRELUDE: A System for Portable Parallel Software. PARLE 1992: 971-973 |