Anthony D. Joseph
Anthony D. Joseph
Verified email at eecs.berkeley.edu
Title
Cited by
Cited by
Year
A view of cloud computing
M Armbrust, A Fox, R Griffith, AD Joseph, R Katz, A Konwinski, G Lee, ...
Communications of the ACM 53 (4), 50-58, 2010
106672010
Above the clouds: A berkeley view of cloud computing
A Fox, R Griffith, A Joseph, R Katz, A Konwinski, G Lee, D Patterson, ...
Dept. Electrical Eng. and Comput. Sciences, University of California …, 2009
80532009
Above the clouds: A berkeley view of cloud computing
A Fox, R Griffith, A Joseph, R Katz, A Konwinski, G Lee, D Patterson, ...
Dept. Electrical Eng. and Comput. Sciences, University of California …, 2009
79802009
Tapestry: An infrastructure for fault-tolerant wide-area location and routing
BY Zhao, J Kubiatowicz, AD Joseph
Computer Science Division, University of California, 2001
32502001
Tapestry: An infrastructure for fault-tolerant wide-area location and routing
BY Zhao, J Kubiatowicz, AD Joseph
Computer Science Division, University of California, 2001
32302001
Tapestry: A resilient global-scale overlay for service deployment
BY Zhao, L Huang, J Stribling, SC Rhea, AD Joseph, JD Kubiatowicz
IEEE Journal on selected areas in communications 22 (1), 41-53, 2004
25412004
Improving MapReduce performance in heterogeneous environments.
M Zaharia, A Konwinski, AD Joseph, RH Katz, I Stoica
Osdi 8 (4), 7, 2008
19762008
Mesos: A platform for fine-grained resource sharing in the data center.
B Hindman, A Konwinski, M Zaharia, A Ghodsi, AD Joseph, RH Katz, ...
NSDI 11 (2011), 22-22, 2011
17092011
Bayeux: An architecture for scalable and fault-tolerant wide-area data dissemination
SQ Zhuang, BY Zhao, AD Joseph, RH Katz, JD Kubiatowicz
Proceedings of the 11th international workshop on Network and operating …, 2001
11132001
An architecture for a secure service discovery service
SE Czerwinski, BY Zhao, TD Hodes, AD Joseph, RH Katz
Proceedings of the 5th annual ACM/IEEE international conference on Mobile …, 1999
9101999
Adversarial machine learning
L Huang, AD Joseph, B Nelson, BIP Rubinstein, JD Tygar
Proceedings of the 4th ACM workshop on Security and artificial intelligence …, 2011
6412011
Can machine learning be secure?
M Barreno, B Nelson, R Sears, AD Joseph, JD Tygar
Proceedings of the 2006 ACM Symposium on Information, computer and …, 2006
6362006
The security of machine learning
M Barreno, B Nelson, AD Joseph, JD Tygar
Machine Learning 81 (2), 121-148, 2010
4972010
The Ninja architecture for robust Internet-scale systems and services
SD Gribble, M Welsh, R Von Behren, EA Brewer, D Culler, N Borisov, ...
Computer Networks 35 (4), 473-497, 2001
4792001
The Ninja architecture for robust Internet-scale systems and services
SD Gribble, M Welsh, R Von Behren, EA Brewer, D Culler, N Borisov, ...
Computer Networks 35 (4), 473-497, 2001
4792001
Tapestry: An Infrastructure for Fault-Resilient Wide-Ares Location and Routing
BY Zhao
Technical Report UCB/CSD-01-1141, 2001
461*2001
A taxonomy of cyber attacks on SCADA systems
B Zhu, A Joseph, S Sastry
2011 International conference on internet of things and 4th international …, 2011
4362011
Rover: A toolkit for mobile information access
AD Joseph, AF de Lespinasse, JA Tauber, DK Gifford, MF Kaashoek
Proceedings of the fifteenth ACM symposium on Operating systems principles …, 1995
4361995
A View of Cloud Computing-Clearing the clouds away from the true potential and obstacles posed by this computing capability.
M Armbrust, A Fox, R Griffith, AD Joseph, R Katz, A Konwinski, G Lee, ...
Communications of the ACM 53 (4), 50, 2010
4142010
Understanding TCP incast throughput collapse in datacenter networks
Y Chen, R Griffith, J Liu, RH Katz, AD Joseph
Proceedings of the 1st ACM workshop on Research on enterprise networking, 73-82, 2009
3972009
The system can't perform the operation now. Try again later.
Articles 1–20