|
|
|
Book chapters or sections
- X. Nguyen, L. Huang, and A. D. Joseph, "Support vector machines, data reduction, and approximate kernel matrices," in Machine Learning and Knowledge Discovery in Databases -- Part II: Proc. European Conf. (ECML/PKDD 2008), W. Daelemans, B. Goethals, and K. Morik, Eds., Lecture Notes in Computer Science::Lecture Notes in Artificial Intelligence, Vol. 5212, Berlin, Germany: Springer-Verlag, 2008, pp. 137-153.
- B. I. P. Rubinstein, B. Nelson, L. Huang, A. D. Joseph, S. Lau, N. Taft, and D. Tygar, "Evading anomaly detection through variance injection attacks on PCA (Winner, RAID '08 Best Poster Award)," in Recent Advances in Intrusion Detection: Proc. 11th Intl. Symp. (RAID 2008), R. Lippmann, E. Kirda, and A. Trachtenberg, Eds., Lecture Notes in Computer Science, Vol. 5230, Berlin, Germany: Springer-Verlag, 2008, pp. 394-394.
- L. Huang, X. Nguyen, M. Garofalakis, M. Jordan, A. D. Joseph, and N. Taft, "In-network PCA and anomaly detection," in Advances in Neural Information Processing Systems 19: Proc. 20th Annual Conf. (NIPS 2006), B. Scholkopf, J. Platt, and T. Hofmann, Eds., Advances in Neural Information Processing Systems, Vol. 19, Cambridge, MA: MIT Press, 2007, pp. 617-624.
- B. Y. Zhao, L. Huang, A. D. Joseph, and J. D. Kubiatowicz, "Rapid mobility via type indirection," in Peer-to-Peer Systems III: Proc. 3rd Intl. Workshop (IPTPS '04). Revised Selected Papers, G. M. Voelker and S. Shenker, Eds., Lecture Notes in Computer Science, Vol. 3279, Berlin, Germany: Springer-Verlag, 2005, pp. 64-74.
- F. Zhou, L. Zhuang, B. Y. Zhao, L. Huang, A. D. Joseph, and J. D. Kubiatowicz, "Approximate object location and spam filtering on peer-to-peer systems," in Middleware 2003: Proc. ACM/IFIP/USENIX Intl. Middleware Conf., M. Endler and D. Schmidt, Eds., Lecture Notes in Computer Science, Vol. 2672, Berlin, Germany: Springer-Verlag, 2003, pp. 1-20.
- B. Y. Zhao, Y. Duan, L. Huang, A. D. Joseph, and J. D. Kubiatowicz, "Brocade: Landmark routing on overlay networks," in Revised Papers of the 1st Intl. Workshop on Peer-to-Peer Systems, P. Druschel, F. Kaashoek, and A. Rowstron, Eds., Lecture Notes in Computer Science, Vol. 2429, London, UK: Springer-Verlag, 2002, pp. 34-44.
- B. Raman, S. Agarwal, Y. Chen, M. Caesar, W. Cui, P. Johansson, K. Lai, T. Lavian, S. Machiraju, Z. M. Mao, G. Porter, T. Roscoe, M. Seshadri, J. S. Shih, K. Sklower, L. Subramanian, T. Suzuki, S. Zhuang, A. D. Joseph, R. H. Katz, and I. Stoica, "The SAHARA model for service composition across multiple providers," in Pervasive Computing: Proc. 1st Intl. Conf. (Pervasive 2002), F. Mattern and M. Naghshineh, Eds., Lecture Notes in Computer Science, Vol. 2414, Berlin, Germany: Springer-Verlag, 2002, pp. 1-14.
- A. D. Joseph, J. A. Tauber, and M. F. Kaashoek, "Mobile computing with the Rover toolkit (Invited Paper)," in Mobility: Processes, Computers, and Agents, D. Milojicic, F. Douglis, and R. Wheeler, Eds., New York, NY: Addison-Wesley Professional, 1999, pp. 335-352.
- W. Weihl, E. Brewer, A. Colbrook, C. Dellarocas, W. Hsieh, A. D. Joseph, C. Waldspurger, and P. Wang, "Prelude: A system for portable parallel software (Poster Session)," in PARLE '92: Parallel Architectures and Languages Europe: Proc. 4th Intl. Conf., D. Etiemble and J. Syre, Eds., Lecture Notes in Computer Science, Vol. 605, Berlin, Germany: Springer-Verlag, 1992, pp. 971-972.
Articles in journals or magazines
- B. Hindman, A. Konwinski, M. Zaharia, A. Ghodsi, A. D. Joseph, R. H. Katz, S. Shenker, and I. Stoica, "Mesos: Flexible Resource Sharing for the Cloud," ;login:, vol. 36, no. 4, pp. 37-45, Aug. 2011.
- A. Konrad, B. Y. Zhao, and A. D. Joseph, "Determining model accuracy of network traces," J. Computer and System Sciences: Performance Modelling and Evaluation of Computer Systems, vol. 72, no. 7, pp. 1156-1171, Nov. 2006.
- N. Vaidya and A. D. Joseph, "Guest Editorial," Wireless Networks: Selected Papers from ACM MOBICOM 2003, vol. 11, no. 4, pp. 361-361, July 2005.
- R. Bajcsy, A. D. Joseph, V. Paxson, D. Tygar, S. S. Sastry, and other DETER/EMIST Members, "Cyber defense technology networking and evaluation," Communications of the ACM Special Issue: Emerging Technologies for Homeland Security, vol. 47, no. 3, pp. 58-61, March 2004.
- B. Y. Zhao, L. Huang, J. Stribling, S. C. Rhea, A. D. Joseph, and J. D. Kubiatowicz, "Tapestry: A resilient global-scale overlay for service deployment," IEEE J. Selected Areas in Communications: Special Issue on Recent Advances in Service Overlay Networ, vol. 22, no. 1, pp. 41-53, Jan. 2004.
- A. Konrad, B. Y. Zhao, A. D. Joseph, and R. Ludwig, "Best Paper Award: A Markov-based channel model algorithm for wireless networks," Wireless Networks: Selected Papers from MOBICOM '03, vol. 9, no. 3, pp. 189-199, May 2003.
- S. J. Ross, J. L. Hil, M. Y. Chen, A. D. Joseph, D. E. Culler, and E. Brewer, "A composable framework for secure multi-modal access to Internet services from Post-PC devices," Mobile Networks and Applications, vol. 7, no. 5, pp. 389-406, Oct. 2002.
- R. Ludwig, A. Konrad, A. D. Joseph, and R. H. Katz, "Optimizing the end-to-end performance of reliable flows over wireless links," Wireless Networks: Selected Papers from MOBICOM '99, vol. 8, no. 2-3, pp. 289-299, March 2002.
- T. D. Hodes, S. E. Czerwinski, B. Y. Zhao, A. D. Joseph, and R. H. Katz, "An architecture for secure wide-area service discovery," Wireless Networks: Selected Papers from MOBICOM '99, vol. 8, no. 2/3, pp. 213-230, March 2002.
- B. Y. Zhao, J. D. Kubiatowicz, and A. D. Joseph, "Tapestry: A fault-tolerant wide-area application infrastructure (Student Poster Session)," ACM SIGCOMM Computer Communication Review, vol. 32, no. 1, pp. 81-81, Jan. 2002.
- S. D. Gribble, M. Welsh, R. von Behren, E. Brewer, D. E. Culler, N. Borisov, S. Czerwinski, R. Gummadi, J. Hill, A. D. Joseph, R. H. Katz, Z. M. Mao, S. Ross, and B. Zhao, "Recipient of Computer Networks' Best Article of the Year Award: The Ninja architecture for robust internet-scale systems and services (Invited Paper)," Computer Networks: The Intl. J. Distributed Informatique (Special Issue on Pervasive Computing), vol. 35, no. 4, pp. 473-497, March 2001.
- H. J. Wang, B. Raman, C. Chuah, R. Biswas, R. Gummadi, B. Hohlt, X. Hong, E. Kiciman, Z. Mao, J. S. Shih, L. Subramanian, B. Y. Zhao, A. D. Joseph, and R. H. Katz, "Invited Paper: ICEBERG: An Internet core network architecture for integrated communications," IEEE Personal Communications, vol. 7, no. 4, pp. 10-19, Aug. 2000.
- B. Raman, H. J. Wang, J. Shih, A. D. Joseph, and R. H. Katz, "The Iceberg Project: Defining the IP and telecom intersection," IT Professional, vol. 1, no. 6, pp. 38-45, Nov. 1999.
- R. Ludwig, B. Rathonyi, A. Konrad, K. Oden, and A. D. Joseph, "Multi-layer tracing of TCP over a reliable wireless link," ACM SIGMETRICS Performance Evaluation Review, vol. 27, no. 1, pp. 144-154, June 1999.
- A. D. Joseph and M. F. Kaashoek, "Building reliable mobile-aware applications using the Rover toolkit," Wireless Networks: Selected papers from MOBICOM '96, vol. 3, no. 5, pp. 405-419, Oct. 1997.
- A. D. Joseph, J. A. Tauber, and M. F. Kaashoek, "Mobile computing with the Rover toolkit," IEEE Trans. Computers: Special Issue on Mobile Computing, vol. 46, no. 3, pp. 337-352, March 1997.
- A. D. Joseph, A. F. deLespinasse, J. A. Tauber, D. K. Gifford, and M. F. Kaashoek, "Rover: A toolkit for mobile information access," ACM SIGOPS Operating Systems Review, vol. 29, no. 5, pp. 156-171, Dec. 1995.
- A. Colbrook, W. E. Weihl, E. Brewer, C. N. Dellarocas, W. C. Hsieh, A. D. Joseph, C. A. Waldspurger, and P. Wang, "Portable software for multiprocessor systems," Computing and Control Engineering J., vol. 3, no. 6, pp. 275-281, Nov. 1992.
Articles in conference proceedings
- A. Kantchelian, J. Ma, L. Huang, S. Afroz, A. D. Joseph, and D. Tygar, "Robust detection of comment spam using entropy rate," in Proceedings of the 5th ACM workshop on Security and artificial intelligence, AISec'12, New York, NY, USA: ACM, 2012, pp. 59--70.
- M. Maas, P. Reames, J. Morlan, K. Asanović, A. D. Joseph, and J. D. Kubiatowicz, "GPUs as an Opportunity for Offloading Garbage Collection," in Proceedings of the 2012 International Symposium on Memory Management, ISMM '12, New York, NY, USA: ACM, 2012, pp. 25--36.
- M. Zaharia, A. Konwinski, A. D. Joseph, R. H. Katz, and I. Stoica, "Improving MapReduce performance in heterogeneous environments," in Proc. 8th USENIX Symp. on Operating Systems Design and Implementation (OSDI 2008), Berkeley, CA: USENIX Association, 2008, pp. 29-42.
- M. Barreno, P. Bartlett, F. J. Chi, A. D. Joseph, B. Nelson, B. I. P. Rubinstein, U. Saini, and D. Tygar, "Open problems in the security of learning (Position Paper)," in Proc. 1st ACM Workshop on AISec (AISec 2008), New York, NY: The Association for Computing Machinery, Inc., 2008, pp. 19-26.
- B. Nelson, M. Barreno, F. J. Chi, A. D. Joseph, B. I. P. Rubinstein, U. Saini, C. Sutton, D. Tygar, and K. Xia, "Exploiting machine learning to subvert your spam filter," in Proc. 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEFT 2008), Berkeley, CA: USENIX Association, 2008, pp. 9 pg.
- K. Sklower and A. D. Joseph, "Very large scale cooperative experiments in Emulab-derived systems," in Proc. DETER Community Workshop on Cyber Security Experimentation and Test (DETER 2007), Berkeley, CA: USENIX Association, 2007, pp. 7 pg.
- T. Benzel, R. Braden, D. Kim, C. Neuman, A. D. Joseph, K. Sklower, R. Ostrenga, and S. Schwab, "Design, deployment, and use of the DETER testbed," in Proc. DETER Community Workshop on Cyber Security Experimentation and Test (DETER 2007), Berkeley, CA: USENIX Association, 2007, pp. 8 pg.
- L. Huang, M. Garofalakis, A. D. Joseph, and N. Taft, "Communication-efficient tracking of distributed cumulative triggers," in Proc. 27th Intl. Conf. on Distributed Computing Systems (ICDCS '07), Los Alamitos, CA: IEEE Computer Society, 2007, pp. Art. 54:1-10.
- L. Huang, X. Nguyen, M. Garofalakis, J. M. Hellerstein, M. Jordan, A. D. Joseph, and N. Taft, "Communication-efficient online detection of network-wide anomalies," in Proc. 26th IEEE Intl. Conf. on Computer Communications (INFOCOM 2007), Piscataway, NJ: IEEE Press, 2007, pp. 134-142.
- L. Huang, M. Garofalakis, J. M. Hellerstein, A. D. Joseph, and N. Taft, "Toward sophisticated detection with distributed triggers," in Proc. 2006 SIGCOMM Workshop on Mining Network Data (MineNet '06), New York, NY: The Association for Computing Machinery, Inc., 2006, pp. 311-316.
- B. Nelson and A. D. Joseph, "Bounding an attack's complexity for a simple learning model," in Proc. 1st Workshop on Tackling Computer Systems Problems with Machine Learning Techniques (SysML 2006), 2006.
- M. Barreno, B. Nelson, R. Sears, and A. D. Joseph, "User model transfer for email virus detection," in Proc. 1st Workshop on Tackling Computer Systems Problems with Machine Learning Techniques (SysML 2006), 2006.
- T. Benzel, R. Braden, D. Kim, C. Neuman, A. D. Joseph, K. Sklower, R. Ostrenga, and S. Schwab, "Experience with DETER: A testbed for security research," in Proc. 2nd Intl. IEEE/Create-Net Conf. on Testbeds and Research Infrastructures for the Development of Networks and Communities (TRICENTCOM 2006), Piscataway, NJ: IEEE Press, 2006, pp. 10 pg.
- M. Barreno, B. Nelson, R. Sears, A. D. Joseph, and D. Tygar, "Can Machine Learning Be Secure? (Invited Talk)," in Proc. 2006 ACM Symp. on Information, Computer and Communications Security, New York, NY: ACM Press, 2006, pp. 16-25.
- A. Konrad, B. Y. Zhao, and A. D. Joseph, "Choosing an accurate network model using domain analysis," in Proc. 11th Intl. Conf. on Parallel and Distributed Systems (ICPADS '05): Workshops, J. Ma and L. T. Yang, Eds., Vol. 2, Los Alamitos, CA: IEEE Computer Society, 2005, pp. 100-104.
- S. Martin, A. Sewani, B. Nelson, K. Chen, and A. D. Joseph, "Analyzing behavioral features for email classification," in Proc. 2nd Conf. on Email and Anti-Spam (CEAS 2005), 2005, pp. 8 pg.
- K. D. Simler, S. E. Czerwinski, and A. D. Joseph, "Analysis of wide area user mobility patterns," in Proc. 6th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2004), Los Alamitos, CA: IEEE Computer Society, 2004, pp. 30-40.
- B. Y. Zhao, L. Huang, J. Stribling, A. D. Joseph, and J. D. Kubiatowicz, "Exploiting routing redundancy via structured peer-to-peer overlays," in Proc. 11th IEEE Intl. Conf. on Network Protocols (ICNP 2003), Los Alamitos, CA: IEEE Computer Society, 2003, pp. 246-257.
- A. Konrad and A. D. Joseph, "Choosing an accurate network path model (Poster Session)," in Proc. 2003 ACM SIGMETRICS Intl. Conf. on Measurement and Modeling of Computer Sytems (SIGMETRICS '03), New York, NY: The Association for Computing Machinery, Inc., 2003, pp. 314-315.
- B. Y. Zhao, A. D. Joseph, and J. D. Kubiatowicz, "Locality-aware mechanisms for large-scale networks," in Proc. Intl. Workshop on Future Directions in Distributed Computing (FuDiCo 2002), 2002, pp. 4 pg.
- J. S. Shih, R. H. Katz, and A. D. Joseph, "Pricing experiments for a computer-telephony-service usage allocation," in Proc. IEEE Global Telecommunications Conf. (GLOBECOM '01), Piscataway, NJ: IEEE Press, 2001, pp. 2450-2454.
- S. E. Czerwinski and A. D. Joseph, "Using simple remote evaluation to enable efficient application protocols in mobile environments," in Proc. IEEE Intl. Symp. on Network Computing and Applications (NCA '01), Los Alamitos, CA: IEEE Computer Society, 2001, pp. 162-173.
- A. Konrad, B. Y. Zhao, A. D. Joseph, and R. Ludwig, "Best Paper Award: A Markov-based channel model algorithm for wireless networks," in Proc. 4th ACM Intl. Workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems (ACM WSWiM 2001), M. Meo, T. A. Dahlberg, and L. Donatiello, Eds., New York: The Association for Computing Machinery, Inc., 2001, pp. 28-36.
- F. C. Li, J. A. Landay, and A. D. Joseph, "Supporting collaborative teams in engineering education," in Proc. 2001 ASEE Annual Conference & Exposition, Washington, DC: American Society for Engineering Education, 2001, pp. 11 pg.
- A. Singh, A. Konrad, and A. D. Joseph, "Performance evaluation of UDP Lite for cellular video," in Proc. 11th Intl. Workshop on Network and Operatings Systems Support for Digital Audio and Video (NOSSDAV 2001), J. Nieh, Ed., New York, NY: The Association for Computing Machinery, Inc., 2001, pp. 117-124.
- S. Q. Zhuang, B. Y. Zhao, A. D. Joseph, R. H. Katz, and J. D. Kubiatowicz, "Bayeux: An architecture for scalable and fault-tolerant wide-area data dissemination," in Proc. 11th Intl. Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV 2001), New York, NY: ACM Press, 2001, pp. 11-20.
- B. Raman, R. H. Katz, and A. D. Joseph, "Universal Inbox: Providing extensible personal mobility and service mobility in an integrated communication network," in Proc. 3rd IEEE Workshop on Mobile Computing Systems and Applications (WMCSA '00), Los Alamitos, CA: IEEE Computer Society, 2000, pp. 95-106.
- S. J. Ross, J. L. Hill, M. Y. Chen, A. D. Joseph, D. E. Culler, and E. Brewer, "A composable framework for secure multi-modal access to Internet services from post-PC devices," in Proc. 3rd IEEE Workshop on Mobile Computing Systems and Applications (WMCSA '00), Los Alamitos, CA: IEEE Computer Society, 2000, pp. 171-182.
- J. R. von Behren, S. Czerwinski, A. D. Joseph, E. Brewer, and J. D. Kubiatowicz, "NinjaMail: The design of a high-performance clustered, distributed e-mail system," in Proc. 29th Intl. Workshops on Parallel Processing (ICPP '00 - Workshops), P. Sadayappan, Ed., Los Alamitos, CA: IEEE Computer Society, 2000, pp. 151-158.
- C. Chuah, L. Subramanian, R. H. Katz, and A. D. Joseph, "QoS provisioning using a clearing house architecture," in Proc. 8th Intl. Workshop on Quality of Service (IWQoS 2000), Piscataway, NJ: IEEE Press, 2000, pp. 115-124.
- H. J. Wang, A. D. Joseph, and R. H. Katz, "A signaling system using lightweight call sessions," in Proc. 19th Annual Joint Conf. of the IEEE Computer and Communications Societies (INFOCOM 2000), Vol. 2, Piscataway, NJ: IEEE Press, 2000, pp. 697-706.
- H. J. Wang, A. D. Joseph, and R. H. Katz, "A signaling system using lightweight call sessions," in Proc. 19th Annual Joint Conf. on IEEE Computer and Communications Societies (INFOCOM 2000), Vol. 2, Piscataway, NJ: IEEE Press, 2000, pp. 697-706.
- R. Ludwig, A. Konrad, and A. D. Joseph, "Optimizing the end-to-end performance of reliable flows over wireless links," in Proc. 5th Annual ACM/IEEE Intl. Conf. on Mobile Computing and Networking (MOBICOM '99), New York, NY: The Association for Computing Machinery, Inc., 1999, pp. 113-119.
- S. E. Czerwinski, B. Y. Zhao, T. D. Hodes, A. D. Joseph, and R. H. Katz, "An architecture for a secure service discovery service," in Proc. 5th Annual ACM/IEEE Intl. Conf. on Mobile Computing and Networking, New York, NY: ACM Press, 1999, pp. 24-35.
- R. Ludwig, B. Rathonyi, A. Konrad, K. Oden, and A. D. Joseph, "Multi-layer tracing of TCP over a reliable wireless link," in Proc. 1999 ACM SIGMETRICS Intl. Conf. on Measurement and Modeling of Computer Systems (SIGMETRICS '99), New York, NY: The Association for Computing Machinery, Inc., 1999, pp. 144-154.
- A. D. Joseph, B. R. Badrinath, and R. H. Katz, "A case for services over cascaded networks," in Proc. 1st ACM International Workshop on Wireless Mobile Multimedia (WOWMOM '98), New York, NY: The Association for Computing Machinery, Inc., 1998, pp. 2-10.
- A. D. Joseph, G. M. Candea, and M. F. Kaashoek, "RFS: A mobile-transparent file system for the Rover toolkit (Work-in-Progress Poster)," in Proc. 16th ACM Symp. on Operating Systems Principles (SOSP-16), New York, NY: The Association for Computing Machinery, Inc., 1997.
- A. D. Joseph and M. F. Kaashoek, "Building reliable mobile-aware applications using the Rover toolkit," in Proc. 2nd ACM Intl. Conf. on Mobile Computing and Networking (MOBICOM '96), New York, NY: The Association for Computing Machinery, Inc., 1996, pp. 117-129.
- A. D. Joseph, A. F. deLespinasse, J. A. Tauber, D. K. Gifford, and M. F. Kaashoek, "Rover: A toolkit for mobile information access," in Proc. 15th ACM Symp. on Operating Systems Principles (SOSP-15), M. B. Jones, Ed., New York, NY: The Association for Computing Machinery, Inc., 1995, pp. 156-171.
Conference proceedings (edited)
Technical Reports
- D. Haussler, D. A. Patterson, M. Diekhans, A. Fox, M. Jordan, A. D. Joseph, S. Ma, B. Paten, S. Shenker, T. Sittler, and I. Stoica, "A Million Cancer Genome Warehouse," EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2012-211, Nov. 2012. [abstract]
- B. Hindman, A. Konwinski, M. Zaharia, A. Ghodsi, A. D. Joseph, R. H. Katz, S. Shenker, and I. Stoica, "Mesos: A Platform for Fine-Grained Resource Sharing in the Data Center," EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2010-87, May 2010. [abstract]
- M. Piotrowski and A. D. Joseph, "Virtics: A System for Privilege Separation of Legacy Desktop Applications," EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2010-70, May 2010. [abstract]
- B. Hindman, A. Konwinski, M. Zaharia, A. Ghodsi, A. D. Joseph, S. Shenker, and I. Stoica, "Nexus: A Common Substrate for Cluster Computing," EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2009-158, Nov. 2009. [abstract]
- M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "Above the Clouds: A Berkeley View of Cloud Computing," EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2009-28, Feb. 2009. [abstract]
- M. Zaharia, A. Konwinski, A. D. Joseph, R. H. Katz, and I. Stoica, "Improving MapReduce Performance in Heterogeneous Environments," EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2008-99, Aug. 2008. [abstract]
- B. I. P. Rubinstein, B. Nelson, L. Huang, A. D. Joseph, S. Lau, N. Taft, and D. Tygar, "Compromising PCA-based Anomaly Detectors for Network-Wide Traffic," EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2008-73, May 2008. [abstract]
- M. Barreno, B. A. Nelson, A. D. Joseph, and D. Tygar, "The Security of Machine Learning," EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2008-43, April 2008. [abstract]
- L. Huang, X. Nguyen, M. Garofalakis, M. Jordan, A. D. Joseph, and N. Taft, "In-Network PCA and Anomaly Detection," EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2007-10, Jan. 2007. [abstract]
- L. Huang, M. Garofalakis, A. D. Joseph, and N. Taft, "Communication-Efficient Tracking of Distributed Cumulative Triggers," EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2006-139, Oct. 2006. [abstract]
- L. Huang, X. Nguyen, M. Garofalakis, M. Jordan, A. D. Joseph, and N. Taft, "Distributed PCA and Network Anomaly Detection," EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2006-99, July 2006. [abstract]
- L. Huang, B. Zhao, A. D. Joseph, and J. D. Kubiatowicz, "Probabilistic Data Aggregation In Distributed Networks," EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2006-11, Feb. 2006. [abstract]
- A. Konrad and A. D. Joseph, "Choosing an Accurate Network Path Model," EECS Department, University of California, Berkeley, Tech. Rep. UCB/CSD-03-1236, May 2003. [abstract]
- B. Y. Zhao, L. Huang, A. D. Joseph, and J. D. Kubiatowicz, "Exploiting Routing Redundancy Using a Wide-area Overlay," EECS Department, University of California, Berkeley, Tech. Rep. UCB/CSD-02-1215, Nov. 2002. [abstract]
- B. Y. Zhao, A. D. Joseph, and J. D. Kubiatowicz, "Supporting Rapid Mobility via Locality in an Overlay Network," EECS Department, University of California, Berkeley, Tech. Rep. UCB/CSD-02-1216, Nov. 2002. [abstract]
- A. Konrad, A. D. Joseph, R. Ludwig, and B. Y. Zhao, "A Markov-Based Channel Model Algorithm for Wireless Networks," EECS Department, University of California, Berkeley, Tech. Rep. UCB/CSD-01-1142, May 2001. [abstract]
- B. Y. Zhao, J. D. Kubiatowicz, and A. D. Joseph, "Tapestry: An Infrastructure for Fault-Resilient [Tolerant] Wide-Area Location and Routing," University of California, Berkeley, EECS Department, Tech. Rep. UCB/CSD-01-1141, April 2001.
- B. Y. Zhao, J. D. Kubiatowicz, and A. D. Joseph, "Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and Routing," EECS Department, University of California, Berkeley, Tech. Rep. UCB/CSD-01-1141, April 2001. [abstract]
- S. Agarwal, R. H. Katz, and A. D. Joseph, "Reducing the Energy Consumption of Group Driven Ad-hoc Wireless Communication," EECS Department, University of California, Berkeley, Tech. Rep. UCB/CSD-01-1127, Jan. 2001. [abstract]
- B. Y. Zhao and A. Joseph, "The XSet XML Search Engine and XBench XML Query Benchmark," EECS Department, University of California, Berkeley, Tech. Rep. UCB/CSD-00-1112, Sep. 2000. [abstract]
- B. Raman, R. H. Katz, and A. D. Joseph, "Personal Mobility in the ICEBERG Integrated Communication Network," EECS Department, University of California, Berkeley, Tech. Rep. UCB/CSD-99-1048, May 1999. [abstract]
- W. Weihl, E. Brewer, A. Colbrook, C. Dellarocas, W. Hsieh, A. D. Joseph, C. Waldspurger, and P. Wang, "Prelude: A System for Portable Parallel Software," Massachusetts Institute for Technology, Laboratory for Computer Science, Tech. Rep. MIT-LCS-TR-519, Oct. 1991.
Ph.D. Theses
|
|
|