Подписаться
Anthony D. Joseph
Anthony D. Joseph
Подтвержден адрес электронной почты в домене eecs.berkeley.edu
Название
Процитировано
Процитировано
Год
A view of cloud computing
M Armbrust, A Fox, R Griffith, AD Joseph, R Katz, A Konwinski, G Lee, ...
Communications of the ACM 53 (4), 50-58, 2010
139612010
Above the clouds: A berkeley view of cloud computing
M Armbrust, A Fox, R Griffith, AD Joseph, RH Katz, A Konwinski, G Lee, ...
Technical Report UCB/EECS-2009-28, EECS Department, University of California …, 2009
88672009
Tapestry: An infrastructure for fault-tolerant wide-area location and routing
BY Zhao, J Kubiatowicz, AD Joseph
Computer Science Division, University of California, 2001
34902001
Tapestry: An infrastructure for fault-tolerant wide-area location and routing
BY Zhao, J Kubiatowicz, AD Joseph
Computer Science Division, University of California, 2001
33662001
Tapestry: A resilient global-scale overlay for service deployment
BY Zhao, L Huang, J Stribling, SC Rhea, AD Joseph, JD Kubiatowicz
IEEE Journal on selected areas in communications 22 (1), 41-53, 2004
28332004
Mesos: A platform for {Fine-Grained} resource sharing in the data center
B Hindman, A Konwinski, M Zaharia, A Ghodsi, AD Joseph, R Katz, ...
8th USENIX Symposium on Networked Systems Design and Implementation (NSDI 11), 2011
25592011
Improving MapReduce performance in heterogeneous environments.
M Zaharia, A Konwinski, AD Joseph, RH Katz, I Stoica
Osdi 8 (4), 7, 2008
24372008
Adversarial machine learning
L Huang, AD Joseph, B Nelson, BIP Rubinstein, JD Tygar
Proceedings of the 4th ACM workshop on Security and artificial intelligence …, 2011
14632011
Bayeux: An architecture for scalable and fault-tolerant wide-area data dissemination
SQ Zhuang, BY Zhao, AD Joseph, RH Katz, JD Kubiatowicz
Proceedings of the 11th international workshop on Network and operating …, 2001
12092001
Can machine learning be secure?
M Barreno, B Nelson, R Sears, AD Joseph, JD Tygar
Proceedings of the 2006 ACM Symposium on Information, computer and …, 2006
11652006
The security of machine learning
M Barreno, B Nelson, AD Joseph, JD Tygar
Machine Learning 81, 121-148, 2010
10542010
Above the clouds: A berkeley view of cloud computing
A Fox, R Griffith, A Joseph, R Katz, A Konwinski, G Lee, D Patterson, ...
Dept. Electrical Eng. and Comput. Sciences, University of California …, 2009
10482009
Above the clouds: A berkeley view of cloud computing
A Fox, R Griffith, A Joseph, R Katz, A Konwinski, G Lee, D Patterson, ...
Dept. Electrical Eng. and Comput. Sciences, University of California …, 2009
9952009
Toil enables reproducible, open source, big biomedical data analyses
J Vivian, AA Rao, FA Nothaft, C Ketchum, J Armstrong, A Novak, J Pfeil, ...
Nature biotechnology 35 (4), 314-316, 2017
9872017
An architecture for a secure service discovery service
SE Czerwinski, BY Zhao, TD Hodes, AD Joseph, RH Katz
Proceedings of the 5th annual ACM/IEEE international conference on Mobile …, 1999
9691999
A taxonomy of cyber attacks on SCADA systems
B Zhu, A Joseph, S Sastry
2011 International conference on internet of things and 4th international …, 2011
6892011
The Ninja architecture for robust Internet-scale systems and services
SD Gribble, M Welsh, R Von Behren, EA Brewer, D Culler, N Borisov, ...
Computer Networks 35 (4), 473-497, 2001
5282001
The Ninja architecture for robust Internet-scale systems and services
SD Gribble, M Welsh, R Von Behren, EA Brewer, D Culler, N Borisov, ...
Computer Networks 35 (4), 473-497, 2001
5282001
Tapestry: An Infrastructure for Fault-Resilient Wide-Ares Location and Routing
BY Zhao
Technical Report, UC Berkly, 2001
514*2001
Understanding TCP incast throughput collapse in datacenter networks
Y Chen, R Griffith, J Liu, RH Katz, AD Joseph
Proceedings of the 1st ACM workshop on Research on enterprise networking, 73-82, 2009
4972009
В данный момент система не может выполнить эту операцию. Повторите попытку позднее.
Статьи 1–20