The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Anthony D. Joseph: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Anthony D. Joseph, Joshua A. Tauber, M. Frans Kaashoek
    Mobile Computing with the Rover Toolkit. [Citation Graph (1, 0)][DBLP]
    IEEE Trans. Computers, 1997, v:46, n:3, pp:337-352 [Journal]
  2. Marco Barreno, Blaine Nelson, Russell Sears, Anthony D. Joseph, J. D. Tygar
    Can machine learning be secure? [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:16-25 [Conf]
  3. Steve Martin, Blaine Nelson, Anil Sewani, Karl Chen, Anthony D. Joseph
    Analyzing Behavioral Features for Email Classification. [Citation Graph (0, 0)][DBLP]
    CEAS, 2005, pp:- [Conf]
  4. Ben Y. Zhao, Ling Huang, Jeremy Stribling, Anthony D. Joseph, John Kubiatowicz
    Exploiting Routing Redundancy via Structured Peer-to-Peer Overlays. [Citation Graph (0, 0)][DBLP]
    ICNP, 2003, pp:246-257 [Conf]
  5. Almudena Konrad, Ben Y. Zhao, Anthony D. Joseph
    Choosing an Accurate Network Model using Domain Analysis. [Citation Graph (0, 0)][DBLP]
    ICPADS (2), 2005, pp:100-104 [Conf]
  6. J. Robert von Behren, Steven E. Czerwinski, Anthony D. Joseph, Eric A. Brewer, John Kubiatowicz
    NinjaMail: The Design of a High-Performance Clustered, Distributed E-Mail System. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 2000, pp:151-0 [Conf]
  7. Helen J. Wang, Anthony D. Joseph, Randy H. Katz
    A Signaling System Using Lightweight Call Sessions. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2000, pp:697-706 [Conf]
  8. Ben Y. Zhao, Yitao Duan, Ling Huang, Anthony D. Joseph, John Kubiatowicz
    Brocade: Landmark Routing on Overlay Networks. [Citation Graph (0, 0)][DBLP]
    IPTPS, 2002, pp:34-44 [Conf]
  9. Ben Y. Zhao, Ling Huang, Anthony D. Joseph, John Kubiatowicz
    Rapid Mobility via Type Indirection. [Citation Graph (0, 0)][DBLP]
    IPTPS, 2004, pp:64-74 [Conf]
  10. Feng Zhou, Li Zhuang, Ben Y. Zhao, Ling Huang, Anthony D. Joseph, John Kubiatowicz
    Approximate Object Location and Spam Filtering on Peer-to-Peer Systems. [Citation Graph (0, 0)][DBLP]
    Middleware, 2003, pp:1-20 [Conf]
  11. Steven E. Czerwinski, Ben Y. Zhao, Todd D. Hodes, Anthony D. Joseph, Randy H. Katz
    An Architecture for a Secure Service Discovery Service. [Citation Graph (0, 0)][DBLP]
    MOBICOM, 1999, pp:24-35 [Conf]
  12. Anthony D. Joseph, M. Frans Kaashoek
    Building Reliable Mobile-Aware Applications Using the Rover Toolkit. [Citation Graph (0, 0)][DBLP]
    MOBICOM, 1996, pp:117-129 [Conf]
  13. Reiner Ludwig, Almudena Konrad, Anthony D. Joseph
    Optimizing the End-to-End Performance of Reliable Flows Over Wireless Links. [Citation Graph (0, 0)][DBLP]
    MOBICOM, 1999, pp:113-119 [Conf]
  14. Almudena Konrad, Ben Y. Zhao, Anthony D. Joseph, Reiner Ludwig
    A Markov-based channel model algorithm for wireless networks. [Citation Graph (0, 0)][DBLP]
    MSWiM, 2001, pp:28-36 [Conf]
  15. Steven E. Czerwinski, Anthony D. Joseph
    Using Simple Remote Evaluation to Enable Efficient Application Protocols in Mobile Environments. [Citation Graph (0, 0)][DBLP]
    NCA, 2001, pp:162-173 [Conf]
  16. Amoolya Singh, Almudena Konrad, Anthony D. Joseph
    Performance evaluation of UDP lite for cellular video. [Citation Graph (0, 0)][DBLP]
    NOSSDAV, 2001, pp:117-124 [Conf]
  17. Shelley Zhuang, Ben Y. Zhao, Anthony D. Joseph, Randy H. Katz, John Kubiatowicz
    Bayeux: an architecture for scalable and fault-tolerant wide-area data dissemination. [Citation Graph (0, 0)][DBLP]
    NOSSDAV, 2001, pp:11-20 [Conf]
  18. William E. Weihl, Eric A. Brewer, Adrian Colbrook, Chrysanthos Dellarocas, Wilson C. Hsieh, Anthony D. Joseph, Carl A. Waldspurger, Paul Wang
    PRELUDE: A System for Portable Parallel Software. [Citation Graph (0, 0)][DBLP]
    PARLE, 1992, pp:971-973 [Conf]
  19. Bhaskaran Raman, Sharad Agarwal, Yan Chen, Matthew Caesar, Weidong Cui, Per Johansson, Kevin Lai, Tal Lavian, Sridhar Machiraju, Zhuoqing Morley Mao, George Porter, Timothy Roscoe, Mukund Seshadri, Jimmy S. Shih, Keith Sklower, Lakshminarayanan Subramanian, Takashi Suzuki, Shelley Zhuang, Anthony D. Joseph, Randy H. Katz, Ion Stoica
    The SAHARA Model for Service Composition across Multiple Providers. [Citation Graph (0, 0)][DBLP]
    Pervasive, 2002, pp:1-14 [Conf]
  20. Almudena Konrad, Anthony D. Joseph
    Choosing an accurate network path model. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 2003, pp:314-315 [Conf]
  21. Reiner Ludwig, Bela Rathonyi, Almudena Konrad, Kimberly Oden, Anthony D. Joseph
    Multi-Layer Tracing of TCP over a Reliable Wireless Link. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 1999, pp:144-154 [Conf]
  22. Anthony D. Joseph, Alan F. deLespinasse, Joshua A. Tauber, David K. Gifford, M. Frans Kaashoek
    Rover: A Toolkit for Mobile Information Access. [Citation Graph (0, 0)][DBLP]
    SOSP, 1995, pp:156-171 [Conf]
  23. Terry Benzel, Robert Braden, Dongho Kim, Cliford Neuman, Anthony D. Joseph, Keith Sklower
    Experience with deter: A testbed for security research. [Citation Graph (0, 0)][DBLP]
    TRIDENTCOM, 2006, pp:- [Conf]
  24. Bhaskaran Raman, Randy H. Katz, Anthony D. Joseph
    Universal Inbox: providing extensible personal mobility and service mobility in an integrated communication network. [Citation Graph (0, 0)][DBLP]
    WMCSA, 2000, pp:95-0 [Conf]
  25. Steven J. Ross, Jason L. Hill, Michael Y. Chen, Anthony D. Joseph, David E. Culler, Eric A. Brewer
    A Composable Framework for Secure Multi-Modal Access to Internet Services from Post-PC Devices. [Citation Graph (0, 0)][DBLP]
    WMCSA, 2000, pp:171-182 [Conf]
  26. Kevin D. Simler, Steven E. Czerwinski, Anthony D. Joseph
    Analysis of Wide Area User Mobility Patterns. [Citation Graph (0, 0)][DBLP]
    WMCSA, 2004, pp:30-40 [Conf]
  27. Anthony D. Joseph, B. R. Badrinath, Randy H. Katz
    The Case for Services over Cascaded Networks. [Citation Graph (0, 0)][DBLP]
    WOWMOM, 1998, pp:2-10 [Conf]
  28. Ruzena Bajcsy, Terry Benzel, Matt Bishop, Robert Braden, Carla E. Brodley, Sonia Fahmy, Sally Floyd, W. Hardaker, Anthony D. Joseph, George Kesidis, Karl N. Levitt, Robert Lindell, Peng Liu, David Miller, Russ Mundy, Cliford Neuman, Ron Ostrenga, Vern Paxson, Phillip A. Porras, Catherine Rosenberg, J. Doug Tygar, Shankar Sastry, Daniel F. Sterne, Shyhtsun Felix Wu
    Cyber defense technology networking and evaluation. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:3, pp:58-61 [Journal]
  29. Ben Y. Zhao, John Kubiatowicz, Anthony D. Joseph
    Tapestry: a fault-tolerant wide-area application infrastructure. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2002, v:32, n:1, pp:81- [Journal]
  30. Steven D. Gribble, Matt Welsh, J. Robert von Behren, Eric A. Brewer, David E. Culler, Nikita Borisov, Steven E. Czerwinski, Ramakrishna Gummadi, Jon R. Hill, Anthony D. Joseph, Randy H. Katz, Zhuoqing Morley Mao, S. Ross, Ben Y. Zhao
    The Ninja architecture for robust Internet-scale systems and services. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2001, v:35, n:4, pp:473-497 [Journal]
  31. Almudena Konrad, Ben Y. Zhao, Anthony D. Joseph
    Determining model accuracy of network traces. [Citation Graph (0, 0)][DBLP]
    J. Comput. Syst. Sci., 2006, v:72, n:7, pp:1156-1171 [Journal]
  32. Steven J. Ross, Jason L. Hill, Michael Y. Chen, Anthony D. Joseph, David E. Culler, Eric A. Brewer
    A Composable Framework for Secure Multi-Modal Access to Internet Services from Post-PC Devices. [Citation Graph (0, 0)][DBLP]
    MONET, 2002, v:7, n:5, pp:389-406 [Journal]
  33. Anthony D. Joseph, M. Frans Kaashoek
    Building reliable mobile-aware applications using the Rover toolkit. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 1997, v:3, n:5, pp:405-419 [Journal]
  34. Almudena Konrad, Ben Y. Zhao, Anthony D. Joseph, Reiner Ludwig
    A Markov-Based Channel Model Algorithm for Wireless Networks. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 2003, v:9, n:3, pp:189-199 [Journal]
  35. Todd D. Hodes, Steven E. Czerwinski, Ben Y. Zhao, Anthony D. Joseph, Randy H. Katz
    An Architecture for Secure Wide-Area Service Discovery. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 2002, v:8, n:2-3, pp:213-230 [Journal]
  36. Reiner Ludwig, Almudena Konrad, Anthony D. Joseph, Randy H. Katz
    Optimizing the End-to-End Performance of Reliable Flows over Wireless Links. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 2002, v:8, n:2-3, pp:289-299 [Journal]
  37. Nitin H. Vaidya, Anthony D. Joseph
    Guest Editorial. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 2005, v:11, n:4, pp:361-361 [Journal]
  38. Ling Huang, Minos N. Garofalakis, Anthony D. Joseph, Nina Taft
    Communication-Efficient Tracking of Distributed Cumulative Triggers. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2007, pp:54- [Conf]
  39. Ling Huang, XuanLong Nguyen, Minos N. Garofalakis, Joseph M. Hellerstein, Michael I. Jordan, Anthony D. Joseph, Nina Taft
    Communication-Efficient Online Detection of Network-Wide Anomalies. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:134-142 [Conf]
  40. Ling Huang, XuanLong Nguyen, Minos N. Garofalakis, Michael I. Jordan, Anthony Joseph, Nina Taft
    In-Network PCA and Anomaly Detection. [Citation Graph (0, 0)][DBLP]
    NIPS, 2006, pp:617-624 [Conf]

  41. Open problems in the security of learning. [Citation Graph (, )][DBLP]


  42. 06131 Abstracts Collection -- Peer-to -Peer -Systems and -Applications. [Citation Graph (, )][DBLP]


  43. 06131 Executive Summary -- Peer-to-Peer-Systems and -Applications. [Citation Graph (, )][DBLP]


  44. ANTIDOTE: understanding and defending against poisoning of anomaly detectors. [Citation Graph (, )][DBLP]


  45. Exploiting Machine Learning to Subvert Your Spam Filter. [Citation Graph (, )][DBLP]


  46. Improving MapReduce Performance in Heterogeneous Environments. [Citation Graph (, )][DBLP]


  47. Support Vector Machines, Data Reduction, and Approximate Kernel Matrices. [Citation Graph (, )][DBLP]


  48. Evading Anomaly Detection through Variance Injection Attacks on PCA. [Citation Graph (, )][DBLP]


  49. Understanding TCP incast throughput collapse in datacenter networks. [Citation Graph (, )][DBLP]


  50. Toward sophisticated detection with distributed triggers. [Citation Graph (, )][DBLP]


  51. A view of cloud computing. [Citation Graph (, )][DBLP]


  52. Near-Optimal Evasion of Convex-Inducing Classifiers [Citation Graph (, )][DBLP]


  53. Query Strategies for Evading Convex-Inducing Classifiers [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002