Faculty Publications - Anthony D. Joseph

Book chapters or sections

  • X. Nguyen, L. Huang, and A. D. Joseph, "Support vector machines, data reduction, and approximate kernel matrices," in Machine Learning and Knowledge Discovery in Databases -- Part II: Proc. European Conf. (ECML/PKDD 2008), W. Daelemans, B. Goethals, and K. Morik, Eds., Lecture Notes in Computer Science::Lecture Notes in Artificial Intelligence, Vol. 5212, Berlin, Germany: Springer-Verlag, 2008, pp. 137-153.
  • B. I. P. Rubinstein, B. Nelson, L. Huang, A. D. Joseph, S. Lau, N. Taft, and D. Tygar, "Evading anomaly detection through variance injection attacks on PCA (Winner, RAID '08 Best Poster Award)," in Recent Advances in Intrusion Detection: Proc. 11th Intl. Symp. (RAID 2008), R. Lippmann, E. Kirda, and A. Trachtenberg, Eds., Lecture Notes in Computer Science, Vol. 5230, Berlin, Germany: Springer-Verlag, 2008, pp. 394-394.
  • L. Huang, X. Nguyen, M. Garofalakis, M. Jordan, A. D. Joseph, and N. Taft, "In-network PCA and anomaly detection," in Advances in Neural Information Processing Systems 19: Proc. 20th Annual Conf. (NIPS 2006), B. Scholkopf, J. Platt, and T. Hofmann, Eds., Advances in Neural Information Processing Systems, Vol. 19, Cambridge, MA: MIT Press, 2007, pp. 617-624.
  • B. Y. Zhao, L. Huang, A. D. Joseph, and J. D. Kubiatowicz, "Rapid mobility via type indirection," in Peer-to-Peer Systems III: Proc. 3rd Intl. Workshop (IPTPS '04). Revised Selected Papers, G. M. Voelker and S. Shenker, Eds., Lecture Notes in Computer Science, Vol. 3279, Berlin, Germany: Springer-Verlag, 2005, pp. 64-74.
  • F. Zhou, L. Zhuang, B. Y. Zhao, L. Huang, A. D. Joseph, and J. D. Kubiatowicz, "Approximate object location and spam filtering on peer-to-peer systems," in Middleware 2003: Proc. ACM/IFIP/USENIX Intl. Middleware Conf., M. Endler and D. Schmidt, Eds., Lecture Notes in Computer Science, Vol. 2672, Berlin, Germany: Springer-Verlag, 2003, pp. 1-20.
  • B. Y. Zhao, Y. Duan, L. Huang, A. D. Joseph, and J. D. Kubiatowicz, "Brocade: Landmark routing on overlay networks," in Revised Papers of the 1st Intl. Workshop on Peer-to-Peer Systems, P. Druschel, F. Kaashoek, and A. Rowstron, Eds., Lecture Notes in Computer Science, Vol. 2429, London, UK: Springer-Verlag, 2002, pp. 34-44.
  • B. Raman, S. Agarwal, Y. Chen, M. Caesar, W. Cui, P. Johansson, K. Lai, T. Lavian, S. Machiraju, Z. M. Mao, G. Porter, T. Roscoe, M. Seshadri, J. S. Shih, K. Sklower, L. Subramanian, T. Suzuki, S. Zhuang, A. D. Joseph, R. H. Katz, and I. Stoica, "The SAHARA model for service composition across multiple providers," in Pervasive Computing: Proc. 1st Intl. Conf. (Pervasive 2002), F. Mattern and M. Naghshineh, Eds., Lecture Notes in Computer Science, Vol. 2414, Berlin, Germany: Springer-Verlag, 2002, pp. 1-14.
  • A. D. Joseph, J. A. Tauber, and M. F. Kaashoek, "Mobile computing with the Rover toolkit (Invited Paper)," in Mobility: Processes, Computers, and Agents, D. Milojicic, F. Douglis, and R. Wheeler, Eds., New York, NY: Addison-Wesley Professional, 1999, pp. 335-352.
  • W. Weihl, E. Brewer, A. Colbrook, C. Dellarocas, W. Hsieh, A. D. Joseph, C. Waldspurger, and P. Wang, "Prelude: A system for portable parallel software (Poster Session)," in PARLE '92: Parallel Architectures and Languages Europe: Proc. 4th Intl. Conf., D. Etiemble and J. Syre, Eds., Lecture Notes in Computer Science, Vol. 605, Berlin, Germany: Springer-Verlag, 1992, pp. 971-972.

Articles in journals or magazines

Articles in conference proceedings

Conference proceedings (edited)

Technical Reports

Ph.D. Theses

Masters Reports