X. Nguyen, L. Huang, and A. D. Joseph, "Support vector machines, data reduction, and approximate kernel matrices," in Machine Learning and Knowledge Discovery in Databases -- Part II: Proc. European Conf. (ECML/PKDD 2008), W. Daelemans, B. Goethals, and K. Morik, Eds., Lecture Notes in Computer Science::Lecture Notes in Artificial Intelligence, Vol. 5212, Berlin, Germany: Springer-Verlag, 2008, pp. 137-153.
B. I. P. Rubinstein, B. Nelson, L. Huang, A. D. Joseph, S. Lau, N. Taft, and D. Tygar, "Evading anomaly detection through variance injection attacks on PCA (Winner, RAID '08 Best Poster Award)," in Recent Advances in Intrusion Detection: Proc. 11th Intl. Symp. (RAID 2008), R. Lippmann, E. Kirda, and A. Trachtenberg, Eds., Lecture Notes in Computer Science, Vol. 5230, Berlin, Germany: Springer-Verlag, 2008, pp. 394-394.
L. Huang, X. Nguyen, M. Garofalakis, M. Jordan, A. D. Joseph, and N. Taft, "In-network PCA and anomaly detection," in Advances in Neural Information Processing Systems 19: Proc. 20th Annual Conf. (NIPS 2006), B. Scholkopf, J. Platt, and T. Hofmann, Eds., Advances in Neural Information Processing Systems, Vol. 19, Cambridge, MA: MIT Press, 2007, pp. 617-624.
B. Y. Zhao, L. Huang, A. D. Joseph, and J. D. Kubiatowicz, "Rapid mobility via type indirection," in Peer-to-Peer Systems III: Proc. 3rd Intl. Workshop (IPTPS '04). Revised Selected Papers, G. M. Voelker and S. Shenker, Eds., Lecture Notes in Computer Science, Vol. 3279, Berlin, Germany: Springer-Verlag, 2005, pp. 64-74.
F. Zhou, L. Zhuang, B. Y. Zhao, L. Huang, A. D. Joseph, and J. D. Kubiatowicz, "Approximate object location and spam filtering on peer-to-peer systems," in Middleware 2003: Proc. ACM/IFIP/USENIX Intl. Middleware Conf., M. Endler and D. Schmidt, Eds., Lecture Notes in Computer Science, Vol. 2672, Berlin, Germany: Springer-Verlag, 2003, pp. 1-20.
B. Y. Zhao, Y. Duan, L. Huang, A. D. Joseph, and J. D. Kubiatowicz, "Brocade: Landmark routing on overlay networks," in Revised Papers of the 1st Intl. Workshop on Peer-to-Peer Systems, P. Druschel, F. Kaashoek, and A. Rowstron, Eds., Lecture Notes in Computer Science, Vol. 2429, London, UK: Springer-Verlag, 2002, pp. 34-44.
B. Raman, S. Agarwal, Y. Chen, M. Caesar, W. Cui, P. Johansson, K. Lai, T. Lavian, S. Machiraju, Z. M. Mao, G. Porter, T. Roscoe, M. Seshadri, J. S. Shih, K. Sklower, L. Subramanian, T. Suzuki, S. Zhuang, A. D. Joseph, R. H. Katz, and I. Stoica, "The SAHARA model for service composition across multiple providers," in Pervasive Computing: Proc. 1st Intl. Conf. (Pervasive 2002), F. Mattern and M. Naghshineh, Eds., Lecture Notes in Computer Science, Vol. 2414, Berlin, Germany: Springer-Verlag, 2002, pp. 1-14.
A. D. Joseph, J. A. Tauber, and M. F. Kaashoek, "Mobile computing with the Rover toolkit (Invited Paper)," in Mobility: Processes, Computers, and Agents, D. Milojicic, F. Douglis, and R. Wheeler, Eds., New York, NY: Addison-Wesley Professional, 1999, pp. 335-352.
W. Weihl, E. Brewer, A. Colbrook, C. Dellarocas, W. Hsieh, A. D. Joseph, C. Waldspurger, and P. Wang, "Prelude: A system for portable parallel software (Poster Session)," in PARLE '92: Parallel Architectures and Languages Europe: Proc. 4th Intl. Conf., D. Etiemble and J. Syre, Eds., Lecture Notes in Computer Science, Vol. 605, Berlin, Germany: Springer-Verlag, 1992, pp. 971-972.
Articles in journals or magazines
I. Stoica, D. Song, R. A. Popa, D. A. Patterson, M. W. Mahoney, R. H. Katz, A. D. Joseph, M. Jordan, J. M. Hellerstein, J. Gonzalez, and et al, "A berkeley view of systems challenges for AI," arXiv preprint arXiv:1712.05855, 2017.
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "A view of cloud computing," Communications of the ACM, vol. 53, no. 4, pp. 50-58, April 2010.
A. Konrad, B. Y. Zhao, and A. D. Joseph, "Determining model accuracy of network traces," J. Computer and System Sciences: Performance Modelling and Evaluation of Computer Systems, vol. 72, no. 7, pp. 1156-1171, Nov. 2006.
N. Vaidya and A. D. Joseph, "Guest Editorial," Wireless Networks: Selected Papers from ACM MOBICOM 2003, vol. 11, no. 4, pp. 361-361, July 2005.
R. Bajcsy, A. D. Joseph, V. Paxson, D. Tygar, S. S. Sastry, and other DETER/EMIST Members, "Cyber defense technology networking and evaluation," Communications of the ACM Special Issue: Emerging Technologies for Homeland Security, vol. 47, no. 3, pp. 58-61, March 2004.
B. Y. Zhao, L. Huang, J. Stribling, S. C. Rhea, A. D. Joseph, and J. D. Kubiatowicz, "Tapestry: A resilient global-scale overlay for service deployment," IEEE J. Selected Areas in Communications: Special Issue on Recent Advances in Service Overlay Networ, vol. 22, no. 1, pp. 41-53, Jan. 2004.
T. D. Hodes, S. E. Czerwinski, B. Y. Zhao, A. D. Joseph, and R. H. Katz, "An architecture for secure wide-area service discovery," Wireless Networks: Selected Papers from MOBICOM '99, vol. 8, no. 2/3, pp. 213-230, March 2002.
A. D. Joseph, J. A. Tauber, and M. F. Kaashoek, "Mobile computing with the Rover toolkit," IEEE Trans. Computers: Special Issue on Mobile Computing, vol. 46, no. 3, pp. 337-352, March 1997.
A. D. Joseph, A. F. deLespinasse, J. A. Tauber, D. K. Gifford, and M. F. Kaashoek, "Rover: A toolkit for mobile information access," ACM SIGOPS Operating Systems Review, vol. 29, no. 5, pp. 156-171, Dec. 1995.
A. Colbrook, W. E. Weihl, E. Brewer, C. N. Dellarocas, W. C. Hsieh, A. D. Joseph, C. A. Waldspurger, and P. Wang, "Portable software for multiprocessor systems," Computing and Control Engineering J., vol. 3, no. 6, pp. 275-281, Nov. 1992.
Articles in conference proceedings
F. A. Nothaft, M. Massie, T. Danford, Z. Zhang, U. Laserson, C. Yeksigian, J. Kottalam, A. Ahuja, J. Hammerbacher, M. Linderman, M. J. Franklin, A. D. Joseph, and D. A. Patterson, "Rethinking Data-Intensive Science Using Scalable Analytics Systems," in Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD '15), 2015.
A. Kantchelian, J. Ma, L. Huang, S. Afroz, A. D. Joseph, and D. Tygar, "Robust detection of comment spam using entropy rate," in Proceedings of the 5th ACM workshop on Security and artificial intelligence, AISec'12, New York, NY, USA: ACM, 2012, pp. 59--70.
M. Maas, P. Reames, J. Morlan, K. Asanović, A. D. Joseph, and J. D. Kubiatowicz, "GPUs as an Opportunity for Offloading Garbage Collection," in Proceedings of the 2012 International Symposium on Memory Management, ISMM '12, New York, NY, USA: ACM, 2012, pp. 25--36.
M. Zaharia, A. Konwinski, A. D. Joseph, R. H. Katz, and I. Stoica, "Improving MapReduce performance in heterogeneous environments," in Proc. 8th USENIX Symp. on Operating Systems Design and Implementation (OSDI 2008), Berkeley, CA: USENIX Association, 2008, pp. 29-42.
M. Barreno, P. Bartlett, F. J. Chi, A. D. Joseph, B. Nelson, B. I. P. Rubinstein, U. Saini, and D. Tygar, "Open problems in the security of learning (Position Paper)," in Proc. 1st ACM Workshop on AISec (AISec 2008), New York, NY: The Association for Computing Machinery, Inc., 2008, pp. 19-26.
B. Nelson, M. Barreno, F. J. Chi, A. D. Joseph, B. I. P. Rubinstein, U. Saini, C. Sutton, D. Tygar, and K. Xia, "Exploiting machine learning to subvert your spam filter," in Proc. 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEFT 2008), Berkeley, CA: USENIX Association, 2008, pp. 9 pg.
T. Benzel, R. Braden, D. Kim, C. Neuman, A. D. Joseph, K. Sklower, R. Ostrenga, and S. Schwab, "Design, deployment, and use of the DETER testbed," in Proc. DETER Community Workshop on Cyber Security Experimentation and Test (DETER 2007), Berkeley, CA: USENIX Association, 2007, pp. 8 pg.
L. Huang, X. Nguyen, M. Garofalakis, J. M. Hellerstein, M. Jordan, A. D. Joseph, and N. Taft, "Communication-efficient online detection of network-wide anomalies," in Proc. 26th IEEE Intl. Conf. on Computer Communications (INFOCOM 2007), Piscataway, NJ: IEEE Press, 2007, pp. 134-142.
L. Huang, M. Garofalakis, J. M. Hellerstein, A. D. Joseph, and N. Taft, "Toward sophisticated detection with distributed triggers," in Proc. 2006 SIGCOMM Workshop on Mining Network Data (MineNet '06), New York, NY: The Association for Computing Machinery, Inc., 2006, pp. 311-316.
M. Barreno, B. Nelson, R. Sears, and A. D. Joseph, "User model transfer for email virus detection," in Proc. 1st Workshop on Tackling Computer Systems Problems with Machine Learning Techniques (SysML 2006), 2006.
T. Benzel, R. Braden, D. Kim, C. Neuman, A. D. Joseph, K. Sklower, R. Ostrenga, and S. Schwab, "Experience with DETER: A testbed for security research," in Proc. 2nd Intl. IEEE/Create-Net Conf. on Testbeds and Research Infrastructures for the Development of Networks and Communities (TRICENTCOM 2006), Piscataway, NJ: IEEE Press, 2006, pp. 10 pg.
M. Barreno, B. Nelson, R. Sears, A. D. Joseph, and D. Tygar, "Can Machine Learning Be Secure? (Invited Talk)," in Proc. 2006 ACM Symp. on Information, Computer and Communications Security, New York, NY: ACM Press, 2006, pp. 16-25.
A. Konrad, B. Y. Zhao, and A. D. Joseph, "Choosing an accurate network model using domain analysis," in Proc. 11th Intl. Conf. on Parallel and Distributed Systems (ICPADS '05): Workshops, J. Ma and L. T. Yang, Eds., Vol. 2, Los Alamitos, CA: IEEE Computer Society, 2005, pp. 100-104.
K. D. Simler, S. E. Czerwinski, and A. D. Joseph, "Analysis of wide area user mobility patterns," in Proc. 6th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2004), Los Alamitos, CA: IEEE Computer Society, 2004, pp. 30-40.
B. Y. Zhao, L. Huang, J. Stribling, A. D. Joseph, and J. D. Kubiatowicz, "Exploiting routing redundancy via structured peer-to-peer overlays," in Proc. 11th IEEE Intl. Conf. on Network Protocols (ICNP 2003), Los Alamitos, CA: IEEE Computer Society, 2003, pp. 246-257.
A. Konrad and A. D. Joseph, "Choosing an accurate network path model (Poster Session)," in Proc. 2003 ACM SIGMETRICS Intl. Conf. on Measurement and Modeling of Computer Sytems (SIGMETRICS '03), New York, NY: The Association for Computing Machinery, Inc., 2003, pp. 314-315.
B. Y. Zhao, A. D. Joseph, and J. D. Kubiatowicz, "Locality-aware mechanisms for large-scale networks," in Proc. Intl. Workshop on Future Directions in Distributed Computing (FuDiCo 2002), 2002, pp. 4 pg.
A. Konrad, B. Y. Zhao, A. D. Joseph, and R. Ludwig, "Best Paper Award: A Markov-based channel model algorithm for wireless networks," in Proc. 4th ACM Intl. Workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems (ACM WSWiM 2001), M. Meo, T. A. Dahlberg, and L. Donatiello, Eds., New York: The Association for Computing Machinery, Inc., 2001, pp. 28-36.
F. C. Li, J. A. Landay, and A. D. Joseph, "Supporting collaborative teams in engineering education," in Proc. 2001 ASEE Annual Conference & Exposition, Washington, DC: American Society for Engineering Education, 2001, pp. 11 pg.
A. Singh, A. Konrad, and A. D. Joseph, "Performance evaluation of UDP Lite for cellular video," in Proc. 11th Intl. Workshop on Network and Operatings Systems Support for Digital Audio and Video (NOSSDAV 2001), J. Nieh, Ed., New York, NY: The Association for Computing Machinery, Inc., 2001, pp. 117-124.
J. R. von Behren, S. Czerwinski, A. D. Joseph, E. Brewer, and J. D. Kubiatowicz, "NinjaMail: The design of a high-performance clustered, distributed e-mail system," in Proc. 29th Intl. Workshops on Parallel Processing (ICPP '00 - Workshops), P. Sadayappan, Ed., Los Alamitos, CA: IEEE Computer Society, 2000, pp. 151-158.
C. Chuah, L. Subramanian, R. H. Katz, and A. D. Joseph, "QoS provisioning using a clearing house architecture," in Proc. 8th Intl. Workshop on Quality of Service (IWQoS 2000), Piscataway, NJ: IEEE Press, 2000, pp. 115-124.
H. J. Wang, A. D. Joseph, and R. H. Katz, "A signaling system using lightweight call sessions," in Proc. 19th Annual Joint Conf. of the IEEE Computer and Communications Societies (INFOCOM 2000), Vol. 2, Piscataway, NJ: IEEE Press, 2000, pp. 697-706.
H. J. Wang, A. D. Joseph, and R. H. Katz, "A signaling system using lightweight call sessions," in Proc. 19th Annual Joint Conf. on IEEE Computer and Communications Societies (INFOCOM 2000), Vol. 2, Piscataway, NJ: IEEE Press, 2000, pp. 697-706.
S. E. Czerwinski, B. Y. Zhao, T. D. Hodes, A. D. Joseph, and R. H. Katz, "An architecture for a secure service discovery service," in Proc. 5th Annual ACM/IEEE Intl. Conf. on Mobile Computing and Networking, New York, NY: ACM Press, 1999, pp. 24-35.
R. Ludwig, B. Rathonyi, A. Konrad, K. Oden, and A. D. Joseph, "Multi-layer tracing of TCP over a reliable wireless link," in Proc. 1999 ACM SIGMETRICS Intl. Conf. on Measurement and Modeling of Computer Systems (SIGMETRICS '99), New York, NY: The Association for Computing Machinery, Inc., 1999, pp. 144-154.
A. D. Joseph, B. R. Badrinath, and R. H. Katz, "A case for services over cascaded networks," in Proc. 1st ACM International Workshop on Wireless Mobile Multimedia (WOWMOM '98), New York, NY: The Association for Computing Machinery, Inc., 1998, pp. 2-10.
A. D. Joseph, A. F. deLespinasse, J. A. Tauber, D. K. Gifford, and M. F. Kaashoek, "Rover: A toolkit for mobile information access," in Proc. 15th ACM Symp. on Operating Systems Principles (SOSP-15), M. B. Jones, Ed., New York, NY: The Association for Computing Machinery, Inc., 1995, pp. 156-171.
E. Chen, A. Thomas, H. Lu, W. Mullen, J. Ichnowski, R. Arya, N. Krishnakumar, R. Teoh, W. Wang, A. D. Joseph, and J. D. Kubiatowicz, "SCL: A Secure Concurrency Layer For Paranoid Stateful Lambdas," EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2022-232, Oct. 2022.
I. Stoica, M. Franklin, M. Jordan, A. Fox, A. D. Joseph, M. Mahoney, R. H. Katz, D. A. Patterson, and S. Shenker, "The Berkeley Data Analysis System (BDAS): An open source platform for big data analytics," University of California, Berkeley Berkeley United States, 2017.
I. Stoica, D. Song, R. A. Popa, D. A. Patterson, M. W. Mahoney, R. H. Katz, A. D. Joseph, M. Jordan, J. M. Hellerstein, J. Gonzalez, K. Goldberg, A. Ghodsi, D. E. Culler, and P. Abbeel, "A Berkeley View of Systems Challenges for AI," EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2017-159, Oct. 2017.
D. Haussler, D. A. Patterson, M. Diekhans, A. Fox, M. Jordan, A. D. Joseph, S. Ma, B. Paten, S. Shenker, T. Sittler, and I. Stoica, "A Million Cancer Genome Warehouse," EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2012-211, Nov. 2012.
B. Hindman, A. Konwinski, M. Zaharia, A. Ghodsi, A. D. Joseph, S. Shenker, and I. Stoica, "Nexus: A Common Substrate for Cluster Computing," EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2009-158, Nov. 2009.
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "Above the Clouds: A Berkeley View of Cloud Computing," EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2009-28, Feb. 2009.
M. Barreno, B. A. Nelson, A. D. Joseph, and D. Tygar, "The Security of Machine Learning," EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2008-43, April 2008.
L. Huang, X. Nguyen, M. Garofalakis, M. Jordan, A. D. Joseph, and N. Taft, "In-Network PCA and Anomaly Detection," EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2007-10, Jan. 2007.
L. Huang, X. Nguyen, M. Garofalakis, M. Jordan, A. D. Joseph, and N. Taft, "Distributed PCA and Network Anomaly Detection," EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2006-99, July 2006.
A. Konrad and A. D. Joseph, "Choosing an Accurate Network Path Model," EECS Department, University of California, Berkeley, Tech. Rep. UCB/CSD-03-1236, May 2003.
W. Weihl, E. Brewer, A. Colbrook, C. Dellarocas, W. Hsieh, A. D. Joseph, C. Waldspurger, and P. Wang, "Prelude: A System for Portable Parallel Software," Massachusetts Institute for Technology, Laboratory for Computer Science, Tech. Rep. MIT-LCS-TR-519, Oct. 1991.
Ph.D. Theses
A. D. Joseph, "Mobile Computing with the Rover Toolkit," Massachusetts Institute of Technology, Department of EECS, Laboratory for Computer Science, Jan. 1998.
A. Morrow, "Distributed Visualization for Genomic Analysis," A. D. Joseph and N. Yosef, Eds., EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2017-82, May 2017.