A view of cloud computing M Armbrust, A Fox, R Griffith, AD Joseph, R Katz, A Konwinski, G Lee, ... Communications of the ACM 53 (4), 50-58, 2010 | 14102 | 2010 |
Above the clouds: A berkeley view of cloud computing M Armbrust, A Fox, R Griffith, AD Joseph, RH Katz, A Konwinski, G Lee, ... Technical Report UCB/EECS-2009-28, EECS Department, University of California …, 2009 | 8915 | 2009 |
Tapestry: An infrastructure for fault-tolerant wide-area location and routing BY Zhao, J Kubiatowicz, AD Joseph Computer Science Division, University of California, 2001 | 3879* | 2001 |
Tapestry: A resilient global-scale overlay for service deployment BY Zhao, L Huang, J Stribling, SC Rhea, AD Joseph, JD Kubiatowicz IEEE Journal on selected areas in communications 22 (1), 41-53, 2004 | 2842 | 2004 |
Mesos: A platform for {Fine-Grained} resource sharing in the data center B Hindman, A Konwinski, M Zaharia, A Ghodsi, AD Joseph, R Katz, ... 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI 11), 2011 | 2570 | 2011 |
Improving MapReduce performance in heterogeneous environments. M Zaharia, A Konwinski, AD Joseph, RH Katz, I Stoica Osdi 8 (4), 7, 2008 | 2448 | 2008 |
Adversarial machine learning L Huang, AD Joseph, B Nelson, BIP Rubinstein, JD Tygar Proceedings of the 4th ACM workshop on Security and artificial intelligence …, 2011 | 1498 | 2011 |
Bayeux: An architecture for scalable and fault-tolerant wide-area data dissemination SQ Zhuang, BY Zhao, AD Joseph, RH Katz, JD Kubiatowicz Proceedings of the 11th international workshop on Network and operating …, 2001 | 1211 | 2001 |
Can machine learning be secure? M Barreno, B Nelson, R Sears, AD Joseph, JD Tygar Proceedings of the 2006 ACM Symposium on Information, computer and …, 2006 | 1180 | 2006 |
Above the clouds: A berkeley view of cloud computing A Fox, R Griffith, A Joseph, R Katz, A Konwinski, G Lee, D Patterson, ... Dept. Electrical Eng. and Comput. Sciences, University of California …, 2009 | 1082* | 2009 |
The security of machine learning M Barreno, B Nelson, AD Joseph, JD Tygar Machine Learning 81, 121-148, 2010 | 1075 | 2010 |
Toil enables reproducible, open source, big biomedical data analyses J Vivian, AA Rao, FA Nothaft, C Ketchum, J Armstrong, A Novak, J Pfeil, ... Nature biotechnology 35 (4), 314-316, 2017 | 1019 | 2017 |
An architecture for a secure service discovery service SE Czerwinski, BY Zhao, TD Hodes, AD Joseph, RH Katz Proceedings of the 5th annual ACM/IEEE international conference on Mobile …, 1999 | 969 | 1999 |
A taxonomy of cyber attacks on SCADA systems B Zhu, A Joseph, S Sastry 2011 International conference on internet of things and 4th international …, 2011 | 696 | 2011 |
The Ninja architecture for robust Internet-scale systems and services SD Gribble, M Welsh, R Von Behren, EA Brewer, D Culler, N Borisov, ... Computer Networks 35 (4), 473-497, 2001 | 529 | 2001 |
Understanding TCP incast throughput collapse in datacenter networks Y Chen, R Griffith, J Liu, RH Katz, AD Joseph Proceedings of the 1st ACM workshop on Research on enterprise networking, 73-82, 2009 | 503 | 2009 |
Antidote: understanding and defending against poisoning of anomaly detectors BIP Rubinstein, B Nelson, L Huang, AD Joseph, S Lau, S Rao, N Taft, ... Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement, 1-14, 2009 | 470 | 2009 |
Exploiting machine learning to subvert your spam filter. B Nelson, M Barreno, FJ Chi, AD Joseph, BIP Rubinstein, U Saini, ... LEET 8 (1-9), 16-17, 2008 | 470 | 2008 |
Rover: A toolkit for mobile information access AD Joseph, AF de Lespinasse, JA Tauber, DK Gifford, MF Kaashoek Proceedings of the fifteenth ACM symposium on Operating systems principles …, 1995 | 468 | 1995 |
Above the clouds: a view of cloud computing R Gupta | 424* | 2012 |