default search action
Anthony D. Joseph
Person information
- affiliation: University of California at Berkeley, Computer Science Division
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [i14]Sarah E. Chasins, Alvin Cheung, Natacha Crooks, Ali Ghodsi, Ken Goldberg, Joseph E. Gonzalez, Joseph M. Hellerstein, Michael I. Jordan, Anthony D. Joseph, Michael W. Mahoney, Aditya G. Parameswaran, David A. Patterson, Raluca Ada Popa, Koushik Sen, Scott Shenker, Dawn Song, Ion Stoica:
The Sky Above The Clouds. CoRR abs/2205.07147 (2022) - [i13]Kaiyuan Chen, Alexander Thomas, Hanming Lu, William Mullen, Jeffrey Ichnowski, Rahul Arya, Nivedha Krishnakumar, Ryan Teoh, Willis Wang, Anthony D. Joseph, John Kubiatowicz:
SCL: A Secure Concurrency Layer For Paranoid Stateful Lambdas. CoRR abs/2210.11703 (2022) - 2021
- [j30]Doris Xin, Devin Petersohn, Dixin Tang, Yifan Wu, Joseph E. Gonzalez, Joseph M. Hellerstein, Anthony D. Joseph, Aditya G. Parameswaran:
Enhancing the Interactivity of Dataframe Queries by Leveraging Think Time. IEEE Data Eng. Bull. 44(1): 66-78 (2021) - [j29]Devin Petersohn, Dixin Tang, Rehan Sohail Durrani, Areg Melik-Adamyan, Joseph Gonzalez, Anthony D. Joseph, Aditya G. Parameswaran:
Flexible Rule-Based Decomposition and Metadata Independence in Modin: A Parallel Dataframe System. Proc. VLDB Endow. 15(3): 739-751 (2021) - [i12]Doris Xin, Devin Petersohn, Dixin Tang, Yifan Wu, Joseph E. Gonzalez, Joseph M. Hellerstein, Anthony D. Joseph, Aditya G. Parameswaran:
Enhancing the Interactivity of Dataframe Queries by Leveraging Think Time. CoRR abs/2103.02145 (2021) - 2020
- [j28]Devin Petersohn, William W. Ma, Doris Jung Lin Lee, Stephen Macke, Doris Xin, Xiangxi Mo, Joseph Gonzalez, Joseph M. Hellerstein, Anthony D. Joseph, Aditya G. Parameswaran:
Towards Scalable Dataframe Systems. Proc. VLDB Endow. 13(11): 2033-2046 (2020) - [i11]Devin Petersohn, William W. Ma, Doris Jung Lin Lee, Stephen Macke, Doris Xin, Xiangxi Mo, Joseph E. Gonzalez, Joseph M. Hellerstein, Anthony D. Joseph, Aditya G. Parameswaran:
Towards Scalable Dataframe Systems. CoRR abs/2001.00888 (2020)
2010 – 2019
- 2019
- [c57]Lisa Wu, David Bruns-Smith, Frank A. Nothaft, Qijing Huang, Sagar Karandikar, Johnny Le, Andrew Lin, Howard Mao, Brendan Sweeney, Krste Asanovic, David A. Patterson, Anthony D. Joseph:
FPGA Accelerated INDEL Realignment in the Cloud. HPCA 2019: 277-290 - 2018
- [i10]J. Weston Hughes, Taylor Sittler, Anthony D. Joseph, Jeffrey E. Olgin, Joseph E. Gonzalez, Geoffrey H. Tison:
Using Multitask Learning to Improve 12-Lead Electrocardiogram Classification. CoRR abs/1812.00497 (2018) - 2017
- [i9]Ion Stoica, Dawn Song, Raluca Ada Popa, David A. Patterson, Michael W. Mahoney, Randy H. Katz, Anthony D. Joseph, Michael I. Jordan, Joseph M. Hellerstein, Joseph E. Gonzalez, Ken Goldberg, Ali Ghodsi, David E. Culler, Pieter Abbeel:
A Berkeley View of Systems Challenges for AI. CoRR abs/1712.05855 (2017) - 2016
- [c56]Brad Miller, Alex Kantchelian, Michael Carl Tschantz, Sadia Afroz, Rekha Bachwani, Riyaz Faizullabhoy, Ling Huang, Vaishaal Shankar, Tony Wu, George Yiu, Anthony D. Joseph, J. D. Tygar:
Reviewer Integration and Performance Measurement for Malware Detection. DIMVA 2016: 122-141 - [c55]Alex Kantchelian, J. D. Tygar, Anthony D. Joseph:
Evasion and Hardening of Tree Ensemble Classifiers. ICML 2016: 2387-2396 - 2015
- [c54]Alex Kantchelian, Michael Carl Tschantz, Sadia Afroz, Brad Miller, Vaishaal Shankar, Rekha Bachwani, Anthony D. Joseph, J. Doug Tygar:
Better Malware Ground Truth: Techniques for Weighting Anti-Virus Vendor Labels. AISec@CCS 2015: 45-56 - [c53]Frank Austin Nothaft, Matt Massie, Timothy Danford, Zhao Zhang, Uri Laserson, Carl Yeksigian, Jey Kottalam, Arun Ahuja, Jeff Hammerbacher, Michael D. Linderman, Michael J. Franklin, Anthony D. Joseph, David A. Patterson:
Rethinking Data-Intensive Science Using Scalable Analytics Systems. SIGMOD Conference 2015: 631-646 - [i8]Alex Kantchelian, J. D. Tygar, Anthony D. Joseph:
Evasion and Hardening of Tree Ensemble Classifiers. CoRR abs/1509.07892 (2015) - [i7]Brad Miller, Alex Kantchelian, Michael Carl Tschantz, Sadia Afroz, Rekha Bachwani, Riyaz Faizullabhoy, Ling Huang, Vaishaal Shankar, Tony Wu, George Yiu, Anthony D. Joseph, J. D. Tygar:
Back to the Future: Malware Detection with Temporally Consistent Labels. CoRR abs/1510.07338 (2015) - 2014
- [c52]Brad Miller, Alex Kantchelian, Sadia Afroz, Rekha Bachwani, Edwin Dauber, Ling Huang, Michael Carl Tschantz, Anthony D. Joseph, J. Doug Tygar:
Adversarial Active Learning. AISec@CCS 2014: 3-14 - [c51]Alex Kantchelian, Michael Carl Tschantz, Ling Huang, Peter L. Bartlett, Anthony D. Joseph, J. Doug Tygar:
Large-Margin Convex Polytope Machine. NIPS 2014: 3248-3256 - [c50]Brad Miller, Ling Huang, Anthony D. Joseph, J. D. Tygar:
I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis. Privacy Enhancing Technologies 2014: 143-163 - [i6]Brad Miller, Ling Huang, Anthony D. Joseph, J. Doug Tygar:
I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis. CoRR abs/1403.0297 (2014) - 2013
- [j27]Anthony D. Joseph, Pavel Laskov, Fabio Roli, J. Doug Tygar, Blaine Nelson:
Machine Learning Methods for Computer Security (Dagstuhl Perspectives Workshop 12371). Dagstuhl Manifestos 3(1): 1-30 (2013) - [c49]Alex Kantchelian, Sadia Afroz, Ling Huang, Aylin Caliskan Islam, Brad Miller, Michael Carl Tschantz, Rachel Greenstadt, Anthony D. Joseph, J. D. Tygar:
Approaches to adversarial drift. AISec 2013: 99-110 - 2012
- [j26]Blaine Nelson, Benjamin I. P. Rubinstein, Ling Huang, Anthony D. Joseph, Steven J. Lee, Satish Rao, J. D. Tygar:
Query Strategies for Evading Convex-Inducing Classifiers. J. Mach. Learn. Res. 13: 1293-1332 (2012) - [j25]Lo-Yao Yeh, Yu-Lun Huang, Anthony D. Joseph, Shiuhpyng Winston Shieh, Woei-Jiunn Tsaur:
A Batch-Authenticated and Key Agreement Framework for P2P-Based Online Social Networks. IEEE Trans. Veh. Technol. 61(4): 1907-1924 (2012) - [j24]Yanpei Chen, Rean Griffith, David Zats, Anthony D. Joseph, Randy H. Katz:
Understanding TCP Incast and Its Implications for Big Data Workloads. login Usenix Mag. 37(3) (2012) - [c48]Alex Kantchelian, Justin Ma, Ling Huang, Sadia Afroz, Anthony D. Joseph, J. D. Tygar:
Robust detection of comment spam using entropy rate. AISec 2012: 59-70 - [c47]Martin Maas, Philip Reames, Jeffrey Morlan, Krste Asanovic, Anthony D. Joseph, John Kubiatowicz:
GPUs as an opportunity for offloading garbage collection. ISMM 2012: 25-36 - [i5]Anthony D. Joseph, Pavel Laskov, Fabio Roli, J. Doug Tygar, Blaine Nelson:
Machine Learning Methods for Computer Security (Dagstuhl Perspectives Workshop 12371). Dagstuhl Reports 2(9): 109-130 (2012) - 2011
- [j23]Benjamin Hindman, Andy Konwinski, Matei Zaharia, Ali Ghodsi, Anthony D. Joseph, Randy H. Katz, Scott Shenker, Ion Stoica:
Mesos: Flexible Resource Sharing for the Cloud. login Usenix Mag. 36(4) (2011) - [c46]Ling Huang, Anthony D. Joseph, Blaine Nelson, Benjamin I. P. Rubinstein, J. D. Tygar:
Adversarial machine learning. AISec 2011: 43-58 - [c45]Matei Zaharia, Benjamin Hindman, Andy Konwinski, Ali Ghodsi, Anthony D. Joseph, Randy H. Katz, Scott Shenker, Ion Stoica:
The Datacenter Needs an Operating System. HotCloud 2011 - [c44]Bonnie Zhu, Anthony D. Joseph, Shankar Sastry:
A Taxonomy of Cyber Attacks on SCADA Systems. iThings/CPSCom 2011: 380-388 - [c43]Benjamin Hindman, Andy Konwinski, Matei Zaharia, Ali Ghodsi, Anthony D. Joseph, Randy H. Katz, Scott Shenker, Ion Stoica:
Mesos: A Platform for Fine-Grained Resource Sharing in the Data Center. NSDI 2011 - 2010
- [j22]Michael Armbrust, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy H. Katz, Andy Konwinski, Gunho Lee, David A. Patterson, Ariel Rabkin, Ion Stoica, Matei Zaharia:
A view of cloud computing. Commun. ACM 53(4): 50-58 (2010) - [j21]Marco Barreno, Blaine Nelson, Anthony D. Joseph, J. D. Tygar:
The security of machine learning. Mach. Learn. 81(2): 121-148 (2010) - [c42]Blaine Nelson, Benjamin I. P. Rubinstein, Ling Huang, Anthony D. Joseph, J. D. Tygar:
Classifier Evasion: Models and Open Problems. PSDML 2010: 92-98 - [c41]Blaine Nelson, Benjamin I. P. Rubinstein, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Steven J. Lee, Satish Rao, Anthony Tran, J. Doug Tygar:
Near-Optimal Evasion of Convex-Inducing Classifiers. AISTATS 2010: 549-556 - [i4]Blaine Nelson, Benjamin I. P. Rubinstein, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Steven J. Lee, Satish Rao, Anthony Tran, J. D. Tygar:
Near-Optimal Evasion of Convex-Inducing Classifiers. CoRR abs/1003.2751 (2010) - [i3]Blaine Nelson, Benjamin I. P. Rubinstein, Ling Huang, Anthony D. Joseph, Steven J. Lee, Satish Rao, J. D. Tygar:
Query Strategies for Evading Convex-Inducing Classifiers. CoRR abs/1007.0484 (2010)
2000 – 2009
- 2009
- [j20]Yu-Lun Huang, P. H. Lu, J. Doug Tygar, Anthony D. Joseph:
OSNP: Secure wireless authentication protocol using one-time key. Comput. Secur. 28(8): 803-815 (2009) - [j19]James A. Landay, Anthony D. Joseph, Franklin Reynolds:
Guest Editors' Introduction: Smarter Phones. IEEE Pervasive Comput. 8(2): 12-13 (2009) - [j18]Benjamin I. P. Rubinstein, Blaine Nelson, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Satish Rao, Nina Taft, J. D. Tygar:
Stealthy poisoning attacks on PCA-based anomaly detectors. SIGMETRICS Perform. Evaluation Rev. 37(2): 73-74 (2009) - [c40]Benjamin I. P. Rubinstein, Blaine Nelson, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Satish Rao, Nina Taft, J. D. Tygar:
ANTIDOTE: understanding and defending against poisoning of anomaly detectors. Internet Measurement Conference 2009: 1-14 - [c39]Yanpei Chen, Rean Griffith, Junda Liu, Randy H. Katz, Anthony D. Joseph:
Understanding TCP incast throughput collapse in datacenter networks. WREN 2009: 73-82 - 2008
- [c38]Marco Barreno, Peter L. Bartlett, Fuching Jack Chi, Anthony D. Joseph, Blaine Nelson, Benjamin I. P. Rubinstein, Udam Saini, J. Doug Tygar:
Open problems in the security of learning. AISec 2008: 19-26 - [c37]Blaine Nelson, Marco Barreno, Fuching Jack Chi, Anthony D. Joseph, Benjamin I. P. Rubinstein, Udam Saini, Charles Sutton, J. Doug Tygar, Kai Xia:
Exploiting Machine Learning to Subvert Your Spam Filter. LEET 2008 - [c36]Matei Zaharia, Andy Konwinski, Anthony D. Joseph, Randy H. Katz, Ion Stoica:
Improving MapReduce Performance in Heterogeneous Environments. OSDI 2008: 29-42 - [c35]XuanLong Nguyen, Ling Huang, Anthony D. Joseph:
Support Vector Machines, Data Reduction, and Approximate Kernel Matrices. ECML/PKDD (2) 2008: 137-153 - [c34]Benjamin I. P. Rubinstein, Blaine Nelson, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Nina Taft, J. Doug Tygar:
Evading Anomaly Detection through Variance Injection Attacks on PCA. RAID 2008: 394-395 - 2007
- [c33]Ling Huang, Minos N. Garofalakis, Anthony D. Joseph, Nina Taft:
Communication-Efficient Tracking of Distributed Cumulative Triggers. ICDCS 2007: 54 - [c32]Ling Huang, XuanLong Nguyen, Minos N. Garofalakis, Joseph M. Hellerstein, Michael I. Jordan, Anthony D. Joseph, Nina Taft:
Communication-Efficient Online Detection of Network-Wide Anomalies. INFOCOM 2007: 134-142 - [c31]Terry Benzel, Robert Braden, Dongho Kim, Anthony D. Joseph, B. Clifford Neuman, Ron Ostrenga, Stephen Schwab, Keith Sklower:
Design, Deployment, and Use of the DETER Testbed. DETER 2007 - [c30]Anthony D. Joseph:
Very Large Scale Cooperative Experiments in Emulab-Derived Systems. DETER 2007 - 2006
- [j17]Almudena Konrad, Ben Y. Zhao, Anthony D. Joseph:
Determining model accuracy of network traces. J. Comput. Syst. Sci. 72(7): 1156-1171 (2006) - [j16]Anthony D. Joseph, Almudena Díaz, Pedro Merino, F. Javier Rivas, Umakanth P. Kulkarni, J. V. Vadavi, G. S. Thyagaraju, S. M. Joshi, Anil R. Yardi:
Mobile and Ubiquitous Objects. IEEE Pervasive Comput. 5(3): 57-59 (2006) - [j15]Anthony D. Joseph, Alastair R. Beresford, Jean Bacon, David Naveen Cottingham, Jonathan J. Davies, Brian D. Jones, Haitao Guo, Wei Guan, Yong Lin, Houbing Song, Liviu Iftode, Simone Fuchs, Bernhard Lamprecht, Kyandoghere Kyamakya, Jorge González Fernández, Juan Carlos Yelmo García, Yod Samuel Martín García, Jorge de Gracia Santos, Milind Nimesh, Gang Pan, Zhaohui Wu, Qing Wu, Zhenyu Shan, Jie Sun, Jian Lu, Guoqing Yang, Muhammad Khurram Khan, Jiashu Zhang:
Intelligent Transportation Systems. IEEE Pervasive Comput. 5(4): 63-67 (2006) - [c29]Marco Barreno, Blaine Nelson, Russell Sears, Anthony D. Joseph, J. D. Tygar:
Can machine learning be secure? AsiaCCS 2006: 16-25 - [c28]Ling Huang, Minos N. Garofalakis, Joseph M. Hellerstein, Anthony D. Joseph, Nina Taft:
Toward sophisticated detection with distributed triggers. MineNet 2006: 311-316 - [c27]Ling Huang, XuanLong Nguyen, Minos N. Garofalakis, Michael I. Jordan, Anthony D. Joseph, Nina Taft:
In-Network PCA and Anomaly Detection. NIPS 2006: 617-624 - [c26]Terry Benzel, Robert Braden, Dongho Kim, Clifford Neuman, Anthony D. Joseph, Keith Sklower:
Experience with deter: A testbed for security research. TRIDENTCOM 2006 - [e2]Anthony D. Joseph, Ralf Steinmetz, Klaus Wehrle:
Peer-to-Peer-Systems and -Applications, 26.03. - 29.03.2006. Dagstuhl Seminar Proceedings 06131, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2006 [contents] - [i2]Anthony D. Joseph, Ralf Steinmetz, Ion Stoica, Klaus Wehrle:
06131 Executive Summary -- Peer-to-Peer-Systems and -Applications. Peer-to-Peer-Systems and -Applications 2006 - [i1]Anthony D. Joseph, Ralf Steinmetz, Ion Stoica, Klaus Wehrle:
06131 Abstracts Collection -- Peer-to -Peer -Systems and -Applications. Peer-to-Peer-Systems and -Applications 2006 - 2005
- [j14]Anthony D. Joseph:
Energy harvesting projects. IEEE Pervasive Comput. 4(1): 69-71 (2005) - [j13]Nitin H. Vaidya, Anthony D. Joseph:
Guest Editorial. Wirel. Networks 11(4): 361-361 (2005) - [c25]Steve Martin, Blaine Nelson, Anil Sewani, Karl Chen, Anthony D. Joseph:
Analyzing Behavioral Features for Email Classification. CEAS 2005 - [c24]Almudena Konrad, Ben Y. Zhao, Anthony D. Joseph:
Choosing an Accurate Network Model using Domain Analysis. ICPADS (2) 2005: 100-104 - 2004
- [j12]Ruzena Bajcsy, Terry Benzel, Matt Bishop, Robert Braden, Carla E. Brodley, Sonia Fahmy, Sally Floyd, Wes Hardaker, Anthony D. Joseph, George Kesidis, Karl N. Levitt, Robert Lindell, Peng Liu, David J. Miller, Russ Mundy, Clifford Neuman, Ron Ostrenga, Vern Paxson, Phillip A. Porras, Catherine Rosenberg, J. Doug Tygar, Shankar Sastry, Daniel F. Sterne, Shyhtsun Felix Wu:
Cyber defense technology networking and evaluation. Commun. ACM 47(3): 58-61 (2004) - [j11]Ben Y. Zhao, Ling Huang, Jeremy Stribling, Sean C. Rhea, Anthony D. Joseph, John Kubiatowicz:
Tapestry: a resilient global-scale overlay for service deployment. IEEE J. Sel. Areas Commun. 22(1): 41-53 (2004) - [c23]Ben Y. Zhao, Ling Huang, Anthony D. Joseph, John Kubiatowicz:
Rapid Mobility via Type Indirection. IPTPS 2004: 64-74 - [c22]Kevin D. Simler, Steven E. Czerwinski, Anthony D. Joseph:
Analysis of Wide Area User Mobility Patterns. WMCSA 2004: 30-40 - 2003
- [j10]Almudena Konrad, Ben Y. Zhao, Anthony D. Joseph, Reiner Ludwig:
A Markov-Based Channel Model Algorithm for Wireless Networks. Wirel. Networks 9(3): 189-199 (2003) - [c21]Ben Y. Zhao, Ling Huang, Jeremy Stribling, Anthony D. Joseph, John Kubiatowicz:
Exploiting Routing Redundancy via Structured Peer-to-Peer Overlays. ICNP 2003: 246-257 - [c20]Feng Zhou, Li Zhuang, Ben Y. Zhao, Ling Huang, Anthony D. Joseph, John Kubiatowicz:
Approximate Object Location and Spam Filtering on Peer-to-Peer Systems. Middleware 2003: 1-20 - [c19]Almudena Konrad, Anthony D. Joseph:
Choosing an accurate network path model. SIGMETRICS 2003: 314-315 - [e1]David B. Johnson, Anthony D. Joseph, Nitin H. Vaidya:
Proceedings of the Ninth Annual International Conference on Mobile Computing and Networking, MOBICOM 2003, 2003, San Diego, CA, USA, September 14-19, 2003. ACM 2003, ISBN 1-58113-753-2 [contents] - 2002
- [j9]Ben Y. Zhao, John Kubiatowicz, Anthony D. Joseph:
Tapestry: a fault-tolerant wide-area application infrastructure. Comput. Commun. Rev. 32(1): 81 (2002) - [j8]Steven J. Ross, Jason L. Hill, Michael Y. Chen, Anthony D. Joseph, David E. Culler, Eric A. Brewer:
A Composable Framework for Secure Multi-Modal Access to Internet Services from Post-PC Devices. Mob. Networks Appl. 7(5): 389-406 (2002) - [j7]Todd D. Hodes, Steven E. Czerwinski, Ben Y. Zhao, Anthony D. Joseph, Randy H. Katz:
An Architecture for Secure Wide-Area Service Discovery. Wirel. Networks 8(2-3): 213-230 (2002) - [j6]Reiner Ludwig, Almudena Konrad, Anthony D. Joseph, Randy H. Katz:
Optimizing the End-to-End Performance of Reliable Flows over Wireless Links. Wirel. Networks 8(2-3): 289-299 (2002) - [c18]Ben Y. Zhao, Yitao Duan, Ling Huang, Anthony D. Joseph, John Kubiatowicz:
Brocade: Landmark Routing on Overlay Networks. IPTPS 2002: 34-44 - [c17]Bhaskaran Raman, Sharad Agarwal, Yan Chen, Matthew Caesar, Weidong Cui, Per Johansson, Kevin Lai, Tal Lavian, Sridhar Machiraju, Zhuoqing Morley Mao, George Porter, Timothy Roscoe, Mukund Seshadri, Jimmy S. Shih, Keith Sklower, Lakshminarayanan Subramanian, Takashi Suzuki, Shelley Zhuang, Anthony D. Joseph, Randy H. Katz, Ion Stoica:
The SAHARA Model for Service Composition across Multiple Providers. Pervasive 2002: 1-14 - 2001
- [j5]Steven D. Gribble, Matt Welsh, J. Robert von Behren, Eric A. Brewer, David E. Culler, Nikita Borisov, Steven E. Czerwinski, Ramakrishna Gummadi, Jon R. Hill, Anthony D. Joseph, Randy H. Katz, Zhuoqing Morley Mao, Steven J. Ross, Ben Y. Zhao:
The Ninja architecture for robust Internet-scale systems and services. Comput. Networks 35(4): 473-497 (2001) - [c16]Jimmy S. Shih, Randy H. Katz, Anthony D. Joseph:
Pricing experiments for a computer-telephony-service usage allocation. GLOBECOM 2001: 2450-2454 - [c15]Almudena Konrad, Ben Y. Zhao, Anthony D. Joseph, Reiner Ludwig:
A Markov-based channel model algorithm for wireless networks. MSWiM 2001: 28-36 - [c14]Steven E. Czerwinski, Anthony D. Joseph:
Using Simple Remote Evaluation to Enable Efficient Application Protocols in Mobile Environments. NCA 2001: 162-173 - [c13]Shelley Zhuang, Ben Y. Zhao, Anthony D. Joseph, Randy H. Katz, John Kubiatowicz:
Bayeux: an architecture for scalable and fault-tolerant wide-area data dissemination. NOSSDAV 2001: 11-20 - [c12]Amoolya Singh, Almudena Konrad, Anthony D. Joseph:
Performance evaluation of UDP lite for cellular video. NOSSDAV 2001: 117-124 - 2000
- [j4]Kalyan Basu, Andrew T. Campbell, Anthony D. Joseph:
IP-based mobile telecommunications networks. IEEE Wirel. Commun. 7(4): 8-9 (2000) - [j3]Helen J. Wang, Bhaskaran Raman, Chen-Nee Chuah, Rahul Biswas, Ramakrishna Gummadi, Barbara Hohlt, Xia Hong, Emre Kiciman, Zhuoqing Morley Mao, Jimmy S. Shih, Lakshminarayanan Subramanian, Ben Y. Zhao, Anthony D. Joseph, Randy H. Katz:
ICEBERG: an Internet core network architecture for integrated communications. IEEE Wirel. Commun. 7(4): 10-19 (2000) - [c11]J. Robert von Behren, Steven E. Czerwinski, Anthony D. Joseph, Eric A. Brewer, John Kubiatowicz:
NinjaMail: The Design of a High-Performance Clustered, Distributed E-Mail System. ICPP Workshops 2000: 151-160 - [c10]Helen J. Wang, Anthony D. Joseph, Randy H. Katz:
A Signaling System Using Lightweight Call Sessions. INFOCOM 2000: 697-706 - [c9]Bhaskaran Raman, Randy H. Katz, Anthony D. Joseph:
Universal Inbox: providing extensible personal mobility and service mobility in an integrated communication network. WMCSA 2000: 95- - [c8]Steven J. Ross, Jason L. Hill, Michael Y. Chen, Anthony D. Joseph, David E. Culler, Eric A. Brewer:
A Composable Framework for Secure Multi-Modal Access to Internet Services from Post-PC Devices. WMCSA 2000: 171-182
1990 – 1999
- 1999
- [c7]Steven E. Czerwinski, Ben Y. Zhao, Todd D. Hodes, Anthony D. Joseph, Randy H. Katz:
An Architecture for a Secure Service Discovery Service. MobiCom 1999: 24-35 - [c6]Reiner Ludwig, Almudena Konrad, Anthony D. Joseph:
Optimizing the End-to-End Performance of Reliable Flows Over Wireless Links. MobiCom 1999: 113-119 - [c5]Reiner Ludwig, Bela Rathonyi, Almudena Konrad, Kimberly Oden, Anthony D. Joseph:
Multi-Layer Tracing of TCP over a Reliable Wireless Link. SIGMETRICS 1999: 144-154 - 1998
- [b1]Anthony D. Joseph:
Mobile computing with the Rover Toolkit. Massachusetts Institute of Technology, Cambridge, MA, USA, 1998 - [c4]Anthony D. Joseph, B. R. Badrinath, Randy H. Katz:
The Case for Services over Cascaded Networks. WOWMOM 1998: 2-10 - 1997
- [j2]Anthony D. Joseph, Joshua A. Tauber, M. Frans Kaashoek:
Mobile Computing with the Rover Toolkit. IEEE Trans. Computers 46(3): 337-352 (1997) - [j1]Anthony D. Joseph, M. Frans Kaashoek:
Building reliable mobile-aware applications using the Rover toolkit. Wirel. Networks 3(5): 405-419 (1997) - 1996
- [c3]Anthony D. Joseph, M. Frans Kaashoek:
Building Reliable Mobile-Aware Applications Using the Rover Toolkit. MobiCom 1996: 117-129 - 1995
- [c2]Anthony D. Joseph, Alan F. deLespinasse, Joshua A. Tauber, David K. Gifford, M. Frans Kaashoek:
Rover: A Toolkit for Mobile Information Access. SOSP 1995: 156-171 - 1992
- [c1]William E. Weihl, Eric A. Brewer, Adrian Colbrook, Chrysanthos Dellarocas, Wilson C. Hsieh, Anthony D. Joseph, Carl A. Waldspurger, Paul Wang:
PRELUDE: A System for Portable Parallel Software. PARLE 1992: 971-973
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-14 00:53 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint