Publications
2009
Hindman, B., Konwinski A., Zaharia M., Ghodsi A., Joseph A., Shenker S., et al.
(2009). Nexus: A Common Substrate for Cluster Computing.
Abstract
Ganapathi, A.
(2009). Predicting and Optimizing System Utilization and Performance via Statistical Machine Learning.
Computer Science. PhD,
2008
Boulon, J., Konwinski A., Qi R., Rabkin A., Yang E., & Yang M.
(2008). Chukwa, a large-scale monitoring system.
In Cloud Computing and its Applications (CCA '08). 1-5. Abstract
Joseph, D., Tavakoli A., & Stoica I.
(2008). A Policy- aware Switching Layer for Data Centers.
SIGCOMM 2008. 51-62. Abstract
Lacoste-Julien, S., Sha F., & Jordan M. I.
(2008). Discriminative learning for dimensionality reduction and classification.
Neural Information Processing Systems (NIPS'08). Abstract
Nelson, B., Barreno M., Chi F. J., Joseph A. D., Rubinstein B. I. P., Saini U., et al.
(2008). Exploiting machine learning to subvert your spam filter.
1st Usenix Workshop on Large-Scale Exploits and Emergent Threats. Abstract
Bodik, P., Goldszmidt M., & Fox A.
(2008). HiLighter: Automatically Building Robust Signatures of Performance Behavior.
3rd Workshop on Tackling System Problems with Machine Learning Techniques (SysML'08). 1-6. Abstract
Rubinstein, B. I. P., Nelson B., Huang L., Joseph A. D., Lau S. -hon, Taft N., et al.
(2008). Evading Anomaly Detection through Variance Injection Attacks on PCA .
11th International Symposium on Recent Advances in Intrusion Detection (RAID'08). 394-395. Abstract
Xu, W., Huang L., Fox A., Patterson D., & Jordan M.
(2008). Mining Console Logs for Large-Scale System Problem Detection.
3rd Workshop on Tackling System Problems with Machine Learning Techniques (SysML'08). 1-6. Abstract