Publications
2009
Hindman, B., Konwinski A., Zaharia M., Ghodsi A., Joseph A., Shenker S., et al.
(2009). Nexus: A Common Substrate for Cluster Computing.
Abstract
Ganapathi, A.
(2009). Predicting and Optimizing System Utilization and Performance via Statistical Machine Learning.
Computer Science. PhD,
2008
Bodik, P., Goldszmidt M., & Fox A.
(2008). HiLighter: Automatically Building Robust Signatures of Performance Behavior.
3rd Workshop on Tackling System Problems with Machine Learning Techniques (SysML'08). 1-6. Abstract
Rubinstein, B. I. P., Nelson B., Huang L., Joseph A. D., Lau S. -hon, Taft N., et al.
(2008). Evading Anomaly Detection through Variance Injection Attacks on PCA .
11th International Symposium on Recent Advances in Intrusion Detection (RAID'08). 394-395. Abstract
Xu, W., Huang L., Fox A., Patterson D., & Jordan M.
(2008). Mining Console Logs for Large-Scale System Problem Detection.
3rd Workshop on Tackling System Problems with Machine Learning Techniques (SysML'08). 1-6. Abstract
Barreno, M., Bartlett P. L., Chi F. J., Joseph A. D., Nelson B., Rubinstein B. I. P., et al.
(2008). Open Problems in the Security of Learning .
1st ACM Workshop on AlSec. 19-26. Abstract
Mackey, L.
(2008). Deflation Methods for Sparse PCA.
Neural Information Processing Systems (NIPS'08). 1-8. Abstract
Rabkin, A.
(2008). Personal knowledge questions for fallback authentication.
4th Symposium on Usable Privacy and Security. 13-23. Abstract
Cook, H., & Skadron K.
(2008). Predictive Design Space Exploration Using Genetically Programmed Response Surfaces.
45th Design Automation Conference (DAC 2008). 960-965.