Publications
2009
Hindman, B., Konwinski A., Zaharia M., Ghodsi A., Joseph A., Shenker S., et al.
(2009). Nexus: A Common Substrate for Cluster Computing.
Abstract
Ganapathi, A.
(2009). Predicting and Optimizing System Utilization and Performance via Statistical Machine Learning.
Computer Science. PhD,
2008
Nelson, B., Barreno M., Chi F. J., Joseph A. D., Rubinstein B. I. P., Saini U., et al.
(2008). Exploiting machine learning to subvert your spam filter.
1st Usenix Workshop on Large-Scale Exploits and Emergent Threats. Abstract
Bodik, P., Goldszmidt M., & Fox A.
(2008). HiLighter: Automatically Building Robust Signatures of Performance Behavior.
3rd Workshop on Tackling System Problems with Machine Learning Techniques (SysML'08). 1-6. Abstract
Rubinstein, B. I. P., Nelson B., Huang L., Joseph A. D., Lau S. -hon, Taft N., et al.
(2008). Evading Anomaly Detection through Variance Injection Attacks on PCA .
11th International Symposium on Recent Advances in Intrusion Detection (RAID'08). 394-395. Abstract
Xu, W., Huang L., Fox A., Patterson D., & Jordan M.
(2008). Mining Console Logs for Large-Scale System Problem Detection.
3rd Workshop on Tackling System Problems with Machine Learning Techniques (SysML'08). 1-6. Abstract
Barreno, M., Bartlett P. L., Chi F. J., Joseph A. D., Nelson B., Rubinstein B. I. P., et al.
(2008). Open Problems in the Security of Learning .
1st ACM Workshop on AlSec. 19-26. Abstract
Mackey, L.
(2008). Deflation Methods for Sparse PCA.
Neural Information Processing Systems (NIPS'08). 1-8. Abstract
Rabkin, A.
(2008). Personal knowledge questions for fallback authentication.
4th Symposium on Usable Privacy and Security. 13-23. Abstract