Publications

2008

Boulon, J., Konwinski A., Qi R., Rabkin A., Yang E., & Yang M. (2008).  Chukwa, a large-scale monitoring system. In Cloud Computing and its Applications (CCA '08). 1-5. Abstract
Bodik, P., Goldszmidt M., & Fox A. (2008).  HiLighter: Automatically Building Robust Signatures of Performance Behavior. 3rd Workshop on Tackling System Problems with Machine Learning Techniques (SysML'08). 1-6. Abstract
Rubinstein, B. I. P., Nelson B., Huang L., Joseph A. D., Lau S. -hon, Taft N., et al. (2008).  Evading Anomaly Detection through Variance Injection Attacks on PCA . 11th International Symposium on Recent Advances in Intrusion Detection (RAID'08). 394-395. Abstract
Xu, W., Huang L., Fox A., Patterson D., & Jordan M. (2008).  Mining Console Logs for Large-Scale System Problem Detection. 3rd Workshop on Tackling System Problems with Machine Learning Techniques (SysML'08). 1-6. Abstract
Barreno, M., Nelson B., Joseph A. D., & Tygar D. (2008).  The security of machine learning. Machine Learning Journal (MLJ) Special Issue on Machine Learning in Adversarial Environments.