Fast and Interactive Analytics over Hadoop Data with Spark.
login Usenix Mag., 2012
Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing.
Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation, 2012
An intermittent energy internet architecture.
Proceedings of the 3rd International Conference on Energy-Efficient Computing and Networking, 2012
Robust detection of comment spam using entropy rate.
Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, 2012
Learning to detect malicious URLs.
ACM Trans. Intell. Syst. Technol., 2011
Privacy-preserving network forensics.
Commun. ACM, 2011
Design and Evaluation of a Real-Time URL Spam Filtering Service.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
Managing data transfers in computer clusters with orchestra.
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011
The energy and emergy of the internet.
Proceedings of the Tenth ACM Workshop on Hot Topics in Networks (HotNets-X), 2011
Scaling the mobile millennium system in the cloud.
Proceedings of the ACM Symposium on Cloud Computing in conjunction with SOSP 2011, 2011
Exploiting Feature Covariance in High-Dimensional Online Learning.
Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, 2010
Neon: system support for derived data management.
Proceedings of the 6th International Conference on Virtual Execution Environments, 2010
Beyond blacklists: learning to detect malicious web sites from suspicious URLs.
Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28, 2009
Identifying suspicious URLs: an application of large-scale online learning.
Proceedings of the 26th Annual International Conference on Machine Learning, 2009
Wireless Network Security and Interworking.
Proc. IEEE, 2006
Unexpected means of protocol inference.
Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, 2006
Finding diversity in remote code injection exploits.
Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, 2006
Proceedings of the 2005 ACM Workshop on Rapid Malcode, 2005
Scalability, fidelity, and containment in the potemkin virtual honeyfarm.
Proceedings of the 20th ACM Symposium on Operating Systems Principles 2005, 2005