Follow
Vincent W. Freeh
Vincent W. Freeh
Verified email at ncsu.edu - Homepage
Title
Cited by
Cited by
Year
Jump-oriented programming: a new class of code-reuse attack
T Bletsch, X Jiang, VW Freeh, Z Liang
Proceedings of the 6th ACM symposium on information, computer and …, 2011
8772011
Taming information-stealing smartphone applications (on android)
Y Zhou, X Zhang, X Jiang, VW Freeh
Trust and Trustworthy Computing: 4th International Conference, TRUST 2011 …, 2011
6242011
THE OPEN SOURCE SOFTWARE DEVELOPMENTPHENOMENON: AN ANALYSIS BASED ONSOCIAL NETWORK THEORY
G Madey, V Freeh, R Tynan
4062002
Adagio: making DVS practical for complex HPC applications
B Rountree, DK Lownenthal, BR De Supinski, M Schulz, VW Freeh, ...
Proceedings of the 23rd international conference on Supercomputing, 460-469, 2009
4052009
Just-in-time dynamic voltage scaling: Exploiting inter-node slack to save energy in mpi programs
VW Freeh, N Kappiah, DK Lowenthal, TK Bletsch
Journal of Parallel and Distributed Computing 68 (9), 1175-1185, 2008
3702008
Using multiple energy gears in MPI programs on a power-scalable cluster
VW Freeh, DK Lowenthal
Proceedings of the tenth ACM SIGPLAN symposium on Principles and practice of …, 2005
2912005
Mapping irregular applications to DIVA, a PIM-based data-intensive architecture
M Hall, P Kogge, J Koller, P Diniz, J Chame, J Draper, J LaCoss, ...
Proceedings of the 1999 ACM/IEEE Conference on Supercomputing, 57-es, 1999
2801999
Adaptive, transparent frequency and voltage scaling of communication phases in mpi programs
MY Lim, VW Freeh, DK Lowenthal
Proceedings of the 2006 ACM/IEEE conference on Supercomputing, 107-es, 2006
2632006
On the expressiveness of return-into-libc attacks
M Tran, M Etheridge, T Bletsch, X Jiang, V Freeh, P Ning
Recent Advances in Intrusion Detection: 14th International Symposium, RAID …, 2011
2542011
Analyzing the energy-time trade-off in high-performance computing applications
VW Freeh, DK Lowenthal, F Pan, N Kappiah, R Springer, BL Rountree, ...
IEEE Transactions on Parallel and Distributed Systems 18 (6), 835-848, 2007
2452007
Mitigating code-reuse attacks with control-flow locking
T Bletsch, X Jiang, V Freeh
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
2302011
Bounding energy consumption in large-scale MPI programs
B Rountree, DK Lowenthal, S Funk, VW Freeh, BR De Supinski, M Schulz
Proceedings of the 2007 ACM/IEEE conference on Supercomputing, 1-9, 2007
2252007
Exploring the energy-time tradeoff in MPI programs on a power-scalable cluster
VW Freeh, F Pan, N Kappiah, DK Lowenthal, R Springer
19th IEEE International Parallel and Distributed Processing Symposium, 10 pp., 2005
1842005
Boosting data center performance through non-uniform power allocation
ME Femal, VW Freeh
Second International Conference on Autonomic Computing (ICAC'05), 250-261, 2005
1642005
Minimizing execution time in MPI programs on an energy-constrained, power-scalable cluster
R Springer, DK Lowenthal, B Rountree, VW Freeh
Proceedings of the eleventh ACM SIGPLAN symposium on Principles and practice …, 2006
1342006
Distributed Filaments: Efficient fine-grain parallelism on a cluster of workstations
VW Freeh, DK Lowenthal, GR Andrews
Proceedings of the 1st USENIX conference on Operating Systems Design and …, 1994
1341994
Parasitic computing
AL Barabasi, VW Freeh, H Jeong, JB Brockman
Nature 412 (6850), 894-897, 2001
1102001
Arrow: Low-level augmented bayesian optimization for finding the best cloud vm
CJ Hsu, V Nair, VW Freeh, T Menzies
2018 IEEE 38th International Conference on Distributed Computing Systems …, 2018
1062018
Modeling the free/open source software community: A quantitative investigation
G Madey, V Freeh, R Tynan
Global Information Technologies: Concepts, Methodologies, Tools, and …, 2008
1062008
Freeloader: Scavenging desktop storage resources for scientific data
SS Vazhkudai, X Ma, VW Freeh, JW Strickland, N Tammineedi, SL Scott
Supercomputing, 2005. Proceedings of the ACM/IEEE SC 2005 Conference, 56-56, 2005
952005
The system can't perform the operation now. Try again later.
Articles 1–20