Follow
Vincent W. Freeh
Vincent W. Freeh
Verified email at ncsu.edu - Homepage
Title
Cited by
Cited by
Year
Jump-oriented programming: a new class of code-reuse attack
T Bletsch, X Jiang, VW Freeh, Z Liang
Proceedings of the 6th ACM symposium on information, computer and …, 2011
8632011
Taming information-stealing smartphone applications (on android)
Y Zhou, X Zhang, X Jiang, VW Freeh
Trust and Trustworthy Computing: 4th International Conference, TRUST 2011 …, 2011
6262011
Adagio: making DVS practical for complex HPC applications
B Rountree, DK Lownenthal, BR De Supinski, M Schulz, VW Freeh, ...
Proceedings of the 23rd international conference on Supercomputing, 460-469, 2009
4072009
THE OPEN SOURCE SOFTWARE DEVELOPMENTPHENOMENON: AN ANALYSIS BASED ONSOCIAL NETWORK THEORY
G Madey, V Freeh, R Tynan
4002002
Just-in-time dynamic voltage scaling: Exploiting inter-node slack to save energy in mpi programs
VW Freeh, N Kappiah, DK Lowenthal, TK Bletsch
Journal of Parallel and Distributed Computing 68 (9), 1175-1185, 2008
3702008
Using multiple energy gears in MPI programs on a power-scalable cluster
VW Freeh, DK Lowenthal
Proceedings of the tenth ACM SIGPLAN symposium on Principles and practice of …, 2005
2942005
Mapping irregular applications to DIVA, a PIM-based data-intensive architecture
M Hall, P Kogge, J Koller, P Diniz, J Chame, J Draper, J LaCoss, ...
Proceedings of the 1999 ACM/IEEE Conference on Supercomputing, 57-es, 1999
2811999
Adaptive, transparent frequency and voltage scaling of communication phases in mpi programs
MY Lim, VW Freeh, DK Lowenthal
Proceedings of the 2006 ACM/IEEE conference on Supercomputing, 107-es, 2006
2642006
On the expressiveness of return-into-libc attacks
M Tran, M Etheridge, T Bletsch, X Jiang, V Freeh, P Ning
Recent Advances in Intrusion Detection: 14th International Symposium, RAID …, 2011
2502011
Analyzing the energy-time trade-off in high-performance computing applications
VW Freeh, DK Lowenthal, F Pan, N Kappiah, R Springer, BL Rountree, ...
IEEE Transactions on Parallel and Distributed Systems 18 (6), 835-848, 2007
2452007
Mitigating code-reuse attacks with control-flow locking
T Bletsch, X Jiang, V Freeh
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
2342011
Bounding energy consumption in large-scale MPI programs
B Rountree, DK Lowenthal, S Funk, VW Freeh, BR De Supinski, M Schulz
Proceedings of the 2007 ACM/IEEE conference on Supercomputing, 1-9, 2007
2252007
Exploring the energy-time tradeoff in MPI programs on a power-scalable cluster
VW Freeh, F Pan, N Kappiah, DK Lowenthal, R Springer
19th IEEE International Parallel and Distributed Processing Symposium, 10 pp., 2005
1842005
Boosting data center performance through non-uniform power allocation
ME Femal, VW Freeh
Second International Conference on Autonomic Computing (ICAC'05), 250-261, 2005
1642005
Distributed Filaments: Efficient fine-grain parallelism on a cluster of workstations
VW Freeh, DK Lowenthal, GR Andrews
Proceedings of the 1st USENIX conference on Operating Systems Design and …, 1994
1371994
Minimizing execution time in MPI programs on an energy-constrained, power-scalable cluster
R Springer, DK Lowenthal, B Rountree, VW Freeh
Proceedings of the eleventh ACM SIGPLAN symposium on Principles and practice …, 2006
1352006
Parasitic computing
AL Barabasi, VW Freeh, H Jeong, JB Brockman
Nature 412 (6850), 894-897, 2001
1102001
Modeling the free/open source software community: A quantitative investigation
G Madey, V Freeh, R Tynan
Global Information Technologies: Concepts, Methodologies, Tools, and …, 2008
1072008
Arrow: Low-level augmented bayesian optimization for finding the best cloud vm
CJ Hsu, V Nair, VW Freeh, T Menzies
2018 IEEE 38th International Conference on Distributed Computing Systems …, 2018
1042018
Freeloader: Scavenging desktop storage resources for scientific data
SS Vazhkudai, X Ma, VW Freeh, JW Strickland, N Tammineedi, SL Scott
Supercomputing, 2005. Proceedings of the ACM/IEEE SC 2005 Conference, 56-56, 2005
962005
The system can't perform the operation now. Try again later.
Articles 1–20