Jump-oriented programming: a new class of code-reuse attack T Bletsch, X Jiang, VW Freeh, Z Liang Proceedings of the 6th ACM symposium on information, computer and …, 2011 | 866 | 2011 |
Taming information-stealing smartphone applications (on android) Y Zhou, X Zhang, X Jiang, VW Freeh Trust and Trustworthy Computing: 4th International Conference, TRUST 2011 …, 2011 | 625 | 2011 |
Adagio: making DVS practical for complex HPC applications B Rountree, DK Lownenthal, BR De Supinski, M Schulz, VW Freeh, ... Proceedings of the 23rd international conference on Supercomputing, 460-469, 2009 | 407 | 2009 |
THE OPEN SOURCE SOFTWARE DEVELOPMENTPHENOMENON: AN ANALYSIS BASED ONSOCIAL NETWORK THEORY G Madey, V Freeh, R Tynan | 401 | 2002 |
Just-in-time dynamic voltage scaling: Exploiting inter-node slack to save energy in mpi programs VW Freeh, N Kappiah, DK Lowenthal, TK Bletsch Journal of Parallel and Distributed Computing 68 (9), 1175-1185, 2008 | 370 | 2008 |
Using multiple energy gears in MPI programs on a power-scalable cluster VW Freeh, DK Lowenthal Proceedings of the tenth ACM SIGPLAN symposium on Principles and practice of …, 2005 | 294 | 2005 |
Mapping irregular applications to DIVA, a PIM-based data-intensive architecture M Hall, P Kogge, J Koller, P Diniz, J Chame, J Draper, J LaCoss, ... Proceedings of the 1999 ACM/IEEE Conference on Supercomputing, 57-es, 1999 | 281 | 1999 |
Adaptive, transparent frequency and voltage scaling of communication phases in mpi programs MY Lim, VW Freeh, DK Lowenthal Proceedings of the 2006 ACM/IEEE conference on Supercomputing, 107-es, 2006 | 264 | 2006 |
On the expressiveness of return-into-libc attacks M Tran, M Etheridge, T Bletsch, X Jiang, V Freeh, P Ning Recent Advances in Intrusion Detection: 14th International Symposium, RAID …, 2011 | 250 | 2011 |
Analyzing the energy-time trade-off in high-performance computing applications VW Freeh, DK Lowenthal, F Pan, N Kappiah, R Springer, BL Rountree, ... IEEE Transactions on Parallel and Distributed Systems 18 (6), 835-848, 2007 | 245 | 2007 |
Mitigating code-reuse attacks with control-flow locking T Bletsch, X Jiang, V Freeh Proceedings of the 27th Annual Computer Security Applications Conference …, 2011 | 234 | 2011 |
Bounding energy consumption in large-scale MPI programs B Rountree, DK Lowenthal, S Funk, VW Freeh, BR De Supinski, M Schulz Proceedings of the 2007 ACM/IEEE conference on Supercomputing, 1-9, 2007 | 225 | 2007 |
Exploring the energy-time tradeoff in MPI programs on a power-scalable cluster VW Freeh, F Pan, N Kappiah, DK Lowenthal, R Springer 19th IEEE International Parallel and Distributed Processing Symposium, 10 pp., 2005 | 184 | 2005 |
Boosting data center performance through non-uniform power allocation ME Femal, VW Freeh Second International Conference on Autonomic Computing (ICAC'05), 250-261, 2005 | 164 | 2005 |
Distributed Filaments: Efficient fine-grain parallelism on a cluster of workstations VW Freeh, DK Lowenthal, GR Andrews Proceedings of the 1st USENIX conference on Operating Systems Design and …, 1994 | 138 | 1994 |
Minimizing execution time in MPI programs on an energy-constrained, power-scalable cluster R Springer, DK Lowenthal, B Rountree, VW Freeh Proceedings of the eleventh ACM SIGPLAN symposium on Principles and practice …, 2006 | 135 | 2006 |
Parasitic computing AL Barabasi, VW Freeh, H Jeong, JB Brockman Nature 412 (6850), 894-897, 2001 | 110 | 2001 |
Modeling the free/open source software community: A quantitative investigation G Madey, V Freeh, R Tynan Global Information Technologies: Concepts, Methodologies, Tools, and …, 2008 | 107 | 2008 |
Arrow: Low-level augmented bayesian optimization for finding the best cloud vm CJ Hsu, V Nair, VW Freeh, T Menzies 2018 IEEE 38th International Conference on Distributed Computing Systems …, 2018 | 104 | 2018 |
Freeloader: Scavenging desktop storage resources for scientific data SS Vazhkudai, X Ma, VW Freeh, JW Strickland, N Tammineedi, SL Scott Supercomputing, 2005. Proceedings of the ACM/IEEE SC 2005 Conference, 56-56, 2005 | 96 | 2005 |