Follow
Feiyi Wang
Feiyi Wang
Group Leader, Analytics and AI Methods at Scale, Oak Ridge National Laboratory
Verified email at ornl.gov - Homepage
Title
Cited by
Cited by
Year
Coordinated garbage collection for raid array of solid state disks
DA Dillow, Y Kim, HS Oral, GM Shipman, F Wang
US Patent 8,713,268, 2014
2532014
Coordinated garbage collection for raid array of solid state disks
DA Dillow, Y Kim, HS Oral, GM Shipman, F Wang
US Patent 8,713,268, 2014
2532014
The Earth System Grid Federation: An open infrastructure for access to distributed geospatial data
L Cinquini, D Crichton, C Mattmann, J Harney, G Shipman, F Wang, ...
Future Generation Computer Systems 36, 400-417, 2014
2072014
The Earth System Grid Federation: An open infrastructure for access to distributed geospatial data
S Fiore, Z Pobre, R Schweitzer, GM Bell, G Shipman, R Ananthakrishnan, ...
Proceedings of the 2012 IEEE 8th International Conference on E-Science (e …, 2012
207*2012
The Earth System Grid Federation: An open infrastructure for access to distributed geospatial data
M Morgan, L Cinquini, C Mattmann, J Harney, G Shipman, F Wang, ...
2012 IEEE 8th International Conference on E-Science (e-Science), 1-10, 2012
207*2012
SITAR: A scalable intrusion-tolerant architecture for distributed services
F Wang, F Gong, C Sargor, K Goseva-Popstojanova, K Trivedi, F Jou
Workshop on Information Assurance and Security 1, 1100, 2003
2032003
SITAR: A scalable intrusion-tolerant architecture for distributed services
F Wang, F Gong, C Sargor, K Goseva-Popstojanova, K Trivedi, F Jou
Workshop on Information Assurance and Security 1, 1100, 2003
2032003
Optimal itinerary analysis for mobile agents in ad hoc wireless sensor networks
H Qi, F Wang
Proceedings of the IEEE 18 (5), 147-153, 2001
1852001
The design, deployment, and evaluation of the CORAL pre-exascale systems
SS Vazhkudai, BR de Supinski, AS Bland, A Geist, J Sexton, J Kahle, ...
SC18: International Conference for High Performance Computing, Networking …, 2018
1832018
Characterizing intrusion tolerant systems using a state transition model
K Goseva-Popstojanova, F Wang, R Wang, F Gong, K Vaidyanathan, ...
DARPA Information Survivability Conference & Exposition II, 2001. DISCEX'01 …, 2001
1582001
Understanding Lustre Internals
F Wang, HS Oral, GM Shipman, O Drokin, D Wang, H Huang
Oak Ridge National Lab.(ORNL), Oak Ridge, TN (United States); Center for …, 2009
1262009
A semi-preemptive garbage collector for solid state drives
J Lee, Y Kim, GM Shipman, S Oral, F Wang, J Kim
(IEEE ISPASS) IEEE International Symposium on Performance Analysis of …, 2011
1082011
Design and implementation of a scalable intrusion detection system for the protection of network infrastructure
YF Jou, F Gong, C Sargor, X Wu, SF Wu, HC Chang, F Wang
Proceedings DARPA Information Survivability Conference and Exposition …, 2000
1072000
Intrusion tolerant server system
F Gong, C Sargor, F Wang
US Patent 7,076,801, 2006
1042006
Intrusion tolerant server system
F Gong, C Sargor, F Wang
US Patent 7,076,801, 2006
1042006
Intrusion tolerant communication networks and associated methods
K Goseva-Popstojanova, F Wang, R Wang, F Gong, K Vaidyanathan, ...
US Patent 7,350,234, 2008
1012008
Intrusion tolerant communication networks and associated methods
K Goseva-Popstojanova, F Wang, R Wang, F Gong, K Vaidyanathan, ...
US Patent 7,350,234, 2008
1012008
Statistical anomaly detection for link-state routing protocols
D Qu, BM Vetter, F Wang, R Narayan, SF Wu, YF Hou, F Gong, C Sargor
Proceedings Sixth International Conference on Network Protocols (Cat. No …, 1998
881998
An experimental study of insider attacks for OSPF routing protocol
B Vetter, F Wang, SF Wu
Proceedings 1997 International Conference on Network Protocols, 293-300, 1997
841997
Secure routing protocols: Theory and practice
F Wang, B Vetter, SF Wu
Technical report, North Carolina State University, 1997
671997
The system can't perform the operation now. Try again later.
Articles 1–20