Login / Signup

Predicting the Silent Data Corruption Vulnerability of Instructions in Programs.

Na YangYun Wang
Published in: ICPADS (2019)
Keyphrases
  • data corruption
  • buffer overflow
  • computer programs
  • database
  • wireless sensor networks