Login / Signup
Cache vulnerability equations for protecting data in embedded processor caches from soft errors.
Aviral Shrivastava
Jongeun Lee
Reiley Jeyapaul
Published in:
LCTES (2010)
Keyphrases
</>
data sources
image data
data sets
data points
database
data analysis
data mining
knowledge discovery
data collection
memory access
parallel processing
raw data
computer systems
access control
data access
data mining techniques
computer architecture
data structure