Login / Signup
No Need to Hide: Protecting Safe Regions on Commodity Hardware.
Koen Koning
Xi Chen
Herbert Bos
Cristiano Giuffrida
Elias Athanasopoulos
Published in:
EuroSys (2017)
Keyphrases
</>
commodity hardware
parallel computing
cloud computing
computing systems
database
scheduling problem
high end
real world
data mining
search engine