Login / Signup

No Need to Hide: Protecting Safe Regions on Commodity Hardware.

Koen KoningXi ChenHerbert BosCristiano GiuffridaElias Athanasopoulos
Published in: EuroSys (2017)
Keyphrases
  • commodity hardware
  • parallel computing
  • cloud computing
  • computing systems
  • database
  • scheduling problem
  • high end
  • real world
  • data mining
  • search engine