Login / Signup
Use-After-Free Mitigation via Protected Heap Allocation.
Mingbo Zhang
Saman A. Zonouz
Published in:
DSC (2018)
Keyphrases
</>
data structure
resource allocation
machine learning
real time
neural network
information retrieval
case study
hidden markov models
object oriented databases
combinatorial auctions
suffix tree
optimal allocation
allocation strategies