Login / Signup

Evaluating the Viability of Using Compression to Mitigate Silent Corruption of Read-Mostly Application Data.

Scott LevyKurt B. FerreiraPatrick G. Bridges
Published in: CLUSTER (2017)
Keyphrases