Login / Signup
Hiding Your Wares: Transparently Retrofitting Memory Confidentiality into Legacy Applications.
Jamie Levy
Bilal Khan
Published in:
ICC (2007)
Keyphrases
</>
memory space
main memory
memory usage
memory size
memory requirements
neural network
knowledge base
computational power
artificial intelligence
artificial neural networks
access control
file system
reverse engineering
computing power
limited memory