Sign in

Redundant Memory Array Architecture for Efficient Selective Protection.

Ruohuang ZhengMichael C. Huang
Published in: ISCA (2017)
Keyphrases
  • limited memory
  • management system
  • network architecture
  • databases
  • neural network
  • software architecture
  • memory requirements
  • memory usage
  • random access memory