Login / Signup
Tolerating Silent Data Corruption in Opaque Preconditioners.
James Elliott
Mark Hoemmen
Frank Mueller
Published in:
CoRR (2014)
Keyphrases
</>
data corruption
iterative methods
virtual memory
operating system