Login / Signup
All-Inclusive ECC: Thorough End-to-End Protection for Reliable Computer Memory.
Jungrae Kim
Michael B. Sullivan
Sangkug Lym
Mattan Erez
Published in:
ISCA (2016)
Keyphrases
</>
end to end
admission control
congestion control
multipath
ad hoc networks
computer systems
content delivery
high bandwidth
internet protocol
real world
information security
wireless ad hoc networks
error correction
application layer
scalable video
packet loss rate