Sign in

PEPPA-X: finding program test inputs to bound silent data corruption vulnerability in HPC applications.

Md Hasanur RahmanAabid ShamjiShengjian GuoGuanpeng Li
Published in: SC (2021)
Keyphrases
  • data corruption
  • buffer overflow
  • database
  • nearest neighbor
  • distributed systems
  • computer systems
  • end to end
  • high performance computing