期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
An Overview of Non-Volatile Flip-Flops Based on Emerging Memory Technologies(Invited paper)
1
作者 J.M.Portal M.Bocquet +8 位作者 M.Moreau H.Aziza D.Deleruyelle Y.Zhang W.Kang J.-O.Klein Y.-G.Zhang C.Chappert W.-S.Zhao 《Journal of Electronic Science and Technology》 CAS 2014年第2期173-181,共9页
Low power consumption is a major issue in nowadays electronics systems. This trend is pushed by the development of data center related to cloud services and soon to the Internet of Things (IoT) deployment. Memories ... Low power consumption is a major issue in nowadays electronics systems. This trend is pushed by the development of data center related to cloud services and soon to the Internet of Things (IoT) deployment. Memories are one of the major contributors to power consumption. However, the development of emerging memory technologies paves the way to low-power design, through the partial replacement of the dynamic random access memory (DRAM) with the non-volatile stand-alone memory in servers or with the embedded or distributed emerging non-volatile memory in IoT objects. In the latter case, non-volatile flip-flops (NVFFs) seem a promising candidate to replace the retention latch. Indeed, IoT objects present long sleep time and NVFFs offer to save data in registers with zero power when the application is idle. This paper gives an overview of NVFF architecture flavors for various emerging memory technologies. 展开更多
关键词 Emerging memory technology ferroelectric RAM low power magnetic RAM non-volatile flip-flops phase change RAM resistive RAM
在线阅读 下载PDF
A Scheme of Memory Privacy Protection in Cloud Computing Environment
2
作者 LIU Kehao CAO Ming +1 位作者 FU Nan MA Jing 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2015年第4期307-312,共6页
With the popularity and commercialization of cloud computing platforms, the security of virtualization technology must be guaranteed. The paper studies the protection of memory privacy under virtual platform to enhanc... With the popularity and commercialization of cloud computing platforms, the security of virtualization technology must be guaranteed. The paper studies the protection of memory privacy under virtual platform to enhance system security. Based on the monitoring of foreign mapping for Dom0, a memory privacy protection scheme is designed and implemented to prevent process memory pages in DomU being mapped illegally which might result in the leakage of secret data. 展开更多
关键词 virtualization technology virtual domain foreign mapping the protection of memory privacy
原文传递
Editorial for the special issue on memory architectures and systems for modern applications
3
作者 Guangyu Sun Liang Shi Jingtong Hu 《CCF Transactions on High Performance Computing》 2022年第4期367-369,共3页
Modern data-centric applications,such as artifical artificial intelligence(AI)workloads,graph data analysis,IoT and mobile systems,have emerged and been widely used in our daily life.These applications keep raising th... Modern data-centric applications,such as artifical artificial intelligence(AI)workloads,graph data analysis,IoT and mobile systems,have emerged and been widely used in our daily life.These applications keep raising the requirements of large capacity,high performance,low power consumption,and high reliability for the whole memory hierarchy,which may be difficult to be satisfied by traditional memory architectures and systems.On the other hand,with the rapid advancement of memory technologies,various emerging memory technologies have been proposed to mitigate the problems mentioned above.These emerging memory technologies have the advantages of high density,low standy power,etc.However,they also face the challenges of programming overhead,limited lifetime,and reliablility issues.Thus,to leverage the uniques features and handle the limitations of these emerging memory technologies,we are expecting innovations in memory architecture and system designs. 展开更多
关键词 memory architectures systemson large capacity emerging memory technologies memory architectures high performance high reliability mobile systemshave artifical artificial intelligence ai workloadsgraph data analysisiot
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部