Results 71 to 80 of about 97,626 (219)

A Highly Parallel DRAM Architecture to Mitigate Large Access Latency and Improve Energy Efficiency of Modern DRAM Systems

open access: yesIEEE Access
Modern Dynamic Random Access Memory (DRAM) banks are characterized by their ability to work in parallel, enabling concurrent servicing of multiple memory accesses through the interleaved DRAM banks.
Tareq A. Alawneh   +6 more
doaj   +1 more source

Machine Learning‐Driven Variability Analysis of Process Parameters for Semiconductor Manufacturing

open access: yesAdvanced Intelligent Systems, EarlyView.
This research presents a machine learning approach that integrates nonlinear variation decomposition (NLVD) with statistical techniques to quantify the contribution of individual unit processes to performance and variance of figure of merit (FoM) at the LOT level.
Sinyeong Kang   +6 more
wiley   +1 more source

DReAM: Dynamic Re-arrangement of Address Mapping to Improve the Performance of DRAMs

open access: yes, 2015
The initial location of data in DRAMs is determined and controlled by the 'address-mapping' and even modern memory controllers use a fixed and run-time-agnostic address mapping.
Garside, Jim   +3 more
core   +1 more source

Evaluation of IHH, PTCH1, and SMO protein immunohistochemistry in the human mandibular condyle at fetal stages from 30 to 80 mm greatest length

open access: yesThe Anatomical Record, EarlyView.
Abstract This study evaluated the morphogenesis of the temporomandibular joint (TMJ) in human fetuses during the third month of gestation through the analysis of immunohistochemistry for the proteins Indian Hedgehog (IHH), Patched‐1 (PTCH1), and Smoothened (SMO).
Filipe Santos da Silva   +5 more
wiley   +1 more source

DeLTA: GPU Performance Model for Deep Learning Applications with In-depth Memory System Traffic Analysis

open access: yes, 2019
Training convolutional neural networks (CNNs) requires intense compute throughput and high memory bandwidth. Especially, convolution layers account for the majority of the execution time of CNN training, and GPUs are commonly used to accelerate these ...
Chatterjee, Niladrish   +4 more
core   +1 more source

Keggin‐Type Aluminum Polyoxometalate‐Mediated Oxidation of Amorphous Carbon for Engineered Electrochemical Interfaces

open access: yesCarbon Energy, EarlyView.
Keggin‐type Al‐POM‐coated silica achieves selective surface oxidation of amorphous carbon through electrostatic attraction and proton‐coupled oxidation, tailoring interfacial properties for lithium‐ion batteries and semiconductor processes. ABSTRACT Amorphous carbon is widely used in energy storage and semiconductor technologies, where surface ...
Ganggyu Lee   +13 more
wiley   +1 more source

Аналітичний огляд та аналіз трендів вразливості RowHummer для різних виробників DRAM

open access: yesSocial Development & Security
Мета роботи: провести аналітичний огляд вразливості жорстких дисків типу SSD та проаналізувати трендів вразливості RowHummer для різних виробників DRAM. Сформувати прогнози розвитку.
Valentyn Mazurok, Vladimir Lutsenko
doaj   +1 more source

Downregulation of VRK1 by p53 in response to DNA damage is mediated by the autophagic pathway. [PDF]

open access: yesPLoS ONE, 2011
Human VRK1 induces a stabilization and accumulation of p53 by specific phosphorylation in Thr18. This p53 accumulation is reversed by its downregulation mediated by Hdm2, requiring a dephosphorylated p53 and therefore also needs the removal of VRK1 as ...
Alberto Valbuena   +2 more
doaj   +1 more source

Performance Assessment of the Immersed Boundary Method in the Framework of the Moment Representation Lattice Boltzmann Method

open access: yesInternational Journal for Numerical Methods in Fluids, EarlyView.
The immersed boundary method (IBM) was coupled with the moment representation lattice Boltzmann method (MR‐LBM), reducing bandwidth requirements compared to population‐based LBM formulations. A systematic assessment of IBM parameters was conducted to quantify their effect on computational performance.
Marco A. Ferrari   +2 more
wiley   +1 more source

Детектування атак типу RowHummer за допомогою частотних масивів

open access: yesSocial Development & Security
Мета роботи: створення алгоритму захисту оперативної пам’яті DRAM від вразливості RowHammer, що не має вразливості нерівномірного оновлення. Результати дослідження: показано механізм детектування RowHammer на основі частотних масивів, що не має ...
Valentyn Mazurok, Volodymyr Lutsenko
doaj   +1 more source

Home - About - Disclaimer - Privacy