the overall write performance of flash memory. In order to solve this "erase-before-write" problem, the flash memory controller can be integrated with a software module, called "flash translation layer (FTL)." Among many FTL schemes available, the log block buffer scheme is considered to be optimum. With this scheme, a small number of log blocks, a kind of write buffer, can improve the performance of write operations by reducing the number of erase operations. However, this scheme can suffer from low space utilization of log blocks. In this paper, we show that there is much room for performance improvement in the log buffer block scheme, and propose an enhanced log block buffer scheme, called FAST (full associative sector translation). Our FAST scheme improves the space utilization of log blocks using fully-associative sector translations for the log block sectors. We also show empirically that our FAST scheme outperforms the pure log block buffer scheme. . 2007. A log bufferbased flash translation layer using fully-associative sector translation. ACM Trans. Embedd.
The semantics of online authentication in the web are rather straightforward: if Alice has a certificate binding Bob's name to a public key, and if a remote entity can prove knowledge of Bob's private key, then (barring key compromise) that remote entity must be Bob. However, in reality, many websites-and the majority of the most popular ones-are hosted at least in part by third parties such as Content Delivery Networks (CDNs) or web hosting providers. Put simply: administrators of websites who deal with (extremely) sensitive user data are giving their private keys to third parties. Importantly, this sharing of keys is undetectable by most users, and widely unknown even among researchers. In this paper, we perform a large-scale measurement study of key sharing in today's web. We analyze the prevalence with which websites trust third-party hosting providers with their secret keys, as well as the impact that this trust has on responsible key management practices, such as revocation. Our results reveal that key sharing is extremely common, with a small handful of hosting providers having keys from the majority of the most popular websites. We also find that hosting providers often manage their customers' keys, and that they tend to react more slowly yet more thoroughly to compromised or potentially compromised keys.
Abstract. Recently, flash memory is widely adopted in embedded applications since it has several strong points: non-volatility, fast access speed, shock resistance, and low power consumption. However, due to its hardware characteristic, namely "erase before write", it requires a software layer called FTL (Flash Translation Layer). This paper surveys the state-of-the-art FTL software for flash memory. This paper also describes problem definitions, several algorithms proposed to solve them, and related research issues. In addition, this paper provides performance results based on our implementation of each of FTL algorithms.
Immunohistochemical localization of the injury specific apolipoprotein, acute phase serum amyloid A (A-apoSAA), was compared in brains of patients with neuropathologically confirmed Alzheimer's disease (AD), multiple sclerosis (MS), Parkinson's disease (PD); Pick's disease (Pick's), dementia with Lewy bodies (DLB), coronary artery disease (CAD), and schizophrenia. Affected regions of both AD and MS brains showed intense staining for A-apoSAA in comparison to an unaffected region and non-AD/MS brains. The major site of A-apoSAA staining in both diseases was the myelin sheaths of axons in layers V and VI of affected cortex. A-apoSAA contains a cholesterol binding site near its amino terminus and is likely to have a high affinity for cholesterol-rich myelin. These findings, along with our recent evidence that A-apoSAA can inhibit lipid synthesis in vascular smooth muscle cells suggest that A-apoSAA plays a role in the neuronal loss and white matter damage occurring in AD and MS.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.