2015 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS) 2015
DOI: 10.1109/dft.2015.7315128
|View full text |Cite
|
Sign up to set email alerts
|

Asymmetric ECC organization in 3D-memory via spare column utilization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…The authors state that the flux of alpha particles generated from the Integrated Circuit (IC) plastic packaging material is almost ten times greater than that of the metallization layers, and the metallization layers block more than 30% of these particles before reaching an active layer; besides, only 0.4% of the particles can reach the active layer of a second die from the top. Thus, the lower layers of a 3D memory have lower error rates than the higher ones, which is an advantageous feature of 3D technologies [12][13][17] [18]. (c) (d)…”
Section: Soft Error Rate Analysis On 3d Memoriesmentioning
confidence: 99%
See 1 more Smart Citation
“…The authors state that the flux of alpha particles generated from the Integrated Circuit (IC) plastic packaging material is almost ten times greater than that of the metallization layers, and the metallization layers block more than 30% of these particles before reaching an active layer; besides, only 0.4% of the particles can reach the active layer of a second die from the top. Thus, the lower layers of a 3D memory have lower error rates than the higher ones, which is an advantageous feature of 3D technologies [12][13][17] [18]. (c) (d)…”
Section: Soft Error Rate Analysis On 3d Memoriesmentioning
confidence: 99%
“…Chang, Huang, and Li [17] proposed an area and reliability-efficient ECC scheme for 3D RAMs, taking advantage of the shielding effect. Han and Yang [12] introduced a 3D memory scheme to ensure reliable operations by enhancing the ECC capacity of upper layer memories. Experimental results show that the proposed method can tolerate more than three times the bit The Hamming code is denoted as Ham(𝑛, 𝑘), where 𝑛, 𝑘 and 𝑟 are the numbers of bits of the codeword, data and redundancy, respectively.…”
Section: State-of-the-artmentioning
confidence: 99%