2018 International Conference on Electronics, Information, and Communication (ICEIC) 2018
DOI: 10.23919/elinfocom.2018.8330553
|View full text |Cite
|
Sign up to set email alerts
|

Efficient and reliable NAND flash channel for high-speed solid state drives

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 2 publications
0
1
0
Order By: Relevance
“…[13] are becoming more popular for data storage due to This Chapter 10 Personal File on Solid State Drives Cleaning is reliable for FTL sec provides a method, which is page-based encryption A method called generally Flash translation Setting layer coordinates. [14]. These devices Standard I/O is performance and access Also offer latency, spinning hard-disk drives Better size than (HDD).…”
Section: Solid-state Drives (Ssds)mentioning
confidence: 99%
See 1 more Smart Citation
“…[13] are becoming more popular for data storage due to This Chapter 10 Personal File on Solid State Drives Cleaning is reliable for FTL sec provides a method, which is page-based encryption A method called generally Flash translation Setting layer coordinates. [14]. These devices Standard I/O is performance and access Also offer latency, spinning hard-disk drives Better size than (HDD).…”
Section: Solid-state Drives (Ssds)mentioning
confidence: 99%
“…An interface A user interacts with a physical medium using The interface receives the user's data objects For a format suitable for storage on physical media Converts provides functions. [14] Last 10 Over the years, NAND Flash Memory (NFM) based Solid state drives (SSDs) notably have gained importance. The market share of SSDs is increasing Coming because SSDs were previously hard disk drives (HDDs) dominated the price market and was equal to performance.…”
Section: The 3d Nand Flashmentioning
confidence: 99%
“…Consequently, web-based technologies are more vulnerable and threatened. Attackers target web-based technologies such as Application Program Interface (API) [11], Angular JS [12], Ajax [13], MySQL [14], ASP.NET [15], PHP [16], XHTML [17], Flash [18], JavaScript [19], MSSQL [20], etc. Sometimes these web technologies become vulnerable due to compromised web-based platforms.…”
Section: Introductionmentioning
confidence: 99%