2014
DOI: 10.1109/tnano.2014.2299558
|View full text |Cite
|
Sign up to set email alerts
|

Memristor Multiport Readout: A Closed-Form Solution for Sneak Paths

Abstract: Abstract-In this paper, we introduce for the first time, a closedform solution for the memristor-based memory sneak paths without using any gating elements. The introduced technique fully eliminates the effect of sneak paths by reading the stored data using multiple access points and evaluating a simple addition/subtraction on the different readings. The new method requires fewer reading steps compared to previously reported techniques, and has a very small impact on the memory density. To verify the underlyin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
56
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 78 publications
(56 citation statements)
references
References 49 publications
0
56
0
Order By: Relevance
“…In order to simplify the tangled structure of the crossbar network, read-out operations are typically performed with all inactive word-lines shorted together and similarly all inactive bitlines shorted together. This reduces the crossbar network to a 'four-node-four-component' (4n4c) system where the four components are: 1) the target device alone (R T ), 2) the devices sharing word-line with the target (we shall call this the 'word complement' of R T ) with equivalent resistance R w , 3) the devices sharing bit-line with the target (the 'bit complement' of R T ) with equivalent resistance R b and 4) the rest of the array with equivalent resistance R r (see [9], [14]). Fig.…”
Section: B Crossbar Array Nomenclaturementioning
confidence: 99%
See 2 more Smart Citations
“…In order to simplify the tangled structure of the crossbar network, read-out operations are typically performed with all inactive word-lines shorted together and similarly all inactive bitlines shorted together. This reduces the crossbar network to a 'four-node-four-component' (4n4c) system where the four components are: 1) the target device alone (R T ), 2) the devices sharing word-line with the target (we shall call this the 'word complement' of R T ) with equivalent resistance R w , 3) the devices sharing bit-line with the target (the 'bit complement' of R T ) with equivalent resistance R b and 4) the rest of the array with equivalent resistance R r (see [9], [14]). Fig.…”
Section: B Crossbar Array Nomenclaturementioning
confidence: 99%
“…c) Short together and bias the active wordand bit-lines with the aim of shunting R T whilst determining the 'full complement', R wb = R w ||R b . The procedure yields three equations for three unknowns and hence R T can be computed, as shown in [14]. All read-outs are performed at the standard V b = 0.5 V .…”
Section: (B)mentioning
confidence: 99%
See 1 more Smart Citation
“…As a result, cell read-out accuracy is reduced and write operations may disturb the memory state of adjacent devices, which is why strategies to mitigate sneak path effects are an area of active research. These include introducing CMOS [12], or emerging devices [13] as 'selector' elements to isolate the target device from the rest of the array, and the employment of active biasing of inactive WLs and BLs in order to divert sneak currents [10] amongst other techniques [14]. The second key advantage of RRAM concerns the potential for single-device, multi-level memory cells [2].…”
Section: Introductionmentioning
confidence: 99%
“…One approach centers on multiport readout and subsequent mathematical cancellation of said sneak path currents [18]. Another, more conventional approach employs various schemes of active biasing of both active (leading to the target device) and inactive word and bitlines.…”
mentioning
confidence: 99%