2013
DOI: 10.1016/j.microrel.2013.07.008
|View full text |Cite
|
Sign up to set email alerts
|

Access resistor modelling for EEPROM’s retention test vehicle

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…It provides for example the possibility to detect overerased bit tails or weaknesses in terms of data retention [2,3]. Furthermore, the problems due to the access resistance of a cell in a memory array can be modeled to optimize the number of contacts to bring the voltage biasing in a specific area without loss [4]. The equivalent transistor of charge storage memory, that corresponds to the memory cell where the floating and control gates are shorted, is also used in CAST structures to study the oxide reliability.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…It provides for example the possibility to detect overerased bit tails or weaknesses in terms of data retention [2,3]. Furthermore, the problems due to the access resistance of a cell in a memory array can be modeled to optimize the number of contacts to bring the voltage biasing in a specific area without loss [4]. The equivalent transistor of charge storage memory, that corresponds to the memory cell where the floating and control gates are shorted, is also used in CAST structures to study the oxide reliability.…”
Section: Introductionmentioning
confidence: 99%
“…This information is fundamental for the process control of large memory array to detect edge or specific signatures due to the different behaviors. Complex calculation techniques, combined with specific physical analysis [5], are used to estimate the number of extrinsic cells [4]. Finally, only electrical characterization on test products, can show the vulnerability localization [5].…”
Section: Introductionmentioning
confidence: 99%