2013
DOI: 10.1145/2508148.2485928
|View full text |Cite
|
Sign up to set email alerts
|

An experimental study of data retention behavior in modern DRAM devices

Abstract: DRAM cells store data in the form of charge on a capacitor. This charge leaks off over time, eventually causing data to be lost. To prevent this data loss from occurring, DRAM cells must be periodically refreshed. Unfortunately, DRAM refresh operations waste energy and also degrade system performance by interfering with memory requests. These problems are expected to worsen as DRAM density increases.The amount of time that a DRAM cell can safely retain data without being refreshed is called the cell's retentio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

10
403
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
3
2
2

Relationship

3
4

Authors

Journals

citations
Cited by 176 publications
(415 citation statements)
references
References 29 publications
10
403
0
Order By: Relevance
“…Although the retention time of every DRAM cell is required to be greater than the 64ms minimum, different cells have different retention times. In this context, the cells with the shortest retention times are referred to as weak cells [45]. Intuitively, it would appear that the weak cells are especially vulnerable to disturbance errors since they are already leakier than others.…”
Section: Sensitivity Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Although the retention time of every DRAM cell is required to be greater than the 64ms minimum, different cells have different retention times. In this context, the cells with the shortest retention times are referred to as weak cells [45]. Intuitively, it would appear that the weak cells are especially vulnerable to disturbance errors since they are already leakier than others.…”
Section: Sensitivity Resultsmentioning
confidence: 99%
“…We searched for a module's weak cells by neither accessing nor refreshing a module for a generous amount of time (10 seconds) after having populated it with either all '0's or all '1's. If a cell was corrupted during this procedure, we considered it to be a weak cell [45]. In total, we were able to identify 1M weak cells for each module (984K, 993K, and 1.22M), which is on par with the number of victim cells.…”
Section: Sensitivity Resultsmentioning
confidence: 99%
“…Literature from industry such as IBM [13,17], Intel [34], Samsung [16], and Toshiba [11], and academic groups [6,21,31] have proposed and/or used T ret profiling schemes. However, recent work [20] has pointed out that T ret profiling has to deal with Data Pattern Dependence (DPD) and Variable Retention Time (VRT) effects. As suggested in [20] and [13], profiling in the presence of DPD can be best done by using a variety of manufacturer-provided test patterns -e.g., all 0s/1s, checkerboard, walk and random.…”
Section: Profiling the Retention Timesmentioning
confidence: 99%
“…However, recent work [20] has pointed out that T ret profiling has to deal with Data Pattern Dependence (DPD) and Variable Retention Time (VRT) effects. As suggested in [20] and [13], profiling in the presence of DPD can be best done by using a variety of manufacturer-provided test patterns -e.g., all 0s/1s, checkerboard, walk and random. One of the papers [20] also points out that VRT changes are slow (in the order of hours and sometimes a day) and, therefore, one could profile periodically.…”
Section: Profiling the Retention Timesmentioning
confidence: 99%
See 1 more Smart Citation