Proceedings of the 6th IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis 2008
DOI: 10.1145/1450135.1450144
|View full text |Cite
|
Sign up to set email alerts
|

Application specific non-volatile primary memory for embedded systems

Abstract: Memory subsystems have been considered as one of the most critical components in embedded systems and furthermore, displaying increasing complexity as application requirements diversify. Modern embedded systems are generally equipped with multiple heterogeneous memory devices to satisfy diverse requirements and constraints. NAND flash memory has been widely adopted for data storage because of its outstanding benefits on cost, power, capacity and nonvolatility. However, in NAND flash memory, the intrinsic costs… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2010
2010
2013
2013

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 18 publications
(6 citation statements)
references
References 9 publications
(6 reference statements)
0
6
0
Order By: Relevance
“…Therefore, according to the length of each request, we design a behavior detector to detect the write requests into random and sequential requests. The length is a user defined threshold, which is determined by observing performance gains with different threshold values (e.g., 16,32,64) in the experiments. For example, if the length of a request is smaller than 32, then this request is treated as a random request; Otherwise, if the length of a request is greater than or equal to 32, then it is treated as a sequential request.…”
Section: Overviewmentioning
confidence: 99%
See 2 more Smart Citations
“…Therefore, according to the length of each request, we design a behavior detector to detect the write requests into random and sequential requests. The length is a user defined threshold, which is determined by observing performance gains with different threshold values (e.g., 16,32,64) in the experiments. For example, if the length of a request is smaller than 32, then this request is treated as a random request; Otherwise, if the length of a request is greater than or equal to 32, then it is treated as a sequential request.…”
Section: Overviewmentioning
confidence: 99%
“…There is a large amount of research work on NVM based systems [10,16,25,28,36]. In general, these work can be categorized into three types, which are physic material [10,28,34], lifespan issues [4,12,20,26] and energy consumption saving [5,18,19,27,30,35].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In those conditions (Random worst case column of The researches on how to use NAND to execute code can be classified in four categories. First, we can distinguish pure hardware solutions since NAND is not a well-adapted device to do it [4,5,6,7]. On the opposite, some researchers [8,9,10,11,12,13,14,15] proposed software solutions using already available NAND, even if, here, software is often limited to firmware.…”
Section: Motivation Around Smart-card and Flash-memories Characteristicsmentioning
confidence: 99%
“…INTRODUCTION Flash memory has been widely applied in mobile devices and embedded systems recently [4], [14], [15]. With characteristics such as small and lightweight form factor, shock resistance and low power consumption, flash memory is an ideal candidate in replacing traditional hard disk [1], [2], [3] as the secondary storage.…”
mentioning
confidence: 99%