期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
可便携读卡硬盘机PCX 370
1
作者 田中寿 《广东电脑与电讯》 2002年第09M期25-25,共1页
关键词 记忆储存器 PCX370 20GN硬盘 USB 1.1接口
下载PDF
The MMU Implementation of Unity-1 Microprocessor 被引量:2
2
作者 宋传华 Cheng +2 位作者 Xu Zhu Dexin 《High Technology Letters》 EI CAS 2003年第4期27-32,共6页
Virtual memory management is always a very essential issue of the modern microprocessor design. A memory management unit (MMU) is designed to implement a virtual machine for user programs, and provides a management me... Virtual memory management is always a very essential issue of the modern microprocessor design. A memory management unit (MMU) is designed to implement a virtual machine for user programs, and provides a management mechanism between the operating system and user programs. This paper analyzes the tradeoffs considered in the MMU design of Unity 11 CPU of Peking University, and introduces in detail the solution of pure hardware table walking with two level page table organization. The implementation takes care of required operations and high performances needed by modern operating systems and low costs needed by embedded systems. This solution has been silicon proven, and successfully porting the Linux 2.4.17 kernel, the XWindow system, GNOME and most application software onto the Unity platform. 展开更多
关键词 Unity 1 MMU TLB table walking MICROPROCESSOR
下载PDF
LMI-based approach for global asymptotic stability analysis of continuous BAM neural networks 被引量:2
3
作者 张森林 刘妹琴 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第1期32-37,共6页
Studies on the stability of the equilibrium points of continuous bidirectional associative memory (BAM) neural network have yielded many useful results. A novel neural network model called standard neural network mode... Studies on the stability of the equilibrium points of continuous bidirectional associative memory (BAM) neural network have yielded many useful results. A novel neural network model called standard neural network model (SNNM) is ad- vanced. By using state affine transformation, the BAM neural networks were converted to SNNMs. Some sufficient conditions for the global asymptotic stability of continuous BAM neural networks were derived from studies on the SNNMs’ stability. These conditions were formulated as easily verifiable linear matrix inequalities (LMIs), whose conservativeness is relatively low. The approach proposed extends the known stability results, and can also be applied to other forms of recurrent neural networks (RNNs). 展开更多
关键词 Standard neural network model (SNNM) Bidirectional associative memory (BAM) neural network Linear matrix inequality (LMI) Linear differential inclusion (LDI) Global asymptotic stability
下载PDF
Behavioral interventions to eliminate fear responses 被引量:4
4
作者 Jingli Yue Le Shi +3 位作者 Xiao Lin Muhammad Zahid Khan Jie Shi Lin Lu 《Science China(Life Sciences)》 SCIE CAS CSCD 2018年第6期625-632,共8页
Fear memory underlies anxiety-related disorders, including posttraumatic stress disorder(PTSD). PTSD is a fear-based disorder,characterized by difficulties in extinguishing the learned fear response and maintaining ex... Fear memory underlies anxiety-related disorders, including posttraumatic stress disorder(PTSD). PTSD is a fear-based disorder,characterized by difficulties in extinguishing the learned fear response and maintaining extinction. Currently, the first-line treatment for PTSD is exposure therapy, which forms an extinction memory to compete with the original fear memory. However,the extinguished fear often returns under numerous circumstances, suggesting that novel methods are needed to eliminate fear memory or facilitate extinction memory. This review discusses research that targeted extinction and reconsolidation to manipulate fear memory. Recent studies indicate that sleep is an active state that can regulate memory processes. We also discuss the influence of sleep on fear memory. For each manipulation, we briefly summarize the neural mechanisms that have been identified in human studies. Finally, we highlight potential limitations and future directions in the field to better translate existing interventions to clinical settings. 展开更多
关键词 fear memory extinction sleep manipulation reconsolidation human
原文传递
Enhancing security of NVM-based main memory with dynamic Feistel network mapping
5
作者 Fang-ting HUANG Dan FENG +5 位作者 Wen XIA Wen ZHOU Yu-cheng ZHANG Min FU Chun-tao JIANG Yu-kun ZHOU 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2018年第7期847-863,共17页
As promising alternatives in building future main memory systems, emerging non-volatile memory(NVM) technologies can increase memory capacity in a cost-effective and power-efficient way. However, NVM is facing securit... As promising alternatives in building future main memory systems, emerging non-volatile memory(NVM) technologies can increase memory capacity in a cost-effective and power-efficient way. However, NVM is facing security threats due to its limited write endurance: a malicious adversary can wear out the cells and cause the NVM system to fail quickly. To address this issue, several wear-leveling schemes have been proposed to evenly distribute write traffic in a security-aware manner. In this study, we present a new type of timing attack, remapping timing attack(RTA), based on information leakage from the remapping latency difference in NVM. Our analysis and experimental results show that RTA can cause three of the latest wear-leveling schemes(i.e., region-based start-gap,security refresh, and multi-way wear leveling) to lose their effectiveness in several days(even minutes), causing failure of NVM. To defend against such an attack, we further propose a novel wear-leveling scheme called the ‘security region-based start-gap(security RBSG)', which is a two-stage strategy using a dynamic Feistel network to enhance the simple start-gap wear leveling with level-adjustable security assurance. The theoretical analysis and evaluation results show that the proposed security RBSG not only performs well when facing traditional malicious attacks, but also better defends against RTA. 展开更多
关键词 Non-volatile memory (NVM) ENDURANCE Wear leveling Timing attack
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部