在现今的彩色电视接收机中,都趋向于微电脑化,但基于微电脑的记忆存储容量有限,大多机器都外接了一块用于记忆存储的集成电路。CXK1004L 是日本索尼公司研制并生产出的一种记忆存储器。采用单列十脚封装,使用它和一片 CPU 便能组合成一...在现今的彩色电视接收机中,都趋向于微电脑化,但基于微电脑的记忆存储容量有限,大多机器都外接了一块用于记忆存储的集成电路。CXK1004L 是日本索尼公司研制并生产出的一种记忆存储器。采用单列十脚封装,使用它和一片 CPU 便能组合成一个完整的微电脑记忆控制泵统。CXK1004L 是一个结构上采用 P 沟道 NMOS 型永久性晶体管存储器,具有32字×16位的E^2PROM,IC 内装有一个充电的泵电路,仅用一个单5V 的供电电源,就能够完成全部操作,这种设计彻底摒去了其他公司生产的存储器必须使用一个-30V 左右的高压的做法。展开更多
Virtual memory management is always a very essential issue of the modern microprocessor design. A memory management unit (MMU) is designed to implement a virtual machine for user programs, and provides a management me...Virtual memory management is always a very essential issue of the modern microprocessor design. A memory management unit (MMU) is designed to implement a virtual machine for user programs, and provides a management mechanism between the operating system and user programs. This paper analyzes the tradeoffs considered in the MMU design of Unity 11 CPU of Peking University, and introduces in detail the solution of pure hardware table walking with two level page table organization. The implementation takes care of required operations and high performances needed by modern operating systems and low costs needed by embedded systems. This solution has been silicon proven, and successfully porting the Linux 2.4.17 kernel, the XWindow system, GNOME and most application software onto the Unity platform.展开更多
Studies on the stability of the equilibrium points of continuous bidirectional associative memory (BAM) neural network have yielded many useful results. A novel neural network model called standard neural network mode...Studies on the stability of the equilibrium points of continuous bidirectional associative memory (BAM) neural network have yielded many useful results. A novel neural network model called standard neural network model (SNNM) is ad- vanced. By using state affine transformation, the BAM neural networks were converted to SNNMs. Some sufficient conditions for the global asymptotic stability of continuous BAM neural networks were derived from studies on the SNNMs’ stability. These conditions were formulated as easily verifiable linear matrix inequalities (LMIs), whose conservativeness is relatively low. The approach proposed extends the known stability results, and can also be applied to other forms of recurrent neural networks (RNNs).展开更多
Fear memory underlies anxiety-related disorders, including posttraumatic stress disorder(PTSD). PTSD is a fear-based disorder,characterized by difficulties in extinguishing the learned fear response and maintaining ex...Fear memory underlies anxiety-related disorders, including posttraumatic stress disorder(PTSD). PTSD is a fear-based disorder,characterized by difficulties in extinguishing the learned fear response and maintaining extinction. Currently, the first-line treatment for PTSD is exposure therapy, which forms an extinction memory to compete with the original fear memory. However,the extinguished fear often returns under numerous circumstances, suggesting that novel methods are needed to eliminate fear memory or facilitate extinction memory. This review discusses research that targeted extinction and reconsolidation to manipulate fear memory. Recent studies indicate that sleep is an active state that can regulate memory processes. We also discuss the influence of sleep on fear memory. For each manipulation, we briefly summarize the neural mechanisms that have been identified in human studies. Finally, we highlight potential limitations and future directions in the field to better translate existing interventions to clinical settings.展开更多
Solid electrolyte based-resistive memories have been considered to be a potential candidate for future information technology with applications in non-volatile memory, logic circuits and neuromorphic computing. A cond...Solid electrolyte based-resistive memories have been considered to be a potential candidate for future information technology with applications in non-volatile memory, logic circuits and neuromorphic computing. A conductive filament model has been generally accepted to be the underlying mechanism for the resistive switching. However, the growth dynamics of such conductive filaments is still not fully understood. Here, we explore the controllability of filament growth by correlating observations of the filament growth with the electric field distribution and several other factors. The filament growth behavior has been recorded using in situ transmission electron microscopy. By studying the real- time recorded filament growth behavior and morphologies, we have been able to simulate the electric field distribution in accordance with our observations. Other factors have also been shown to affect the filament growth, such as Joule heating and electrolyte infrastructure. This work provides insight into the controllable growth of conductive filaments and will help guide research into further functionalities of nanoionic resistive memories.展开更多
As promising alternatives in building future main memory systems, emerging non-volatile memory(NVM) technologies can increase memory capacity in a cost-effective and power-efficient way. However, NVM is facing securit...As promising alternatives in building future main memory systems, emerging non-volatile memory(NVM) technologies can increase memory capacity in a cost-effective and power-efficient way. However, NVM is facing security threats due to its limited write endurance: a malicious adversary can wear out the cells and cause the NVM system to fail quickly. To address this issue, several wear-leveling schemes have been proposed to evenly distribute write traffic in a security-aware manner. In this study, we present a new type of timing attack, remapping timing attack(RTA), based on information leakage from the remapping latency difference in NVM. Our analysis and experimental results show that RTA can cause three of the latest wear-leveling schemes(i.e., region-based start-gap,security refresh, and multi-way wear leveling) to lose their effectiveness in several days(even minutes), causing failure of NVM. To defend against such an attack, we further propose a novel wear-leveling scheme called the ‘security region-based start-gap(security RBSG)', which is a two-stage strategy using a dynamic Feistel network to enhance the simple start-gap wear leveling with level-adjustable security assurance. The theoretical analysis and evaluation results show that the proposed security RBSG not only performs well when facing traditional malicious attacks, but also better defends against RTA.展开更多
文摘Virtual memory management is always a very essential issue of the modern microprocessor design. A memory management unit (MMU) is designed to implement a virtual machine for user programs, and provides a management mechanism between the operating system and user programs. This paper analyzes the tradeoffs considered in the MMU design of Unity 11 CPU of Peking University, and introduces in detail the solution of pure hardware table walking with two level page table organization. The implementation takes care of required operations and high performances needed by modern operating systems and low costs needed by embedded systems. This solution has been silicon proven, and successfully porting the Linux 2.4.17 kernel, the XWindow system, GNOME and most application software onto the Unity platform.
基金Project (No. 60074008) supported by the National Natural Science Foundation of China
文摘Studies on the stability of the equilibrium points of continuous bidirectional associative memory (BAM) neural network have yielded many useful results. A novel neural network model called standard neural network model (SNNM) is ad- vanced. By using state affine transformation, the BAM neural networks were converted to SNNMs. Some sufficient conditions for the global asymptotic stability of continuous BAM neural networks were derived from studies on the SNNMs’ stability. These conditions were formulated as easily verifiable linear matrix inequalities (LMIs), whose conservativeness is relatively low. The approach proposed extends the known stability results, and can also be applied to other forms of recurrent neural networks (RNNs).
基金supported by the National Key Technology Research and Development Program of the Ministry of Science and Technology of China(2015BAI13B01)
文摘Fear memory underlies anxiety-related disorders, including posttraumatic stress disorder(PTSD). PTSD is a fear-based disorder,characterized by difficulties in extinguishing the learned fear response and maintaining extinction. Currently, the first-line treatment for PTSD is exposure therapy, which forms an extinction memory to compete with the original fear memory. However,the extinguished fear often returns under numerous circumstances, suggesting that novel methods are needed to eliminate fear memory or facilitate extinction memory. This review discusses research that targeted extinction and reconsolidation to manipulate fear memory. Recent studies indicate that sleep is an active state that can regulate memory processes. We also discuss the influence of sleep on fear memory. For each manipulation, we briefly summarize the neural mechanisms that have been identified in human studies. Finally, we highlight potential limitations and future directions in the field to better translate existing interventions to clinical settings.
文摘Solid electrolyte based-resistive memories have been considered to be a potential candidate for future information technology with applications in non-volatile memory, logic circuits and neuromorphic computing. A conductive filament model has been generally accepted to be the underlying mechanism for the resistive switching. However, the growth dynamics of such conductive filaments is still not fully understood. Here, we explore the controllability of filament growth by correlating observations of the filament growth with the electric field distribution and several other factors. The filament growth behavior has been recorded using in situ transmission electron microscopy. By studying the real- time recorded filament growth behavior and morphologies, we have been able to simulate the electric field distribution in accordance with our observations. Other factors have also been shown to affect the filament growth, such as Joule heating and electrolyte infrastructure. This work provides insight into the controllable growth of conductive filaments and will help guide research into further functionalities of nanoionic resistive memories.
基金Project supported by the National High-Tech R&D Program(863)of China(Nos.2015AA015301 and 2015AA016701)the National Natural Science Foundation of China(Nos.61303046,61472153,61502190,and 61232004)+2 种基金the State Key Laboratory of Computer Architecture(No.CARCH201505)the Wuhan Applied Basic Research Project,China(No.2015010101010004)the Engineering Research Center of Data Storage Systems and Technology,Ministry of Education,China
文摘As promising alternatives in building future main memory systems, emerging non-volatile memory(NVM) technologies can increase memory capacity in a cost-effective and power-efficient way. However, NVM is facing security threats due to its limited write endurance: a malicious adversary can wear out the cells and cause the NVM system to fail quickly. To address this issue, several wear-leveling schemes have been proposed to evenly distribute write traffic in a security-aware manner. In this study, we present a new type of timing attack, remapping timing attack(RTA), based on information leakage from the remapping latency difference in NVM. Our analysis and experimental results show that RTA can cause three of the latest wear-leveling schemes(i.e., region-based start-gap,security refresh, and multi-way wear leveling) to lose their effectiveness in several days(even minutes), causing failure of NVM. To defend against such an attack, we further propose a novel wear-leveling scheme called the ‘security region-based start-gap(security RBSG)', which is a two-stage strategy using a dynamic Feistel network to enhance the simple start-gap wear leveling with level-adjustable security assurance. The theoretical analysis and evaluation results show that the proposed security RBSG not only performs well when facing traditional malicious attacks, but also better defends against RTA.