Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Charge trap flash

Known as: CTF 
Charge Trap Flash (CTF) is a semiconductor memory technology used in creating non-volatile NOR and NAND flash memory. The technology differs from the… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
Since the graphene boom, great efforts have been devoted to two-dimensional (2D) monolayer materials with exciting possibilities… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2013
Highly Cited
2013
By recording digital holograms created from different illumination directions and subsequently processing them in a complex… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2013
Highly Cited
2013
Cyclops (cyclic-operations) Tensor Framework (CTF) 1 is a distributed library for tensor contractions. CTF aims to scale high… Expand
  • figure 1
  • figure 2
  • figure 3
  • table III
  • table I
Is this relevant?
2012
2012
The IEEE 802.11ac is an emerging WLAN standard for the 5 GHz band in which multiple input multiple output (MIMO) and wider… Expand
  • table I
  • figure 1
  • figure 2
  • table II
  • table III
Is this relevant?
Highly Cited
2011
Highly Cited
2011
We propose a bottom-up power-line communication (PLC) channel simulator for networks that deploy multiconductor cables and enable… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Traditional intrusion detection systems (IDSs) focus on low-level attacks or anomalies, and raise alerts independently, though… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2004
Highly Cited
2004
A new plate model is used to analyze the mean seismicities of seven types of plate boundary (CRB, continental rift boundary; CTF… Expand
  • table 1
  • figure 1
  • table 2
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Existing position-based unicast routing algorithms which forward packets in the geographic direction of the destination require… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Traditional intrusion detection systems (IDSs) focus on low-level attacks or anomalies, and raise alerts independently, though… Expand
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Abstract Focal parameters of local earthquakes in the region of the Ionian Islands of western Greece are constrained with a… Expand
  • figure 2
  • figure 2
  • figure 4
  • figure 4
Is this relevant?