RAM parity

Known as: Memory parity, Logic parity RAM, Extended Error Correction 
RAM parity checking is the storing of a redundant parity bit representing the parity (odd or even) of a small amount of computer data (typically one… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1984-2017
0102019842017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Growing computer system sizes and levels of integration have made memory reliability a primary concern, necessitating strong… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2014
Highly Cited
2014
Memory devices represent a key component of datacenter total cost of ownership (TCO), and techniques used to reduce errors that… (More)
  • table 1
  • figure 1
  • table 2
  • table 3
  • figure 2
Is this relevant?
Highly Cited
2012
Highly Cited
2012
Memory access bugs, including buffer overflows and uses of freed heap memory, remain a serious problem for programming languages… (More)
Is this relevant?
Highly Cited
2012
Highly Cited
2012
As NAND flash memory manufacturers scale down to smaller process technology nodes and store more bits per cell, reliability and… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
2012
2012
Memory errors in C and C++ programs continue to be one of the dominant sources of security problems, accounting for over a third… (More)
  • figure 4
  • figure 5
  • figure 6
  • figure 7
  • figure 8
Is this relevant?
2007
2007
An interpretation of the notion of software diversity is based on the concept of diversified process replicæ. We define pr as the… (More)
Is this relevant?
2007
2007
Flayer is a tool for dynamically exposing application innards for security testing and analysis. It is implemented on the dynamic… (More)
  • figure 1
  • figure 3
Is this relevant?
Highly Cited
2006
Highly Cited
2006
We present SafeDrive, a system for detecting and recovering from type safety violations in software extensions. SafeDrive has low… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 6
  • table 1
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Despite the wide publicity received by buffer overflow attacks, the vast majority of today’s security vulnerabilities continue to… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 5
Is this relevant?
Highly Cited
2002
Highly Cited
2002
This paper proposes a pure software technique, Error Detection by Duplicated Instructions (EDDI), for detecting errors during… (More)
  • figure 1.1
  • figure 3.1
  • figure 3.3
  • figure 3.4
  • figure 3.5
Is this relevant?