Publication | Closed Access
Two-Step Write Scheme for Reducing Sneak-Path Leakage in Complementary Memristor Array
78
Citations
26
References
2012
Year
Hardware SecurityNon-volatile MemoryElectrical EngineeringEngineeringCms 10Complementary Memristor ArrayEmerging Memory TechnologyComputer EngineeringComputer ArchitectureMemory DeviceMemory DevicesSemiconductor MemorySneak-path LeakageMicroelectronicsMemory ArchitectureTwo-step Write SchemeComplementary Memristor
In this paper, a new two-step write scheme is proposed to minimize sneak-path leakage in complementary memristor (CM) array, where no selection device is needed. When R <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">RESET</sub> /R <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">SET</sub> = 100, the new two-step write scheme can increase the array size of CMs 10 times larger than the conventional write. If R <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">RESET</sub> /R <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">SET</sub> is increased to 500, we can increase the passive array size up to 1000 × 1000 with maintaining the read sensing margin lager than 10% of V <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">DD</sub> . The two-step write scheme will be very essential in realizing passive cross-point array without any selection device that is known to be the ideal architecture for future 3-D memories.
| Year | Citations | |
|---|---|---|
Page 1
Page 1