{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T11:02:45Z","timestamp":1725620565007},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,3]],"date-time":"2016-10-03T00:00:00Z","timestamp":1475452800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,3]]},"DOI":"10.1145\/2989081.2989108","type":"proceedings-article","created":{"date-parts":[[2016,10,20]],"date-time":"2016-10-20T15:58:54Z","timestamp":1476979134000},"page":"327-337","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["On the Use of DRAM with Unrepaired Weak Cells in Computing Systems"],"prefix":"10.1145","author":[{"given":"Hao","family":"Wang","sequence":"first","affiliation":[{"name":"Rensselaer Polytechnic, Institute, Troy, NY"}]},{"given":"Yin","family":"Li","sequence":"additional","affiliation":[{"name":"Rensselaer Polytechnic, Institute, Troy, NY"}]},{"given":"Xuebin","family":"Zhang","sequence":"additional","affiliation":[{"name":"Rensselaer Polytechnic, Institute, Troy, NY"}]},{"given":"Xiaoqing","family":"Zhao","sequence":"additional","affiliation":[{"name":"Xi'an Jiaotong University, Xi'an, China"}]},{"given":"Hongbin","family":"Sun","sequence":"additional","affiliation":[{"name":"Xi'an Jiaotong University, Xi'an, China"}]},{"given":"Tong","family":"Zhang","sequence":"additional","affiliation":[{"name":"Rensselaer Polytechnic, Institute, Troy, NY"}]}],"member":"320","published-online":{"date-parts":[[2016,10,3]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Theory and Practice of Error Control Codes","author":"Blahut R. E.","year":"1984","unstructured":"R. E. Blahut . Theory and Practice of Error Control Codes . Addison Wesley , 1984 . R. E. Blahut. Theory and Practice of Error Control Codes. Addison Wesley, 1984."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(60)90287-4"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/26.231911"},{"key":"e_1_3_2_1_4_1","volume-title":"Fault-Tolerance and Reliability Techniques for High-Density Random-Access Memories","author":"Chakraborty K.","year":"2002","unstructured":"K. Chakraborty and P. Mazumder . Fault-Tolerance and Reliability Techniques for High-Density Random-Access Memories . Prentice Hall , 2002 . K. Chakraborty and P. Mazumder. Fault-Tolerance and Reliability Techniques for High-Density Random-Access Memories. Prentice Hall, 2002."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818950.2818961"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTCSA.2015.29"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2015.34"},{"volume-title":"Low RAM project. https:\/\/source.android.com\/devices\/tech\/config\/low-ram","year":"2015","key":"e_1_3_2_1_9_1","unstructured":"Google. Low RAM project. https:\/\/source.android.com\/devices\/tech\/config\/low-ram , 2015 . Google. Low RAM project. https:\/\/source.android.com\/devices\/tech\/config\/low-ram, 2015."},{"key":"e_1_3_2_1_10_1","volume-title":"Fast CRC computation for iSCSI polynomial using CRC32 instruction","author":"Gopal V.","year":"2011","unstructured":"V. Gopal , J. Guilford , and E. Ozturk . Fast CRC computation for iSCSI polynomial using CRC32 instruction . 2011 . V. Gopal, J. Guilford, and E. Ozturk. Fast CRC computation for iSCSI polynomial using CRC32 instruction. 2011."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1186736.1186737"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2015.7056025"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/2830865.2830888"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2014.7027336"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLSI-DAT.2014.6834928"},{"key":"e_1_3_2_1_16_1","volume-title":"Error Control Coding: Fundamentals and Applications","author":"Lin S.","year":"2004","unstructured":"S. Lin and D. J. Costello . Error Control Coding: Fundamentals and Applications ( 2 nd Ed.). Prentice Hall , 2004 . S. Lin and D. J. Costello. Error Control Coding: Fundamentals and Applications (2nd Ed.). Prentice Hall, 2004.","edition":"2"},{"key":"e_1_3_2_1_17_1","volume-title":"Linux kernel development","author":"Love R.","year":"2005","unstructured":"R. Love . Linux kernel development second edition. Pearson Education , USA , 2005 . R. Love. Linux kernel development second edition. Pearson Education, USA, 2005."},{"key":"e_1_3_2_1_18_1","volume-title":"User manual for LZO version 0.28","author":"Oberhumer M.","year":"2005","unstructured":"M. Oberhumer . LZO real-time data compression library. User manual for LZO version 0.28 , 2005 . M. Oberhumer. LZO real-time data compression library. User manual for LZO version 0.28, 2005."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.2296049"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/IMW.2015.7150307"},{"key":"e_1_3_2_1_21_1","volume-title":"Internet small computer systems interface (iSCSI)","author":"Satran J.","year":"2004","unstructured":"J. Satran and K. Meth . Internet small computer systems interface (iSCSI) . 2004 . J. Satran and K. Meth. Internet small computer systems interface (iSCSI). 2004."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLSIT.2015.7223651"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2366231.2337192"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/IMW.2014.6849372"}],"event":{"name":"MEMSYS '16: The Second International Symposium on Memory Systems","acronym":"MEMSYS '16","location":"Alexandria VA USA"},"container-title":["Proceedings of the Second International Symposium on Memory Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2989081.2989108","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T22:53:54Z","timestamp":1673564034000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2989081.2989108"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,3]]},"references-count":23,"alternative-id":["10.1145\/2989081.2989108","10.1145\/2989081"],"URL":"https:\/\/doi.org\/10.1145\/2989081.2989108","relation":{},"subject":[],"published":{"date-parts":[[2016,10,3]]},"assertion":[{"value":"2016-10-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}