Browsing by Subject "Random access storage"
Now showing items 1-7 of 7
-
Article
Failure-sensitive analysis of parallel algorithms with controlled memory access concurrency
(2007)The abstract problem of using P failure-prone processors to cooperatively update all locations of an N-element shared array is called Write-All. Solutions to Write-All can be used iteratively to construct efficient simulations ...
-
Conference Object
Magnetic domain-wall racetrack memory for high density and fast data storage
(2012)The racetrack memory device is a new concept of Magnetic RAM (MRAM) based on controlling domain wall (DW) motion in ferromagnetic nanowires. It promises ultra-high storage density thanks to the possibility to store multiple ...
-
Article
Magnetic properties of the half-metallic ferromagnet NiMnSb grown on InSb by pulsed laser deposition
(2004)We have grown films of the half-metallic ferromagnet NiMnSb on single crystals of the narrow gap semiconductor InSb by pulsed laser deposition. NiMnSb is a possible candidate for spin injection applications. The film ...
-
Conference Object
Modelling of the high firing variability of real cortical neurons with the temporal noisy-leaky integrator neuron model
(IEEE, 1994)Using the Temporal Noisy-Leaky Integrator (TNLI) neuron model with reset, we observed that high firing variability can be achieved for certain input parameter values which results from the temporal summation of noise in ...
-
Article
Recent advances in spintronics. Half-metal ferromagnets: Their role in spintronics
(2004)A review of recent advances in spintronics is presented. We report the structural, magnetic, electrical and thermal properties of the ferromagnetic half-Heusler alloy NiMnSb grown by arcmelting. The bulk material is used ...
-
Conference Object
Relation between velocities and global maximum for Gaussian seas
(2004)We study the probability distribution of the height of global maximum for a Gaussian random field evolving in time. Particularly, we discuss the role of the wave kinematics. It is observed that taking into account time ...
-
Article
Speaker identification for security systems using reinforcement-trained pRAM neural network architectures
(2001)Four probabilistic pRAM neural network architectures are presented to explain have the different pRAM network architectures perform a classification. In addition, it is shown where the difficulties lie in seperating different ...