MEMprop: Gradient-based Learning To Train Fully Memristive SNNs

New technical paper titled "Gradient-based Neuromorphic Learning on Dynamical RRAM Arrays" from IEEE researchers. Abstract "We present MEMprop, the adoption of gradient-based learning to train fully memristive spiking neural networks (MSNNs). Our approach harnesses intrinsic device dynamics to trigger naturally arising voltage spikes. These spikes emitted by memristive dynamics are anal... » read more

End-to-End System for Object Localization By Coupling pMUTs to a Neuromorphic RRAM-based Computational Map

New research paper titled "Neuromorphic object localization using resistive memories and ultrasonic transducers" from researchers at CEA, LETI, Université Grenoble Alpes and others. Abstract "Real-world sensory-processing applications require compact, low-latency, and low-power computing systems. Enabled by their in-memory event-driven computing abilities, hybrid memristive-Complementary... » read more

Using Dynamic Route Map Technique for Insight Into Memristors

New technical paper titled "Empirical Characterization of ReRAM Devices Using Memory Maps and a Dynamic Route Map," from Balearic Islands University, UC Berkeley, Health Institute of the Balearic Islands, International Hellenic University, Technische Universität Dresden, Universidad de Valladolid, and Aristotle University of Thessaloniki. Abstract: "Memristors were proposed in the early 1... » read more

Analog Edge Inference with ReRAM

Abstract "As the demands of big data applications and deep learning continue to rise, the industry is increasingly looking to artificial intelligence (AI) accelerators. Analog in-memory computing (AiMC) with emerging nonvolatile devices enable good hardware solutions, due to its high energy efficiency in accelerating the multiply-and-accumulation (MAC) operation. Herein, an Applied Materials... » read more

Hiding Security Keys Using ReRAM PUFs

Resistive RAM and physically unclonable functions (PUFs) have been gaining traction for completely different reasons, but when combined they create an extremely secure and inexpensive way of storing authentication keys. As security concerns shift from purely software to a combination of hardware and software, chipmakers and systems companies have been scrambling to figure out how to prevent ... » read more

Data-driven RRAM device models using Kriging interpolation

New technical paper from The George Washington University and NIST with support from DARPA and others. Abstract "A two-tier Kriging interpolation approach is proposed to model jump tables for resistive switches. Originally developed for mining and geostatistics, its locality of the calculation makes this approach particularly powerful for modeling electronic devices with complex behavior la... » read more

Key Recovery for Content Protection Using Ternary PUFs Designed with Pre-Formed ReRAM

RESEARCH PAPER Abstract "Physical unclonable functions, embedded in terminal devices, can be used as part of the recovery process of session keys that protect digital files. Such an approach is only valuable when the physical element offers sufficient tamper resistance. Otherwise, error correcting codes should be able to handle any variations arising from aging, and environmentally induce... » read more

Comprehensive Model of Electron Conduction in Oxide-Based Memristive Devices

Abstract "Memristive devices are two-terminal devices that can change their resistance state upon application of appropriate voltage stimuli. The resistance can be tuned over a wide resistance range enabling applications such as multibit data storage or analog computing-in-memory concepts. One of the most promising classes of memristive devices is based on the valence change mechanism in oxide... » read more

Making PUFs Even More Secure

As security has become a must-have in most systems, hardware roots of trust (HRoTs) have started appearing in many chips. Critical to an HRoT is the ability to authenticate and to create keys – ideally from a reliable source that is unviewable and immutable. “We see hardware roots of trust deployed in two use models — providing a foundation to securely start a system, and enabling a se... » read more

Power/Performance Bits: Nov. 16

Light-emitting memory Researchers from Kyushu University and National Taiwan Normal University propose a 'light-emitting memory' based on a perovskite that can simultaneously store and visually transmit data. The team used the idea in conjunction with resistive RAM (RRAM), in which states of high and low resistance represent ones and zeros. "The electrical measurements needed to check the r... » read more

← Older posts Newer posts →