摘要:
Non-volatile storage devices and techniques for operating non-volatile storage are described herein. One embodiment includes accessing “n” pages of data to be programmed into a group of non-volatile storage elements. The “n” pages are mapped to a data state for each of the non-volatile storage elements based on a coding scheme that evenly distributes read errors across the “n” pages of data. Each of the non-volatile storage elements in the group are programmed to a threshold voltage range based on the data states to which the plurality of pages have been mapped. The programming may include programming the “n” pages simultaneously. In one embodiment, mapping the plurality of pages is based on a coding scheme that distributes a significant failure mode (for example, program disturb errors) to a first of the pages and a significant failure mode (for example, data retention errors) to a second of the pages.
摘要:
A nonvolatile memory with a multi-pass programming scheme enables a page of multi-level memory cells to be programmed with reduced floating-gate to floating-gate perturbations (Yuping effect). The memory cells operate within a common threshold voltage range or window, which is partitioned into multiple bands to denote a series of increasingly programmed states. The series is divided into two halves, a lower set and a higher set. The memory cells are programmed in a first, coarse programming pass such that the memory cells of the page with target states from the higher set are programmed to a staging area near midway in the threshold window. In particular, they are programmed closer to their targeted destinations than previous schemes, without incurring much performance penalty. Subsequent passes will then complete the programming more quickly. Yuping effect is reduced since the threshold voltage change in subsequent passes are reduced.
摘要:
A particular method includes predicting, by a mobile device, that interference may occur during one or more specified time slots of a set of upcoming scheduled time slots of a wireless communication channel. The method also includes sending a message to a network device instructing the network device to prevent sending information to the mobile device during the one or more specified time slots.
摘要:
Shifts in the apparent charge stored on a charge storing element of a non-volatile memory cell can occur because of the coupling of an electric field based on the charge stored in adjacent charge storing elements. To compensate for this coupling, the programming process for a given memory cell can take into account the target programmed state of one or more adjacent memory cell. The amount of programming is verified after each programming pulse and the standard verify level for the programming cell is dependent on the target state. The verify level is further offset lower dependent on the amount of perturbation from neighboring cells, determinable by their target states. The verify level is preferably virtually offset by biasing adjacent word lines instead of actually offsetting the standard verify level. For soft-programming erased cells, neighboring cells on both adjacent word lines are taken into account.
摘要:
In view of the characteristics of distributed applications, the present invention proposes a technical solution for applying a shared memory on an NIC comprising: a shared memory configured to provide shared storage space for a task of a distributed application, and a microcontroller. Furthermore, the present invention provides a computer device that includes the above-mentioned NIC, a method for controlling a read/write operation on a shared memory of a NIC, and a method for invoking the NIC. The use of the technical solution provided in the present invention bypasses the processing of network protocol stack, avoids the time delay introduced by the network protocol stack. The present invention does not need to perform TCP/IP encapsulation on the data packet, thus greatly saving additional packet header and packet tail overheads generated from the TCP/IP layer data encapsulation.
摘要:
The present invention provides an email management method, apparatus and terminal device, wherein the method comprises: receiving an email, and judging whether said email is attached with an attachment; if said email is attached with an attachment, extracting attachment information of said email, and saving said attachment information. The solution of the present invention improves the efficiency of email searching, and makes it more convenient for the user to perform searching.
摘要:
A method wherein images of different types of objects within a class are partitioned into region stacks. For each one of the stacks, the method: (a) applies a template to extract fragments having a predetermined size and one of a plurality of different spatial orientations, to generate extracted templates; (b) determines, from the extracted templates, a most frequent one thereof having only a first number of fragments with a common spatial orientations; (c) records the number of images having the determined most frequent extracted template; (d) repeats (b) and (c) with successively increasing number of fragments until the number of recoded images falls below a threshold; and (e) selects as a master extracted template the one of the most frequent templates having the largest recorded number of fragments. The master extracted templates for the stacks are combined into a map that is then compared with background images to remove extracted templates matching segment in the background.
摘要:
The present application relates to polymer-conjugated quantum dots. The quantum dots can include, for example, an inorganic core conjugated to a polymer. The quantum dots may, in some embodiments, be water-soluble and exhibit superior photoluminescence. Also disclosed are methods of making and using the quantum dots.
摘要:
The present invention discloses a data transmission method and an apparatus for a wireless distribution system. The method comprises: receiving data by a wireless access point or a wireless repeater of the wireless distribution system (S202); determining a priority of the data (S204); and transmitting the data according to the determined priority (S206). The present invention achieves a technical effect of providing an optimum wireless resources configuration for the users.
摘要:
A method and apparatus for indicating a temporary block flow (TBF) to which a piggybacked acknowledgement/non-acknowledgement (PAN) field is addressed. A PAN check sequence (PCS) is created, for example using a cyclic redundancy check (CRC) encoding. The PCS is masked with a temporary flow identity (TFI) assigned to a TBF or a mask generated based on the TFI. A data block including the PAN field and the masked PCS is then processed for transmission. The mask may be generated by converting the TFI using an (M, N) code, M being not greater than the number of bits of the PCS and N being the number of bits of the TFI. With this scheme, a TFI may be transmitted in a PAN field without using explicit bits to identify the TBF.