{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T16:02:06Z","timestamp":1740153726735,"version":"3.37.3"},"reference-count":86,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2017,5,27]],"date-time":"2017-05-27T00:00:00Z","timestamp":1495843200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cogn Comput"],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1007\/s12559-017-9482-4","type":"journal-article","created":{"date-parts":[[2017,5,26]],"date-time":"2017-05-26T23:15:47Z","timestamp":1495840547000},"page":"646-658","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Storages Are Not Forever"],"prefix":"10.1007","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3030-1280","authenticated-orcid":false,"given":"Erik","family":"Cambria","sequence":"first","affiliation":[]},{"given":"Anupam","family":"Chattopadhyay","sequence":"additional","affiliation":[]},{"given":"Eike","family":"Linn","sequence":"additional","affiliation":[]},{"given":"Bappaditya","family":"Mandal","sequence":"additional","affiliation":[]},{"given":"Bebo","family":"White","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,27]]},"reference":[{"key":"9482_CR1","unstructured":"Where in the world is storage: a look at byte density across the globe. www.idc.com\/downloads\/where_is_storage_infographic_243338.pdf . Accessed 08 June 2015."},{"key":"9482_CR2","unstructured":"CERN Data Center. http:\/\/home.web.cern.ch\/about\/updates\/2013\/02\/cern-data-centre-passes-100-petabytes . Accessed 08 June 2015."},{"key":"9482_CR3","unstructured":"When the meteor and the 1PB database collide. http:\/\/www.computerworld.com\/article\/2532280\/data-center\/when-the-meteor-and-the-1pb-database-collide.html Accessed 08 June 2015."},{"key":"9482_CR4","unstructured":"NASA Near Earth Object Program. http:\/\/neo.jpl.nasa.gov\/risks\/doc\/sentry_faq.html . Accessed 08 June 2015."},{"key":"9482_CR5","unstructured":"Moving an elephant: large scale Hadoop data migration at Facebook. https:\/\/www.facebook.com\/notes\/paul-yang\/moving-an-elephant-large-scale-hadoop-data-migration-at-facebook\/10150246275318920 . Accessed 08 June 2015."},{"key":"9482_CR6","unstructured":"The digital universe of opportunities: rich data and the increasing value of the internet of things. http:\/\/www.emc.com\/leadership\/digital-universe\/2014iview\/executive-summary.htm . Accessed 08 June 2015."},{"issue":"6065","key":"9482_CR7","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1126\/science.1214131","volume":"335","author":"S Loth","year":"2012","unstructured":"Loth S, Baumann S, Lutz CP, Eigler DM, Heinrich AJ. Bistability in atomic-scale antiferromagnets. Science. 2012;335(6065):196\u20139.","journal-title":"Science"},{"key":"9482_CR8","unstructured":"Physics questions people ask Fermilab. http:\/\/www.fnal.gov\/pub\/science\/inquiring\/questions\/atoms.html . Accessed 08 June 2015."},{"issue":"3","key":"9482_CR9","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/MCI.2014.2326099","volume":"9","author":"Y Zhai","year":"2014","unstructured":"Zhai Y, Ong Y-S, Tsang I. The emerging \u201cbig dimensionality\u201d. IEEE Comput Intell Mag. 2014;9(3):14\u201326.","journal-title":"IEEE Comput Intell Mag."},{"issue":"6","key":"9482_CR10","first-page":"610","volume":"3","author":"R Haralickand","year":"2007","unstructured":"Haralickand R, Shanmugam K, Dinstein I. Textural features for image classification. IEEE Trans Syst Man Cybern. 2007;3(6):610\u201321.","journal-title":"IEEE Trans Syst Man Cybern"},{"key":"9482_CR11","volume-title":"Pattern classification","author":"RO Duda","year":"2001","unstructured":"Duda RO, Hart PE, Stork DG. Pattern classification. New York: Wiley; 2001."},{"key":"9482_CR12","unstructured":"Zhu M, Martinez AM. Optimal subclass discovery for discriminant analysis. In: Conference on computer vision and pattern recognition workshop, 2004. CVPRW \u201904. 2004. p. 97\u2013104."},{"issue":"12","key":"9482_CR13","doi-asserted-by":"crossref","first-page":"1664","DOI":"10.1109\/TSMC.2016.2605159","volume":"46","author":"M Wang","year":"2016","unstructured":"Wang M, Li H-X, Chen X, Chen Y. Deep learning-based model reduction for distributed parameter systems. IEEE Trans Syst Man Cybern Syst. 2016;46(12):1664\u201374.","journal-title":"IEEE Trans Syst Man Cybern Syst."},{"key":"9482_CR14","unstructured":"Dai B, Li H, Wei L. Image processing unit for general-purpose representation and association system for recognizing low-resolution digits with visual information variability. IEEE Trans Syst Man Cybern Syst. 2016."},{"issue":"1","key":"9482_CR15","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1109\/TSMCB.2007.908870","volume":"38","author":"H Zhao","year":"2008","unstructured":"Zhao H, Yuen PC. Incremental linear discriminant analysis for face recognition. IEEE Trans Syst Man Cybern Part B (Cybern). 2008;38(1):210\u201321.","journal-title":"IEEE Trans Syst Man Cybern Part B (Cybern)"},{"key":"9482_CR16","doi-asserted-by":"crossref","first-page":"1000","DOI":"10.1109\/72.788641","volume":"10","author":"B Sch\u00f6lkopf","year":"1999","unstructured":"Sch\u00f6lkopf B, Mika S, Burges C, Knirsch P, M\u00fcller K-R, R\u00e4tsch G, Smola A. Input space versus feature space in kernel-based methods. IEEE Trans Neural Netw. 1999;10:1000\u201317.","journal-title":"IEEE Trans Neural Netw"},{"key":"9482_CR17","doi-asserted-by":"crossref","unstructured":"Mika S, Ratsch G, Weston J, Scholkopf B, Mullers KR. Fisher discriminant analysis with kernels. In: Proceedings of the 1999 IEEE signal processing society workshop neural networks for signal processing IX. 1999. p. 41\u201348.","DOI":"10.1109\/NNSP.1999.788121"},{"issue":"3","key":"9482_CR18","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1109\/TPAMI.2007.70708","volume":"30","author":"XD Jiang","year":"2008","unstructured":"Jiang XD, Mandal B, Kot A. Eigenfeature regularization and extraction in face recognition. IEEE Trans Pattern Anal Mach Intell. 2008;30(3):383\u201394.","journal-title":"IEEE Trans Pattern Anal Mach Intell."},{"issue":"1","key":"9482_CR19","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/s00138-007-0103-1","volume":"20","author":"XD Jiang","year":"2009","unstructured":"Jiang XD, Mandal B, Kot A. Complete discriminant evaluation and feature extraction in kernel space for face recognition. Mach Vis Appl Springer. 2009;20(1):35\u201346.","journal-title":"Mach Vis Appl Springer"},{"key":"9482_CR20","unstructured":"Facebook. 2015. Online social network. https:\/\/www.facebook.com\/ ."},{"key":"9482_CR21","doi-asserted-by":"crossref","unstructured":"Taigman Y, Yang M, Ranzato M, Wolf L. Deepface: closing the gap to human-level performance in face verification. In: CVPR. Columbus; 2014. p. 1701\u20131708.","DOI":"10.1109\/CVPR.2014.220"},{"key":"9482_CR22","unstructured":"Huang GB, Ramesh M, Berg Ta, Learned-Miller E. Labeled faces in the wild: a database for studying face recognition in unconstrained environments. Technical Report 07-49. University of Massachusetts, Amherst. 2007."},{"key":"9482_CR23","doi-asserted-by":"crossref","unstructured":"Wolf L, Hassner T, Maoz I. Face recognition in unconstrained video with matched background similarity. In: IEEE Conference on computer vision and pattern recognition. 2011. p. 529\u2013534.","DOI":"10.1109\/CVPR.2011.5995566"},{"issue":"10","key":"9482_CR24","doi-asserted-by":"crossref","first-page":"1090","DOI":"10.1109\/34.879790","volume":"22","author":"PJ Phillips","year":"2000","unstructured":"Phillips PJ, Moon H, Rizvi S, Rauss P. The FERET evaluation methodology for face recognition algorithms. IEEE Trans Pattern Anal Mach Intell. 2000;22(10):1090\u20131104.","journal-title":"IEEE Trans Pattern Anal Mach Intell."},{"key":"9482_CR25","unstructured":"The Face Recognition Technology (FERET) Normalization. http:\/\/www.cs.colostate.edu\/evalfacerec\/data\/normalization.html . CSU."},{"issue":"1","key":"9482_CR26","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1162\/jocn.1991.3.1.71","volume":"3","author":"M Turk","year":"1991","unstructured":"Turk M, Pentland A. Eigenfaces for recognition. J Cogn Neurosci. 1991;3(1):71\u201386.","journal-title":"J Cogn Neurosci."},{"issue":"8","key":"9482_CR27","doi-asserted-by":"crossref","first-page":"831","DOI":"10.1109\/34.531802","volume":"18","author":"DL Swets","year":"1996","unstructured":"Swets DL, Weng J. Using discriminant eigenfeatures for image retrieval. IEEE Trans Pattern Anal Mach Intell. 1996;18(8):831\u20136.","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"9482_CR28","doi-asserted-by":"crossref","unstructured":"Mandal B, Zhikai W, Li L, Kassim A. Whole space subclass discriminant analysis for face recognition. In: IEEE International conference on image processing (ICIP). Quebec City.","DOI":"10.1109\/ICIP.2015.7350814"},{"key":"9482_CR29","unstructured":"Balduzzi D. 2013. Randomized co-training: from cortical neurons to machine learning and back again. arXiv: 1310.6536 ."},{"issue":"2","key":"9482_CR30","first-page":"13","volume":"5","author":"AK Menon","year":"2011","unstructured":"Menon AK, Elkan C. Fast algorithms for approximating the singular value decomposition. ACM Trans Knowl Discov Data (TKDD). 2011;5(2):13.","journal-title":"ACM Trans Knowl Discov Data (TKDD)"},{"issue":"10","key":"9482_CR31","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1145\/2001269.2001295","volume":"54","author":"H Lee","year":"2011","unstructured":"Lee H, Grosse R, Ranganath R, Ng AY. Unsupervised learning of hierarchical representations with convolutional deep belief networks. Commun ACM. 2011;54(10):95\u2013103.","journal-title":"Commun ACM"},{"key":"9482_CR32","doi-asserted-by":"crossref","unstructured":"Bingham E, Mannila H. Random projection in dimensionality reduction: applications to image and text data. In: ACM SIGKDD. 2001. p. 245\u2013250.","DOI":"10.1145\/502512.502546"},{"key":"9482_CR33","doi-asserted-by":"crossref","unstructured":"Sarlos T. Improved approximation algorithms for large matrices via random projections. In: FOCS. 2006. p. 143\u2013152.","DOI":"10.1109\/FOCS.2006.37"},{"issue":"4","key":"9482_CR34","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1016\/S0022-0000(03)00025-4","volume":"66","author":"D Achlioptas","year":"2003","unstructured":"Achlioptas D. Database-friendly random projections: Johnson-Lindenstrauss with binary coins. J Comput Syst Sci. 2003;66(4):671\u2013687.","journal-title":"J Comput Syst Sci."},{"key":"9482_CR35","unstructured":"Yichao L, Dhillon P, Foster DP, Ungar L. Faster ridge regression via the subsampled randomized hadamard transform. In: Advances in neural information processing systems. 2013. p. 369\u2013377."},{"issue":"01n02","key":"9482_CR36","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1142\/S1793536911000787","volume":"3","author":"JA Tropp","year":"2011","unstructured":"Tropp JA. Improved analysis of the subsampled randomized hadamard transform. Adv Adapt Data Anal. 2011;3(01n02):115\u201326.","journal-title":"Adv Adapt Data Anal"},{"key":"9482_CR37","unstructured":"Lewis L. 1994. Randomness and nondeterminism. In: International congress of mathematicians. Zurich."},{"issue":"32","key":"9482_CR38","first-page":"389","volume":"3","author":"A Kolmogorov","year":"1987","unstructured":"Kolmogorov A, Uspenskii V. Algorithms and randomness. Theor Veroyatnost i Primenen. 1987;3(32):389\u2013412.","journal-title":"Theor Veroyatnost i Primenen."},{"issue":"12","key":"9482_CR39","doi-asserted-by":"crossref","first-page":"1711","DOI":"10.1109\/TSMC.2015.2503381","volume":"46","author":"L Jiao","year":"2016","unstructured":"Jiao L, Denoeux T, Pan Q. A hybrid belief rule-based classification system based on uncertain training data and expert knowledge. IEEE Trans Syst Man Cybern Syst. 2016;46(12):1711\u201323.","journal-title":"IEEE Trans Syst Man Cybern Syst."},{"issue":"6","key":"9482_CR40","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/MIS.2013.140","volume":"28","author":"E Cambria","year":"2013","unstructured":"Cambria E, Huang G-B, et al. Extreme learning machines. IEEE Intell Syst. 2013;28(6):30\u201359.","journal-title":"IEEE Intell Syst."},{"issue":"1","key":"9482_CR41","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1016\/j.neucom.2005.12.126","volume":"70","author":"G-B Huang","year":"2006","unstructured":"Huang G-B, Zhu Q-Y, Siew C-K. Extreme learning machine: theory and applications. Neurocomputing. 2006;70(1):489\u2013501.","journal-title":"Neurocomputing"},{"issue":"2","key":"9482_CR42","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/MCI.2015.2405277","volume":"10","author":"G-B Huang","year":"2015","unstructured":"Huang G-B, Cambria E, Toh K-A, Widrow B, Zongben X. New trends of learning in computational intelligence. IEEE Comput Intell Mag. 2015;10(2):16\u20137.","journal-title":"IEEE Comput Intell Mag"},{"issue":"3","key":"9482_CR43","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1109\/MCI.2016.2572540","volume":"11","author":"L Oneto","year":"2016","unstructured":"Oneto L, Bisio F, Cambria E, Anguita D. Statistical learning theory and ELM for big social data analysis. IEEE Comput Intell Mag. 2016;11(3):45\u201355.","journal-title":"IEEE Comput Intell Mag"},{"issue":"1","key":"9482_CR44","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1007\/s12559-016-9433-5","volume":"9","author":"L Oneto","year":"2017","unstructured":"Oneto L, Bisio F, Cambria E, Anguita D. Semi-supervised learning for affective common-sense reasoning. Cogn Comput. 2017;9(1):18\u201342.","journal-title":"Cogn Comput"},{"issue":"3","key":"9482_CR45","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1007\/s12559-014-9255-2","volume":"6","author":"G-B Huang","year":"2014","unstructured":"Huang G-B. An insight into extreme learning machines: random neurons, random features and kernels. Cogn Comput. 2014;6(3):376\u201390.","journal-title":"Cogn Comput"},{"issue":"1","key":"9482_CR46","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1109\/72.554194","volume":"8","author":"S Ridella","year":"1997","unstructured":"Ridella S, Rovetta S, Zunino R. Circular backpropagation networks for classification. IEEE Trans Neural Netw. 1997;8(1):84\u201397.","journal-title":"IEEE Trans Neural Netw"},{"issue":"4-5","key":"9482_CR47","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/BF00332914","volume":"59","author":"TP Vogl","year":"1988","unstructured":"Vogl TP, Mangis JK, Rigler AK, Zink WT, Alkon DL. Accelerating the convergence of the back-propagation method. Biol Cybern. 1988;59(4-5):257\u201363.","journal-title":"Biol Cybern."},{"issue":"4","key":"9482_CR48","doi-asserted-by":"crossref","first-page":"879","DOI":"10.1109\/TNN.2006.875977","volume":"17","author":"G-B Huang","year":"2006","unstructured":"Huang G-B, Chen L, Siew C-K. Universal approximation using incremental constructive feedforward networks with random hidden nodes. IEEE Trans Neural Netw. 2006;17(4):879\u201392.","journal-title":"IEEE Trans Neural Netw."},{"issue":"2","key":"9482_CR49","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/s13042-011-0019-y","volume":"2","author":"G-B Huang","year":"2011","unstructured":"Huang G-B, Wang DH, Lan Y. Extreme learning machines: a survey. Int J Mach Learn Cybern. 2011;2(2):107\u2013122.","journal-title":"Int J Mach Learn Cybern."},{"issue":"2","key":"9482_CR50","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1109\/TSMCB.2011.2168604","volume":"42","author":"G-B Huang","year":"2012","unstructured":"Huang G-B, Zhou H, Ding X, Zhang R. Extreme learning machine for regression and multiclass classification. IEEE Trans Syst Man Cybern Part B: Cybern. 2012;42(2):513\u201329.","journal-title":"IEEE Trans Syst Man Cybern Part B: Cybern"},{"key":"9482_CR51","first-page":"389","volume-title":"Connectionist natural language processing: a status report, volume 292 of Computational architectures integrating neural and symbolic processes","author":"M Dyer","year":"1995","unstructured":"Dyer M. Connectionist natural language processing: a status report, volume 292 of Computational architectures integrating neural and symbolic processes. Dordrecht: Kluwer Academic; 1995, pp. 389\u2013429."},{"issue":"2","key":"9482_CR52","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/MCI.2014.2307227","volume":"9","author":"E Cambria","year":"2014","unstructured":"Cambria E, White B. Jumping NLP curves: a review of natural language processing research. IEEE Comput Intell Mag. 2014;9(2):48\u201357.","journal-title":"IEEE Comput Intell Mag"},{"key":"9482_CR53","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1016\/j.knosys.2016.07.019","volume":"108","author":"I Chaturvedi","year":"2016","unstructured":"Chaturvedi I, Ong Y-S, Tsang IW, Welsch RE, Cambria E. Learning word dependencies in text by means of a deep recurrent belief network. Knowl-Based Syst. 2016;108:144\u201354.","journal-title":"Knowl-Based Syst"},{"issue":"2","key":"9482_CR54","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1177\/0165551506070706","volume":"33","author":"J Rowley","year":"2007","unstructured":"Rowley J. The wisdom hierarchy: representations of the DIKW hierarchy. J Inf Sci. 2007;33(2):163\u2013180.","journal-title":"J Inf Sci."},{"key":"9482_CR55","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.knosys.2014.07.002","volume":"69","author":"E Cambria","year":"2014","unstructured":"Cambria E, Wang H, White B. Guest editorial: big social data analysis. Knowl-Based Syst. 2014;69:1\u20132.","journal-title":"Knowl-Based Syst"},{"key":"9482_CR56","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-23654-4","volume-title":"Sentic computing: a common-sense-based framework for concept-level sentiment analysis","author":"E Cambria","year":"2015","unstructured":"Cambria E, Hussain A. Sentic computing: a common-sense-based framework for concept-level sentiment analysis. Cham: Springer; 2015."},{"key":"9482_CR57","doi-asserted-by":"crossref","unstructured":"Poria S, Cambria E, Gelbukh A, Bisio F, Hussain A. Sentiment data flow analysis by means of dynamic linguistic patterns. IEEE Comput Intell Mag. 2015;10(4):26\u201336.","DOI":"10.1109\/MCI.2015.2471215"},{"key":"9482_CR58","unstructured":"Cambria E, Poria S, Bajpai R, Schuller B. SenticNet 4: a semantic resource for sentiment analysis based on conceptual primitives. In: COLING. 2016. p. 2666\u20132677."},{"key":"9482_CR59","unstructured":"Cambria E, Hussain A, Havasi C, Eckl C, Munro J. 2010. Towards crowd validation of the UK national health service. In: WebSci. Raleigh."},{"key":"9482_CR60","unstructured":"The international technology roadmap for semiconductors (ITRS). International technology roadmap for semiconductors - 2013 edition. http:\/\/dx.doi.org\/http:\/\/www.itrs.net . 2013."},{"key":"9482_CR61","doi-asserted-by":"crossref","unstructured":"Menzel S, Linn E, Waser R. Redox-based resistive memory. Wiley; 2015. vol. 1, chapter 8, p. 137\u2013161.","DOI":"10.1002\/9781118958254.ch08"},{"issue":"14","key":"9482_CR62","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1149\/06414.0003ecst","volume":"64","author":"I Valov","year":"2014","unstructured":"Valov I, Tappertzhofen S, Linn E, Menzel S, van den Hurk J, Waser R. Atomic scale and interface interactions in redox-based resistive switching memories. ECS Trans. 2014;64(14):3\u201318.","journal-title":"ECS Trans."},{"issue":"25","key":"9482_CR63","doi-asserted-by":"crossref","first-page":"254027\/1","DOI":"10.1088\/0957-4484\/22\/25\/254027","volume":"22","author":"VV Zhirnov","year":"2011","unstructured":"Zhirnov VV, Meade R, Cavin RK, Sandhu G. Scaling limits of resistive memories. Nanotechnology. 2011;22(25):254027\/1\u201321.","journal-title":"Nanotechnology"},{"key":"9482_CR64","doi-asserted-by":"crossref","unstructured":"Chien W-C, Lee M-H, Lee F-M, Lin Y-Y, Lung H-L, Hsieh K-Y, Lu C-Y. A multi-level 40nm WOX resistive memory with excellent reliability. In: 2011 IEEE international electron devices meeting IEDM \u201911. 2011.","DOI":"10.1109\/IEDM.2011.6131651"},{"issue":"12","key":"9482_CR65","doi-asserted-by":"crossref","first-page":"1287","DOI":"10.1016\/j.sse.2009.09.034","volume":"53","author":"C K\u00fcgeler","year":"2009","unstructured":"K\u00fcgeler C, Meier M, Rosezin R, Gilles S, Waser R. High density 3D memory architecture based on the resistive switching effect. Solid State Electron. 2009;53(12):1287\u201392.","journal-title":"Solid State Electron."},{"key":"9482_CR66","doi-asserted-by":"crossref","first-page":"1047","DOI":"10.1038\/35023282","volume":"406","author":"S Lloyd","year":"2000","unstructured":"Lloyd S. Ultimate physical limits to computation. Nature. 2000;406:1047\u201354.","journal-title":"Nature"},{"issue":"7191","key":"9482_CR67","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1038\/nature06932","volume":"453","author":"DB Strukov","year":"2008","unstructured":"Strukov DB, Snider GS, Stewart DR, Williams RS. The missing memristor found. Nature. 2008;453(7191):80\u20133.","journal-title":"Nature"},{"issue":"2","key":"9482_CR68","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1109\/PROC.1976.10092","volume":"64","author":"LO Chua","year":"1976","unstructured":"Chua LO, Kang SM. Memristive devices and systems. Proc IEEE. 1976;64(2):209\u201323.","journal-title":"Proc IEEE"},{"issue":"7290","key":"9482_CR69","doi-asserted-by":"crossref","first-page":"873","DOI":"10.1038\/nature08940","volume":"464","author":"J Borghetti","year":"2010","unstructured":"Borghetti J, Snider GS, Kuekes PJ, Yang JJ, Stewart DR, Williams RS. \u2018Memristive\u2019 switches enable \u2018stateful\u2019 logic operations via material implication. Nature. 2010;464(7290):873\u201376.","journal-title":"Nature"},{"key":"9482_CR70","doi-asserted-by":"crossref","first-page":"305205","DOI":"10.1088\/0957-4484\/23\/30\/305205","volume":"23","author":"E Linn","year":"2012","unstructured":"Linn E, Rosezin R, Tappertzhofen S, B\u00f6ttger U, Waser R. Beyond von Neumann\u2014logic operations in passive crossbar arrays alongside memory operations. Nanotechnology. 2012;23:305205.","journal-title":"Nanotechnology"},{"key":"9482_CR71","doi-asserted-by":"crossref","first-page":"36652 EP","DOI":"10.1038\/srep36652","volume":"6","author":"W Kim","year":"2016","unstructured":"Kim W, Chattopadhyay A, Siemon A, Linn E, Waser R, Rana V. Multistate memristive tantalum oxide devices for ternary arithmetic. Sci Rep 2016;6:36652 EP \u2013, 11.","journal-title":"Sci Rep"},{"key":"9482_CR72","doi-asserted-by":"crossref","unstructured":"Siemon A, Breuer T, Aslam N, Ferch S, Kim W, van den Hurk J, Rana V, Hoffmann-Eifert S, Waser R, Menzel S, Linn E. 2015. Realization of Boolean logic functionality using redox-based memristive devices. Adv Funct Mater.","DOI":"10.1002\/adfm.201500865"},{"key":"9482_CR73","doi-asserted-by":"crossref","unstructured":"Siemon A, Menzel S, Chattopadhyay A, Waser R, Linn E. 2015. In-memory adder functionality in 1S1R arrays. In: Proceedings of 2014 IEEE international symposium on circuits and systems (ISCAS).","DOI":"10.1109\/ISCAS.2015.7168889"},{"issue":"1","key":"9482_CR74","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/JETCAS.2015.2398217","volume":"5","author":"A Siemon","year":"2015","unstructured":"Siemon A, Menzel S, Waser R, Linn E. A complementary resistive switch-based crossbar array adder. IEEE J Emerg Sel Top Circ Syst. 2015;5(1):64\u201374.","journal-title":"IEEE J Emerg Sel Top Circ Syst."},{"key":"9482_CR75","doi-asserted-by":"crossref","unstructured":"Breuer T, Siemon A, Linn E, Menzel S, Waser R, Rana V. 2015. A HfO2-based complementary switching crossbar adder. Adv Electron Mater.","DOI":"10.1002\/aelm.201500138"},{"key":"9482_CR76","doi-asserted-by":"crossref","unstructured":"Bhattacharjee D, Chattopadhyay A. Efficient binary basic linear algebra operations on reram crossbar arrays. In: 2017 30th international conference on VLSI design and 2017 16th international conference on embedded systems (VLSID). 2017. p. 277\u2013282.","DOI":"10.1109\/VLSID.2017.10"},{"key":"9482_CR77","doi-asserted-by":"crossref","unstructured":"Bhattacharjee D, Chattopadhyay A. In-memory data compression using ReRAMs. Springer International Publishing; 2017. p. 275\u2013291.","DOI":"10.1007\/978-3-319-54840-1_13"},{"key":"9482_CR78","doi-asserted-by":"publisher","unstructured":"Traversa FL, Di Ventra M. Universal memcomputing machines. IEEE Trans Neural Netw Learn Syst. [published online; doi: 10.1109\/TNNLS.2015.2 ]. 2015. p. 1\u201314.","DOI":"10.1109\/TNNLS.2015.2"},{"key":"9482_CR79","doi-asserted-by":"crossref","first-page":"1047","DOI":"10.1038\/35023282","volume":"406","author":"S Lloyd","year":"2000","unstructured":"Lloyd S. Ultimate physical limits to computation. Nature. 2000;406:1047\u201354.","journal-title":"Nature"},{"key":"9482_CR80","unstructured":"How many stars are there in our galaxy (Milky Way)? http:\/\/curious.astro.cornell.edu\/about-us\/78-the-universe\/stars-and-star-clusters\/general-questions\/343-how-many-stars-are-there-in-our-galaxy-milky-way-intermediate Accessed 09 June 2015."},{"key":"9482_CR81","unstructured":"2014 Astronomical Constants. http:\/\/asa.usno.navy.mil\/static\/files\/2014\/Astronomical_Constants_2014.pdf . Accessed: 09 June 2015."},{"issue":"2","key":"9482_CR82","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1103\/PhysRevD.23.287","volume":"23","author":"JD Bekenstein","year":"1981","unstructured":"Bekenstein JD. Universal upper bound on the entropy-to-energy ratio for bounded systems. Phys Rev D. 1981; 23(2):287\u201398.","journal-title":"Phys Rev D"},{"issue":"6102","key":"9482_CR83","doi-asserted-by":"crossref","first-page":"1628","DOI":"10.1126\/science.1226355","volume":"337","author":"GM Church","year":"2012","unstructured":"Church GM, Gao Y, Kosuri S. Next-generation digital information storage in DNA. Science. 2012;337(6102):1628.","journal-title":"Science"},{"key":"9482_CR84","unstructured":"Delay- and disruption-tolerant networks (DTNs): a tutorial, version 2.0. http:\/\/ipnsig.org\/links-for-academics-and-technical-folks\/ . Accessed 09 June 2015."},{"issue":"1","key":"9482_CR85","doi-asserted-by":"crossref","first-page":"134","DOI":"10.2218\/ijdc.v3i1.48","volume":"3","author":"S Higgins","year":"2008","unstructured":"Higgins S. The DCC curation lifecycle model. Int J Digit Curat. 2008;3(1):134\u201340.","journal-title":"Int J Digit Curat"},{"issue":"3","key":"9482_CR86","doi-asserted-by":"crossref","first-page":"462","DOI":"10.1109\/21.31053","volume":"19","author":"G Klein","year":"2002","unstructured":"Klein G, Calderwood R, MacGregor D. Critical decision method for eliciting knowledge. IEEE Trans Syst Man Cybern. 2002;19(3):462\u201372.","journal-title":"IEEE Trans Syst Man Cybern"}],"container-title":["Cognitive Computation"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12559-017-9482-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12559-017-9482-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12559-017-9482-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T01:21:50Z","timestamp":1569374510000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12559-017-9482-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,27]]},"references-count":86,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2017,10]]}},"alternative-id":["9482"],"URL":"https:\/\/doi.org\/10.1007\/s12559-017-9482-4","relation":{},"ISSN":["1866-9956","1866-9964"],"issn-type":[{"type":"print","value":"1866-9956"},{"type":"electronic","value":"1866-9964"}],"subject":[],"published":{"date-parts":[[2017,5,27]]}}}