{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:04:26Z","timestamp":1730279066367,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1109\/itw.2018.8613473","type":"proceedings-article","created":{"date-parts":[[2019,1,18]],"date-time":"2019-01-18T00:39:34Z","timestamp":1547771974000},"page":"1-5","source":"Crossref","is-referenced-by-count":1,"title":["Error Correction and Detection for Computing Memories Using System Side Information"],"prefix":"10.1109","author":[{"given":"Clayton","family":"Schoeny","sequence":"first","affiliation":[]},{"given":"Irina","family":"Alam","sequence":"additional","affiliation":[]},{"given":"Mark","family":"Gottscho","sequence":"additional","affiliation":[]},{"given":"Puneet","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Lara","family":"Dolecek","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.101"},{"key":"ref11","article-title":"The Stateof-art and Future Trends in Testing Embedded Memories","author":"hamdioui","year":"0","journal-title":"Proc IEEE Int Workshop on Memory Technology Design and Testing (MTDT)"},{"key":"ref12","article-title":"Memory Resiliency","volume":"17","author":"lu","year":"2013","journal-title":"Intel Technology Journal"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2010.2071890"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2018336"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.140504"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2603621"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1561\/0100000084","article-title":"Channel Coding Methods for Non-Volatile Memories","author":"dolecek","year":"2016","journal-title":"Foundations and Trends in Information and Coding Theory"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-W.2016.67"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3126534"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2007.892185"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2016.2630270"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2830772.2830804"},{"key":"ref6","first-page":"1","article-title":"A White Paper on the Benefits of Chipkill-Correct ECC for PC Server Main Memory","volume":"11","author":"dell","year":"1997","journal-title":"IBM Microelectronics Division"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1147\/rd.144.0395","article-title":"A Class of Optimal Minimum Odd-weight-column SECDED Codes","volume":"14","author":"hsiao","year":"1970","journal-title":"IBM Journal of Research and Development"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/L-CA.2012.21"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2503210.2503243"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.57"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1982.1676056"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1555349.1555372"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2017.8278033"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2016.7841934"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-W.2018.00048"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.62"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2017.8006651"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/WWC.2001.990739"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.21236\/ADA605735"}],"event":{"name":"2018 IEEE Information Theory Workshop (ITW)","start":{"date-parts":[[2018,11,25]]},"location":"Guangzhou","end":{"date-parts":[[2018,11,29]]}},"container-title":["2018 IEEE Information Theory Workshop (ITW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8598908\/8613300\/08613473.pdf?arnumber=8613473","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T23:51:19Z","timestamp":1643241079000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8613473\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/itw.2018.8613473","relation":{},"subject":[],"published":{"date-parts":[[2018,11]]}}}