The embodiments of the present invention relate to error correction. More particularly, embodiments of the present invention relate to two bit error correction for signals encoded via Bose-Chaudhuri-Hocquenghem (BCH) codes.
Generally most electronic devices are equipped with a form of error detection and error correction. For example, most DVD players, wireless devices, flash devices, etc., implement algorithms for error correction of encoded data. Algorithms used for error correction operate on data encoded via convolutional codes, e.g., Viterbi decode, and block codes, e.g., Reed-Solomon codes, turbo codes, Bose-Chaudhuri-Hocquenghem (BCH) codes, Reed-Muller codes, Binary Golay codes, etc.
Algorithms used for error correction may depend on the type of electronic device using the data and its application. For example, NAND flash technology may require high error correction, e.g., 16 bits. Accordingly, a BCH code may be used to correct t-errors in a given data block. The design of the BCH code is influenced by the number of error correction bits required and the data block size.
In general, error correction using BCH codes requires the syndromes to be generated from the encoded data. An error locator polynomial M(x) is calculated from the generated syndromes. The roots of the error locator polynomial M(x) are found in order to determine the location of the error bits.
Unfortunately, finding the roots of the error locator polynomial M(x) is an iterative process, e.g., using Chien's search, and can be very time consuming. The duration of the iterative process depends on the data block size and may take hundreds to thousands of clock cycles to complete.
Generally, one or two bit error conditions have a higher probability distribution in comparison to more than two bit errors. Thus, fast decoding procedures for one or two error bit conditions improves the effective bandwidth of BCH codes.
A hamming code may be used for correcting a single-error, thereby improving the number of clock cycles required. Faster decoding circuits have been developed for two bit errors, as described by Saxena et al., U.S. Pat. No. 5,533,035 and by Kustedjo et al., U.S. Pat. No. 4,360,916.
Unfortunately, the faster two bit error correction described by Saxena et al, and Kustedjo et al., are still iterative. Normally each potential error position is tried until the error is detected and corrected. Thus, the faster two bit error correction, as described by Saxena et al., and Kustedjo et al., while improving the effective bandwidth of BCH codes still require hundreds if not thousands of iterative clock cycles.
Accordingly, a need has arisen to develop a non-iterative approach for correcting two bit errors in BCH encoded data (“BCH codes”). Moreover, a need has arisen to correct two bit errors in BCH codes in relatively few clock cycles. It will become apparent to those skilled in the art after reading the detailed description of the present invention that the embodiments of the present invention satisfy the above mentioned needs.
An error locator unit for correcting two bit errors for BCH codes may include a first plurality of operational units, a normalized basis transform unit, and a conversion unit. The error locator unit implements a non-iterative procedure for correcting two bit errors in BCH codes.
According to one embodiment, the first plurality of operational units receives two syndromes generated for a polynomial in a first basis of a Galois Field. The two syndromes are associated with a data block encoded with BCH codes. The first plurality of operational units calculates two coefficients of the polynomial based on the two syndromes and performs a mathematical operation on the two coefficients to produce a root definition value vector in the first basis.
The normalized basis transform unit transforms the root definition value vector to a normal basis to produce a plurality of roots in the normal basis. It is appreciated that the normal basis transforms a square operation in the first basis to a circular operation in the normal basis. According to one embodiment, a lookup table is used to access the normal basis. Furthermore, it is appreciated that the polynomial in the first basis may be associated with more than one normal basis.
In one embodiment, the conversion unit converts the plurality of roots in the normal basis to the first basis. The conversion results in a plurality of roots in the first basis.
It is appreciated that the error locator unit may further include a second plurality of operational units operable to compute a scaling factor based on the two coefficients calculated from the two syndromes. The error locator unit may also include a computational unit operable to scale the plurality of roots in the first basis by the scaling factor to produce a plurality of scaled roots for the polynomial in the first basis. It is appreciated that the computational unit is further operable to add the plurality of scaled roots to produce error locations for the polynomial.
According to one embodiment, an instant root of the plurality of roots in the first basis is equal to a root preceding the instant root in the first basis plus an instant normal basis root. The instant normal basis root is a root in the normal basis that corresponds to the instant root of the plurality of roots in the first basis.
According to one embodiment, the error locator unit includes a control unit operable to generate a control signal based on a plurality of coefficients of the polynomial in the first basis received from an error locator polynomial unit. The control signal indicates whether a two bit error has occurred. In one embodiment, the plurality of scaled roots added to one another is associated with error locations of the polynomial if the control signal indicates that a two bit error has occurred.
It is appreciated that the error locator unit for correcting two bit errors for BCH codes according to embodiments of the present invention is a non-iterative approach that takes very few clock cycles to complete. For example, the error locator unit according to embodiments of the present invention may complete their computation in 8 clock cycles.
As a result, a two bit error correction for BCH codes is developed where squaring in one basis is transformed to a circular shift in its normalized basis. Thus, a non-iterative procedure of the instant embodiments replaces the iterative process of the conventional art, thereby improving the effective bandwidth of BCH codes.
Embodiments of the present invention are illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings and in which like reference numerals refer to similar elements and in which:
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings. While the invention will be described in conjunction with these embodiments, it will be understood that they are not intended to limit the invention to these embodiments. On the contrary, the invention is intended to cover alternatives, modifications and equivalents, which may be included within the spirit and scope of the invention as defined by the appended claims. Furthermore, in the following detailed description of the present invention, numerous specific details are set forth in order to provide a thorough understanding of the present invention. However, it will be evident to one of ordinary skill in the art that the present invention may be practiced without these specific details. In other instances, well known methods, procedures, components, and circuits have not been described in detail as not to unnecessarily obscure aspects of the invention.
Notation and Nomenclature
Some portions of the detailed descriptions which follow are presented in terms of procedures, steps, logic blocks, processing, and other symbolic representations of operations on data bits that can be performed on computer memory. These descriptions and representations are the means used by those skilled in the art to most effectively convey the substance of their work to others skilled in the art. A procedure, computer executed step, logic block, process, etc., is here, and generally, conceived to be a self-consistent sequence of steps or instructions leading to a desired result. The steps are those requiring physical manipulations of physical quantities.
Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated in a computer system. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.
It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise as apparent from the following discussions, it is appreciated that throughout the present invention, discussions utilizing terms such as “processing” or “creating” or “transferring” or “executing” or “determining” or “instructing” or “issuing” or “clearing” or “accessing” or “obtaining” or “selecting” or “calculating” or “measuring” or “querying” or “receiving” or “sending” or “providing” or “storing” or “incrementing” or “ordering” or “transmitting” or “computing” or “performing” or “converting” or “scaling” or “generating” or the like, refer to the action and processes of a computer system, or similar electronic computing device, that manipulates and transforms data represented as physical (electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission or display devices.
Method and System for Fast Two Bit Error Correction
Referring now to
The encoder unit 110 on the encoder side receives a data block. The encoder unit 110 encodes the data block with error correcting code technology, e.g., Bose-Chaundhuri-Hocquenghem (BCH) codes. A t-error correcting BCH code is capable of correcting up to t errors in a given data block. It is appreciated that the design of the BCH code may depend on the size of the data block. It is appreciated that the probability distribution of one bit error and two bit error are exponentially higher in comparison to probability distribution of multi-bit error. A one bit error may be corrected using hamming codes. Embodiments of the present invention are employed to correct a two bit error because occurrence of a two bit error is exponentially more likely than the probability distribution of multi-bit error.
Embodiments of the present invention compute the locations of two bit errors using a non-iterative approach whereas the conventional approach uses an iterative approach. The non-iterative approach of embodiments of the present invention transforms a squaring operation of a two bit error into a shift operation. Squaring operation of the iterative approach of the conventional approach is computationally intensive, e.g., may require hundreds and thousands of clock cycles. In comparison, the shift operation for non-iterative approach of the embodiments of the present invention is computationally less intensive. For example, the non-iterative approach may only require 8 clock cycles. As a result, the embodiments of the present invention improve the effective bandwidth of BCH codes and significantly reduce the number of clock cycles required.
The encoded data block is received at the decoder side by the syndrome generator unit 120. The syndrome generator unit 120 generates the syndromes, e.g., S1, S2, . . . , S2t, for the encoded data block using well known techniques. The generated syndromes are transmitted to the error locator polynomial unit 130. The generated syndromes, e.g., S1, S2, . . . , S2t, are used by the error locator polynomial unit 130 to generate the coefficients of the error locator polynomial. The error locator polynomial is:
M(x)=(1+αjx) . . . (1+αkx)=1+(αi+αj+ . . . +αk)x+ . . . +(αi+αj+ . . . +αk)x2t
where i, j, and k are unknown locations of error bits and where M0=M[0]=1, M1=M[1]=αi+αj+ . . . +αk, . . . , and M2t=M[2t]=αi+j+ . . . +k are known coefficients of the polynomial M(x).
It is appreciated that finding the error locations based on the polynomial M(x) determines the locations of the error bits. The coefficients M0, M1, . . . , and M2t are used by the conventional error locator unit 150 to determine the locations of error bits without any presumption regarding the number of error bits. It is appreciated that searching for the roots of the polynomial is performed in a Galois Field (GF) (2m) where 2 represents binary numbers and m represents the order of the polynomial. The conventional error locator unit 150 uses an iterative search, e.g., Chien's search, in Galois Field to find the roots of the polynomial, thereby determining the error locations. The conventional error locator unit 150 outputs the result of the search, e.g., L′0, L′1, . . . , L′2t.
Presuming that a two bit error has occurred, the error locator polynomial becomes M(x)=1+(αi+αj)x+(αi+j)x2. It is well known that M1=S12 and M2=S1−1S3 for a two bit error. Accordingly, embodiments of the present invention need not delay finding the error locations until the polynomial is completely generated by the error locator polynomial unit 130 because the coefficients of the polynomial, e.g., M1 and M2, can be calculated from S1 and S3 directly. In other words, error locator unit 140 in accordance with embodiments of the present invention can commence operating once S1 and S3 are known.
The error locator unit 140 receives the syndromes S1 and S3. The error locator unit 140 uses the received syndromes to calculate the error locations in a few clock cycles, e.g., 8 clock cycles, presuming that only a two bit error has occurred. The error locator unit 140 is a non-iterative error locator and therefore calculates the error locations in a few clock cycles as opposed to a few hundred or a few thousand clock cycles of the conventional approach. The error locator unit 140 improves efficiency by transforming a squaring operation for the polynomial with two error bit in to a circular shift operation. A description for calculating locations for a two bit error is described in
The error locator unit 140 further receives the coefficients of the polynomial calculated by the error locator polynomial unit 130. The error locator unit 140 uses the received coefficients of the polynomial to verify whether the presumption is correct that only a two bit error has occurred. For example, the error locator unit 140 may compare the received coefficients with the calculated coefficients from S1 and S3 syndromes. The occurrence of a two bit error is confirmed if the received coefficients match those calculated by the error locator unit 140. In response to the verification, the error locator unit 140 generates a control signal to the multiplexer 160. In another embodiment, the error locator unit 140 determines that the presumption is false if the M0 coefficient received from the error locator polynomial unit 130 is zero.
It is appreciated that by the time that the error locations and the control signal are generated by the error locator unit 140, the conventional error locator unit 150 is operating and is performing an exhaustive search to find the roots of the error locator polynomial. The error locations computed by the error locator unit 140 and the control signal are input to a switching mechanism, e.g., the multiplexer 160. If the control signal confirms that a two bit error has occurred, then the multiplexer 160 outputs the error locations L0, L1, . . . , L2t from the error locator unit 140 without having to wait for the results of the conventional error locator unit 150. As a result, finding the error locations is performed in a few clock cycles as opposed to many hundreds and thousands of clock cycles of the conventional approach. On the other hand, if the control signal indicates that two bit error has not occurred, then the multiplexer 160 does not output the error locations L0, L1, . . . , L2t from the error locator unit 140 and awaits the result from the conventional error locator unit 150 assuming an error occurred.
Accordingly, employing the iterative approach to correct a two bit error significantly improves the effective bandwidth of decoding BCH codes. For example, the iterative approach can locate errors in 8 clock cycles.
Referring now to
M(x)=ax2+bx+c, where a=M2, b=M1 and c=M0
Finding the roots of the error locator polynomial of the second order in the Galois Field requires a squaring operation that takes many clock cycles. Embodiments of the present invention take advantage of transforming the squaring operation of the Galois Field in to a circular shift operation in its normalized basis that requires a few clock cycles, e.g., less than 10 clock cycles, to find their respective roots.
It is appreciated that more than one normalized basis may be possible for any given polynomial. Thus, one or more normalized basis may be stored in a memory component and the desired normalized basis may be selected accordingly.
Transforming the error locator polynomial into a normalized basis and replacing x with bz/a results in:
b2/a (Z2+Z+β)=0 where β=a/b2=M2/M12
Z2+Z+β=0 can be written as Z2+Z=β. Solving the equation results in β where β is a vector, e.g., β=[b0, b1, b2, . . . , bM-1]. Transforming from the normalized basis back to the original Galois Field provides the error locations e.g., α0, α1, . . . , αM-1, for the error locator polynomial M(x) where α0=b0, α1=b0+b1, . . . , αM-1=b0+b1+ . . . +bM-1.
The error locations α0, α1, . . . , αM-1 are now scaled back by a factor of b/a because x=bz/a. The scaled error locations are added to generate the error locations L0, L1, . . . , L2t.
Accordingly, the computationally intensive quadratic equation in the original Galois Field has been transformed to a circular shift operation by transformation of coefficients into a normalized basis, thereby substantially reducing the number of clock cycles needed to find the error locations. Components of the error locator unit 140 to achieve the above objective are now described. The error locator unit 140 comprises a coefficient computation unit 205 operable to receive the syndromes S1 and S3 and to compute M[1] and M[2], as described above.
The error locator unit 140 of
The output of the multiplication unit 230 is transformed into a normalized basis by accessing a table where the normalized basis (one or more) is stored. The normalized basis transform unit 240 transforms β to a normalized basis producing a vector [b0, b1, b2, . . . , bM-1]. A conversion unit 250 transforms the vector [b0, b1, b2, . . . , bM-1] from the normalized basis back to the original Galois Field. Accordingly, the error locations e.g., α0, α1, . . . , αM-1, for the error locator polynomial M(x) can be found where α0=b0, α1=b0+b1, . . . , αM-1=b0+b1+ . . . +bM−1.
A multiplication/add unit 260 scales the roots back by a factor of b/a because x=bz/a and adds them in order to form the polynomial with their error locations, e.g., L0, L1, . . . , L2t. The scaling factor b/a may be generated using an inverse unit 270 and a multiplication unit 280. For example, the inverse unit 270 may receive M[2] from the coefficient computation unit 205 and inverse it to produce 1/M[2]. The multiplication unit 280 may receive M[1] from the coefficient computation unit 205 and further receive 1/M[2] from the inverse unit 270. Thus, the scaling factor b/a or M[1]/M[2] may be generated when the multiplication unit 280 multiplies the two inputs.
It is appreciated that the error locator unit 140 may further include a control unit 290. The control unit 290 receives coefficients of the error locator polynomial M(x) from the error locator polynomial unit 130. The control unit 290 uses the received coefficients from the error locator polynomial unit 130 to verify whether the presumption that a two bit error has occurred is correct. For example, the control unit 290 may compare the received coefficients from the error locator polynomial unit 130 to the calculated coefficients of the coefficient computation unit 205. The control signal may indicate that a two bit error has occurred if there is a match and it may indicate otherwise if there is no match, for instance.
At step 320, using the two received syndromes, a first and a second coefficient, e.g., M1 and M2, for the error locator polynomial are calculated by the coefficient computation unit 205, for instance. At step 330, a first mathematical operation is performed on the first and the second coefficient. For example, M[2]M[1]−2 is calculated in the Galois Field. The first mathematical operation results in a root definition value vector. At step 340, the root definition value vector is transformed and converted into its normalized basis, e.g., using the normalized basis transform unit 240. At step 350, roots associated with the root definition value vector in the normalized basis is computed to produce a plurality of roots in the normalized basis, e.g., β=[b0, b1, b2, . . . , bM-1].
At step 360, the plurality of roots in the normalized basis is converted back to the original Galois Field basis to produce a plurality of roots in the original Galois Field basis. A second mathematical operation is performed in the Galois Field to produce a scaling factor, e.g., M[1]/M[2], at step 370. Accordingly, the plurality of roots in the original Galois Field basis is scaled by the scaling factor at step 380 in order to produce a plurality of scaled roots.
At step 390, the plurality of scaled roots is added together to produce error locations of the error locator polynomial. It is appreciated that at step 395 the error locator unit 140 generates a control signal in order to verify whether the presumption that a two bit error has occurred is correct. The error locations found by the error locator unit 140 are used as proper error locations if the control signal verifies the validity of the presumption that a two bit error has occurred. As a result, hundreds if not thousands of clock cycles are saved. On the other hand, if the presumption is not valid, then the system awaits the results from the conventional error locator unit 150.
Referring now to
According to one embodiment, at time t4 the error locator unit 140 finds the roots based on the calculated coefficients M1 and M2. At time t5, the error locator unit 140 receives the coefficients from the error locator polynomial unit 130. It is appreciated that the event associated with t5 may occur prior to the event associated with t4 but typically does not. The error locator unit 140 utilizes the received coefficients to generate a control signal, at time t6. The control signal verifies whether the presumption that a two bit error has occurred is correct.
It is appreciated that during the time which the error locator unit 140 is finding the roots and is generating the control signal, the conventional error locator unit 150 may be operating in parallel to find the roots of the error locator polynomial, e.g., using Chien's search. At time t7, the multiplexer 160 outputs the roots found by the error locator unit 140 if the control signal verifies that the presumption that a two bit error has occurred. If the control signal verifies the presumption, the operation of the conventional error locator unit 150 may be stopped.
However, if the control signal indicates that the presumption that a two bit error has occurred is incorrect, the conventional error locator unit 150 continues to search and find the roots associated with the error locator polynomial. Accordingly, at time t8, which is hundreds if not thousands of clock cycles after t7, the conventional error locator unit 150 finds the roots of the error locator polynomial. The multiplexer 160 outputs the result of the search by the conventional error locator unit 150.
Referring now to
The non-iterative process 530 may be initiated any time after syndromes S1 and S3 are generated. For example, the non-iterative process 530 may be initiated at time t2=x, which is before the syndrome generation 510 completes the syndrome generation. In one exemplary embodiment, the non-iterative process 530 may be initiated after the coefficients of the polynomial have been generated by the polynomial generation 520, e.g., at time t5=x+y where y>v.
The non-iterative process 530 requires a few clock cycles, e.g., z=8 clock cycles, to complete. For example, the non-iterative process 530 completes finding the error locations at time t3=x+z if the process starts at time t2. On the other hand, the non-iterative process 530 completes finding the error locations at time t6=x+y+z if the process starts at time t5.
In contrast, the iterative locator 540 starts after the polynomial generation 520 completes its operation, e.g., at time t4=x+v. The iterative locator 540 approach requires w clock cycles to complete which is hundreds if not thousands of clock cycles. The operation of the non-iterative approach requires a lot less clock cycles than the iterative approach. For example, w>>z. The iterative locator 540 completes its operation at time t7=w+x+v where w>>z. Thus, t7 occurs many thousands of clock cycles after the completion, e.g., t3 or t6, of the process by the non-iterative process 530.
Accordingly, a non-iterative method for correcting two bit errors in BCH codes is implemented. The non-iterative approach require only a few clock cycles to find the roots associated with the error locator polynomial whereas the conventional iterative approach requires many hundreds and thousands of clock cycles. The non-iterative approach improves the efficiency and the time required to correct two bit error considering that the occurrence of a two bit error is exponentially more likely than multi-bit error. Thus, the effective bandwidth of BCH codes is improved.
Computer system 600 also includes a main memory 606, such as a random access memory (RAM) or other dynamic storage device, coupled to bus 602 for storing information and instructions to be executed by processor 604. Main memory 606 also may be used for storing temporary variables or other intermediate information during execution of instructions to be executed by processor 604. Computer system 600 further includes a read only memory (ROM) 608 or other static storage device coupled to bus 602 for storing static information and instructions for processor 604. A non-volatile storage device 610, such as a magnetic disk or optical disk, is provided and coupled to bus 602 for storing information and instructions and may store the persistent internal queue. According to one embodiment, the instructions for implementing the virtual device may be stored on any one of the memory components (e.g., RAM, ROM, non-volatile storage device and etc.). Computer system 600 may be coupled via bus 602 to an optional display 612 for displaying information to a computer user.
The term “computer-readable medium” as used herein refers to any medium that participates in providing instructions to processor 604 for execution. Such a medium may take many forms, including but not limited to, non-volatile media, volatile media, and transmission media. Non-volatile media includes, for example, optical or magnetic disks, such as storage device 610. Volatile media includes dynamic memory, such as main memory 606. Transmission media includes coaxial cables, copper wire and fiber optics, including the wires that comprise bus 602. Transmission media can also take the form of acoustic or light waves, such as those generated during radio wave and infrared data communications.
Common forms of computer-readable media include, for example, a floppy disk, a flexible disk, hard disk, magnetic tape, or any other magnetic medium, a CD-ROM, any other optical medium, punch cards, paper tape, any other physical medium with patterns of holes, a RAM, a PROM, and EPROM, a FLASH-EPROM, any other memory chip or cartridge, a carrier wave as described hereinafter, or any other medium from which a computer can read.
In the foregoing specification, embodiments of the invention have been described with reference to numerous specific details that may vary from implementation to implementation. Thus, the sole and exclusive indicator of what is, and is intended by the applicants to be, the invention is the set of claims that issue from this application, in the specific form in which such claims issue, including any subsequent correction. Hence, no limitation, element, property, feature, advantage or attribute that is not expressly recited in a claim should limit the scope of such claim in any way. The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense.
Number | Name | Date | Kind |
---|---|---|---|
4360916 | Kustedjo et al. | Nov 1982 | A |
5343481 | Kraft | Aug 1994 | A |
5533035 | Saxena et al. | Jul 1996 | A |
5734926 | Feeley et al. | Mar 1998 | A |
5787279 | Rigoutsos | Jul 1998 | A |
5878279 | Athenes | Mar 1999 | A |
6000006 | Bruce et al. | Dec 1999 | A |
6760743 | Heddes et al. | Jul 2004 | B1 |
6772276 | Dover | Aug 2004 | B2 |
6985977 | Vrancic | Jan 2006 | B2 |
7100103 | Mizrachi et al. | Aug 2006 | B2 |
7237016 | Schober | Jun 2007 | B1 |
7392330 | Weatherspoon | Jun 2008 | B2 |
7457897 | Lee et al. | Nov 2008 | B1 |
7689998 | Chrysanthakopoulos | Mar 2010 | B1 |
7761636 | Mott et al. | Jul 2010 | B2 |
7877254 | Luan et al. | Jan 2011 | B2 |
7877524 | Annem et al. | Jan 2011 | B1 |
8108590 | Chow et al. | Jan 2012 | B2 |
20020078270 | Hofstee et al. | Jun 2002 | A1 |
20020161941 | Chue et al. | Oct 2002 | A1 |
20030172147 | Chang et al. | Sep 2003 | A1 |
20040044811 | Vrancic | Mar 2004 | A1 |
20040186946 | Lee | Sep 2004 | A1 |
20050057973 | Khatami et al. | Mar 2005 | A1 |
20050097183 | Westrelin | May 2005 | A1 |
20050160200 | Saito | Jul 2005 | A1 |
20050289253 | Edirisooriya et al. | Dec 2005 | A1 |
20060004931 | Weatherspoon | Jan 2006 | A1 |
20060136570 | Pandya | Jun 2006 | A1 |
20060152981 | Ryu | Jul 2006 | A1 |
20060236039 | Golander | Oct 2006 | A1 |
20070073920 | Wu et al. | Mar 2007 | A1 |
20080034153 | Lee et al. | Feb 2008 | A1 |
20080126684 | Wu et al. | May 2008 | A1 |
20080140910 | Flynn et al. | Jun 2008 | A1 |
20080250195 | Chow et al. | Oct 2008 | A1 |
20080270681 | Van Acht et al. | Oct 2008 | A1 |
20090002761 | La et al. | Jan 2009 | A1 |
20090070520 | Mizushima | Mar 2009 | A1 |
20090100307 | Lee | Apr 2009 | A1 |
20090150605 | Flynn et al. | Jun 2009 | A1 |
20090300318 | Allen et al. | Dec 2009 | A1 |
20100268864 | Ramiya Mothilal | Oct 2010 | A1 |
20110055668 | Kim et al. | Mar 2011 | A1 |
Number | Date | Country |
---|---|---|
0502211 | Sep 1992 | EP |
2004110438 | Apr 2004 | JP |
2007034581 | Feb 2007 | JP |
Entry |
---|
“8237A High Performance Programmable DMA Controller”, datasheet by Intel, Oct. 1989. |
“Express APPS-PEX 8311”, by PLX Technology, Jan. 2006. |
“Wikipedia-Microcontroller” article found on http://web.archive.org from Nov. 27, 2007. |
Advanced Semiconductor Memories Architecture, Designs, and Applications, Ashok Sharma, IEEE Press, 2003, at 393-401. |
Number | Date | Country | |
---|---|---|---|
20110145677 A1 | Jun 2011 | US |