Patent attributes
Exemplary methods, apparatuses, and systems include receiving read operations. The read operations are divided into a current set of a sequence of read operations and one or more other sets of sequences of read operations. An aggressor read operation is selected from the current set. An identifier of a memory location read by the aggressor read operation is stored and, in response to determining a data integrity scan of a victim location of the aggressor read operation will collide with a host operation, the data integrity scan is delayed. In response to a trigger condition being satisfied, the delayed data integrity scan of the victim location of the aggressor read operation is performed.