Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

380results about How to "Reduce performance overhead" patented technology

Network monitoring and analysis system under virtual machine circumstance

The invention discloses a network monitoring and analyzing system under an environment of a virtual machine. The system comprises a network data multiplexing module, a lightweight level virtual machine manager module, a virtual machine control module, a service virtual machine module and an I/O access path optimization module, wherein the network data multiplexing module and the lightweight level virtual machine manager module are positioned in an operating system of a host computer, the virtual machine control module and the service virtual machine module are positioned on the operating system of the host computer; and the I/O access path optimization module is positioned in the operating system of the host computer and the service virtual machine. The network monitoring and analyzing system is based on the virtual machine and realizes the network data multiplexing of a single physical machine to a plurality of network monitoring and analyzing service programs, thereby providing a plurality of monitoring and analyzing functions for the same network data in real time, realizing safe isolation between the service programs and dynamically adjusting and distributing resource to the service programs according to requirements. The network monitoring and analyzing system overcomes the problems that the prior network monitoring and analyzing system has resource competition, low safety, instability of the system, uneasy expansion and the like.
Owner:BEIHANG UNIV

Consistent hash-based hierarchical mixed storage system and method

The invention discloses a consistent hash-based hierarchical mixed storage system and method, and belongs to the field of computer storage. The characteristics of various storage mediums can be utilized to the maximum extent; and storage policies are reasonably adopted, so that the system performance is improved. The method comprises the steps of designing a hierarchical consistent hash ring according to difference of the storage mediums and the storage policies; performing hierarchical storage in the hierarchical consistent hash ring through indexes such as access frequencies, capacity and the like by storage objects; introducing a monitoring module for determining data collection frequencies and data migration thresholds in different time periods; introducing a scheduling module for performing reasonable upgrading and downgrading data migration scheduling for cold and hot changes, with time, of data; and managing SSD cluster data information by adopting a forest data structure. The hierarchical storage is performed for load characteristics; different storage mediums and storage policies are provided according to the characteristics of the storage objects; the system flexibility is enhanced and the system read-write performance is improved; and the system stability is ensured.
Owner:HUAZHONG UNIV OF SCI & TECH

Linear assembly instruction diversity conversion based DSP soft error detection method

ActiveCN106021040ACapable of soft error detectionDoes not require multithreading supportFaulty hardware testing methodsSoft error detectionBasic block
The invention discloses a linear assembly instruction diversity conversion based DSP soft error detection method which can solve the problem that the conventional DSP soft error detection methods are large in performance cost. The DSP soft error detection method includes: dividing a program into storeless basic blocks, establishing a program control flow diagram, recognizing circulations, screening out circulations capable of arranging a software pipeline; reinforcing the program, adding error detection instructions to the program, performing equivalent conversion on a part of instructions through an instruction diversity conversion method, and performing double calculation on the rest instructions, inserting the detection instructions before instruction storage and instruction jumping, optimizing the detection instructions through DSP instruction condition execution characters and the equivalent conversion method, and reducing the performance cost due to reinforcement through the delay error processing method for the circulations capable of arranging the software pipeline; and executing the reinforcement program, and detecting soft errors during operation. The DSP soft error detection method is a DSP reinforcement method of pure software, is high in detection rate of date errors, and is low in performance cost of reinforcement.
Owner:NAT UNIV OF DEFENSE TECH

Similarity detection method for unknown vulnerability discovery based on patch information

The invention relates to a similarity detection method for unknown vulnerability discovery based on patch information. The method comprises steps as follows: a known vulnerability function and a patchfunction after patching are sliced, and slices containing vulnerability related statements and slices containing patch statements are generated; variable names, variable types and function call namesof a to-be-detected function, the vulnerability slices and the patch slices are subjected to symbol normalization; the to-be-detected function, the vulnerability slices and the patch slices are mapped to vector space to generate to-be-detected function characteristic vectors, vulnerability characteristic vectors and patch characteristic vectors, one vector is formed by each of the to-be-detectedfunction characteristic vectors, the vulnerability characteristic vectors and the patch characteristic vectors, and a value of each dimension of the one vector represents a product of the number of appearing times of the characteristic statement in the function and TF-IDF weight; after generation of the characteristic vectors, similarity of the characteristic vectors is calculated and sequencing is performed, and whether unknown vulnerability with the characteristics similar to those of known vulnerability in a to-be-detected function set is judged. According to the method, disturbance of vulnerability unrelated statements can be effectively reduced, and detection accuracy is improved.
Owner:RENMIN UNIVERSITY OF CHINA

Automatic simplified-configured self-adaptation optimization method

The invention discloses an automatic simplified-configured self-adaptation optimization method which comprises the following steps that S1. during initial running of a storing system, data blocks with fixed size are used for simplified distribution; S2. during running, the feature of a data IO request which is sent to the storing system is subjected to statistics; S3. according to the IO request statistics results, the size of the data blocks which are subjected to simplified distribution is adjusted automatically; S4. during system running, the space using situation of large data blocks is recorded, and meanwhile data migration and data block merging are carried out; and S5. when the storing system receives a space recycling request, recyclable data blocks are recycled, and data block merging is carried out. The distribution size of the data blocks can be adjusted automatically according to the storing system practical service requirement, on the basis that the requirement of management according to needs of a disk space is met, extra storing system performance expenditure caused by data block distribution is lowered, the disk space using rate is improved, and accordingly the storing system is suitable for various service application scenarios.
Owner:LANGCHAO ELECTRONIC INFORMATION IND CO LTD

Search method, index data generation method and device on the basis of static Cache

The invention discloses a search method and device on the basis of static Cache, an index data generation method and device used for static Cache, and a method and a device used for obtaining a query syntax tree identifier. The search method on the basis of the static Cache comprises the following steps: receiving a search request of a client side; according to query information in the search request, generating a query syntax tree; looking up a pre-generated high-frequency syntax tree from the query syntax tree, and replacing parts of query information corresponding to the high-frequency syntax tree in the query information with a unique identifier, which is pre-calculated, of the high-frequency syntax tree according to a sequence from a root node to a leaf node, wherein the unique identifier of the high-frequency syntax tree is used for quickly recalling a search result corresponding to parts of query information from an index database in a retrieval stage; and according to the replaced query information, retrieving the index database, and returning the search result to the client side. The above method can reduce performance cost generated when a search engine carries out inverted recalling, and improves the retrieval performance of the search engine.
Owner:ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products