Unlock instant, AI-driven research and patent intelligence for your innovation.

Task processing method, compiler, scheduling server and medium

A task processing and compiler technology, applied in the field of security computing, can solve problems such as parallel processing, reduce execution delay, improve execution efficiency, and save processing time

Pending Publication Date: 2020-04-24
HUAKONG TSINGJIAO INFORMATION SCI BEIJING LTD
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Such a model prevents parallel processing at the data level and the program level.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Task processing method, compiler, scheduling server and medium
  • Task processing method, compiler, scheduling server and medium
  • Task processing method, compiler, scheduling server and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many forms and should not be construed as limited to the examples set forth herein; Fully conveyed to those skilled in the art. The drawings are merely schematic illustrations of the present disclosure and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and thus repeated descriptions thereof will be omitted.

[0063] Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more example embodiments. In the following description, numerous specific details are provided in order to give a thorough understanding of example embodiments of the present disclosure. However, those skilled in the art will appreciate that the technical solutions of the present disclosure may be practiced without one or more of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a task processing method, a compiler, a scheduling server and a medium. The method comprises the following steps: extracting to-be-processed instructions sequentially from instructions of a task; determining whether the to-be-processed instruction has a dependency relationship with an instruction of the task which is taken out before and is not processed; if it is determinedthat no dependency exists, putting the to-be-processed instruction into a to-be-processed queue; and if it is determined that the dependency relationship exists, executing the instructions in the to-be-processed queue in parallel, and then putting the to-be-processed instructions into the to-be-processed queue. According to the embodiment of the invention, the execution efficiency of the instruction in the execution task is improved, and the execution delay is reduced.

Description

technical field [0001] The disclosure relates to the field of secure computing, in particular to a task processing method, a compiler, a scheduling server and a medium. Background technique [0002] Multi-party secure computing refers to the calculation and fusion of data between multiple non-trusted databases under the premise of mutual confidentiality of data in the absence of a trusted third party. In current multi-party secure computing, multiple computing nodes are set up. The calculation node obtains the ciphertext of the private data from the data party, and calculates based on the ciphertext, and the plaintext of the calculation result can only be obtained by the result party. Since the calculation node obtains the ciphertext of the private data and does not know the real data, it realizes the calculation and fusion of data under the condition of data confidentiality. [0003] There are one or more instruction computing units in each computing node. In the current...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F8/41
CPCG06F8/41
Inventor 徐鹏董书言
Owner HUAKONG TSINGJIAO INFORMATION SCI BEIJING LTD