Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

199 results about "Doubly linked list" patented technology

In computer science, a doubly linked list is a linked data structure that consists of a set of sequentially linked records called nodes. Each node contains three fields: two link fields (references to the previous and to the next node in the sequence of nodes) and one data field. The beginning and ending nodes' previous and next links, respectively, point to some kind of terminator, typically a sentinel node or null, to facilitate traversal of the list. If there is only one sentinel node, then the list is circularly linked via the sentinel node. It can be conceptualized as two singly linked lists formed from the same data items, but in opposite sequential orders.

Management method of Nand-Flash memory system

The invention relates to a management method for a computer Nand-Flash storage system. A plurality of physical blocks form a logic block chain; the information of the block numbers of the physical blocks and the block number of a forward physical block thereof are stored in an extended area of a first physical page of each physical block; when the system is initialized, a bidirectional chain table of the logic block chain is reconstructed by the stored information. When in read operation, the bidirectional chain table is utilized to research forwards and read a target physical block; the number of a read physical page is the same as the number of a logic page. When in write operation, the bidirectional chain table is utilized to research backwards; when a first physical block with the number of used pages on the logic block chain smaller than the number of a logic page requested to write, data is directly written in the logic page requested to write by the physical block; if the numbers of used pages of all physical blocks are larger than the number of the number of the logic page requested to write, a free physical block is added into the logic block chain; the data of effective pages is copied to the new current free physical block, and the data of the current page is written.
Owner:常州新超电子科技有限公司

Practical lock-free doubly-linked list

One embodiment of the present invention provides a system that supports inserting or deleting nodes at any location within a doubly-linked list which is lock-free, wherein lock-free means that the doubly-linked list can be simultaneously accessed by multiple processes without requiring the processes to perform locking operations (non-blocking) and furthermore that a finite number of steps performed by a process will guarantee progress by at least one process (lock-free). During operation, the system receives a reference to a target node to be deleted from the doubly-linked list. Next, the system atomically marks a forward pointer in the target node to indicate that the target node is deleted, wherein the forward pointer contains the address of an immediately following node in the doubly-linked list, and wherein the marking operation does not destroy the address of the immediately following node. Additional cleanup steps are then done by this or any other process. The system may also receive a new node which is accessible by only the requesting thread and may then insert the new node into the doubly linked list after a reference node. The system accomplishes this by setting the new node's backward pointer to the reference node and forward pointer to the successor of the reference node. Next, the system atomically changes the forward pointer of the reference node from the successor node to the new node. Additional cleanup steps are then done by this or any other process. An update operation that atomically performs a delete of an old node and an insert of its replacement node is also described.
Owner:ORACLE INT CORP

Computer and abnormal progress detection method

The invention provides an abnormal progress detection device and a method thereof, comprising a hardware platform, a virtual machine management module, a first operation module and a second operation module, wherein the virtual machine management module is used for installing a virtual machine manager, the first operation module is provided with a first operation system, and the second operation module is provided with a second operation system which operates on the virtual machine manager; the virtual machine management module comprises a first acquisition module and a second acquisition module, wherein the first acquisition module is used for obtaining the value of the identifier of a currently operating progress in the second operation system, and the second acquisition module is used for obtaining the doubly linked list of the currently operating progress in the second operation system. The device also comprises a detection module which is used for traversing the value of the identifier in the doubly linked list; and if the doubly linked list does not have the value of the identifier, the currently operating progress is determined to be an abnormal progress. The invention avoids the potential safety hazard of the operation system in a virtual machine system and improves the system safety.
Owner:LENOVO (BEIJING) LTD

Method and device for adding, searching and deleting hash table

The invention discloses a method and a device for adding, searching and deleting a hash table. The method for adding a hash table comprises the following steps of: extracting keywords of data to be added; performing hash operation on the keywords to obtain a hash address and a hash fingerprint; judging whether a corresponding target storage position is occupied according to the hash address; when the target storage position is occupied, searching for an unoccupied idle storage position from the hash table, and judging whether an occupied node at the target storage position is a first node of a bidirectional linked list; if so, adding a target node at the idle storage position according to the hash fingerprint, and linking the target node to the tail of the bidirectional linked list where the occupied node is positioned; and otherwise, moving the occupied node to the idle storage position, linking the occupied node to the tail of the bidirectional linked list where the occupied node is positioned, and adding a target node at the target storage position to constitute a single-node bidirectional linked list according to the hash fingerprint,. According to the method and the device, the utilization efficiency of the hash table and the utilization ratio of a storage space can be increased.
Owner:COMP NETWORK INFORMATION CENT CHINESE ACADEMY OF SCI

Implement method for automatic topology discovery of resilient packet multi-ring interconnection network

InactiveCN1547359ASolve problems in automatic control, etc.Solve wasteLoop networksAutomatic controlTopology information
The invention is a method for realizing automatic topology discovery of a kind of elastic grouping multi-ring mutual-connection method, at first, the standardized grouping ring RPR single ring network media is accessed to the address which controls the MAC, the representation method is defined extensively, then constructs the double direction chain and the topology information table unit structure of the tree connection, in order to preserve the topology information and the joint information in the network, finally, based on the constructed chain table and the automatic topology discovery., it uses clockwise layering method to realize the automatic topology discovery of the multi-ring mutual-connection network. The invention has character of distributed automatic control of single ring structure and the merits of automatic topology discovery algorithm, it solves the problem of route information automatic discovery and the automatic control of the RPR multi-ring mutual-connection network topology, based on the topology information and the joint information in the chain table and the information table, it can complete the calculation of the second layer route, thus, any joint in the network can works out the route series to other joint in the network quickly.
Owner:SHANGHAI JIAO TONG UNIV

Timer setting method under multithreading environment

InactiveCN103019805ASuitable for technical requirementsEasy to set upMultiprogramming arrangementsTimerDistributed computing
The invention discloses a timer setting method under the multithreading environment. On the basis of the traditional increment timer, one index structure and a double linked list are introduced in to improve the time efficiency of the timer. The traditional increment timer adopts one double linked list to manage a timer unit according to a time overtime sequence, and the steps of setting a new timer, clearing the timer and carrying out timer overtime judgment are all carried out by the linked list. When the number of the timer unit is huge, the operations occupy a great quantity of CPU (central processing unit) resources. According to the index structure introduced by the invention, the timer unit can be quickly looked up and managed according to the unique identification of the timer, first timer units triggered at different time periods are connected by the newly-added double linked list, the setting operation performance of the new timer is improved, and the timer time efficiency is improved under the condition that little space overhead is added. The timer setting method under the multithreading environment, which is disclosed by the invention, has the advantage that an implementation method is simple and easy to understand, and is suitable for the requirement on the timer under the common environment.
Owner:PCI TECH GRP CO LTD

Service ordering method and service ordering platform

The invention relates to a service ordering method and a service ordering platform. The service ordering method comprises the steps of transmitting preset service request information by a service requiring party to a service ordering platform; after receiving preset service request information by a service ordering platform, transmitting preset service request information to a service provider; querying a preset task by the service provider, and filtering the service requiring party and filtering the preset task of the service requiring party; paying advance payment of a preset task by the service requiring party to the service provider in preset time period, confirming successful order establishment and establishing a bidirectional chain table through the service ordering platform; reading information in the bidirectional chain table by the service provider, establishing an identity verification system; keeping the service requiring party and the service provider operate in an allowed or preset time period until time is up, and after transaction, paying cost by the service requiring party to the service provider through the service ordering platform. The service ordering platform comprises a terminal logging-on module, a service searching module, a service provider filtering module, a payment module, an identity verification module, an evaluation module and a platform processing module.
Owner:吴江

Method for distributing and reclaiming idle blocks of file

The invention discloses a method for distributing and reclaiming idle blocks of a file. The distributing method comprises the following steps: dividing the file into N file blocks according to the preset size, and numbering the file blocks; using K file blocks in the N file blocks as index blocks, and connecting the index blocks by adopting a bidirectional link table; storing a previous index block sequence number of the index block, a rear index block sequence number and the number of the idle blocks managed by the index block into the index blocks; and distributing the idle blocks managed by the index block in turn according to the order of the index blocks in the bidirectional link table, and correspondingly modifying information stored in the index blocks. The reclaiming method comprises the following steps: reclaiming the idle blocks in turn by the index blocks according to the order of the index blocks in the bidirectional link table, and correspondingly modifying the information stored in the index blocks. The method is particularly suitable for application situations with high real-time requirements. The method can save a large amount of storage space in the storage of mass historical data of the real-time database, and meanwhile can ensure the real-time response of the real-time database to the data due to extremely high idle block distribution speed.
Owner:SHANGHAI BAOSIGHT SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products