Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

112 results about "Red–black tree" patented technology

A red–black tree is a kind of self-balancing binary search tree in computer science. Each node of the binary tree has an extra bit, and that bit is often interpreted as the color (red or black) of the node. These color bits are used to ensure the tree remains approximately balanced during insertions and deletions.

Fine grit document and catalogs version management method based on snapshot

InactiveCN101162469AShort execution timeFlexible configuration version generation strategySpecial data processing applicationsGranularityUsability
The present invention relates to a fine-granularity files and directory edition management method based on snapshots, belonging to the multi-version document system field. The present invention separates a name space consisting of files and dirnames in a whole file system from an edition space representing the generating periods of different editions, and adopts relatively independent strategies to execute management, forming a hierarchical two-dimensional structure, i.e. forming a hierarchical structure from a root directory to a file in the name space; in the edition space, the editions of files and directory are organized through an index structure chronologically, forming a hierarchical structure in the edition space. The retrieval of the name space adopts an index strategy based on dynamic hash. The retrieval of the edition space adopts an index strategy based on a red-black tree. The directory edition and file edition respectively adopt a red-black tree structure variant aiming at the respective characteristics. The present invention can greatly improve the usability and the performance of the system, and controls the amount of consumption of time and space resulting from the maintenance of historical editions in an acceptable scope.
Owner:TSINGHUA UNIV

Artificial neural network-based out-of-order processor Cache memory access performance evaluation method

ActiveCN105653790AAccurately capture the full simulation processHigh speedNeural learning methodsSpecial data processing applicationsNerve networkStack distance
The invention discloses an artificial neural network-based out-of-order processor Cache memory access performance evaluation method, and aims at solving the problem that the memory access instructions are executed out of order so that the stacking distance distribution extracted by utilizing a binary execution tool during the prediction of LRU-Cache memory access behaviors is low in precision. The method comprises the following steps: combining a read-black tree and a hash table; designing a Cache group association architecture-based stacking distance extraction algorithm; respectively calculating a memory access sequence and the stacking distance distribution executed out of order; fitting the stacking distance distribution executed according to the memory access sequence and a memory access missing number by utilizing a BP neural network; and importing the stacking distance distributed extracted on the basis of the binary execution tool into the trained neural network so as to predict the Cache memory access behaviors with high precision. According to the method disclosed in the invention, the artificial neural network is adopted, so that the problem that the stacking distance distribution extracted by utilizing the binary execution tool during the prediction of the Cache memory access behaviors is low in precision is effectively solved.
Owner:RES INST OF SOUTHEAST UNIV IN SUZHOU

Search encryption method supporting dynamic updating and multi-keyword safe ranking

ActiveCN104615692ATroubleshoot dynamic update issuesStructural updateFile access structuresSpecial data processing applicationsRankingClient-side
The invention discloses a search encryption method supporting dynamic updating and multi-keyword searching and achieving safe ranking. According to the search encryption method, a red-black tree serves as an index structure, an unencrypted index is generated for a file set, file vectors are stored in leaf nodes, and a union result of child nodes is stored in an internal node. Vectors of all the nodes in the tree are encrypted through an asymmetrical scalar product. During keyword searching, a client side generates a trap door matched with the child nodes of the red-black tree. Calculation is conducted according to the word frequency stored by the leaf nodes, and a top-k file can be returned during searching. When a file is added or canceled, the client side sends a file name and operation, a server returns relevant nodes, and structure updating is achieved in the server. The client side conducts data decrypting and updating and sends decrypted and updated date to the server. Partial updating of the index is achieved through the server. By means of the search encryption method, the dynamic updating purpose of cloud storage data can be achieved, and the user experience can be improved through multi-keyword searching and safe ranking.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

Method and system for automatically extracting virus characteristics based on family samples

The invention provides a method and a system for automatically extracting virus characteristics based on family samples. According to the method and the system, a longest public subsequence algorithm is modified, a sequence A and a sequence B are established by using samples in the family samples, Hash values of subsequences with lengths equal to preset values in the sequence A and the sequence B are calculated respectively through preset feature code lengths, and the Hash values of the subsequences in the sequence A and the sequence B are matched through a red black tree manner, if the Hash values are same, the subsequences corresponding to the Hash values are public subsequences of the sequence A and the sequence B, and the public subsequences are feature codes of the family samples; and when surplus samples are taken as the sequence B and searched in a red black tree, feature codes of all family samples are obtained and combined into a feature set of the family samples, a weighting model is evaluated according to qualities of the established feature codes, the qualities of the established feature codes are judged, and the feature codes of the family samples are determined. According to the method, the time complexity of the algorithm is simplified, and the extraction efficiency and the accuracy of the feature codes are improved.
Owner:HARBIN ANTIY TECH

Double-controller-based read-write locking method and device

The invention discloses a double-controller-based read-write locking method and device, and relates to the technical field of disk data read-write. The method comprises the following steps: determining an interval block, to which a target read-write interval belongs; searching an Area node, to which the interval block belongs, on a read-black tree of the determined interval block; searching the target read-write interval on a red-black tree of the searched Area node; if the target read-write interval is not searched, creating a Block node corresponding to the target read-write interval and inserting the created Block node into the red-black tree of the Area node; creating a SubLlock node under the Block node; searching nodes, the memory address spaces of which have conflict, in the SubLock node; adding conflict count of the SubLock node if the nodes, the memory address spaces of which have conflict, have read-write conflict; judging whether the conflict count is an initial value; if the conflict count is an initial value, completing the locking of the target read-write interval. Through the coordination of the steps, the communication can be decreased and the locking conflict can be processed more accurately.
Owner:武汉神州数码云科网络技术有限公司 +1

Fault storage method and apparatus and fault search method and apparatus

The invention discloses a fault storage method and apparatus and a fault search method and apparatus, and belongs to the field of fault injection. The fault storage method comprises: obtaining descriptors of to-be-injected faults to perform Hash operation during fault injection, and extracting feature values of the to-be-injected faults from a result; determining a corresponding red black tree node according to a binary search tree insertion algorithm for each feature value in the feature values of the to-be-injected faults; storing the to-be-injected faults and obtaining a storage address; and forming a key value pair by the feature value of each to-be-injected fault and the storage address, and storing the key value pair in the red black tree node. The fault search method comprises: obtaining descriptors of to-be-searched faults to perform Hash operation during fault search, extracting feature values from a result, traversing red black tree nodes by taking the feature values as indexes, judging whether the feature values exist or not, if so, determining that the faults exist, and returning a storage address of fault information corresponding to the feature values; otherwise, determining that the faults do not exist. According to the fault storage method and apparatus and the fault search method and apparatus, the fault search efficiency of a fault injection system is effectively improved.
Owner:HUAWEI TECH CO LTD

Order-preserving encryption algorithm based on balanced sort tree storage structure

The invention belongs to the technical field of passwords, and specifically relates to an order-preserving encryption algorithm based on a balanced sort tree storage structure. In the order-preservingencryption algorithm, a data storage basic structure comprises an AVL tree, a red-black tree, a B tree, a B+ tree or a B* tree; and different data storage structures have slightly different algorithmexpressions. The algorithm takes an AVL tree structure as an example, and comprises a basic AVL tree-based ideal secure order-preserving encryption algorithm and some improved order-preserving encryption algorithms. Various algorithms are described from a tree structure, an initialization algorithm, an encryption algorithm, a decryption algorithm, an orderby sort algorithm, a range query algorithm, a deletion algorithm, a balancing algorithm and an interactive query algorithm. Compared with most order-preserving encryptions that cannot achieve the ideal secure effect, the algorithm security provided by the invention has absolute advantages, the algorithm provided by the invention also performs all-directional comparison, and the algorithm is suitable for most systems and is especially suitable for a system with relatively high security requirements and sufficient bandwidth configuration.
Owner:FUDAN UNIV

Organizing management method and system of dirty data in cache and storage system

ActiveCN107844436AImprove the writing speedReduce latencyMemory systemsArray data structureDirty data
The invention discloses an organizing management method and system of dirty data in a cache and a storage system. According to the method, cache space is divided into multiple cache modules, and multiple logical volumes are determined according to the storage capacity of a disk array; the cache modules are distributed for the logical volumes, arrays corresponding to the logical volumes in a one-to-one mode are further arranged, and elements in the arrays serve as root nodes of a red-black tree respectively. According to the organizing management method and system of the dirty data in the cacheand the storage system, the address of a dirty block corresponding to any logical volume in the cache modules can also be determined, accordingly the corresponding address of the dirty block in the corresponding logical volume is determined, and the corresponding address serves as a key value of the node of the red-black tree corresponding to the logical volume. Then, the dirty blocks can be organized into the red-black trees according to a preset red-black tree ranking rule, the dirty data in the dirty blocks is written according to a preorder traversal mode when written to the disk array, which is equal to conducting ordered access on the disk array, the writing speed is improved, the writing time is shortened, and the accessing efficiency of the system is improved.
Owner:ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products