Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

380results about How to "Reduce performance overhead" patented technology

Network monitoring and analysis system under virtual machine circumstance

The invention discloses a network monitoring and analyzing system under an environment of a virtual machine. The system comprises a network data multiplexing module, a lightweight level virtual machine manager module, a virtual machine control module, a service virtual machine module and an I/O access path optimization module, wherein the network data multiplexing module and the lightweight level virtual machine manager module are positioned in an operating system of a host computer, the virtual machine control module and the service virtual machine module are positioned on the operating system of the host computer; and the I/O access path optimization module is positioned in the operating system of the host computer and the service virtual machine. The network monitoring and analyzing system is based on the virtual machine and realizes the network data multiplexing of a single physical machine to a plurality of network monitoring and analyzing service programs, thereby providing a plurality of monitoring and analyzing functions for the same network data in real time, realizing safe isolation between the service programs and dynamically adjusting and distributing resource to the service programs according to requirements. The network monitoring and analyzing system overcomes the problems that the prior network monitoring and analyzing system has resource competition, low safety, instability of the system, uneasy expansion and the like.
Owner:BEIHANG UNIV

Consistent hash-based hierarchical mixed storage system and method

The invention discloses a consistent hash-based hierarchical mixed storage system and method, and belongs to the field of computer storage. The characteristics of various storage mediums can be utilized to the maximum extent; and storage policies are reasonably adopted, so that the system performance is improved. The method comprises the steps of designing a hierarchical consistent hash ring according to difference of the storage mediums and the storage policies; performing hierarchical storage in the hierarchical consistent hash ring through indexes such as access frequencies, capacity and the like by storage objects; introducing a monitoring module for determining data collection frequencies and data migration thresholds in different time periods; introducing a scheduling module for performing reasonable upgrading and downgrading data migration scheduling for cold and hot changes, with time, of data; and managing SSD cluster data information by adopting a forest data structure. The hierarchical storage is performed for load characteristics; different storage mediums and storage policies are provided according to the characteristics of the storage objects; the system flexibility is enhanced and the system read-write performance is improved; and the system stability is ensured.
Owner:HUAZHONG UNIV OF SCI & TECH

Method and system for recycling solid state disk junk and solid state disk controller

The invention relates to the technical field of storage and discloses a method and system for recycling solid state disk junk and a solid state disk controller. The method includes the following steps that an order for recycling junk on a solid state disk is received; junk recycling strips needing to perform junk recycling are determined from multiple strips included by the solid state disk according to the order; junk recycling data blocks needing to perform junk recycling are determined from multiple data blocks which are included in the junk recycling strips; effective data in the junk recycling data blocks are written into data blocks of other strips, and the junk recycling data blocks are erased to obtain blank data blocks. The blank data blocks in the junk recycling strips are built to form a first logic sub strip, and strip management is performed on the first logic sub strip. According to the scheme, the recycling efficiency of the solid state disk junk can be improved, and performance expenditure is reduced.
Owner:HUAWEI TECH CO LTD

Continuous data caching system and data caching method thereof

The invention discloses a continuous data caching system and a data caching method thereof, belonging to computer data storage system and backup method and solving the problem that continuous data capturing capability and protective capability are unmatched brought by burst I / O and network performance fluctuation. The inventive system is composed of a core cache zone, a user cache zone, a core module and a daemon process module. The inventive method comprises initializing, storing core cache zone data, storing user cache zone data, and transmitting user cache zone data. The inventive system adopts two-level cache mechanism comprising core cache and user cache, is structured on TCP / IP protocol, has little performance expenditure and reduces user node complexity. The inventive method adopts smaller core cache zone and larger user cache zone, thus lowering core processing complexity, allocating or recycling user cache zone node timely by proposing cache anticipation algorithm, optimizing use ratio of user cache zone and saving system internal storage resource.
Owner:HUAZHONG UNIV OF SCI & TECH

Asymmetric software triple-computer hot backup fault-tolerant method

The invention provides an asymmetric software triple-computer hot backup fault-tolerant method. Both a local physical host and a remote physical host are loaded with virtual machine systems, simultaneously, a local backup domain and a remote backup domain are provided for user application and the operating environment, the user application and the operating environment are encapsulated into a work domain, the local backup domain and the work domain are run in the same physical host, the remote backup domain is run in another physical host, and the two physical hosts are connected with each other through the network. As the remote backup operation is completed by a specific processor, the executing process does not affect the running of the local work domain at all. The method greatly reduces the performance cost caused by synchronization of main and standby states at the same time of guaranteeing the reliability of the system, and simultaneously, the deployment of the fault-tolerant system is more flexible and has better expandability.
Owner:BEIHANG UNIV

Data flow monitoring-based code reuse attack defending method and system

The invention discloses a data flow monitoring-based code reuse attack defending method and system, and belongs to the technical field of system security. The method comprises the steps of firstly extracting function and data information through source codes of a target program and a shared library; then analyzing intermediate language codes; identifying a memory access instruction in the target program and the shared library; and performing instrumentation on the instruction and generating a function jumping table and instruction relocating information. During target program loading, segments, stacks and heaps of the target program and the shared library are mapped to corresponding regions of a memory address space, and an isolation environment is set. During target program operation, ina mode of monitoring abnormal data flow, an attacker is prevented from performing a search in an isolation region, so that code reuse attack is prevented. The invention furthermore discloses a data flow monitoring-based code reuse attack defending system. The method and the system are suitable for code reuse attack defending in an X86_64 platform, so that huge loss caused by attack can be avoided.
Owner:HUAZHONG UNIV OF SCI & TECH

Linear assembly instruction diversity conversion based DSP soft error detection method

ActiveCN106021040ACapable of soft error detectionDoes not require multithreading supportFaulty hardware testing methodsSoft error detectionBasic block
The invention discloses a linear assembly instruction diversity conversion based DSP soft error detection method which can solve the problem that the conventional DSP soft error detection methods are large in performance cost. The DSP soft error detection method includes: dividing a program into storeless basic blocks, establishing a program control flow diagram, recognizing circulations, screening out circulations capable of arranging a software pipeline; reinforcing the program, adding error detection instructions to the program, performing equivalent conversion on a part of instructions through an instruction diversity conversion method, and performing double calculation on the rest instructions, inserting the detection instructions before instruction storage and instruction jumping, optimizing the detection instructions through DSP instruction condition execution characters and the equivalent conversion method, and reducing the performance cost due to reinforcement through the delay error processing method for the circulations capable of arranging the software pipeline; and executing the reinforcement program, and detecting soft errors during operation. The DSP soft error detection method is a DSP reinforcement method of pure software, is high in detection rate of date errors, and is low in performance cost of reinforcement.
Owner:NAT UNIV OF DEFENSE TECH

Similarity detection method for unknown vulnerability discovery based on patch information

The invention relates to a similarity detection method for unknown vulnerability discovery based on patch information. The method comprises steps as follows: a known vulnerability function and a patchfunction after patching are sliced, and slices containing vulnerability related statements and slices containing patch statements are generated; variable names, variable types and function call namesof a to-be-detected function, the vulnerability slices and the patch slices are subjected to symbol normalization; the to-be-detected function, the vulnerability slices and the patch slices are mapped to vector space to generate to-be-detected function characteristic vectors, vulnerability characteristic vectors and patch characteristic vectors, one vector is formed by each of the to-be-detectedfunction characteristic vectors, the vulnerability characteristic vectors and the patch characteristic vectors, and a value of each dimension of the one vector represents a product of the number of appearing times of the characteristic statement in the function and TF-IDF weight; after generation of the characteristic vectors, similarity of the characteristic vectors is calculated and sequencing is performed, and whether unknown vulnerability with the characteristics similar to those of known vulnerability in a to-be-detected function set is judged. According to the method, disturbance of vulnerability unrelated statements can be effectively reduced, and detection accuracy is improved.
Owner:RENMIN UNIVERSITY OF CHINA

Automatic simplified-configured self-adaptation optimization method

The invention discloses an automatic simplified-configured self-adaptation optimization method which comprises the following steps that S1. during initial running of a storing system, data blocks with fixed size are used for simplified distribution; S2. during running, the feature of a data IO request which is sent to the storing system is subjected to statistics; S3. according to the IO request statistics results, the size of the data blocks which are subjected to simplified distribution is adjusted automatically; S4. during system running, the space using situation of large data blocks is recorded, and meanwhile data migration and data block merging are carried out; and S5. when the storing system receives a space recycling request, recyclable data blocks are recycled, and data block merging is carried out. The distribution size of the data blocks can be adjusted automatically according to the storing system practical service requirement, on the basis that the requirement of management according to needs of a disk space is met, extra storing system performance expenditure caused by data block distribution is lowered, the disk space using rate is improved, and accordingly the storing system is suitable for various service application scenarios.
Owner:LANGCHAO ELECTRONIC INFORMATION IND CO LTD

Data transmission method, device and equipment

The embodiment of the invention provides a data transmission method, device and equipment, and the method comprises the steps that a terminal directly carries out the wireless screen projection protocol packaging of first data in an unvarnished transmission mode after receiving the first data from a server, obtains second data, and transmits the second data to wireless screen projection equipment.Since the terminal does not need to decode the first data and does not need to carry out secondary encoding on the first data when transmitting the first data to the screen projection equipment, thephenomenon of picture delay in the wireless screen projection process can be avoided, and the power consumption and the performance overhead of the terminal can be reduced.
Owner:HUAWEI TECH CO LTD

Search method, index data generation method and device on the basis of static Cache

The invention discloses a search method and device on the basis of static Cache, an index data generation method and device used for static Cache, and a method and a device used for obtaining a query syntax tree identifier. The search method on the basis of the static Cache comprises the following steps: receiving a search request of a client side; according to query information in the search request, generating a query syntax tree; looking up a pre-generated high-frequency syntax tree from the query syntax tree, and replacing parts of query information corresponding to the high-frequency syntax tree in the query information with a unique identifier, which is pre-calculated, of the high-frequency syntax tree according to a sequence from a root node to a leaf node, wherein the unique identifier of the high-frequency syntax tree is used for quickly recalling a search result corresponding to parts of query information from an index database in a retrieval stage; and according to the replaced query information, retrieving the index database, and returning the search result to the client side. The above method can reduce performance cost generated when a search engine carries out inverted recalling, and improves the retrieval performance of the search engine.
Owner:ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products