Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

115 results about "Copying mechanism" patented technology

In the study of scale-free networks, a copying mechanism is a process by which such a network can form and grow, by means of repeated steps in which nodes are duplicated with mutations from existing nodes. Several variations of copying mechanisms have been studied. In the general copying model, a growing network starts as a small initial graph and, at each time step, a new vertex is added with a given number k of new outgoing edges. As a result of a stochastic selection, the neighbors of the new vertex are either chosen randomly among the existing vertices, or one existing vertex is randomly selected and k of its neighbors are ‘copied’ as heads of the new edges.

Off-chip data relocation

The on-chip copy process is extended so that the data may be copied between two blocks that may be on different chips, different planes on the same chip, or the same plane of the same chip. More specifically, the methods described here provide a single data copying mechanism that allows data to be copied between any two locations in a memory system. An exemplary embodiment uses an EDO-type timing. According to another aspect, selected portions of the relocated data, such as chosen words in a transferred page, can be updated in the controller on the fly. In addition to transferring a data set directly from a read buffer of a source array to a write buffer of a destination array, the data set can concurrently be copied, if desired, into the controller where an error detection and correction operation can be performed on it.
Owner:SANDISK TECH LLC

Storage device

A storage device can flexibly apply a dynamic load distribution and a performance expansion to an unexpected peak performance demand changing in a time sequence such as a web server and a contents delivery at the minimum cost. In the storage device, a load condition of a logical volume is measured by a performance measuring mechanism based on a data and command processing amounts transferred by a data transfer mechanism, and contents of the logical volume set in the physical volume are copied to a logical volume set in the auxiliary logical volume by a copy mechanism based on a measurement result of the performance measuring mechanism, and the logical volume set in the auxiliary physical volume copied by the copy mechanism and the logical volume set in the physical volume serving as a copy source are provided as one virtual logical volume in a host, thereby distributing a load from the host.
Owner:HITACHI LTD

Large scale integrated circuit test data and method for testing power consumption cooperate optimization

The invention relates to a method collaborating and optimizing the test data and the power consumption of testing large scale integrated circuits. The method relates to the technical field of the large scale integrated circuits and is proposed to resolve the problem that in the prior art of SOC test, no method is available to effectively reduce the test data and the power consumption of test at the same time. The method has the following steps: the compatibility of scanning units of the circuit is analyzed and accordingly the scanning units are classified into three categories; each category of scanning units are connected respectively, and a scanning chain with copying mechanism is built; a set of test vector is adjusted according to the new scanning chain structure; the test set is compressed by the method based on the compression of repeated data and a compressed test set TE is acquired. When in the testing process, the compressed data is fully recovered by a decompression circuit to be tested. The invention discloses a design method for the testability of integrated circuits, and reduces the power consumption of circuits in the testing process, thus ensuring the reliability and testability; furthermore, the invention can effectively reduce the quantity of test data, shorten the test process, and lessen the number of ATE channels.
Owner:HARBIN INST OF TECH

Data relocation in a memory system

The on-chip copy process is extended so that the data may be copied between two blocks that may be on different chips, different planes on the same chip, or the same plane of the same chip. More specifically, the methods described here provide a single data copying mechanism that allows data to be copied between any two locations in a memory system. An exemplary embodiment uses an EDO-type timing. According to another aspect, selected portions of the relocated data, such as chosen words in a transferred page, can be updated in the controller on the fly. In addition to transferring a data set directly from a read buffer of a source array to a write buffer of a destination array, the data set can concurrently be copied, if desired, into the controller where an error detection and correction operation can be performed on it.
Owner:SANDISK CORP

System and method for operating system image provisioning in a utility computing environment

A technique to provision an OS image during a boot-up of a computing server in a utility computing environment using disk array's inherent raw concurrent multi-disk copy mechanism. In one example embodiment, this is achieved by forming a pool of OS image boot-up disks in a disk array using the disk array's internal disk copy routine. An OS image boot-up disk is assigned from the pool of OS image boot-up disks to the computing server upon receiving a request from the computing server. The OS image is then received from the assigned OS image boot-up disk. The computing server then boots-up using the received OS image and runs one or more applications residing in the computing server.
Owner:VALTRUS INNOVATIONS LTD +1

Reliable replication mechanisms based on active-passive hfi protocols built on top of non-reliable multicast fabric implementations

Methods, apparatus, and systems for reliable replication mechanisms based on active-passive HFI protocols build on top of non-reliable multicast fabric implementations. Under a first hardware-based scheme, a reliable replication mechanism is (primarily) implemented via Host Fabric Interfaces (HFIs) coupled to (or integrated in) nodes coupled to a non-reliable fabric. Under this approach, the HFIs take an active role in ensuring reliable delivery of multicast messages to each of multiple target nodes. Under a second hybrid software / hardware scheme, software running on nodes is responsible for determining whether target nodes have confirmed delivery of multicast messages and sending retry messages for cases in which delivery is not acknowledged within a timeout period. At the same time, the HFIs on the target nodes are responsible for generating reply messages containing acknowledgements rather than software running on the target nodes.
Owner:INTEL CORP

Anti-copy method for embedded device program

The invention relates to an anti-copy method for an embedded device program. The method comprises: firstly, storing an embedded device ID and License information in a hidden region, and reading device ID information to an RAM region from the hidden region after the device program performs authorization; secondly, calculating the License information according to the read device ID information and an authorization algorithm; and finally, comparing the calculated License information with the License information in the hidden region, and if the calculated License information is the same as the License information in the hidden region, the program entering a running state, or otherwise, performing authorization requesting. According to the method, the ID and the License are stored in the hidden region and technically protected, and the program is subjected to authorization management through the ID and the License; and the program stealer does not have a password, so that the hidden region cannot be accessed, data copy also cannot be realized, and further the program is protected. The method is simple and feasible, and can effectively protect an authorization process only by processing a storage mechanism of the ID and the License information without the need for complex encryption and decryption of the algorithm and addition of an anti-copy mechanism in a process and a thread.
Owner:XUJI GRP +3

Safety overlay network constructing method of ciphertext full text search system and corresponding full text search method

ActiveCN102855292ASafe and efficient dynamic updateSafe and efficient creationSpecial data processing applicationsFull text searchCiphertext
The invention relates to a safety overlay network constructing method of ciphertext full text search system and a corresponding full text search method. The invention initially provides a safety overlay network concept used for peer-to-peer full test search, solves the problems of distribution, storage and search of massive ciphertext data index files under the premise that recall ratio and precision ratio are not influenced, realizes storage and search of massive data to peer-to-peer nodes of a distributed P2P (peer-to-peer) network and introduces an index file duplicate copying mechanism based on a pivot node, wherein the mechanism ensures that resource can be rapidly obtained by searches in different directions by virtue of a duplicate of the pivot node without increasing occupation of network bandwidth, so that the safety overlay network constructing method and the corresponding full text search method disclosed by the invention are more applicable to peer-to-peer full text search when information amount is large, and efficiency of full text search under the peer-to-peer network environment is further improved.
Owner:GUANGXI UNIV

Milling machine for shaft lever of camshaft of general machinery

The invention relates to the technical field of machining equipment, in particular to a milling machine for a shaft lever of a camshaft of general machinery. The milling machine comprises a machine table and a worktable fixed to the machine table. A slide is movably connected to the machine table through a translation mechanism, a main motor is fixed to the slide, the main motor is connected to atool assembly, the tool assembly comprises a plurality of milling cutters driven by the main motor, and the milling cutters are arranged in a polygonal shape; the worktable is connected to a workpieceseat through a copying mechanism, the copying mechanism can drive the workpiece seat to move along a polygonal path, the workpiece seat is connected to a clamping seat, a plurality of clamping holesfor clamping camshafts are formed in the clamping seat, and the clamping holes as with the milling cutters are arranged in a polygonal shape. According to the scheme, the camshafts move along the polygonal path and lean against the milling cutters in the moving process to be milled, so that the camshafts can be machined at one time, and therefore, a problem of manual misoperation and high structural wear as a result of many roundtripping numbers of times of tool feeding and tool retracting in shaft lever milling in the prior art is solved.
Owner:重庆九方铸造有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products