Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

40 results about "Cuckoo hashing" patented technology

Cuckoo hashing is a scheme in computer programming for resolving hash collisions of values of hash functions in a table, with worst-case constant lookup time. The name derives from the behavior of some species of cuckoo, where the cuckoo chick pushes the other eggs or young out of the nest when it hatches; analogously, inserting a new key into a cuckoo hashing table may push an older key to a different location in the table.

Set-associative hash table organization for efficient storage and retrieval of data in a storage system

In one embodiment, use of hashing in a file system metadata arrangement reduces an amount of metadata stored in a memory of a node in a cluster and reduces the amount of metadata needed to process an input / output (I / O) request at the node. Illustratively, cuckoo hashing may be modified and applied to construct the file system metadata arrangement. The file system metadata arrangement may be illustratively configured as a key-value extent store embodied as a data structure, e.g., a cuckoo hash table, wherein a value, such as a hash table index, may be configured as an index and applied to the cuckoo hash table to obtain a key, such as an extent key, configured to reference a location of an extent on one or more storage devices, such as solid state drives.
Owner:NETWORK APPLIANCE INC

Combining associativity and cuckoo hashing

Addition, search, and performance of other allied activities relating to keys are performed in a hardware hash table. Further, high performance and efficient design may be provided for a hash table applicable to CPU caches and cache coherence directories. Set-associative tables and cuckoo hashing are combined for construction of a directory table of a directory based cache coherence controller. A method may allow configuration of C cuckoo ways, where C is an integer greater than or equal to 2, wherein each cuckoo way Ci is a set-associative table with N sets, where each set has an associativity of A, where A is an integer greater than or equal to 2.
Owner:INTEL CORP

Composite index method and device

An embodiment of the invention discloses a composite index method and a device. The method is implemented by the following steps of obtaining to-be-detected keys and carrying out Hash computation on the to-be-detected keys to obtain combined Hash codes; moving the combined Hash codes a set bit to the right to obtain labels of the to-be-detected keys; carrying out copy and vectorization processing on the labels of the to-be-detected keys with a bit wide of single-instruction multiple-data stream as reference so as to obtain label vectors of the to-be-detected keys; comparing index key vectors with the label vectors of the to-be-detected keys by group through a comparison order of the single-instruction multiple-data stream; and determining whether detection is successful according to the comparison result, and returning tuple objects in index addresses of the to-be-detected keys if detection is successful. A plurality of data items can be compared at each time through parallel detection based on SIMD (Single Instruction Multiple Data), so that the performance cost brought by searching loop is reduced and multiple computations of a Hash function are avoided; the labels of the to-be-detected keys belong to Cuckoo Hashing of partial keys and can be used for reducing the space cost of a Hash table.
Owner:HUAWEI TECH CO LTD

Single Double Cuckoo Hash

In a network element a decision apparatus has a plurality of multi-way hash tables of single size and double size associative entries. A logic pipeline extracts a search key from each of a sequence of received data items. A hash circuit applies first and second hash functions to the search key to generate first and second indices. A lookup circuit reads associative entries in the hash tables that are indicated respectively by the first and second indices, matches the search key against the associative entries in all the ways. Upon finding a match between the search key and an entry key in an indicated associative entry. A processor uses the value of the indicated associative entry to insert associative entries from a stash of associative entries into the hash tables in accordance with a single size and a double size cuckoo insertion procedure.
Owner:MELLANOX TECHNOLOGIES LTD

OpenFlow flow table energy-saving storage architecture supporting QoS (Quality of Service) and application thereof

ActiveCN110808910AGuaranteed service qualityGuaranteed flow table lookup performanceData switching networksQos quality of serviceEngineering
The invention provides an OpenFlow flow table energy-saving storage architecture supporting QoS (Quality of Service) and application of the OpenFlow flow table energy-saving storage architecture. Thearchitecture comprises three layers, namely a priority flow/elephant flow layer, a mouse flow layer and an active connection cache layer, wherein the priority flow/elephant flow layer adopts a TCAM and a DRAM as storage media, the mouse flow layer adopts an SRAM and a DRAM as storage media, the active connection cache layer adopts an SRAM as a storage medium, and a Cuckoo hash structure is adoptedto cache a mapping relationship between active connection and flow table entries in the TCAM. According to the architecture, the TCAM is adopted to preferentially store the identification fields of the priority flow table entries, and quick flow table lookup of priority data packets is realized, so that the network service quality is guaranteed. Meanwhile, a Cuckoo cache is designed to dynamically store the current active connection and the corresponding TCAM flow entry index value in the elephant flow; the cache is hit by most of the data packets, and the corresponding flow table item is found according to the address of the hit cache item, so that a TCAM flow table lookup process is bypassed, and the flow table lookup energy consumption overhead is greatly reduced.
Owner:CHANGSHA UNIVERSITY OF SCIENCE AND TECHNOLOGY

Pathogenic gene detection method based on privacy protection intersection calculation protocol

The invention discloses a pathogenic gene detection method based on a privacy protection intersection calculation protocol. According to the method, elements which do not exist in an intersection of aset held by a server and a set held by a client are filtered out by adopting a Bloom filter; the elements of the server are mapped to hash buckets through simple hash mapping, and the elements of theclient are mapped to a two-dimensional hash table through cuckoo hash mapping; a one-out-of-N ROT extension protocol is executed on the elements in each bucket; an encryption sequence generated by the server is sent to the client; intersection calculation is carried out on the output of the client and the encryption sequence of the server; the set of the client, which has been subjected to filtering and hash mapping, is compared with a calculation result; and the intersection elements of the two parties are finally obtained, the information of any party except the intersection will not leak.With the method of the invention adopted, the safety of gene detection can be ensured, and running time and communication overhead are reduced.
Owner:JINAN UNIVERSITY

Cuckoo filter based on fingerprint family

The invention discloses a cuckoo filter based on a fingerprint family, the cuckoo filter based on the fingerprint family comprises a cuckoo hash table, the cuckoo hash table comprises a plurality of storage buckets, each data member corresponds to a plurality of fingerprints, and each fingerprint in the plurality of fingerprints is stored in different storage buckets; and when the cuckoo filter receives a data member management operation, a plurality of fingerprints corresponding to the data members and candidate storage buckets corresponding to the fingerprints are determined based on addition and subtraction operations, and the data member management operation is executed based on the determined fingerprints and the candidate storage buckets corresponding to the fingerprints. According to the invention, the plurality of fingerprints and the plurality of candidate storage buckets are allocated to each data member, and the number of the plurality of fingerprints can be greater than orequal to 2, so that the storage space efficiency can be improved, and quick insertion, deletion and query operations are supported.
Owner:PENG CHENG LAB +1

QoS (Quality of Service)-aware OpenFlow flow table hierarchical storage architecture and application

ActiveCN111131084AGuaranteed packet forwarding performanceReduce the average flow table lookup timeData switching networksHigh level techniquesQuality of serviceData pack
The invention discloses a QoS (Quality of Service)-aware OpenFlow flow table hierarchical storage architecture and application, and the architecture provided by the invention stores a high-priority flow in a TCAM (Ternary Content Addressable Memory), so that the grouping search performance of the high-priority flow is ensured; a Cuckoo hash structure is adopted to design an accurate flow cache mechanism and store low-priority and non-priority active accurate flows, so that data packets in the accurate flows directly hit caches, corresponding SRAM flow table entries are quickly found, the average flow table search time is remarkably shortened, and the performance of the OpenFlow switch is improved. According to the method, corresponding flow table searching speeds are provided for network flows with different priorities, wherein network packets in a high-priority flow directly hit a TCAM flow table, and corresponding flow table entries are quickly found; a hit Cuckoo cache is searched by a network packet in the low-priority flows, and a corresponding SRAM flow table entry is directly positioned; most of the groups in the priority-free flows can directly hit the Cuckoo cache, and a tuple space search method needs to be further adopted for searching the SRAM flow table for a small part of the groups, and therefore the overall searching efficiency is high.
Owner:CHANGSHA NORMAL UNIV

Cuckoo hash calculation-based data storage optimization method and system

The invention discloses a Cuckoo hash calculation-based data storage optimization method and system. The method comprises the following steps of: considering each barrel in an index table as a subgraph node, considering each element stored in the table as an edge, and pointing from practical storage positions to candidate positions of the elements so as to form the whole index table into a diagraph comprising a plurality of connected subgraphs; recognizing one or two subgraphs of each element through hash calculation before the element is practically inserted; predicting an insertion result according to states of the subgraphs; and finally executing an insertion operation according to the prediction result or directly storing the prediction result into a temporary space. According to the method and system, mass data is flat hashed to the whole index table by utilizing a Cuckoo hash mechanism, so that the hash conflict of data in sets is reasonably solved, the load is balanced under the condition of ensuring the query efficiency, the utilization rate of the index table is effectively improved and the data insertion result is predicted in advance; and through predicting the result before data storage, the ineffective kicking overhead is avoided and the data storage efficiency is improved.
Owner:HUAZHONG UNIV OF SCI & TECH

Data processing method and device in multi-party privacy intersection and electronic equipment

ActiveCN113489583AShorten the timeImprove the efficiency of privacy claimsEncryption apparatus with shift registers/memoriesAlgorithmEngineering
The invention discloses a data processing method in multi-party privacy intersection, which is applied to a receiver device. M keywords of the receiver device are mapped to a hash table with the size of L by adopting cuckoo hash. The method comprises the following steps: receiving L groups of calculation data sent by a sender device for the m keywords; using m groups of calculation data in the L groups of calculation data to respectively correspond to each keyword in the hash table, and calculating an OPPRF result corresponding to the keyword; for each OPPRF result in the m OPPRF results, taking the serial number of the keyword corresponding to the OPPRF result as a packet header, and combining the packet header with the OPPRF result to form a processed result; sorting the obtained m processed results according to packet headers, and storing the m processed results in a result file according to a sequence; and sequentially obtaining each processed result from the result file according to a sequence, and carrying out data fusion on the OPPRF result contained in the processed result and the corresponding local pseudo-random number. By adopting the scheme, the multi-party privacy intersection efficiency is improved.
Owner:HUAKONG TSINGJIAO INFORMATION SCI BEIJING LTD

A compound index method and device

An embodiment of the invention discloses a composite index method and a device. The method is implemented by the following steps of obtaining to-be-detected keys and carrying out Hash computation on the to-be-detected keys to obtain combined Hash codes; moving the combined Hash codes a set bit to the right to obtain labels of the to-be-detected keys; carrying out copy and vectorization processing on the labels of the to-be-detected keys with a bit wide of single-instruction multiple-data stream as reference so as to obtain label vectors of the to-be-detected keys; comparing index key vectors with the label vectors of the to-be-detected keys by group through a comparison order of the single-instruction multiple-data stream; and determining whether detection is successful according to the comparison result, and returning tuple objects in index addresses of the to-be-detected keys if detection is successful. A plurality of data items can be compared at each time through parallel detection based on SIMD (Single Instruction Multiple Data), so that the performance cost brought by searching loop is reduced and multiple computations of a Hash function are avoided; the labels of the to-be-detected keys belong to Cuckoo Hashing of partial keys and can be used for reducing the space cost of a Hash table.
Owner:HUAWEI TECH CO LTD

A QOS-supporting openflow flow table energy-saving storage architecture and method thereof

The present invention provides an OpenFlow flow table energy-saving storage architecture that supports QoS and its application. The architecture of the present invention includes three layers: a priority flow / elephant flow layer, a mouse flow layer and an active connection cache layer, and a priority flow / elephant flow layer TCAM and DRAM are used as storage media, the mouse flow layer uses SRAM and DRAM as storage media, the active connection cache layer uses SRAM as storage media, and the Cuckoo hash structure is used to cache the mapping relationship between active connections and flow entries in TCAM. This architecture uses the TCAM to store the identification field of the priority flow table entry first, and realizes the fast flow table lookup of the priority data packet, thus ensuring the network service quality. At the same time, the Cuckoo cache is designed to dynamically store the current active connection in the elephant flow and the corresponding TCAM flow entry index value, so that most data packets hit the cache, and then find the corresponding flow entry according to the address of the hit cache entry, thereby bypassing the The TCAM flow table lookup process greatly reduces the energy consumption of flow table lookup.
Owner:CHANGSHA UNIVERSITY OF SCIENCE AND TECHNOLOGY

Data storage optimization method and system based on cuckoo hash calculation

The invention discloses a Cuckoo hash calculation-based data storage optimization method and system. The method comprises the following steps of: considering each barrel in an index table as a subgraph node, considering each element stored in the table as an edge, and pointing from practical storage positions to candidate positions of the elements so as to form the whole index table into a diagraph comprising a plurality of connected subgraphs; recognizing one or two subgraphs of each element through hash calculation before the element is practically inserted; predicting an insertion result according to states of the subgraphs; and finally executing an insertion operation according to the prediction result or directly storing the prediction result into a temporary space. According to the method and system, mass data is flat hashed to the whole index table by utilizing a Cuckoo hash mechanism, so that the hash conflict of data in sets is reasonably solved, the load is balanced under the condition of ensuring the query efficiency, the utilization rate of the index table is effectively improved and the data insertion result is predicted in advance; and through predicting the result before data storage, the ineffective kicking overhead is avoided and the data storage efficiency is improved.
Owner:HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products