Patent application number | Description | Published |
20120131225 | DATA CENTER NETWORK SYSTEM AND PACKET FORWARDING METHOD THEREOF - A data center network system and a packet forwarding method are provided. The data center network includes a management server and a plurality of machines containing physical machines and virtual machines. The management server configures a logical media access control (MAC) address for each of the machines, wherein most significant bytes of each of the logical MAC addresses are set as 0. When a data packet is about to be sent from a physical machine, the physical machine executes an encapsulation procedure on the data packet for forwarding the data packet to an intermediate node between a transmitter and a receiver of the data packet, and the intermediate node executes a decapsulation procedure on the data packet for forwarding the data packet to the true receiver. Accordingly, the number of virtual machines exposed to the forwarding table of Ethernet switches can be effectively reduced. | 05-24-2012 |
20120137021 | NETWORK SERVER AND LOAD BALANCING ROUTING METHOD FOR NETWORKS THEREOF - A load balancing routing method for networks is disclosed. The routing method includes following steps. A network topology graph and a plurality of expected bandwidth demands corresponding to a plurality of source-destination pairs are received by a network server. A plurality of link criticalities of a plurality of links established according to the source-destination pairs is calculated by the network server according to the network topology graph and the expected bandwidth demands. A plurality of expected loads of the links is calculated by the network server according to the link criticalities. A plurality of cost values is calculated according to a plurality of residual capacities of the links and the corresponding expected loads. A better transmission path corresponding to each of the source-destination pairs is selected by the network server according to the weighted sum of the cost values corresponding to the links in the source-destination pair. | 05-31-2012 |
20120158997 | NETWORK SYSTEM AND METHOD OF ADDRESS RESOLUTION - A network system and a method of address resolution are provided. The network system includes a network, a plurality of virtual machines, a routing module and a path directory module. Each virtual machine includes an internet protocol (IP) address and N media access control (MAC) addresses, so as to connect the network through N transmission routes. The routing module detects and calculates states of the transmission routes. The path directory module receives and decodes an address resolution protocol (ARP) request presented by at least one source virtual machine to reply path information, which includes N MAC addresses corresponding to an IP address of a destination virtual machine and states of the N transmission routes. Thus, the virtual machines present the ARP request without broadcast, so that the problem of network congestion is solved. | 06-21-2012 |
20120166644 | METHOD AND MANAGER PHYSICAL MACHINE FOR VIRTUAL MACHINE CONSOLIDATION - A method and a manager physical machine (PM) for virtual machine (VM) consolidation are provided. The method is performed by the manager PM. A network connects the manager PM and a plurality of server PMs. A plurality of VMs is running on the server PMs. The method includes the following steps. The manager PM classifies the server PMs into redundant PMs and surviving PMs. The manager PM determines migration paths of the VMs running on the redundant PMs to the surviving PMs. The manager PM determines a parallel migration sequence of the VMs running on the redundant PMs based on the migration paths. The manager PM migrates the VMs running on the redundant PMs to the surviving PMs in parallel according to the parallel migration sequence. | 06-28-2012 |
20130097357 | METHOD FOR IDENTIFYING MEMORY OF VIRTUAL MACHINE AND COMPUTER SYSTEM THEREOF - A method for identifying memories of virtual machines is provided. The method is adapted to a computer system executing at least one virtual machine, and an operating system is executed on the virtual machine. The method includes the following steps. A kernel file of the operating system is obtained, and the kernel file includes version information of the operation system. A source code and a configuration file of the operating system are obtained according to the version information, and the versions of the source code and the configuration file are complied with the version of the operating system. An object file is generated by compiling a fixed interface function with the source code according to the configuration file. Memory pages of the virtual machine are identified according to the object file. Furthermore, a computer system using the foregoing method is also provided. | 04-18-2013 |
20130097358 | METHOD FOR SHARING MEMORY OF VIRTUAL MACHINE AND COMPUTER SYSTEM USING THE SAME - A method for sharing memories of virtual machines is provided. The method is applied for a computer system configured to execute at least one virtual machine. The method includes the following steps. A memory map corresponding to the virtual machines is obtained, wherein usage states of memory pages of the virtual machine are stored in the corresponding memory map. Unused memory pages of the virtual machines are marked as free pages according to the corresponding memory map. The free pages of the virtual machines are shared. Therefore, the unused memory pages in the virtual machine can be shared. A computer system using the foregoing method is also provided. | 04-18-2013 |
20130136126 | DATA CENTER NETWORK SYSTEM AND PACKET FORWARDING METHOD THEREOF - A data center network system and a packet forwarding method thereof are provided. The data center network system includes a virtual bridge and an address resolution protocol (ARP) server. The virtual bridge intercepts an ARP request having an identification field and a destination IP address field and adds a corresponding virtual data center identification to the identification field of the ARP request and redirecting the ARP request to the ARP server. Additionally, the ARP server queries a corresponding MAC address according to an IP address recorded in the destination IP address field of the ARP request and the corresponding VDCID recorded in the identification field of the ARP request, and transmits the corresponding MAC address in response to the ARP request. Accordingly, the same private IP address can be reused in the data center network system. | 05-30-2013 |
20130145076 | SYSTEM AND METHOD FOR MEMORY STORAGE - A memory storage system includes multiple flash memory storage devices, multiple transmission interfaces and a central control device. The central control device has a cache and respectively coupled to the flash memory storage devices through the transmission interfaces. The central control device is for maintaining a block map table (BMT) to record a mapping relationship between multiple logical blocks and the physical blocks of the flash memory storage devices and the BMT is temporarily stored in the cache. In addition, the central control device uses the communication commands to access the physical blocks of the flash memory storage devices, in which the communication commands are transmitted to multiple controllers in the flash memory storage devices through the transmission interfaces and the controllers access the physical blocks according to communication commands. In this way, the system can effectively manage multiple flash memory storage devices. | 06-06-2013 |
20130159694 | DOCUMENT PROCESSING METHOD AND SYSTEM - A document processing method and system are provided. A client divides at least one document into a plurality of document pages, and individually encrypts the document pages by a first key to obtain a plurality of encrypted pages. The client removes a part of words from the document pages to obtain a plurality of significant words, and individually encrypts the significant words by a second key different to the first key to obtain a plurality of encrypted significant words. The client records the encrypted significant words and a plurality of first index information in a significant word set (SWS), where the first index information indicates a page in the encrypted pages where the encrypted significant word comes from. Then, the client transmits the encrypted pages and the SWS to a remote server for storage. | 06-20-2013 |
20130159695 | DOCUMENT PROCESSING METHOD AND SYSTEM - A document processing method and system divides a document into document pages, and encrypts the document pages by first key to obtain a plurality of encrypted pages; picks a part of words from the document pages and encrypts them by second key to obtain a Significant Word Set (SWS); picks a part of words from the picked part of words and encrypts them by third key to obtain a Most Relevant Word Set (MRWS). The encrypted pages, the SWS and the MRWS are transmits to a remote server for storage. When user search a keyword in the document, the keyword is encrypted by the second and third keys for performing two query. The first query result is decrypted to obtain the search result. The second query result is decrypted and then checked whether it is a subset of the first decrypted query result for detecting unfaithful execution. | 06-20-2013 |
20130159999 | SYSTEM AND METHOD FOR GENERATING APPLICATION-LEVEL DEPENDENCIES IN ONE OR MORE VIRTUAL MACHINES - A technique generates application-level dependencies in one or more virtual machines (VMs). An intercepting module in a VM monitor intercepts a guest operation system (OS) at TCP send and close related operations. An introspecting module in the VM monitor performs VM introspection for TCP connection and thread information by checking running thread and processing socket kernel objects. It generates an application trajectory and exports application dependencies from the application trajectory for a selected application. | 06-20-2013 |
20130162818 | METHOD, SYSTEM, COMPUTER PROGRAM PRODUCT AND COMPUTER-READABLE RECORDING MEDIUM FOR OBJECT TRACKING - A method for object tracking is provided, which is suitable for retrieving and analyzing distributed surveillance data. The method for object tracking includes the following steps: determining a set of surveillance data corresponding to at least one initial object spot in a set of initial object spots according to a location and a time of the initial object spot; retrieving segments of surveillance data in the set of surveillance data; finding at least one discovered object spot matching a target object qualification in the set of surveillance data and adding the discovered object spot into a set of discovered object spots; setting the set of initial object spots to be the set of discovered object spots and repeating the aforementioned steps when the set of discovered object spots is not empty; and outputting the discovered object spot when the set of discovered object spots is empty. | 06-27-2013 |
20140006734 | METHOD OF CLONING DATA IN A MEMORY FOR A VIRTUAL MACHINE, PRODUCT OF COMPUTER PROGRAMS AND COMPUTER SYSTEM THEREWITH | 01-02-2014 |
20140108700 | METHOD AND COMPUTER SYSTEM FOR MEMORY MANAGEMENT ON VIRTUAL MACHINE - A method and a computer system for memory management on a virtual machine system are provided. The memory management method includes the following steps. A least recently used (LRU) list is maintained by at least one processor according to a last access time, wherein the LRU list includes a plurality of memory pages. A first portion of the memory pages are stored in a virtual memory, a second portion of the memory pages are stored in a zram driver, and a third portion of the memory pages are stored in at least one swap disk. A space in the zram driver is set by the at least one processor. The space in the zram driver is adjusted by the processor according to a plurality of access probabilities of the memory pages in the zram driver, an overhead of a pseudo page fault, and an overhead of a true page fault. | 04-17-2014 |
20140108764 | METHOD AND COMPUTER SYSTEM FOR MEMORY MANAGEMENT ON VIRTUAL MACHINE - A memory management method for a virtual machine system is provided. First, a first threshold value is set by a processor. A balloon target is then set to an allocated virtual memory size and decremented by a first decrement value stepwise by the processor according to a swapin/refault detecting result in a first adjustment state. The swapin/refault detecting result is generated by detecting at least one swapin or refault events by the processor. The balloon target stops being decremented by the processor according to the swapin/refault detecting result in a cool-down state. The balloon target is decremented by a second decrement value stepwise by the processor in a second adjustment state which is after the cool-down state. The second decrement value is less than the first decrement value, and the balloon target is not less than the first threshold value. | 04-17-2014 |
20140108765 | METHOD AND COMPUTER SYSTEM FOR MEMORY MANAGEMENT ON VIRTUAL MACHINE SYSTEM - A method and a computer system for memory management on a virtual machine system are provided. The memory management method includes the following steps. First, a working set size of each of a plurality of virtual machines on the virtual machine system is obtained by at least one processor, wherein the working set size is an amount of memory required to run applications on each of the virtual machines. Then, an amount of storage memory is allocated to each of the virtual machines by the at least one processor according to the working set size of each of the virtual machines and at least one swapin or refault event, wherein the storage memory is a part of memory available from the computer system. | 04-17-2014 |
20140133360 | METHOD OF CONVERTING ROUTING MODE OF NETWORK, CENTRAL CONTROLLER AND DATA CENTER NETWORK SYSTEM USING THE METHOD - A method of converting a routing mode of a network is provided, wherein a plurality of first routes connected a central controller to a plurality of nodes are established in the network through a spanning tree protocol and a plurality of second routes between the nodes in the network through the spanning tree protocol. The method includes enabling a firewall of each of the nodes to block the second routes; disabling a spanning tree protocol function of each of the nodes; populating a forwarding table of each of the nodes with a plurality of predetermined routing paths; and flushing the firewall of each of the nodes, wherein a plurality of third routes between the central controller and the plurality of nodes are established according to the predetermined routing paths without the spanning tree protocol, after the firewall of each of the nodes is flushed. | 05-15-2014 |
20140157034 | POWER MANAGEMENT METHOD FOR ELECTRO-CHEMICAL BATTERIES IN LOW CAPACITY STATE - A power management method for electro-chemical batteries in low capacity state is provided, including: obtaining battery information based on device hardware, to know in advance the maximum allowable current and maximum allowable power when the battery power is low; by detecting the changes in the voltage versus current, updating BCC curve; using BCC curve as power budget to control the ON/OFF of device function thread; and determining whether the minimum battery capacity and the control restriction are reached, and when the minimum battery capacity and the control restriction are reached, turn off the battery through normal shutdown process; otherwise, return to the step of obtaining battery information. | 06-05-2014 |
20140165054 | METHOD AND SYSTEM FOR ANALYZING ROOT CAUSES OF RELATING PERFORMANCE ISSUES AMONG VIRTUAL MACHINES TO PHYSICAL MACHINES - According to one exemplary embodiment, a method for analyzing root causes applies an application-level dependency discovery and anomaly detection to find application-level dependencies in one or more virtual machines (VMs), and generate an application-level topology with anomaly, and then transfers the application-level topology with anomaly to a VM-level dependency, and transfers the VM-level dependency to a physical machine level (PM-level) dependency via a physical and virtual resource mapping, and eventually generates a group of event sets. A prioritized event list is generated by prioritizing the group of event sets. | 06-12-2014 |
20140181119 | METHOD AND SYSTEM FOR ACCESSING FILES ON A STORAGE SYSTEM - A method for accessing files on a storage system is provided. A hash memory table including a plurality of hash buckets respectively corresponding to a plurality of index hash codes is built. Each of the hash buckets has a pointer pointing towards at least one entry. Each of the entries has a physical address field and a hash code field. The physical address fields respectively record physical addresses storing the files, and the hash code fields respectively record verification hash codes corresponding to the files. The index hash codes are generated by inputting keys of the files to an index hash function and the verification hash codes are generated by inputting keys of the files to a verification hash function. Then, the hash memory table is loaded into the buffer with a bucket-based replacement policy so that the files are able to be accessed according to the hash memory table. | 06-26-2014 |
20140289456 | DISK LOGGING METHOD APPLICABLE TO STORAGE MEDIUM AND ELECTRNOIC DEVICE, STORAGE MEDIUM USING THE SAME AND ELECTRONIC DEVICE USING THE SAME - The present disclosure proposes a disk logging method configured for an electronic device comprising a temporary non-volatile storage medium to log data from a volatile memory to said first storage medium, and the method includes the elements of aggregating data from applications of the electronic device in a queue, transferring the aggregated data to a per device queue targeted toward a native queue of the storage medium, writing the data stored in the native queue of the storage medium into a disk platter of the storage medium, and transmitting an interrupt in response to the completion of the writing of the data to the disk platter, wherein the first batch size is dynamically adjusted such that the step of writing the data to the platter takes more time than the step of transferring the data from the per device queue to the native queue of the storage medium. | 09-25-2014 |
20140331223 | METHOD AND SYSTEM FOR SINGLE ROOT INPUT/OUTPUT VIRTUALIZATION VIRTUAL FUNCTIONS SHARING ON MULTI-HOSTS - In a method for SR-IOV Virtual Functions Sharing on Multi-Hosts, implemented in a management system, one or more fake devices are simulated in one or more hosts with each fake device corresponding to one of a plurality of SR-IOV virtual functions. Each of one or more configuration spaces is redirected from each SR-IOV virtual function to each fake device, respectively. Each of configuration space requests is redirected from a corresponding fake device to a corresponding SR-IOV virtual function when the configuration space request is received. And each of memory access operations is redirected from the corresponding SR-IOV virtual function to a mapped memory on a corresponding host with the corresponding fake device, and each of interrupts generated by one or more SR-IOV virtual machines is redirected to the corresponding fake device. | 11-06-2014 |
20150153950 | SYSTEM AND METHOD FOR RECEIVING USER INPUT AND PROGRAM STORAGE MEDIUM THEREOF - A user input method includes the following steps. A virtual keyboard layout and a control region are displayed. The virtual keyboard layout includes a plurality of key subgroups each mapped to a respective one of a plurality of regions of the control region. Locations of an object from at least one captured image are extracted to identify a location of a feature point of the object. A target region in which the feature point is located is determined. Keys mapped to the target region are determined. Movements of the object are translated as input data to the user interface system. | 06-04-2015 |
20160077848 | METHOD AND SYSTEM FOR HANDLING INTERRUPTS IN A VIRTUALIZED ENVIRONMENT - An interrupt handling method and a system are provided. An exemplary embodiment of an interrupt handling method in a virtualized environment operable on a computer having one or more CPU cores, includes disabling a virtual machine exit triggers by an interrupt that destined to a virtual machine (VM), via a hypervisor of the virtualized environment. The exemplary method further includes delivering directly one or more interrupts from an I/O virtualization (IOV) device and a virtual device that destined to the VM, while the destined VM is running on one of the one or more CPU cores, otherwise delivering the one or more interrupts to the hypervisor to deliver corresponding one or more virtual interrupts to the destined VM. | 03-17-2016 |
Patent application number | Description | Published |
20090021814 | HOLOGRAM APPARATUS AND METHOD THEREOF - Hologram recording and reconstruction apparatuses and method thereof are provided. The hologram recording apparatus comprises a laser source, a spatial light modulator, and a Fourier lens. The laser source provides a coherent light beam. The spatial light modulator receives m-bits data to only determine a (p×q) block comprising ON-pixels less than OFF-pixels, and receives the coherent light beam to modulate with the (p×q) block to generate the signal beam. The Fourier lens focuses the signal beam on the hologram recording medium, so that when the focused signal beam and a focused reference beam is modulated together, the hologram data is generated to be recorded on the hologram recording medium. | 01-22-2009 |
20110193737 | WIRELESS REMOTE CONTROL SYSTEM - A wireless remote control system is provided. This system includes a remote controller, plural detectors, and a decision module. The detectors are used for detecting the frequency a wireless signal emitted by the remote controller and respectively generate a detecting result. Based on at least one frequency difference between the detecting results, the decision module determines how the remote controller is moving and thereby generates a control signal. Because the decision module needs no knowledge of the frequency of the emitted wireless signal, the wireless remote controller has the advantages of small size, low cost, and low power consumption. | 08-11-2011 |
20110254550 | SIMULTANEOUS DIFFUSION IMAGING OF MULTIPLE CROSS SECTIONS - A diffusion imaging method is provided. The diffusion imaging method includes performing a plurality of data collection sequences. Each data collection sequence includes applying an excitation radio frequency signal and a selection gradient. The excitation radio frequency signal includes a first set of frequency bands selected to simultaneously excite a first nuclei type in a plurality of cross sections of a subject. Each data collection sequence further includes applying a diffusion gradient during formation of a magnetic resonance signal, applying a spatial encoding gradient during formation of the magnetic resonance signal, and while acquiring the magnetic resonance signal, applying a separation gradient to change a frequency separation between portions of the magnetic resonance signal. The diffusion imaging method further includes computationally determining a diffusion image of each of the plurality of cross sections. | 10-20-2011 |
20120155444 | METHOD FOR ELIMINATING INTERFERENCE IN A RECEIVER, AND ASSOCIATED APPARATUS - A method for eliminating interference in a receiver (RX) includes: obtaining Bluetooth (BT) information and wireless local area network (Wireless LAN, WLAN) information by performing detection on at least one RX signal, wherein the RX signal is received through an antenna of the RX, and the RX signal includes components of both a BT signal and a WLAN signal that are respectively emitted from at least one transmitter (TX); and performing maximum likelihood (ML) joint detection on frequency representatives of the RX signal according to the BT information and the WLAN information and according to a predetermined library, in order to extract at least one of a reproduced version of the BT signal and a reproduced version of the WLAN signal. An associated apparatus is also provided. | 06-21-2012 |
20120235682 | METHOD AND APPARATUS FOR ACQUIRING MAGNETIC RESONANCE IMAGING SIGNALS - A method for acquiring MRI signals includes: applying one or more than one RF pulse, which carries at least two frequency components, and a slice/slab selection gradient to a subject, so that at least two slices/slabs of the subject respectively corresponding to the at least two frequency components are excited simultaneously; applying a plurality of spatial encoding gradients; applying a plurality of separation gradients for separating the at least two slices/slabs; and applying at least one coherent refocusing gradient between the plurality of separation gradients. | 09-20-2012 |
20140292326 | Method and Apparatus for 3D Magnetic Resonance Imaging - The present invention discloses a 3-dimension magnetic resonance imaging method which comprises: applying a slab selection gradient to a subject; transmitting a radiofrequency pulse to the subject, and exciting a slab of the subject to produce magnetic resonance signals with a continuous frequency bandwidth; performing a spatial encoding gradient across three dimensions to encode the magnetic resonance signals, wherein an equivalent encoded field of view which along the selected acceleration direction is controlled by the spatial encoding gradient, and the equivalent encoded field of view is shorter than the excited slab size of the subject; applying a separation gradient along with the spatial encoding gradient; and receiving and reconstructing the encoded magnetic resonance signals to produce 3D images. | 10-02-2014 |
20150208369 | METHOD AND APPARATUS FOR CELL SEARCH AND SYNCHRONIZATION IN MOBILE COMMUNICATION - The present invention provides a method and an apparatus for cell search and synchronization for subscriber stations of the Long Term Evolution (LTE) system. The invention uses primary synchronizing signal of primary synchronization code in each frame structure to establish synchronization with the base station when a subscriber station accesses the LTE network. With such synchronization between the subscriber station and the base station, control signals and transmission data may be correctly exchanged between them. | 07-23-2015 |