会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Maintaining a double-ended queue as a linked-list with sentinel nodes and delete flags with concurrent non-blocking insert and remove operations using a double compare-and-swap primitive
    • 将双端队列作为链接​​列表维护,并使用哨兵节点和删除标志,并发使用并发的非阻塞插入和删除操作,使用双重比较和交换原语
    • US07000234B1
    • 2006-02-14
    • US09547290
    • 2000-04-11
    • Nir N. ShavitPaul A. MartinGuy L. Steele, Jr.
    • Nir N. ShavitPaul A. MartinGuy L. Steele, Jr.
    • G06F9/54
    • G06F7/785G06F5/10G06F2205/064
    • A linked-list-based concurrent shared object implementation has been developed that provides non-blocking and linearizable access to the concurrent shared object. In an application of the underlying techniques to a deque, the linked-list-based algorithm allows non-blocking completion of access operations without restricting concurrency in accessing the deque's two ends. The new implementation is based at least in part on a new technique for splitting a pop operation into two steps, marking that a node is about to be deleted, and then deleting it. Once marked, the node logically deleted, and the actual deletion from the list can be deferred. In one realization, actual deletion is performed as part of a next push or pop operation performed at the corresponding end of the deque. An important aspect of the overall technique is synchronization of delete operations when processors detect that there are only marked nodes in the list and attempt to delete one or more of these nodes concurrently from both ends of the deque.
    • 已经开发了基于链接列表的并发共享对象实现,其提供对并发共享对象的非阻塞和线性化访问。 在基于deque的基础技术的应用中,基于链表的算法允许非阻塞地完成访问操作,而不会限制访问deque两端的并发性。 新的实现至少部分地基于用于将弹出操作分成两个步骤的新技术,标记节点即将被删除,然后删除它。 一旦标记,节点将被逻辑删除,并且可以推迟从列表中实际删除。 在一个实现中,实际删除被执行为在deque的对应端执行的下一个推或者弹出操作的一部分。 总体技术的一个重要方面是当处理器检测到列表中只有标记节点并且尝试从德克两端同时删除这些节点中的一个或多个时,删除操作的同步。
    • 5. 发明授权
    • Lock free reference counting
    • 锁定自由引用计数
    • US06993770B1
    • 2006-01-31
    • US09837671
    • 2001-04-18
    • David L. DetlefsPaul A. MartinMark S. MoirGuy L. Steele, Jr.
    • David L. DetlefsPaul A. MartinMark S. MoirGuy L. Steele, Jr.
    • G06F9/54
    • G06F9/526G06F12/0261Y10S707/99944Y10S707/99947
    • We present a methodology for transforming concurrent data structure implementations that depend on garbage collection to equivalent implementations that do not. Assuming the existence of garbage collection makes it easier to design implementations of concurrent data structures, particularly because it eliminates the well-known ABA problem. However, this assumption limits their applicability. Our results demonstrate that, for a significant class of data structures, designers can first tackle the easier problem of an implementation that does depend on garbage collection, and then apply our methodology to achieve a garbage-collection-independent implementation. Our methodology is based on the well-known reference counting technique, and employs the double compare-and-swap operation.
    • 我们提出一种方法,用于将依赖于垃圾回收的并行数据结构实现转换为不具有相同的实现。 假设垃圾收集的存在使得设计并发数据结构的实现变得更加容易,特别是因为它消除了众所周知的ABA问题。 然而,这个假设限制了它们的适用性。 我们的研究结果表明,对于重要的数据结构类,设计人员可以首先解决实现依赖于垃圾回收的更容易的问题,然后应用我们的方法来实现与垃圾回收无关的实现。 我们的方法是基于众所周知的参考计数技术,并采用双重比较和交换操作。
    • 7. 发明授权
    • Code preparation technique employing lock-free pointer operations
    • 采用无锁指针操作的代码准备技术
    • US07805467B2
    • 2010-09-28
    • US11343678
    • 2006-01-30
    • Mark S. MoirDavid L. DetlefsSimon DohertyMaurice P. HerlihyVictor M. LuchangcoPaul A. MartinGuy L. Steele, Jr.
    • Mark S. MoirDavid L. DetlefsSimon DohertyMaurice P. HerlihyVictor M. LuchangcoPaul A. MartinGuy L. Steele, Jr.
    • G06F12/00
    • G06F12/0261G06F9/46G06F9/526
    • A methodology has been discovered for transforming garbage collection-dependent algorithms, shared object implementations and/or concurrent software mechanisms into a form that does not presume the existence of an independent, or execution environment provided, garbage collector. Algorithms, shared object implementations and/or mechanisms designed or transformed using techniques described herein provide explicit reclamation of storage using lock-free pointer operations. Transformations can be applied to lock-free algorithms and shared object implementations and preserve lock-freedom of such algorithms and implementations. As a result, existing and future lock-free algorithms and shared object implementations that depend on a garbage-collected execution environment can be exploited in environments that do not provide garbage collection. Furthermore, algorithms and shared object implementations that employ explicit reclamation of storage using lock-free pointer operations such as described herein may be employed in the implementation of a garbage collector itself.
    • 已经发现了一种方法,用于将垃圾回收依赖算法,共享对象实现和/或并发软件机制转换为不假定存在独立或执行环境(垃圾收集器)的形式。 使用本文描述的技术设计或变换的算法,共享对象实现和/或机制使用无锁指针操作来提供存储的显式回收。 转换可以应用于无锁算法和共享对象实现,并保持这种算法和实现的锁定自由度。 因此,依赖于垃圾回收执行环境的现有和将来的无锁算法和共享对象实现可以在不提供垃圾回收的环境中被利用。 此外,使用如本文所述的无锁定指针操作的使用显式回收存储的算法和共享对象实现可以用于实现垃圾收集器本身。
    • 8. 发明授权
    • Method and apparatus for implementing a lock-free skip list that supports concurrent accesses
    • 用于实现支持并发访问的无锁跳过列表的方法和装置
    • US07308448B1
    • 2007-12-11
    • US10805095
    • 2004-03-19
    • Paul A. Martin
    • Paul A. Martin
    • G06F7/00G06F3/00
    • G06F9/52Y10S707/99938
    • One embodiment of the present invention provides a system that supports concurrent accesses to a skip list that is lock-free, which means that the skip list can be simultaneously accessed by multiple processes without requiring the processes to perform locking operations. During a node deletion operation, the system receives reference to a target node to be deleted from the skip list. The system marks a next pointer in the target node to indicate that the target node is deleted, wherein next pointer contains the address of an immediately following node in the skip list. This marking operation does not destroy the address of the immediately following node, and furthermore, the marking operation is performed atomically and thereby without interference from other processes. The system then atomically modifies the next pointer of an immediately preceding node in the skip list to point to an immediately following node in the skip list, instead of pointing to the target node, thereby splicing the target node out of the skip list.
    • 本发明的一个实施例提供了支持对无锁定的跳过列表的并发访问的系统,这意味着可以通过多个进程同时访问跳过列表,而不需要进行执行锁定操作。 在节点删除操作期间,系统从跳过列表接收到要删除的目标节点的引用。 系统标记目标节点中的下一个指针,以指示目标节点被删除,其中下一个指针包含跳过列表中紧随其后的节点的地址。 该标记操作不会破坏紧随其后的节点的地址,此外,标记操作以原子方式执行,从而不受其他过程的干扰。 系统然后对跳过列表中紧邻的前一个节点的下一个指针进行原子修改,以指向跳过列表中紧跟的节点,而不是指向目标节点,从而将目标节点拼接在跳过列表之外。