Resource Type

Journal Article 6

Year

2023 2

2018 1

2017 1

2016 2

Keywords

Chaotic simulated annealing 1

Combinatorial optimization 1

Consistent hash table (CHT) 1

Consistent hashing 1

Deep neural network 1

Extendible hashing 1

Fingerprint indexing 1

Hadoop 1

High concurrency 1

Key value storage system 1

Locality-preserving hashing 1

Metadata 1

Minutia cylinder code 1

Moving target defense 1

Multi-index hashing 1

NameNode 1

Network security 1

Non-volatile memory (NVM) 1

Port address hopping 1

Power management 1

open ︾

Search scope:

排序: Display mode:

An efficient wear-leveling-aware multi-grained allocator for persistent memory file systems Research Article

Tao CAI, Pengfei GAO, Dejiao NIU, Yueming MA, Tianle LEI, Jianfei DAI,caitao@ujs.edu.cn,1306943800@qq.com

Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 5,   Pages 703-715 doi: 10.1631/FITEE.2200462

Abstract: Yahoo cloud serving benchmark (YCSB) is used to test and compare with CCEH, level hashing, and cuckoohashing.

Keywords: Extendible hashing     Non-volatile memory (NVM)     High concurrency    

NEHASH: high-concurrency extendible hashing for non-volatile memory Research Article

Qiankun WANG, Xingchen LI, Bingzhe WU, Ke YANG, Wei HU, Guangyu SUN, Yuchao YANG,gsun@pku.edu.cn

Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 5,   Pages 731-741 doi: 10.1631/FITEE.2200463

Abstract: The problem (COP), which aims to find the optimal solution in discrete space, is fundamental in various fields. Unfortunately, many COPs are NP-complete, and require much more time to solve as the problem scale increases. Troubled by this, researchers may prefer fast methods even if they are not exact, so approximation algorithms, heuristic algorithms, and machine learning have been proposed. Some works proposed (CSA) based on the Hopfield neural network and did a good job. However, CSA is not something that current general-purpose processors can handle easily, and there is no special hardware for it. To efficiently perform CSA, we propose a software and hardware co-design. In software, we quantize the weight and output using appropriate bit widths, and then modify the calculations that are not suitable for hardware implementation. In hardware, we design a specialized hardware architecture named COPPER based on the memristor. COPPER is capable of efficiently running the modified quantized CSA algorithm and supporting the pipeline further acceleration. The results show that COPPER can perform CSA remarkably well in both speed and energy.

Keywords: Combinatorial optimization     Chaotic simulated annealing     Processing-in-memory    

Dr.Hadoop: an infinite scalable metadata management for Hadoop—Howthe baby elephant becomes immortal

Dipayan DEV,Ripon PATGIRI

Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 1,   Pages 15-31 doi: 10.1631/FITEE.1500015

Abstract: DCMS preserves metadata locality using consistent hashing and locality-preserving hashing, keeps replicated

Keywords: Hadoop     NameNode     Metadata     Locality-preserving hashing     Consistent hashing    

Akeyed-hashing based self-synchronizationmechanism for port address hopping communication Article

Yue-bin LUO, Bao-sheng WANG, Xiao-feng WANG, Bo-feng ZHANG

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 5,   Pages 719-728 doi: 10.1631/FITEE.1601548

Abstract: address these problems, in this paper we propose a novel selfsynchronization scheme, called ‘keyed-hashing

Keywords: Synchronization     Port address hopping     Moving target defense     Network security    

Deep learning compact binary codes for fingerprint indexing None

Chao-chao BAI, Wei-qiang WANG, Tong ZHAO, Ru-xin WANG, Ming-qiang LI

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 9,   Pages 1112-1123 doi: 10.1631/FITEE.1700420

Abstract: Eventually, a multi-index hashing (MIH) based fingerprint indexing scheme further speeds up the exact

Keywords: Fingerprint indexing     Minutia cylinder code     Deep neural network     Multi-index hashing    

Areliable power management scheme for consistent hashing based distributed key value storage systems Article

Nan-nan ZHAO,Ji-guang WAN,Jun WANG,Chang-sheng XIE

Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 10,   Pages 994-1007 doi: 10.1631/FITEE.1601162

Abstract: In this paper, we propose GreenCHT, a reliable power management scheme for consistent hashing based distributedGreenCHT is implemented based on Sheepdog, a distributed key value storage system that uses consistent hashing

Keywords: Consistent hash table (CHT)     Replication     Power management     Key value storage system     Reliability    

Title Author Date Type Operation

An efficient wear-leveling-aware multi-grained allocator for persistent memory file systems

Tao CAI, Pengfei GAO, Dejiao NIU, Yueming MA, Tianle LEI, Jianfei DAI,caitao@ujs.edu.cn,1306943800@qq.com

Journal Article

NEHASH: high-concurrency extendible hashing for non-volatile memory

Qiankun WANG, Xingchen LI, Bingzhe WU, Ke YANG, Wei HU, Guangyu SUN, Yuchao YANG,gsun@pku.edu.cn

Journal Article

Dr.Hadoop: an infinite scalable metadata management for Hadoop—Howthe baby elephant becomes immortal

Dipayan DEV,Ripon PATGIRI

Journal Article

Akeyed-hashing based self-synchronizationmechanism for port address hopping communication

Yue-bin LUO, Bao-sheng WANG, Xiao-feng WANG, Bo-feng ZHANG

Journal Article

Deep learning compact binary codes for fingerprint indexing

Chao-chao BAI, Wei-qiang WANG, Tong ZHAO, Ru-xin WANG, Ming-qiang LI

Journal Article

Areliable power management scheme for consistent hashing based distributed key value storage systems

Nan-nan ZHAO,Ji-guang WAN,Jun WANG,Chang-sheng XIE

Journal Article