Faraboschi
Paolo Faraboschi, Sant Cugat Barcelona ES
Patent application number | Description | Published |
---|---|---|
20110106519 | SIMULATING AN APPLICATION - One example embodiment is a method that simulates a sampling period of an application to collect execution counts of basic blocks and compute cycles per instruction (CPI) data. A non-sampling period of the application is simulated to collect execution counts of basic blocks, and a comparison of the execution counts collected during the sampling period is performed to the execution counts collected during the non-sampling period. Based on the comparison, a determination is made whether to estimate CPI for the basic blocks during the non-sampling period using the CPI data collected during the sampling period. | 05-05-2011 |
20140214770 | CHECKPOINT GENERATION - A technique includes generating a checkpoint for an application that is executing on a plurality of nodes of a distributed computing system. Forming the checkpoint includes selectively regulating communication of data from the plurality of nodes to a storage subsystem based at least in part on a replication of the data among the nodes. | 07-31-2014 |
Paolo Faraboschi, Sant Cugal Barceiona ES
Patent application number | Description | Published |
---|---|---|
20110066790 | MAIN MEMORY WITH NON-VOLATILE MEMORY AND DRAM - One embodiment is main memory that includes a combination of non-volatile memory (NVM) and dynamic random access memory (DRAM). An operating system migrates data between the NVM and the DRAM. | 03-17-2011 |
Paolo Faraboschi, Barcelona ES
Patent application number | Description | Published |
---|---|---|
20080270952 | Dynamic sampling of functional simulation to determine whether to perform both functional and timing simulation - A method for simulating a system normally performs functional simulation of the system without performing timing simulation of the system. The method dynamically samples the functional simulation of the system at intervals to determine whether the functional simulation has entered into a new phase. Where the functional simulation has entered into a new phase, the method performs both the functional simulation and the timing simulation of the system for one or more intervals. | 10-30-2008 |
20080270959 | Influencing functional simulation of a system by timing simulation of the system - A method performs functional simulation of a system as influenced by timing simulation of the system. The method performs functional simulation of a system, and periodically performs timing simulation of the system. The functional simulation of the system takes into account the timing simulation of the system that is periodically performed. | 10-30-2008 |
20090282234 | REMOTE CONNECTION BETWEEN INTERMEDIARY DEVICE AND COMPUTING DEVICE VIA CENTRAL AUTHORITY SOFTWARE - Upon an intermediary device on a network being turned on, controlling system software at the intermediary device is booted such that no public network address is ever assigned to the intermediary device. The intermediary device sends a boot message over the network to central authority software running on one or more first computing devices on the network. The central authority software in response sends messages over the network to the intermediary device and to a second computing device on the network to establish a private tunnel with one another. The intermediary device and the second computing device establish the private tunnel with one another over the network. The intermediary device then opens a remote connection to the second computing device through the private tunnel so that peripherals connected to the intermediary device as if they were directly connected to the second computing device. | 11-12-2009 |
20100198827 | METHOD FOR FINDING TEXT READING ORDER IN A DOCUMENT - A method for finding text reading order in a document such as a scanned newspaper or magazine includes the steps of pruning unnecessary text zones using semantic analysis ( | 08-05-2010 |
20110258362 | REDUNDANT DATA STORAGE FOR UNIFORM READ LATENCY - A memory apparatus ( | 10-20-2011 |
20120233472 | SECURING NON-VOLATILE MEMORY REGIONS - Methods, apparatus and articles of manufacture to secure non-volatile memory regions are disclosed. An example method disclosed herein comprises associating a first key pair and a second key pair different than the first key pair with a process, using the first key pair to secure a first region of a non-volatile memory for the process, and using the second key pair to secure a second region of the non-volatile memory for the same process, the second region being different than the first region. | 09-13-2012 |
20130198723 | MAPPING HIGH-PERFORMANCE COMPUTING APPLICATIONS TO PLATFORMS - The mapping of High Performance Computing (“HPC”) applications to platforms is provided. An HPC application characterization module determines an HPC application signature to characterize the HPC application. An HPC application mapping module selects a platform from a plurality of platforms to execute the HPC application based on the HPC application signature and a set of benchmarks. An HPC application monitoring module monitors the execution of the HPC application on the selected platform. | 08-01-2013 |
20140195673 | DYNAMICALLY BALANCING EXECUTION RESOURCES TO MEET A BUDGET AND A QoS of PROJECTS - Systems, methods, and machine-readable and executable instructions are provided for dynamically balancing execution resources to meet a budget and/or a QoS of projects. An example method can include analyzing a submitted program for a project, where the program comprises data to execute the project and a specification for the project, determining a computing resource allocation based upon the submitted data and the specification, and deploying for execution the submitted data to the determined computing resource allocation. The method can include monitoring progress during the execution of the data to determine a probability of project completion satisfying the specification, and dynamically balancing the execution resources to meet the budget and/or the QoS of the project to satisfy the specification. | 07-10-2014 |
20140201371 | BALANCING THE ALLOCATION OF VIRTUAL MACHINES IN CLOUD SYSTEMS - Methods, systems, and machine-readable and executable instructions are provided for balancing the allocation of a number of virtual machines (VMs) in clouds systems. Balancing the allocation of VMs in cloud systems can include determining a number of relationships of a plurality of nodes in a cloud system. Balancing the allocation of VMs in cloud systems can include assigning a number of VMs to the plurality of nodes in response to a request based on a criteria of the request and the number of relationships of the plurality of nodes to balance VMs in the cloud system, where the criteria include a type and a priority for each of the number of VMs. | 07-17-2014 |
Paolo Faraboschi, Sant Cugat ES
Patent application number | Description | Published |
---|---|---|
20120011500 | MANAGING A MEMORY SEGMENT USING A MEMORY VIRTUAL APPLIANCE - In a method for managing a memory segment through use of a memory virtual appliance, data is encapsulated with the memory virtual appliance, in which the memory virtual appliance comprises a virtual machine configured to manage a memory segment in a physical memory. In addition, the memory virtual appliance is implemented using a virtualization wrapper comprising computer readable code enabling the encapsulated data to be shared among a plurality of clients. Moreover, the encapsulated data is stored in the memory segment controlled by the memory virtual appliance. | 01-12-2012 |
20150026318 | IDENTIFYING NETWORK COMMUNICATION PATTERNS - Examples of the present disclosure include methods, devices, and/or systems. Identifying network communication patterns can include analyzing a distributed computer program of a network, estimating virtual network communication traffic based on the analysis, and mapping the virtual network communication traffic to a physical network link. Identifying network communications patterns can also include identifying the network communication pattern and categorizing the physical communication network link based on an estimated communication intensity of the mapped communication traffic and the network communication pattern. Identifying network communication patterns can further include optimizing an energy used by the network based on the categorization. | 01-22-2015 |
Paolo Faraboschi, San Cugat ES
Patent application number | Description | Published |
---|---|---|
20140351495 | LOCAL CHECKPOINTING USING A MULTI-LEVEL CELL - Local checkpointing using a multi-level call is described herein. An example method includes storing a first datum in a first level of a multi-level cell. A second datum is stored in a second level of the multi-level cell, the second datum representing a checkpoint of the first datum. The first datum is copied from the first level to the second level of the multi-level cell to create the checkpoint. | 11-27-2014 |
Paolo Faraboschi, Sant Cugat Del Valles ES
Patent application number | Description | Published |
---|---|---|
20140379889 | AUTONOMOUS METRIC TRACKING AND ADJUSTMENT - Example embodiments relate to autonomous metric tracking and adjustment. In some examples, a computing node may include a processor to run a main operating system and an application that runs on top of the main operating system. The computing node may include a hardware-level controller that dynamically adjusts individual hardware components of the computing node via control signals that do not pass through the main operating system. The adjustments may be based on a target metric from a scheduling service external to the computing node and individual performance metrics from the computing node. | 12-25-2014 |
Paolo Faraboschi, Sant Cugat, Barcelona, CA US
Patent application number | Description | Published |
---|---|---|
20150074456 | VERSIONED MEMORIES USING A MULTI-LEVEL CELL - Versioned memories using a multi-level cell (MLC) are disclosed. An example method includes comparing a global memory version to a block memory version, the global memory version corresponding to a plurality of memory blocks, the block memory version corresponding to one of the plurality of memory blocks. The example method includes determining, based on the comparison, which level in a multi-level cell of the one of the plurality of memory blocks stores checkpoint data. | 03-12-2015 |
Paolo Faraboschi, Palo Alto, CA US
Patent application number | Description | Published |
---|---|---|
20150350381 | Vertically-Tiered Client-Server Architecture - Systems and methods of vertically aggregating tiered servers in a data center are disclosed. An example method includes partitioning a plurality of servers in the data center to form an array of aggregated end points (AEPs). Multiple servers within each AEP are connected by an intra-AEP network fabric and different AEPs are connected by an inter-AEP network. Each AEP has one or multiple central hub servers acting as end-points on the inter-AEP network. The method includes resolving a target server identification (ID). If the target server ID is the central hub server in the first AEP, the request is handled in the first AEP. If the target server ID is another server local to the first AEP, the request is redirected over the intra-AEP fabric. If the target server ID is a server in a second AEP, the request is transferred to the second AEP. | 12-03-2015 |