Patents by Inventor Neelima Premsankar

Neelima Premsankar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11762913
    Abstract: An example method of cursor seek operations using deleted record spans in memory sub-systems comprises: receiving, by a processing device, a request to search for a first data element of a key-value data store, the request specifying a first key associated with the first data element; determining that the first key is within a range of deleted data elements comprising a plurality of deleted data elements of the key-value data store; identifying a tail key associated with a tail element of the range of deleted data elements; identifying a second data element in the key-value data store, wherein the second data element is associated with a second key that follows the tail key in a specified order of keys; and providing the second data element in response to the request.
    Type: Grant
    Filed: June 26, 2020
    Date of Patent: September 19, 2023
    Assignee: Micron Technology, Inc.
    Inventors: Neelima Premsankar, Gaurav Sanjay Ramdasi, David Boles
  • Publication number: 20230105836
    Abstract: A global lock is used to access a first set of data structures. An active transaction having a transaction start identifier is identified as a globally oldest active transaction associated with the first set of data structures. A first marker value of a first data structure of a second set of data structures is compared to the transaction start identifier to determine satisfaction of a first condition. In response to satisfying the first condition, the first data structure is accessed to identify a first set of data locks associated with one or more transactions each having a transaction completion identifier that satisfies a second condition when compared to the transaction start identifier. In response to satisfying the second condition, the first set of data locks is released.
    Type: Application
    Filed: December 5, 2022
    Publication date: April 6, 2023
    Inventors: Gregory Alan Becker, Neelima Premsankar, David Boles
  • Patent number: 11537565
    Abstract: A first data structure lock to access a first data structure of a first set of data structures to perform an operation associated with a transaction is acquired. The operation associated with the transaction is executed, wherein the operation is one of inserting the transaction into the first data structure or removing the transaction from the first data structure. An oldest active transaction of the first data structure is identified. A globally oldest active transaction of the set of the data structures in view of the oldest active transaction is determined. A second set of data structures is accessed, the second set of data structures including information associated with completed transactions to identify a set of data locks associated with completed transactions each having a transaction completion identifier that satisfies a condition when compared to a transaction start identifier associated with the globally oldest active transaction. The set of data locks are released.
    Type: Grant
    Filed: June 25, 2020
    Date of Patent: December 27, 2022
    Assignee: MICRON TECHNOLOGY, INC.
    Inventors: Gregory Alan Becker, Neelima Premsankar, David Boles
  • Publication number: 20220050807
    Abstract: A prefix probe component receives a request to perform a cursor operation to search for one or more data elements of a key-value data store, the request comprising a key identifier associated with the one or more data elements, and wherein the key-value data store comprises a tree structure with a plurality of nodes; traverses a portion of the plurality of nodes to identify data elements in the key-value data store that match the key identifier; determines whether a number of the data elements that match the key identifier satisfies a threshold condition; and responsive to determining that the number of data elements satisfies the threshold condition, performs the cursor operation for the data elements that match the key identifier.
    Type: Application
    Filed: August 13, 2020
    Publication date: February 17, 2022
    Inventors: Gaurav Sanjay Ramdasi, Neelima Premsankar, David Boles
  • Publication number: 20210200721
    Abstract: A first data structure lock to access a first data structure of a first set of data structures to perform an operation associated with a transaction is acquired. The operation associated with the transaction is executed, wherein the operation is one of inserting the transaction into the first data structure or removing the transaction from the first data structure. An oldest active transaction of the first data structure is identified. A globally oldest active transaction of the set of the data structures in view of the oldest active transaction is determined. A second set of data structures is accessed, the second set of data structures including information associated with completed transactions to identify a set of data locks associated with completed transactions each having a transaction completion identifier that satisfies a condition when compared to a transaction start identifier associated with the globally oldest active transaction. The set of data locks are released.
    Type: Application
    Filed: June 25, 2020
    Publication date: July 1, 2021
    Inventors: Gregory Alan Becker, Neelima Premsankar, David Boles
  • Publication number: 20210200818
    Abstract: An example method of cursor seek operations using deleted record spans in memory sub-systems comprises: receiving, by a processing device, a request to search for a first data element of a key-value data store, the request specifying a first key associated with the first data element; determining that the first key is within a range of deleted data elements comprising a plurality of deleted data elements of the key-value data store; identifying a tail key associated with a tail element of the range of deleted data elements; identifying a second data element in the key-value data store, wherein the second data element is associated with a second key that follows the tail key in a specified order of keys; and providing the second data element in response to the request.
    Type: Application
    Filed: June 26, 2020
    Publication date: July 1, 2021
    Inventors: Neelima Premsankar, Gaurav Sanjay Ramdasi, David Boles