Patents by Inventor Cristian Ungureanu
Cristian Ungureanu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 7844581Abstract: Systems and methods for data management and data processing are provided. Embodiments may include systems and methods relating to fast data selection with reasonably high quality results, and may include a faster data selection function and a slower data selection function. Various embodiments may include systems and methods relating to data hashing and/or data redundancy identification and elimination for a data set or a string of data. Embodiments may include a first selection function is used to pre-select boundary points or data blocks/windows from a data set or data stream and a second selection function is used to refine the boundary points or data blocks/windows. The second selection function may be better at determining the best places for boundary points or data blocks/windows in the data set or data stream. In various embodiments, data may be processed by a first faster hash function and slower more discriminating second hash function.Type: GrantFiled: December 1, 2006Date of Patent: November 30, 2010Assignee: NEC Laboratories America, Inc.Inventors: Cezary Dubnicki, Krzysztof Lichota, Erik Kruus, Cristian Ungureanu
-
Patent number: 7747663Abstract: Information, such as files received from a client, etc., is stored in a storage system, such as a content addressable storage system. A file server receives data from a client and chunks the data into blocks of data. The file server also generates metadata for use in forming a data structure. The blocks of data are stored in a block store and a copy of the data blocks and the metadata are locally cached at the file server. A commit server retrieves the metadata. In at least one embodiment, the metadata is retrieved from an update log shared between the file server and the commit server. Based on the retrieved metadata, the commit server generates a version of a data structure. The data structure is then stored at the block store.Type: GrantFiled: March 5, 2008Date of Patent: June 29, 2010Assignee: NEC Laboratories America, Inc.Inventors: Benjamin Atkin, Grzegorz Calkowski, Cristian Ungureanu, Cezary Dubnicki
-
Publication number: 20100082636Abstract: A region of a node is searched to find a content-defined split point. A split point of a node is determined based at least in part on hashes of entries in the node and the node is split based on the determined split point. The search region is searched for the first encountered split point and the node is split based on that split point. That split point is based on a predetermined bitmask of the hashes of the entries in the node satisfying a predetermined condition.Type: ApplicationFiled: September 25, 2008Publication date: April 1, 2010Applicant: NEC LABORATORIES AMERICA, INC.Inventors: Erik Kruus, Cristian Ungureanu, Salil Gokhale, Akshat Aranya, Stephen A. Rago
-
Publication number: 20100070698Abstract: In accordance with exemplary embodiments of the present invention, a content addressable data structure system may include directed acyclic graphs (DAGs) of data content that are addressed using both a user-defined search key and content of data blocks. Internal keys of retention roots of the DAGs may be derived from the user-defined search key while the remaining blocks may be content addressed. As opposed to using a content address, the user may provide the search key when retrieving and deleting DAGs retaining the data content. In addition, the internal keys may be implemented using internal content addressable storage operations, such as applying a hash function and employing a distributed hash table.Type: ApplicationFiled: August 13, 2009Publication date: March 18, 2010Applicant: NEC Laboratories America, Inc.Inventors: Cristian Ungureanu, Cezary Dubnicki
-
Publication number: 20100064166Abstract: Exemplary systems and methods in accordance with embodiments of the present invention may provide a plurality of data services by employing splittable, mergable and transferable redundant chains of data containers. The chains and containers may be automatically split and/or merged in response to changes in storage node network configurations and may be stored in erasure coded fragments distributed across different storage nodes. Data services provided in a distributed secondary storage system utilizing redundant chains of containers may include global deduplication, dynamic scalability, support for multiple redundancy classes, data location, fast reading and writing of data and rebuilding of data due to node or disk failures.Type: ApplicationFiled: July 29, 2009Publication date: March 11, 2010Applicant: NEC Laboratories America, Inc.Inventors: Cezary Dubnicki, Cristian Ungureanu
-
Patent number: 7590513Abstract: A method and system that automatically derives models between monitored quantities under non-faulty conditions so that subsequent faults can be detected as deviations from the derived models. The invention identifies unusual conditions for fault detection and isolation that is absent in rule-based systems.Type: GrantFiled: January 30, 2006Date of Patent: September 15, 2009Assignee: NEC Laboratories America, Inc.Inventors: Guofei Jiang, Haifeng Chen, Cristian Ungureanu, Kenji Yoshihira
-
Publication number: 20090228511Abstract: Information, such as files received from a client, etc., is stored in a storage system, such as a content addressable storage system. A file server receives data from a client and chunks the data into blocks of data. The file server also generates metadata for use in forming a data structure. The blocks of data are stored in a block store and a copy of the data blocks and the metadata are locally cached at the file server. A commit server retrieves the metadata. In at least one embodiment, the metadata is retrieved from an update log shared between the file server and the commit server. Based on the retrieved metadata, the commit server generates a version of a data structure. The data structure is then stored at the block store.Type: ApplicationFiled: March 5, 2008Publication date: September 10, 2009Applicant: NEC LABORATORIES AMERICA, INC.Inventors: Benjamin Atkin, Grzegorz Calkowski, Cristian Ungureanu, Cezary Dubnicki
-
Publication number: 20080221856Abstract: The present invention generally provides a method for grid storage including balancing read and write requests from applications across a first group of nodes in a grid storage system for avoiding hot spots and optimizing performance through smart caching; balancing storage capacity across a second group of nodes in the grid storage system, nodes in the first and second groups being at least one of hardware interchangeable online, capable of being added to change performance or capacity of the grid storage system and capable of being removed to change performance or capacity of the grid storage system; and self managing of the first and second groups of nodes for providing at least one of scalability, self healing after failure of components in the grid storage, non-disruptive upgrades to the grid storage system, and eliminating duplicate data on an object or sub-object level in the grid storage system.Type: ApplicationFiled: February 27, 2008Publication date: September 11, 2008Applicant: NEC LABORATORIES AMERICA, INC.Inventors: Cezary Dubnicki, Cristian Ungureanu, Christian Toelg
-
Publication number: 20080201428Abstract: A fixed prefix peer to peer network has a number of physical nodes. The nodes are logically divided into a number of storage slots. Blocks of data are erasure coded into original and redundant data fragments and the resultant fragments of data are stored in slots on separate physical nodes such that no physical node has more than one original and/or redundant fragment. The storage locations of all of the fragments are organized into a logical virtual node (e.g., a supernode). Thus, the supernode and the original block of data can be recovered even if some of the physical nodes are lost.Type: ApplicationFiled: January 31, 2008Publication date: August 21, 2008Applicant: NEC LABORATORIES AMERICA, INC.Inventors: Cezary Dubnicki, Leszek Gryz, Krzysztof Lichota, Cristian Ungureanu
-
Publication number: 20080201335Abstract: A fixed prefix peer to peer network has a number of physical nodes. The nodes are logically divided into a number of storage slots. Blocks of data are erasure coded into original and redundant data fragments and the resultant fragments of data are stored in slots on separate physical nodes such that no physical node has more than one original and/or redundant fragment. The storage locations of all of the fragments are organized into a logical virtual node (e.g., a supernode). Thus, the supernode and the original block of data can be recovered even if some of the physical nodes are lost.Type: ApplicationFiled: January 31, 2008Publication date: August 21, 2008Applicant: NEC LABORATORIES AMERICA, INC.Inventors: Cezary Dubnicki, Leszek Gryz, Krzysztof Lichota, Cristian Ungureanu
-
Patent number: 7395457Abstract: To determine the cause of a problem, evaluating and tracing how an individual request traverses through various components in the system makes possible new detection techniques. The present invention relates to detecting faults in a computer system. In accordance with an embodiment of the invention, a method and apparatus detects a fault in a system by receiving a request and generating a trace based on the request. The trace is a sequence of components used to service the request. The method and apparatus also compares the trace with a stored automaton to determine whether the trace is an anomaly. The stored automaton describes traces.Type: GrantFiled: June 10, 2005Date of Patent: July 1, 2008Assignee: NEC Laboratories America, Inc.Inventors: Guofei Jiang, Haifeng Chen, Cristian Ungureanu, Kenji Yoshihira
-
Publication number: 20080133446Abstract: Systems and methods for data management and data processing are provided. Embodiments may include systems and methods relating to fast data selection with reasonably high quality results, and may include a faster data selection function and a slower data selection function. Various embodiments may include systems and methods relating to data hashing and/or data redundancy identification and elimination for a data set or a string of data. Embodiments may include a first selection function is used to pre-select boundary points or data blocks/windows from a data set or data stream and a second selection function is used to refine the boundary points or data blocks/windows. The second selection function may be better at determining the best places for boundary points or data blocks/windows in the data set or data stream. In various embodiments, data may be processed by a first faster hash function and slower more discriminating second hash function.Type: ApplicationFiled: December 1, 2006Publication date: June 5, 2008Applicant: NEC Laboratories America, Inc.Inventors: Cezary Dubnicki, Krzysztof Lichota, Erik Kruus, Cristian Ungureanu
-
Publication number: 20080133561Abstract: System(s) and method(s) are provided for data management and data processing. For example, various embodiments may include systems and methods relating to relatively larger groups of data being selected with comparable or better performing selection results (e.g., high data redundancy elimination and/or average chunk size). In various embodiments, the system(s) and method(s) may include, for example a data group, block, or chunk combining technique or/and a data group, block, or chunk splitting technique. Various embodiments may include a first standard or typical data grouping, blocking, or chunking technique and/or data group, block, or chunk combining technique or/and a data group, block, or chunk splitting technique. Exemplary system(s) and method(s) may relate to data hashing and/or data elimination. Embodiments may include a look-ahead buffer and determine whether to emit small chunks or large chunks based on characteristics of underlying data and/or particular application of the invention (e.g.Type: ApplicationFiled: December 1, 2006Publication date: June 5, 2008Applicant: NEC Laboratories America, Inc.Inventors: Cezary Dubnicki, Erik Kruus, Cristian Ungureanu
-
Patent number: 7304994Abstract: An architecture for a peer-to-peer network is disclosed which advantageously is able to maintain short fixed path length routing as the network grows.Type: GrantFiled: March 30, 2004Date of Patent: December 4, 2007Assignee: NEC Laboratories America, Inc.Inventors: Cezary Dubnicki, Cristian Ungureanu
-
Publication number: 20070179746Abstract: A method and system that automatically derives models between monitored quantities under non-faulty conditions so that subsequent faults can be detected as deviations from the derived models. The invention identifies unusual conditions for fault detection and isolation that is absent in rule-based systems.Type: ApplicationFiled: January 30, 2006Publication date: August 2, 2007Applicant: NEC LABORATORIES AMERICA, INC.Inventors: Guofei Jiang, Haifeng Chen, Cristian Ungureanu, Kenji Yoshihira
-
Publication number: 20070112715Abstract: A system failure detection method that employs both supervised and unsupervised monitoring that models the contextual dependencies between the system inputs u and database usages x. By means of statistical learning, the space x is transformed into two subsets of variables, {tilde over (x)}(1) and {tilde over (x)}(2) . The subset {tilde over (x)}(1) encapsulates the dependencies of x with respect to the system load, and each variable in that subset has a highly correlated partner derived from the input u, which serves as a ‘teacher’ to monitor the activities of that variable. The subset {tilde over (x)}(2) contains variables that are less correlated or uncorrelated with respect to the input and are monitored in an unsupervised manner. By combining the supervised and unsupervised monitoring, a high detection rate and minimal false positives are experienced, especially those resulting from workload changes.Type: ApplicationFiled: November 6, 2006Publication date: May 17, 2007Applicant: NEC LABORATORIES AMERICAInventors: Haifeng Chen, Guofei Jiang, Cristian Ungureanu, Kenji Yoshihira
-
Publication number: 20060282708Abstract: To determine the cause of a problem, evaluating and tracing how an individual request traverses through various components in the system makes possible new detection techniques. The present invention relates to detecting faults in a computer system. In accordance with an embodiment of the invention, a method and apparatus detects a fault in a system by receiving a request and generating a trace based on the request. The trace is a sequence of components used to service the request. The method and apparatus also compares the trace with a stored automaton to determine whether the trace is an anomaly. The stored automaton describes traces.Type: ApplicationFiled: June 10, 2005Publication date: December 14, 2006Applicant: NEC Laboratories America, Inc.Inventors: Guofei Jiang, Haifeng Chen, Cristian Ungureanu, Kenji Yoshihira
-
Publication number: 20050135381Abstract: An architecture for a peer-to-peer network is disclosed which advantageously is able to maintain short fixed path length routing as the network grows.Type: ApplicationFiled: March 30, 2004Publication date: June 23, 2005Applicant: NEC Laboratories America, Inc.Inventors: Cezary Dubnicki, Cristian Ungureanu
-
Publication number: 20040215622Abstract: An architecture for a peer-to-peer network is disclosed which advantageously improves system utilization.Type: ApplicationFiled: March 30, 2004Publication date: October 28, 2004Applicant: NEC Laboratories America, Inc.Inventors: Cezary Dubnicki, Cristian Ungureanu