Patents by Inventor Milind M. Chabbi

Milind M. Chabbi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11768716
    Abstract: In example implementations, a method include receiving a request for a lock in a Mellor-Crummey Scott (MCS) lock protocol from a guest user that is context free (e.g., a process that does not bring a queue node). The lock determines that it contains a null value. The lock is granted to the guest user. A pi value is received from the guest user to store in the lock. The pi value notifies subsequent users that the guest user has the lock.
    Type: Grant
    Filed: October 22, 2020
    Date of Patent: September 26, 2023
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Hideaki Kimura, Tianzheng Wang, Milind M. Chabbi
  • Patent number: 11144237
    Abstract: Systems and methods for concurrent reading and writing in shared, persistent byte-addressable non-volatile memory is described herein. One method includes in response to initiating a write sequence to one or more memory elements, checking an identifier memory element to determine whether a write sequence is in progress. In addition, the method includes updating an ingress counter. The method also includes adding process identification associated with a writer node to the identifier memory element. Next, a write operation is performed. After the write operation, an egress counter is incremented and the identifier memory element is reset to an expected value.
    Type: Grant
    Filed: August 1, 2019
    Date of Patent: October 12, 2021
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Milind M. Chabbi, Yupu Zhang, Haris Volos, Kimberly Keeton
  • Publication number: 20210042169
    Abstract: In example implementations, a method include receiving a request for a lock in a Mellor-Crummey Scott (MCS) lock protocol from a guest user that is context free (e.g., a process that does not bring a queue node). The lock determines that it contains a null value. The lock is granted to the guest user. A pi value is received from the guest user to store in the lock. The pi value notifies subsequent users that the guest user has the lock.
    Type: Application
    Filed: October 22, 2020
    Publication date: February 11, 2021
    Inventors: Hideaki Kimura, Tianzheng Wang, Milind M. Chabbi
  • Publication number: 20210034281
    Abstract: Systems and methods for concurrent reading and writing in shared, persistent byte-addressable non-volatile memory is described herein. One method includes in response to initiating a write sequence to one or more memory elements, checking an identifier memory element to determine whether a write sequence is in progress. In addition, the method includes updating an ingress counter. The method also includes adding process identification associated with a writer node to the identifier memory element. Next, a write operation is performed. After the write operation, an egress counter is incremented and the identifier memory element is reset to an expected value.
    Type: Application
    Filed: August 1, 2019
    Publication date: February 4, 2021
    Inventors: Milind M. Chabbi, Yupu Zhang, Haris Volos, Kimberly Keeton
  • Patent number: 10887213
    Abstract: Examples disclosed herein relate to path-synchronous performance monitoring of an interconnection network based on source code attribution. A processing node in the interconnection network has a profiler module to select a network transaction to be monitored, determine a source code attribution associated with the network transaction to be monitored, and issue a network command to execute the network transaction to be monitored. A logger module creates, in a buffer, a node temporal log associated with the network transaction and the network command. A drainer module periodically captures the node temporal log. The processing node has a network interface controller to receive the network command and mark a packet generated for the network command to be temporally tracked and attributed back to the source code attribution at each hop of the interconnection network traversed by the marked packet.
    Type: Grant
    Filed: September 15, 2017
    Date of Patent: January 5, 2021
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Milind M Chabbi, Michael Schlansker, Adarsh Yoga
  • Patent number: 10846148
    Abstract: In example implementations, a method include receiving a request for a lock in a Mellor-Crummey Scott (MCS) lock protocol from a guest user that is context free (e.g., a process that does not bring a queue node). The lock determines that it contains a null value. The lock is granted to the guest user. A pi value is received from the guest user to store in the lock. The pi value notifies subsequent users that the guest user has the lock.
    Type: Grant
    Filed: September 10, 2015
    Date of Patent: November 24, 2020
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Hideaki Kimura, Tianzheng Wang, Milind M. Chabbi
  • Patent number: 10423464
    Abstract: In one example in accordance with the present disclosure, a method may include performing a transactional operation such that if one step of the transactional operation is performed, each other step of the transactional operation is performed. The transactional operation may include making a first copy, stored in a first persistent memory, of a next ticket number stored in a second persistent memory and updating the next ticket number in the second persistent memory. The method may also include determining when to serve a first thread based on the first copy of the next ticket number.
    Type: Grant
    Filed: October 25, 2016
    Date of Patent: September 24, 2019
    Assignee: Hewlett Packard Enterprise Patent Development LP
    Inventors: Mark Lillibridge, Milind M. Chabbi, Haris Volos
  • Publication number: 20190095340
    Abstract: A memory region has logical partitions. Each logical partition has data packages. The memory region discontiguously stores the data packages of the logical partitions. A writing process can discontiguously generate the data packages of the logical partitions. A reading process can contiguously retrieve the data packages of a selected logical partition.
    Type: Application
    Filed: September 28, 2017
    Publication date: March 28, 2019
    Inventors: James Hyungsun Park, Harumi Kuno, Milind M. Chabbi, Wey Yuan Guy, Charles Stuart Johnson, Daniel Feldman, Tuan Tran, William N. Scherer, III, John L. Byrne
  • Publication number: 20190087440
    Abstract: Examples disclosed herein relate to a hierarchical file system. The hierarchical file system may include a first and a second virtual file referencing a stored data set. The first virtual file may include a set of first keys of a first level of specificity, with each key of the set of first keys including a record locator. The second virtual file may include a set of second keys referencing the data set and of a second level of specificity. The set of first keys within the first virtual file is searched in response to a query for data of the data set. A key from the set of second keys is accessed via the record locator from a key from the set of first keys where the data of the data set was not identified by the set of first keys.
    Type: Application
    Filed: September 15, 2017
    Publication date: March 21, 2019
    Inventors: Charles Stuart Johnson, Harumi Kuno, James Park, Wey Yuan Guy, Milind M. Chabbi, Jacqueline Bredenberg, William N. Scherer, John L. Byrne, Joseph Tucek, Daniel Feldman
  • Publication number: 20190089616
    Abstract: Examples disclosed herein relate to path-synchronous performance monitoring of an interconnection network based on source code attribution. A processing node in the interconnection network has a profiler module to select a network transaction to be monitored, determine a source code attribution associated with the network transaction to be monitored, and issue a network command to execute the network transaction to be monitored. A logger module creates, in a buffer, a node temporal log associated with the network transaction and the network command. A drainer module periodically captures the node temporal log. The processing node has a network interface controller to receive the network command and mark a packet generated for the network command to be temporally tracked and attributed back to the source code attribution at each hop of the interconnection network traversed by the marked packet.
    Type: Application
    Filed: September 15, 2017
    Publication date: March 21, 2019
    Inventors: Milind M. Chabbi, Michael Schlansker, Adarsh Yoga
  • Publication number: 20180246773
    Abstract: In example implementations, a method include receiving a request for a lock in a Mellor-Crummey Scott (MCS) lock protocol from a guest user that is context free (e.g., a process that does not bring a queue node). The lock determines that it contains a null value. The lock is granted to the guest user. A pi value is received from the guest user to store in the lock. The pi value notifies subsequent users that the guest user has the lock.
    Type: Application
    Filed: September 10, 2015
    Publication date: August 30, 2018
    Inventors: Hideaki Kimura, Tianzheng Wang, Milind M. Chabbi
  • Publication number: 20180095783
    Abstract: In one example in accordance with the present disclosure, a method may include performing a transactional operation such that if one step of the transactional operation is performed, each other step of the transactional operation is performed. The transactional operation may include making a first copy, stored in a first persistent memory, of a next ticket number stored in a second persistent memory and updating the next ticket number in the second persistent memory. The method may also include determining when to serve a first thread based on the first copy of the next ticket number.
    Type: Application
    Filed: October 25, 2016
    Publication date: April 5, 2018
    Inventors: Mark Lillibridge, Milind M. Chabbi, Haris Volos