Patents by Inventor Ai Lian Mi

Ai Lian Mi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11263115
    Abstract: According to one embodiment, a method, computer system, and computer program product for memory corruption diagnosis is provided. The present invention may include generating a pattern expression (PE) header file, wherein a plurality of common datatypes associated with a software program are pre-defined. The invention may further include generating a PE for each of the plurality of common datatypes, and generating a PE table by merging the generated PEs for each of the plurality of common datatypes. Upon discovery that memory corruption has occurred, the invention may include transmitting a recorded state of the software program as a core dump file to a server, and using a dump utility to identify overlay content of the core dump file. Lastly, the invention may include identifying a possible source program of the memory corruption by matching the PE tables against the illegally-written overlay content.
    Type: Grant
    Filed: December 18, 2019
    Date of Patent: March 1, 2022
    Assignee: International Business Machines Corporation
    Inventors: Guan Jun Liu, Niao Qing Liu, Ai Lian Mi, Jing Jing Wen, Bei Chun Zhou
  • Publication number: 20200142973
    Abstract: A computer-implemented method, computer system, and computer program product for recommending a target location for relocating a file are disclosed. In the method, a source path of a file is obtained. Then, a target starting directory in a target directory system to which the file is to be relocated is determined based on the source path. A directory model representing a subordinated directory system of the target directory system is determined. The directory model comprises at least one path starting with the target starting directory. Then, a similarity of the at least one path in the directory model with respect to the source path is determined. Next, at least one candidate path from the at least one path is recommended based on the similarity.
    Type: Application
    Filed: November 5, 2018
    Publication date: May 7, 2020
    Inventors: Ya Peng Dong, Chen Jiang, Jian Hua Zhang, Jing Jing Wen, Sheng Ping Zhang, Ai Lian Mi
  • Publication number: 20200117572
    Abstract: According to one embodiment, a method, computer system, and computer program product for memory corruption diagnosis is provided. The present invention may include generating a pattern expression (PE) header file, wherein a plurality of common datatypes associated with a software program are pre-defined. The invention may further include generating a PE for each of the plurality of common datatypes, and generating a PE table by merging the generated PEs for each of the plurality of common datatypes. Upon discovery that memory corruption has occurred, the invention may include transmitting a recorded state of the software program as a core dump file to a server, and using a dump utility to identify overlay content of the core dump file. Lastly, the invention may include identifying a possible source program of the memory corruption by matching the PE tables against the illegally-written overlay content.
    Type: Application
    Filed: December 18, 2019
    Publication date: April 16, 2020
    Inventors: Guan Jun Liu, Niao Qing Liu, Ai Lian Mi, Jing Jing Wen, Bei Chun Zhou
  • Patent number: 10540261
    Abstract: According to one embodiment, a method, computer system, and computer program product for memory corruption diagnosis is provided. The present invention may include generating a pattern expression (PE) header file, wherein a plurality of common datatypes associated with a software program are pre-defined. The invention may further include generating a PE for each of the plurality of common datatypes, and generating a PE table by merging the generated PEs for each of the plurality of common datatypes. Upon discovery that memory corruption has occurred, the invention may include transmitting a recorded state of the software program as a core dump file to a server, and using a dump utility to identify overlay content of the core dump file. Lastly, the invention may include identifying a possible source program of the memory corruption by matching the PE tables against the illegally-written overlay content.
    Type: Grant
    Filed: April 7, 2017
    Date of Patent: January 21, 2020
    Assignee: International Business Machines Corporation
    Inventors: Guan Jun Liu, Niao Qing Liu, Ai Lian Mi, Jing Jing Wen, Bei Chun Zhou
  • Patent number: 10534694
    Abstract: According to one embodiment, a method, computer system, and computer program product for memory corruption diagnosis is provided. The present invention may include generating a pattern expression (PE) header file, wherein a plurality of common datatypes associated with a software program are pre-defined. The invention may further include generating a PE for each of the plurality of common datatypes, and generating a PE table by merging the generated PEs for each of the plurality of common datatypes. Upon discovery that memory corruption has occurred, the invention may include transmitting a recorded state of the software program as a core dump file to a server, and using a dump utility to identify overlay content of the core dump file. Lastly, the invention may include identifying a possible source program of the memory corruption by matching the PE tables against the illegally-written overlay content.
    Type: Grant
    Filed: December 14, 2017
    Date of Patent: January 14, 2020
    Assignee: International Business Machines Corporation
    Inventors: Guan Jun Liu, Niao Qing Liu, Ai Lian Mi, Jing Jing Wen, Bei Chun Zhou
  • Patent number: 10346286
    Abstract: According to one embodiment, a method, computer system, and computer program product for memory corruption diagnosis is provided. The present invention may include generating a pattern expression (PE) header file, wherein a plurality of common datatypes associated with a software program are pre-defined. The invention may further include generating a PE for each of the plurality of common datatypes, and generating a PE table by merging the generated PEs for each of the plurality of common datatypes. Upon discovery that memory corruption has occurred, the invention may include transmitting a recorded state of the software program as a core dump file to a server, and using a dump utility to identify overlay content of the core dump file. Lastly, the invention may include identifying a possible source program of the memory corruption by matching the PE tables against the illegally-written overlay content.
    Type: Grant
    Filed: February 22, 2018
    Date of Patent: July 9, 2019
    Assignee: International Business Machines Corporation
    Inventors: Guan Jun Liu, Niao Qing Liu, Ai Lian Mi, Jing Jing Wen, Bei Chun Zhou
  • Publication number: 20180293149
    Abstract: According to one embodiment, a method, computer system, and computer program product for memory corruption diagnosis is provided. The present invention may include generating a pattern expression (PE) header file, wherein a plurality of common datatypes associated with a software program are pre-defined. The invention may further include generating a PE for each of the plurality of common datatypes, and generating a PE table by merging the generated PEs for each of the plurality of common datatypes. Upon discovery that memory corruption has occurred, the invention may include transmitting a recorded state of the software program as a core dump file to a server, and using a dump utility to identify overlay content of the core dump file. Lastly, the invention may include identifying a possible source program of the memory corruption by matching the PE tables against the illegally-written overlay content.
    Type: Application
    Filed: December 14, 2017
    Publication date: October 11, 2018
    Inventors: Guan Jun Liu, Niao Qing Liu, Ai Lian Mi, Jing Jing Wen, Bei Chun Zhou
  • Publication number: 20180293148
    Abstract: According to one embodiment, a method, computer system, and computer program product for memory corruption diagnosis is provided. The present invention may include generating a pattern expression (PE) header file, wherein a plurality of common datatypes associated with a software program are pre-defined. The invention may further include generating a PE for each of the plurality of common datatypes, and generating a PE table by merging the generated PEs for each of the plurality of common datatypes. Upon discovery that memory corruption has occurred, the invention may include transmitting a recorded state of the software program as a core dump file to a server, and using a dump utility to identify overlay content of the core dump file. Lastly, the invention may include identifying a possible source program of the memory corruption by matching the PE tables against the illegally-written overlay content.
    Type: Application
    Filed: April 7, 2017
    Publication date: October 11, 2018
    Inventors: Guan Jun Liu, Niao Qing Liu, Ai Lian Mi, Jing Jing Wen, BEI CHUN ZHOU
  • Publication number: 20180293150
    Abstract: According to one embodiment, a method, computer system, and computer program product for memory corruption diagnosis is provided. The present invention may include generating a pattern expression (PE) header file, wherein a plurality of common datatypes associated with a software program are pre-defined. The invention may further include generating a PE for each of the plurality of common datatypes, and generating a PE table by merging the generated PEs for each of the plurality of common datatypes. Upon discovery that memory corruption has occurred, the invention may include transmitting a recorded state of the software program as a core dump file to a server, and using a dump utility to identify overlay content of the core dump file. Lastly, the invention may include identifying a possible source program of the memory corruption by matching the PE tables against the illegally-written overlay content.
    Type: Application
    Filed: February 22, 2018
    Publication date: October 11, 2018
    Inventors: Guan Jun Liu, Niao Qing Liu, Ai Lian Mi, Jing Jing Wen, Bei Chun Zhou
  • Patent number: 9632818
    Abstract: A mechanism is provided for identifying a performance bottleneck of a transaction in a transaction processing system. At a predefined time point, status information of an interaction between the transaction and a processing component among one or more processing components in the transaction processing system is collected. A duration of the interaction on the basis of the status information is determined. In response to the duration exceeding a predefined threshold, the interaction is identified as the performance bottleneck of the transaction in order to make changes to the transaction processing system thereby improving performance.
    Type: Grant
    Filed: July 13, 2015
    Date of Patent: April 25, 2017
    Assignee: International Business Machines Corporation
    Inventors: Ting Ting Huang, Guan Jun Liu, Niao Qing Liu, Ai Lian Mi, Bei Chun Zhou
  • Publication number: 20170109203
    Abstract: Embodiments of the present invention may schedule a task in a processing system. According to one embodiment of the present invention, a resource to be accessed by a task in a processing system is determined based on a type of a request for initiating the task. Then, a length of a task queue that records at least one task waiting for the resource is determined Next, the request is suspended in response to the length of the task queue being greater than a predefined threshold.
    Type: Application
    Filed: October 15, 2015
    Publication date: April 20, 2017
    Inventors: Guan Jun Liu, Niao Qing Liu, Ai Lian Mi, Bei Chun Zhou
  • Publication number: 20160034301
    Abstract: A mechanism is provided for identifying a performance bottleneck of a transaction in a transaction processing system. At a predefined time point, status information of an interaction between the transaction and a processing component among one or more processing components in the transaction processing system is collected. A duration of the interaction on the basis of the status information is determined. In response to the duration exceeding a predefined threshold, the interaction is identified as the performance bottleneck of the transaction in order to make changes to the transaction processing system thereby improving performance.
    Type: Application
    Filed: July 13, 2015
    Publication date: February 4, 2016
    Inventors: Ting Ting Huang, Guan Jun Liu, Niao Qing Liu, Ai Lian Mi, Bei Chun Zhou