Patents by Inventor Hiroshi H. Horii
Hiroshi H. Horii has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10970311Abstract: A method of a client processing transactions in a NoSQL database that includes inserting client status from a plurality of clients to a NoSQL database, and sending a call from at least one of the clients in the plurality of client to a client server in the NoSQL database, wherein the client server sends a time stamp to the client. The method further includes reading by the client the clients status from the NoSQL database, and the client validating no conflict for a read or write transaction by the client to the database. The client confirms that a latest version of a value is committed before a start time of the transaction. The client performs the read or write transaction if the latest version of the value has been committed.Type: GrantFiled: December 7, 2015Date of Patent: April 6, 2021Assignee: International Business Machines CorporationInventor: Hiroshi H. Horii
-
Patent number: 10740230Abstract: A computer-implemented method and a computer processing system are provided for increasing memory density in a memory using heap contraction. The method includes dividing the heap into a plurality of work regions including a last region and other regions such the last region is larger in size than the other regions. The method further includes calculating a size of the heap contraction. The method also includes forming a pair of the last region and one of the other regions that has a largest free portion. The method additionally includes executing intra-table compaction and inter-table compaction on the heap. The method further includes contracting the last region by subtracting a prescribed space from the last region.Type: GrantFiled: October 20, 2016Date of Patent: August 11, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Michihiro Horie, Hiroshi H. Horii, Kazunori Ogata, Tamiya Onodera
-
Patent number: 10628307Abstract: A computer-implemented method and computer processing system are provided for coordinated heap contraction. The method includes starting a contraction of a heap responsive to a physical memory use of the heap approaching a limit. The contraction starts from a particular runtime system that as estimated to be slowest for the contraction from among a plurality of runtime systems that use the heap, based on previously determined estimates. The method also includes decreasing the physical memory use of the heap by compacting the heap with only one Garbage Collection (GC) thread, responsive to the contraction of the heap being unable to catch up to the physical memory use.Type: GrantFiled: May 8, 2017Date of Patent: April 21, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Michihiro Horie, Hiroshi H. Horii, Kazunori Ogata
-
Patent number: 10599563Abstract: A computer-implemented method and computer processing system are provided for coordinated heap contraction. The method includes starting a contraction of a heap responsive to a physical memory use of the heap approaching a limit. The contraction starts from a particular runtime system that was estimated to be slowest for the contraction from among a plurality of runtime systems that use the heap, based on previously determined estimates. The method also includes decreasing the physical memory use of the heap by compacting the heap with only one Garbage Collection (GC) thread, responsive to the contraction of the heap being unable to catch up to the physical memory use.Type: GrantFiled: November 14, 2017Date of Patent: March 24, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Michihiro Horie, Hiroshi H. Horii, Kazunori Ogata
-
Patent number: 10409762Abstract: Described herein are methods of transferring arrays of data information by remote data memory access (RDMA). The method may include identifying data arrays in a local place that are to be copied to a remote place; and determining whether the data arrays are to be overwritten by analyzing asynchronous blocks from the data arrays in the local place at a start compilation time using a static compiler. The method may further include executing transfer of the data arrays from the local place to the remote place with a pull type RDMA.Type: GrantFiled: March 8, 2016Date of Patent: September 10, 2019Assignee: International Business Machines CorporationInventors: Michihiro Horie, Hiroshi H. Horii, Kiyokuni Kawachiya, Mikio Takeuchi
-
Patent number: 10331554Abstract: Garbage collection methods and systems include adding a data object to one of multiple queues owned by a first garbage collection thread. The queues include a public queue and multiple private queues. A task is popped from one of the plurality of queues to perform garbage collection. The public queue is swapped with one of the private plurality of private queues if there are no tasks in the public queue.Type: GrantFiled: April 28, 2017Date of Patent: June 25, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Michihiro Horie, Hiroshi H. Horii, Tamiya Onodera
-
Patent number: 10324836Abstract: Garbage collection methods include adding a data object to one of multiple queues owned by a first garbage collection thread. The queues include a public queue and multiple private queues. A task is popped from one of the plurality of queues to perform garbage collection. The public queue is swapped with one of the private plurality of private queues if there are no tasks in the public queue.Type: GrantFiled: November 8, 2017Date of Patent: June 18, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Michihiro Horie, Hiroshi H. Horii, Tamiya Onodera
-
Patent number: 10318521Abstract: A computer-implemented method executed on one or more processors is provided for processing a query for a NoSQL (non-structured query language) database. The computer-implemented method includes periodically monitoring active transactions that started and are committing dirty versions before a specific time, sending a query to fetch a state of the active transactions, and receiving a query result. The computer-implemented method further includes, if the query result includes active transactions, performing a normal query that scans dirty and committed versions. The computer-implemented method further includes, if the query result includes no active transactions, due to a time window indicating a specified staleness, sending a simplified query that scans only committed versions.Type: GrantFiled: November 29, 2016Date of Patent: June 11, 2019Assignee: International Business Machines CorporationInventor: Hiroshi H. Horii
-
Patent number: 10305909Abstract: Systems and methods for network access control, including sending a service request from an on-premise system to one or more offloaded front-end services on one or more offloading servers. The requests by the offloaded services to access back-end services in one or more on-premise systems are monitored, and access requests by the offloaded services for unauthorized back-end services are denied. The service request is redirected and locally executed to generate logs of the back-end services used to perform the service request if the access requests are denied. A permission mapping in a firewall between the offloaded services and the logged back-end services is updated to permit future access requests by the offloaded services.Type: GrantFiled: August 9, 2018Date of Patent: May 28, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Hiroshi H. Horii, Takuya Mishina
-
Publication number: 20180351953Abstract: Systems and methods for network access control, including sending a service request from an on-premise system to one or more offloaded front-end services on one or more offloading servers. The requests by the offloaded services to access back-end services in one or more on-premise systems are monitored, and access requests by the offloaded services for unauthorized back-end services are denied. The service request is redirected and locally executed to generate logs of the back-end services used to perform the service request if the access requests are denied. A permission mapping in a firewall between the offloaded services and the logged back-end services is updated to permit future access requests by the offloaded services.Type: ApplicationFiled: August 9, 2018Publication date: December 6, 2018Inventors: HIROSHI H. HORII, TAKUYA MISHINA
-
Publication number: 20180322048Abstract: A computer-implemented method and computer processing system are provided for coordinated heap contraction. The method includes starting a contraction of a heap responsive to a physical memory use of the heap approaching a limit. The contraction starts from a particular runtime system that was estimated to be slowest for the contraction from among a plurality of runtime systems that use the heap, based on previously determined estimates. The method also includes decreasing the physical memory use of the heap by compacting the heap with only one Garbage Collection (GC) thread, responsive to the contraction of the heap being unable to catch up to the physical memory use.Type: ApplicationFiled: November 14, 2017Publication date: November 8, 2018Inventors: Michihiro Horie, Hiroshi H. Horii, Kazunori Ogata
-
Publication number: 20180322047Abstract: A computer-implemented method and computer processing system are provided for coordinated heap contraction. The method includes starting a contraction of a heap responsive to a physical memory use of the heap approaching a limit. The contraction starts from a particular runtime system that as estimated to be slowest for the contraction from among a plurality of runtime systems that use the heap, based on previously determined estimates. The method also includes decreasing the physical memory use of the heap by compacting the heap with only one Garbage Collection (GC) thread, responsive to the contraction of the heap being unable to catch up to the physical memory use.Type: ApplicationFiled: May 8, 2017Publication date: November 8, 2018Inventors: Michihiro Horie, Hiroshi H. Horii, Kazunori Ogata
-
Publication number: 20180314633Abstract: Garbage collection methods include adding a data object to one of multiple queues owned by a first garbage collection thread. The queues include a public queue and multiple private queues. A task is popped from one of the plurality of queues to perform garbage collection. The public queue is swapped with one of the private plurality of private queues if there are no tasks in the public queue.Type: ApplicationFiled: November 8, 2017Publication date: November 1, 2018Inventors: Michihiro Horie, Hiroshi H. Horii, Tamiya Onodera
-
Publication number: 20180314631Abstract: Garbage collection methods and systems include adding a data object to one of multiple queues owned by a first garbage collection thread. The queues include a public queue and multiple private queues. A task is popped from one of the plurality of queues to perform garbage collection. The public queue is swapped with one of the private plurality of private queues if there are no tasks in the public queue.Type: ApplicationFiled: April 28, 2017Publication date: November 1, 2018Inventors: Michihiro Horie, Hiroshi H. Horii, Tamiya Onodera
-
Patent number: 10104085Abstract: Systems and methods for network access control, including sending a service request from an on-premise system to one or more offloaded front-end services on one or more offloading servers. The requests by the offloaded services to access back-end services in one or more on-premise systems are monitored, and access requests by the offloaded services for unauthorized back-end services are denied. The service request is redirected and locally executed to generate logs of the back-end services used to perform the service request if the access requests are denied. A permission mapping in a firewall between the offloaded services and the logged back-end services is updated to permit future access requests by the offloaded services.Type: GrantFiled: December 7, 2015Date of Patent: October 16, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Hiroshi H. Horii, Takuya Mishina
-
Publication number: 20180150503Abstract: A computer-implemented method executed on one or more processors is provided for processing a query for a NoSQL (non-structured query language) database. The computer-implemented method includes periodically monitoring active transactions that started and are committing dirty versions before a specific time, sending a query to fetch a state of the active transactions, and receiving a query result. The computer-implemented method further includes, if the query result includes active transactions, performing a normal query that scans dirty and committed versions. The computer-implemented method further includes, if the query result includes no active transactions, due to a time window indicating a specified staleness, sending a simplified query that scans only committed versions.Type: ApplicationFiled: November 29, 2016Publication date: May 31, 2018Inventor: Hiroshi H. Horii
-
Publication number: 20180113805Abstract: A computer-implemented method and a computer processing system are provided for increasing memory density in a memory using heap contraction. The method includes dividing the heap into a plurality of work regions including a last region and other regions such the last region is larger in size than the other regions. The method further includes calculating a size of the heap contraction. The method also includes forming a pair of the last region and one of the other regions that has a largest free portion. The method additionally includes executing intra-table compaction and inter-table compaction on the heap. The method further includes contracting the last region by subtracting a prescribed space from the last region.Type: ApplicationFiled: October 20, 2016Publication date: April 26, 2018Inventors: Michihiro Horie, Hiroshi H. Horii, Kazunori Ogata, Tamiya Onodera
-
Patent number: 9823910Abstract: Methods and a system are provided. A method includes implementing a function, which a compiler for a first language does not have, using a compiler for a second language. The implementing step includes generating, by the compiler for the first language, a first abstract syntax tree. The implementing step further includes converting, by a converter, the first abstract syntax tree to a second abstract syntax tree of the compiler for the second language using a conversion table from data representation types in the first language to data representation types in the second language. When a compilation error occurs, the implementing step also includes generating a special node for error processing in the second abstract syntax tree and storing an error token in the special node. When unparsing, the implementing step additionally includes outputting the error token, in the form of source code written in the first language.Type: GrantFiled: August 10, 2016Date of Patent: November 21, 2017Assignee: International Business Machines CorporationInventors: Michihiro Horie, Hiroshi H. Horii, Kiyokuni Kawachiya, Mikio Takeuchi
-
Publication number: 20170262405Abstract: Described herein are methods of transferring arrays of data information by remote data memory access (RDMA). The method may include identifying data arrays in a local place that are to be copied to a remote place; and determining whether the data arrays are to be overwritten by analyzing asynchronous blocks from the data arrays in the local place at a start compilation time using a static compiler. The method may further include executing transfer of the data arrays from the local place to the remote place with a pull type RDMA.Type: ApplicationFiled: March 8, 2016Publication date: September 14, 2017Inventors: Michihiro Horie, Hiroshi H. Horii, Kiyokuni Kawachiya, Mikio Takeuchi
-
Publication number: 20170163644Abstract: Systems and methods for network access control, including sending a service request from an on-premise system to one or more offloaded front-end services on one or more offloading servers. The requests by the offloaded services to access back-end services in one or more on-premise systems are monitored, and access requests by the offloaded services for unauthorized back-end services are denied. The service request is redirected and locally executed to generate logs of the back-end services used to perform the service request if the access requests are denied. A permission mapping in a firewall between the offloaded services and the logged back-end services is updated to permit future access requests by the offloaded services.Type: ApplicationFiled: December 7, 2015Publication date: June 8, 2017Inventors: HIROSHI H. HORII, TAKUYA MISHINA