Patents by Inventor Dong Hui Liu
Dong Hui Liu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240134805Abstract: A method, including: identifying static application features of an application; identifying resource access features of the application; labeling a translation lookaside buffer (TLB) miss threshold of a runtime feature of the application; determining utilization of larger pages during the runtime based on the TLB miss threshold; and setting the TLB miss threshold based on the determined utilization of the larger pages.Type: ApplicationFiled: October 19, 2022Publication date: April 25, 2024Inventors: Naijie Li, Dong Hui Liu, Jing Lu, Peng Hui Jiang, Xiao Yan Tang, Bao Zhang, Yong Yin, Jun Su, Jia Yu
-
Patent number: 11947498Abstract: Methods, systems, and computer program products for de-duplicating data in executable files in a container image are disclosed. The method may include receiving a request to read a file in a first layer in a container image including a plurality of layers, wherein the file is a delta file which is from an updated executable file based on a base executable file, the base executable file is in a lower layer than the first layer in the container image, and the delta file includes block mappings between the updated executable file and the base executable file and different data between the two files, and blocks included in the two files are based on respective file structure. The method may also include restoring the updated executable file based on the delta file and the base executable file. The method may further include returning data in the updated executable file.Type: GrantFiled: May 12, 2022Date of Patent: April 2, 2024Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Dong Hui Liu, Peng Hui Jiang, Jing Lu, Xiao Yan Tang, Jun Su, Jia Yu, Yong Yin
-
Publication number: 20240095359Abstract: An embodiment includes generating a caller list of callers that issue requests for calling a designated program at runtime. The embodiment also includes generating an authorized caller list of authorized callers allowed to call the designated program, wherein the authorized callers are selected from among callers on the caller list. The embodiment also includes generating an authorization key for each of the authorized callers that the designated program will require as a condition for completing call requests.Type: ApplicationFiled: September 20, 2022Publication date: March 21, 2024Applicant: International Business Machines CorporationInventors: Dong Hui Liu, Peng Hui Jiang, Jing Lu, Jia Yu, Jun Su, Xiao Yan Tang, Yong Yin
-
Patent number: 11928513Abstract: Mechanisms are provided for scheduling a workload in a cloud computing system. A cloud affinity factor (CAF) computer model is trained, via a machine learning process based on a training dataset comprising static characteristics of a workload binary for a workload, and dynamic characteristics corresponding to historical performance data for the workload, such that the trained CAF computer model predicts a performance classification for a given workload binary. The trained CAF computer model processes a new workload to generate a performance classification for the new workload. Cloud affinity factor(s) are generated based on the performance classification for the new workload. Node affinity and dispatch rule(s) are applied to the cloud affinity factor(s) to select one or more nodes of the cloud computing system to which to dispatch the workload. The workload is then scheduled on the selected one or more nodes.Type: GrantFiled: December 28, 2022Date of Patent: March 12, 2024Assignee: International Business Machines CorporationInventors: Peng Hui Jiang, Dong Hui Liu, Jia Tian Zhong, Xing Xing Shen, Jia Yu, Yong Yin
-
Publication number: 20230367745Abstract: Methods, systems, and computer program products for de-duplicating data in executable files in a container image are disclosed. The method may include receiving a request to read a file in a first layer in a container image including a plurality of layers, wherein the file is a delta file which is from an updated executable file based on a base executable file, the base executable file is in a lower layer than the first layer in the container image, and the delta file includes block mappings between the updated executable file and the base executable file and different data between the two files, and blocks included in the two files are based on respective file structure. The method may also include restoring the updated executable file based on the delta file and the base executable file. The method may further include returning data in the updated executable file.Type: ApplicationFiled: May 12, 2022Publication date: November 16, 2023Inventors: Dong Hui Liu, Peng Hui Jiang, Jing Lu, Xiao Yan Tang, Jun Su, Jia Yu, Yong Yin
-
Publication number: 20230315715Abstract: A computer-implemented method, system and computer program product for improving accuracy and efficiency of auditing databases. A table, list or index of a database is analyzed to identify metadata, which includes time series data, user data, an Internet Protocol address and operation data. The identified metadata is associated with the corresponding record or row of the table, list or index from which the metadata was extracted. A determination is then made as to whether to record a raw data image associated with the record or row of the analyzed table, list or index based on the corresponding data operation. The identified metadata as well as the recorded data images, if any, are stored in a structured audit log. Auditing information is then obtained from a structured audit log based on matching the record or row identifier (RID) associated with the query with the RID associated with the structured audit log.Type: ApplicationFiled: March 30, 2022Publication date: October 5, 2023Inventors: Jia Tian Zhong, Peng Hui Jiang, Dong Hui Liu, Xing Xing Shen, Jia Yu, Yong Yin, Jing Lu, Xiao Yan Tang
-
Publication number: 20230290261Abstract: A method, system, and computer program product for dynamic cue generation for language learning are provided. The method identifies one or more listener actions for a listener engaged in listening learning. Based on the one or more listener actions, a language level of the listener is determined. A set of prompt metrics are generated based on the language level and the one or more listener actions. A set of audio stream levels is generated based on the set of prompt metrics. The method selects an audio stream level for a listening prompt, where the audio stream level is selected from the set of audio stream levels based on the language level of the listener.Type: ApplicationFiled: March 8, 2022Publication date: September 14, 2023Inventors: Zhan Peng Huo, Jia Yu, Jia Tian Zhong, Yong Yin, Dong Hui Liu, Peng Hui Jiang
-
Patent number: 11675593Abstract: Embodiments of the invention are directed to updating a dynamic library. Aspects include receiving an indication that the dynamic library has been updated and identifying all program modules that depend on the dynamic library. Aspects also include, for each program module that depends on the dynamic library, reassigning an application program interface (API) address for a current version of the dynamic library to an API address of the updated version of the dynamic library.Type: GrantFiled: August 31, 2021Date of Patent: June 13, 2023Assignee: International Business Machines CorporationInventors: Jing Lu, Dong Hui Liu, Xiao Yan Tang, Yong Yin, Peng Hui Jiang, Xiang Zu, Jia Yu
-
Patent number: 11647356Abstract: Software for proximity positioning that performs the following operations: (i) receiving at least one parameter via an advertising channel of a first protocol, wherein the at least one parameter is encoded in an advertising packet of the first protocol, and wherein the first protocol supports a first proximity positioning technology; (ii) extracting the encoded at least one parameter from the advertising packet; and (iii) performing, by a second proximity positioning technology different from the first proximity positioning technology, a measurement of distance based, at least in part, on the at least one parameter.Type: GrantFiled: October 13, 2020Date of Patent: May 9, 2023Assignee: International Business Machines CorporationInventors: Yong Yin, Jia Tian Zhong, Dong Hui Liu, Peng Hui Jiang, Xing Xing Shen, Li Cao, Jia Yu
-
Publication number: 20230061270Abstract: Embodiments of the invention are directed to updating a dynamic library. Aspects include receiving an indication that the dynamic library has been updated and identifying all program modules that depend on the dynamic library. Aspects also include, for each program module that depends on the dynamic library, reassigning an application program interface (API) address for a current version of the dynamic library to an API address of the updated version of the dynamic library.Type: ApplicationFiled: August 31, 2021Publication date: March 2, 2023Inventors: Jing Lu, Dong Hui Liu, Xiao Yan Tang, Yong Yin, Peng Hui Jiang, Xiang Zu, Jia Yu
-
Patent number: 11580210Abstract: Embodiments of the present invention relate to password authentication. According to an embodiment of the present invention, a password associated with a user identification is received from a user device. The password is authenticated based on a preset relationship between a seed password and a graphical password associated with the user identification. The seed password consists of a string of characters. The graphical password is a directed path traversing all keys of a keypad in an order. Each of the keys represents one of the characters and is associated with an order number according to the order of the keys being traversed. The preset relationship is that the password consists of respective order numbers associated with respective keys representing corresponding characters of the seed password.Type: GrantFiled: February 18, 2021Date of Patent: February 14, 2023Assignee: International Business Machines CorporationInventors: Jia Tian Zhong, Xing Xing Shen, Peng Hui Jiang, Dong Hui Liu, Yong Yin, Jia Yu
-
Publication number: 20220374233Abstract: In an approach for improving data access performance in memory, a processor monitors each data access to a data element in the memory from an application, wherein the application has a plurality of functions. A processor records, during runtime, each data access into a monitoring element table, wherein the record for each data access includes an identity, a start address, an end address, and a memory page number. A processor clusters recorded data accesses for each function based on a distance between data elements accessed in sequence. A processor allocates, based on the data element clustering result, the data elements in a same cluster into a same memory unit in the memory.Type: ApplicationFiled: May 24, 2021Publication date: November 24, 2022Inventors: Ming Ran Liu, Xiao Yan Tang, Bao Zhang, Jing Lu, Dong Hui Liu, Peng Hui Jiang, Yong Yin, Jia Yu
-
Publication number: 20220261470Abstract: Embodiments of the present invention relate to password authentication. According to an embodiment of the present invention, a password associated with a user identification is received from a user device. The password is authenticated based on a preset relationship between a seed password and a graphical password associated with the user identification. The seed password consists of a string of characters. The graphical password is a directed path traversing all keys of a keypad in an order. Each of the keys represents one of the characters and is associated with an order number according to the order of the keys being traversed. The preset relationship is that the password consists of respective order numbers associated with respective keys representing corresponding characters of the seed password.Type: ApplicationFiled: February 18, 2021Publication date: August 18, 2022Inventors: Jia Tian Zhong, XING XING SHEN, Peng Hui Jiang, Dong Hui Liu, Yong Yin, Jia Yu
-
Patent number: 11347523Abstract: Techniques include executing a software program having a function call to a shared library and reloading the shared library without stopping execution of the software program. A global offset table (GOT) is updated responsive to resolving a link address associated with the function call. An entry in GOT included a link address field, an index field, and a resolved field, the updating including updating the index field with an affirmative value and marking the resolved field with an affirmative flag for the entry in the GOT. Responsive to reloading the shared library, the entry in the GOT is found having the affirmative value in the index field and the affirmative flag in the resolved field. An address value in the link address field is returned for the entry having the affirmative value in the index field, responsive to a subsequent execution of the function call to the shared library.Type: GrantFiled: November 5, 2020Date of Patent: May 31, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Xiao Ling Chen, Zhan Peng Huo, Yong Yin, Dong Hui Liu, Qi Li, Jia Yu, Jiang Yi Liu, Xiao Xuan Fu, Cheng Fang Wang
-
Publication number: 20220137987Abstract: Techniques include executing a software program having a function call to a shared library and reloading the shared library without stopping execution of the software program. A global offset table (GOT) is updated responsive to resolving a link address associated with the function call. An entry in GOT included a link address field, an index field, and a resolved field, the updating including updating the index field with an affirmative value and marking the resolved field with an affirmative flag for the entry in the GOT. Responsive to reloading the shared library, the entry in the GOT is found having the affirmative value in the index field and the affirmative flag in the resolved field. An address value in the link address field is returned for the entry having the affirmative value in the index field, responsive to a subsequent execution of the function call to the shared library.Type: ApplicationFiled: November 5, 2020Publication date: May 5, 2022Inventors: XIAO LING CHEN, Zhan Peng Huo, Yong Yin, Dong Hui Liu, Qi Li, Jia Yu, JIANG YI LIU, Xiao Xuan Fu, Cheng Fang Wang
-
Publication number: 20220116739Abstract: Software for proximity positioning that performs the following operations: (i) receiving at least one parameter via an advertising channel of a first protocol, wherein the at least one parameter is encoded in an advertising packet of the first protocol, and wherein the first protocol supports a first proximity positioning technology; (ii) extracting the encoded at least one parameter from the advertising packet; and (iii) performing, by a second proximity positioning technology different from the first proximity positioning technology, a measurement of distance based, at least in part, on the at least one parameter.Type: ApplicationFiled: October 13, 2020Publication date: April 14, 2022Inventors: Yong Yin, Jia Tian Zhong, Dong Hui Liu, Peng Hui Jiang, Xing Xing Shen, Li Cao, Jia Yu
-
Publication number: 20220075764Abstract: Embodiments of the present disclosure relate to a method, system, and computer program product for comparison of database data. According to the method, a first tree structure corresponding to first data segments of first database data and a second tree structure corresponding to second data segments of second database data are at least partially obtained. Each node of the first or second tree structure indicating a characteristic value of at least one of the first or second data segments, and nodes of the first or second tree structure are divided into a first or second plurality of branches from a first or second root node based on update frequencies of the first or second data segments. A difference between the first data segments and the second data segments is determined by at least comparing characteristic values indicated by nodes in the obtained parts of the first and second tree structures.Type: ApplicationFiled: September 10, 2020Publication date: March 10, 2022Inventors: Jia Tian Zhong, Xing Xing Shen, Peng Hui Jiang, Cai Zhou, Dong Hui Liu, Jia Yu, Yong Yin
-
Publication number: 20210123753Abstract: The present invention relates to a method for enhanced path mapping based on safety consideration. To provide a method to determine a superior path from at least two alternative paths, it is proposed that the navigation system adds one or more new safety parameters based on safety consideration in path mapping process and calculate a path safety index for the alternative paths. The safety parameters may include a biometric index of at least one of drivers of vehicles on the alternative paths, a physical status of the vehicles or environment, a driving habits index of at least one of drivers of the vehicles and/or an autonomous vehicle safety index of at least one of the vehicles.Type: ApplicationFiled: October 24, 2019Publication date: April 29, 2021Inventors: Dong Hui Liu, Peng Hui Jiang, Yong Yin, Jia Yu, Jia Tian Zhong, Xing Xing Shen
-
Patent number: 10764836Abstract: A method, system and computer program product for wireless transmission of a broadcast message to a destination address that includes receiving, by one or more processors on a first device, a first broadcast message from a second device including a wireless-enabled device operating on a Low Energy (LE) advertising channel, the first broadcast message includes transmission power information associated with the second device, transmission data, and a destination address, determining, by the one or more processors, a Received Signal Strength Indication (RSSI) of the first device, and based on the determined RSSI of the first device and the transmission power information associated with the second device, sending, by the one or more processors, the transmission data to the destination address.Type: GrantFiled: September 16, 2019Date of Patent: September 1, 2020Assignee: International Business Machines CorporationInventors: Dong Hui Liu, Yi Gong, Yong Yin, Jia Yu, Jia Tian Zhong
-
Publication number: 20200177841Abstract: Examples of techniques for obtaining video captured by a camera in a vehicle are disclosed. Aspects include receiving a request for a traffic video, the request including a location and a time period and transmitting, to a plurality of communications devices, a data request for information regarding videos captured by vehicles at the location during the time period. Aspects also include receiving, from one or more of the plurality of communications devices, data regarding videos captured at the location during the time period and analyzing the data received to identify one or more videos of interest. Aspects further include transmitting a request for the one or more videos of interest.Type: ApplicationFiled: November 29, 2018Publication date: June 4, 2020Inventors: YONG YIN, JIA YU, DONG HUI LIU, JIA TIAN ZHONG, PENG HUI JIANG