Patents by Inventor FAN JING MENG
FAN JING MENG has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20160062786Abstract: Embodiments include methods and devices for migrating virtual assets over networks that have a first manager connected to a physical host a virtual machine run. Aspects include registering the physical host to a second manager in the network, creating the mapping relationship of the physical host between a database of the first manager and a database of the second manager and importing instance data and status data of the virtual machine of the physical host from the database of the first manager into the database of the second manager. Aspects also include switching the management for the physical host from the first manager to the second manager.Type: ApplicationFiled: August 25, 2015Publication date: March 3, 2016Inventors: Fan Jing Meng, Yuan Wang, Jing Min Xu, Bo Yang, Yang Zhao
-
Publication number: 20150379034Abstract: Determining a characteristic of a configuration file that is used to discover configuration files in a target machine, a computer identifies, using information associated with a configuration item of a machine, a candidate configuration file related to the configuration item of the machine, from among a plurality of files from the machine. The computer extracts a value of a feature of the candidate configuration file and aggregates the candidate configuration file with a second candidate configuration file related to the same configuration item identified from among a plurality of files from a second machine, based on the extracted value. The computer then determines a configuration file related to the configuration item from among the aggregated candidate configuration files based on a result of the aggregation, and determines a characteristic of the configuration file related to the configuration item.Type: ApplicationFiled: June 10, 2015Publication date: December 31, 2015Inventors: Ajay A. Apte, Chang Sheng Li, Fan Jing Meng, Joseph P. Wigglesworth, Jing Min Xu, Bo Yang, Xue Jun Zhuo
-
Publication number: 20150261842Abstract: One or more requirements of a target hosting environment are captured in a specification. The specification is automatically checked against a source content of a source environment with a conformance checker, where the source content is to be migrated to the target hosting environment. It is determined whether the source content conforms to the specification.Type: ApplicationFiled: March 15, 2014Publication date: September 17, 2015Applicant: International Business Machines CorporationInventors: Yun-Wu Huang, Pu Jin, Fan Jing Meng, Michael Montinarelli, Brian Peterson, Lakshminarayanan Renganarayana, John J. Rofrano, Kristiann J. Schultz, Bo Yang, Christopher C. Young, Xiaolan Zhang
-
Publication number: 20150264128Abstract: A conformance checker is received on a system that contains hostable content, and is executed. One or more results provided by the conformance checker are evaluated; and the hostable content is migrated to a destination host in accordance with the evaluating step.Type: ApplicationFiled: March 15, 2014Publication date: September 17, 2015Applicant: International Business Machines CorporationInventors: Yun-Wu Huang, Pu Jin, Fan Jing Meng, Michael Montinarelli, Kristiann J. Schultz, Bo Yang, Christopher C. Young, Xiaolan Zhang
-
Patent number: 9135749Abstract: Apparatus and method for the network transmission and displaying of the computer graphics. The method and apparatus for processing three-dimensional model data includes: obtaining the mesh data for an original mesh model; constructing a derivative mesh model from the vertex data for the original mesh model by using a pre-defined mesh model construction algorithm; comparing the mesh data for the original mesh model with the mesh data for the derivative mesh model to obtain the error data for the derivative mesh model; transmitting the vertex data related to the original mesh model; and transmitting the error data for the derivative mesh model.Type: GrantFiled: December 18, 2012Date of Patent: September 15, 2015Assignee: International Business Machines CorporationInventors: Guo Qiang Hu, Fan Jing Meng, Jian Wang, Yi Min Wang, Zi Yu Zhu
-
Patent number: 9053263Abstract: The present invention provides a method, apparatus, and non-transitory article of manufacture embodying computer readable instructions for scheduling discrete event simulation. One embodiment of the present invention is a method for scheduling discrete event simulation. The method includes: extracting two or more event types in the discrete event simulation in response to having loaded the discrete event simulation; constructing a correlation graph used for the discrete event simulation based on the two or more event types; and scheduling events that are classified into the two or more event types according to the correlation graph wherein each node in the correlation graph describes one of the two or more event types, and an edge in the correlation graph describes the creation or dependency relationship between the two or more event types. Other embodiments of the present invention provide an apparatus and computer program product for scheduling discrete event simulation.Type: GrantFiled: April 23, 2013Date of Patent: June 9, 2015Assignee: International Business Machines CorporationInventors: Guoqiang Hu, Qi Cheng Li, Li Jun Mei, Fan Jing Meng, HuaFang Tan, Jian Wang, Yi Min Wang, Zi Yu Zhu
-
Patent number: 9043752Abstract: Disclosed is a novel system and method to select software components. A set of available software components are accessed. Next, one or more dimensions are defined. Each dimension is an attribute to the set of available software components. A set of coherence distances between each pair of the available software components in the set of available software components is calculated for each of the dimensions that have been defined. Each of the coherence distances are combined between each pair of the available software components that has been calculated in the set of the coherence distances into an overall coherence degree for each of the available software components. Using the overall coherence degree, one or more software components are selected to be included in a software bundle.Type: GrantFiled: September 18, 2013Date of Patent: May 26, 2015Assignee: International Business Machines CorporationInventors: Saeed Bagheri, Yi-Min Chee, Fan Jing Meng, Peide Zhong, Nianjun Zhou
-
Publication number: 20140359053Abstract: Techniques, systems, and articles of manufacture for coordinating application migration processes. A method includes selecting at least one migration service for an application based on analysis of application information and information pertaining to multiple migration services, creating a migration plan to migrate the application to a target cloud based on the at least one selected migration service, and executing the migration plan, utilizing the at least one selected migration service, to migrate the application to the target cloud.Type: ApplicationFiled: May 29, 2013Publication date: December 4, 2014Applicant: International Business Machines CorporationInventors: Kamal K. Bhattacharya, Chen Hua Feng, Yun-Wu Huang, Ying Huang, Hani Jamjoom, Pu Jin, Fan Jing Meng, Michael Montinarelli, Mark E. Podlaseck, Zon-Yin Shae, Daniel J. Williams
-
Publication number: 20140359128Abstract: Systems and articles of manufacture for coordinating application migration processes include selecting at least one migration service for an application based on analysis of application information and information pertaining to multiple migration services, creating a migration plan to migrate the application to a target cloud based on the at least one selected migration service, and executing the migration plan, utilizing the at least one selected migration service, to migrate the application to the target cloud.Type: ApplicationFiled: August 19, 2013Publication date: December 4, 2014Inventors: Kamal K. Bhattacharya, Chen Hua Feng, Yun-Wu Huang, Ying Huang, Hani Jamjoom, Pu Jin, Fan Jing Meng, Michael Montinarelli, Mark E. Podlaseck, Zon-Yin Shae, Daniel J. Williams
-
Publication number: 20140310051Abstract: Systems and techniques for optimization of project portfolio. A set of original proposals, including at least one original proposal allowing for a choice between two or more equivalent sets of resource requirements, are translated into a set of equivalent substitute proposals ensured by translated logical dependencies among them. The set of substitute proposals is optimized and a solution provided by the optimization is translated into a solution in terms of the original proposals.Type: ApplicationFiled: August 20, 2013Publication date: October 16, 2014Applicant: International Business Machines CorporationInventors: Fan Jing Meng, Peri Tarr, Xin Zhou
-
Publication number: 20140310050Abstract: Systems and techniques for optimization of project portfolio. A set of original proposals, including at least one original proposal allowing for a choice between two or more equivalent sets of resource requirements, are translated into a set of equivalent substitute proposals ensured by translated logical dependencies among them. The set of substitute proposals is optimized and a solution provided by the optimization is translated into a solution in terms of the original proposals.Type: ApplicationFiled: April 12, 2013Publication date: October 16, 2014Applicant: International Business Machines CorporationInventors: Fan Jing MENG, Peri Tarr, Xin Zhou
-
Publication number: 20140258980Abstract: Disclosed is a novel system and method to select software components. A set of available software components are accessed. Next, one or more dimensions are defined. Each dimension is an attribute to the set of available software components. A set of coherence distances between each pair of the available software components in the set of available software components is calculated for each of the dimensions that have been defined. Each of the coherence distances are combined between each pair of the available software components that has been calculated in the set of the coherence distances into an overall coherence degree for each of the available software components. Using the overall coherence degree, one or more software components are selected to be included in a software bundle.Type: ApplicationFiled: September 18, 2013Publication date: September 11, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Saeed BAGHERI, Yi-Min CHEE, Fan Jing MENG, Piede ZHONG, Nianjun ZHOU
-
Patent number: 8832673Abstract: Adapting an existing portfolio optimizer to support one or more valuated dependencies without modifying the existing portfolio optimizer, may include translating one or more original elements and associated dependencies in a portfolio to be optimized based on said one or more valuated dependencies; invoking the existing portfolio optimizer with the translated one or more original elements and associated dependencies; and translating optimization results, if said optimization results contain translated one or more original elements, into a solution characterized in terms of said one or more original elements.Type: GrantFiled: June 3, 2011Date of Patent: September 9, 2014Assignee: International Business Machines CorporationInventors: Ying Liu, Fan Jing Meng, Dharmashankar Subramanian, Clay E. Williams, Shun Xiang Yang, Xin Zhou
-
Patent number: 8826421Abstract: According to embodiments of the present invention, a computing device provides a security rules subset of a server-side protection element to a pre-validation component deployed at a client side. The computing device validates the user input based on the security rules. The computing device determines, in response to detecting a user input violation and that a violated security rule has/or has not been provided to the pre-validation component, the user as a first or second class of users. The computing device performs different security protection actions to the first and second class of users. The computing device asynchronously performs a dynamic update to the security rule subset provided to the pre-validation component. The security rule subset is screened from the security rules of the server-side protection means. A policy for screening the security rule subset is selected.Type: GrantFiled: November 5, 2010Date of Patent: September 2, 2014Assignee: International Business Machines CorporationInventors: Lin Luo, Fan Jing Meng, Shun Xiang Yang, Yu Zhang
-
Publication number: 20140156334Abstract: A method for optimizing a project portfolio includes receiving initial objectives and constraints from a user. A portfolio optimization model is constructed based on the received initial objectives and constraints. The constructed portfolio optimization model is solved using an optimization engine executing on a computer system. A constraint optimization model is constructed based on the solved portfolio optimization model. The constraint optimization model is solved using the optimization engine. The portfolio optimization model is modified based on the solution to the constraint optimization model. The modified portfolio optimization model is solved. The solution to the modified portfolio optimization model is provided to the user.Type: ApplicationFiled: December 4, 2012Publication date: June 5, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: FAN JING MENG, PERI LYNN TARR, XIN ZHOU
-
Patent number: 8732717Abstract: At least one candidate allocation time period is determined according to a resource benefit time step function. The resource benefit does not vary with time in the at least one candidate allocation time period. Resources and relations between the resources are converted into sub-resource groups according to the resource cost time step function. Each of the sub-resource groups comprise sub-resources that correspond to the resources and relations between the sub-resources. The resource benefits and resource costs of the sub-resources do not vary with time. With respect to the at least one candidate allocation time period, the sub-resource groups are input into a resource schedule optimizer to obtain optimized results with respect to the sub-resource groups. An optimized result, with respect to the at least one candidate allocation time period, is obtained from the optimized results with respect to the sub-resource groups.Type: GrantFiled: July 26, 2011Date of Patent: May 20, 2014Assignee: International Business Machines CorporationInventors: Fan Jing Meng, Xin Zhou
-
Publication number: 20130304442Abstract: The present invention provides a method, apparatus, and non-transitory article of manufacture embodying computer readable instructions for scheduling discrete event simulation. One embodiment of the present invention is a method for scheduling discrete event simulation. The method includes: extracting two or more event types in the discrete event simulation in response to having loaded the discrete event simulation; constructing a correlation graph used for the discrete event simulation based on the two or more event types; and scheduling events that are classified into the two or more event types according to the correlation graph wherein each node in the correlation graph describes one of the two or more event types, and an edge in the correlation graph describes the creation or dependency relationship between the two or more event types. Other embodiments of the present invention provide an apparatus and computer program product for scheduling discrete event simulation.Type: ApplicationFiled: April 23, 2013Publication date: November 14, 2013Inventors: Guoqiang Hu, Qi Cheng Li, Li Jun Mei, Fan Jing Meng, HuaFang Tan, Jian Wang, Yi Min Wang, Zi Yu Zhu
-
Publication number: 20130147806Abstract: A method including receiving a plurality of probability distributions corresponding to respective competitive goals, receiving an indication of a comparison goal, mapping the comparison goal to a domain independent comparison statistic characteristic, determining a plurality of statistical values of the probability distributions, receiving a selections of a comparison pattern specifying a designed comparison coordination for corresponding ones of the comparison statistic characteristics, converting the plurality of probability distributions into the designed comparison coordination, and displaying the probability distributions in the designed comparison coordination including values of the comparative statistic characteristics of the probability distributions.Type: ApplicationFiled: December 12, 2011Publication date: June 13, 2013Applicant: International Business Machines CorporationInventors: Peter K. Malkin, Fan Jing Meng, Peri L. Tarr, Xin Zhou
-
Publication number: 20120311549Abstract: Adapting an existing portfolio optimizer to support one or more valuated dependencies without modifying the existing portfolio optimizer, may include translating one or more original elements and associated dependencies in a portfolio to be optimized based on said one or more valuated dependencies; invoking the existing portfolio optimizer with the translated one or more original elements and associated dependencies; and translating optimization results, if said optimization results contain translated one or more original elements, into a solution characterized in terms of said one or more original elements.Type: ApplicationFiled: June 3, 2011Publication date: December 6, 2012Applicant: International Business Machines CorporationInventors: Ying Liu, Fan Jing Meng, Dharmashankar Subramanian, Clay E. Williams, Shun Xiang Yang, Xin Zhou
-
Publication number: 20120304249Abstract: A computer-implemented method, apparatus, and article of manufacture for security validation of a user input in a computer network application. The method includes: providing a subset of security rules of a server-side protection means to a pre-validation component deployed at a client side, so as to enable security validation of a user input on the client side by the pre-validation component; validating the user input based on at least one of the security rules; determining, in response to detecting a user input violation and that a violated security rule has not been provided to the pre-validation component, the user as a first class of users; determining, in response to detecting the user input violation and that the violated security rule has been provided to the pre-validation component, the user as a second class of users; and performing different security protection actions to the first and second class of users.Type: ApplicationFiled: November 5, 2010Publication date: November 29, 2012Applicant: International Business Machines CorporationInventors: Lin Luo, Fan Jing Meng, Shun Xiang Yang, Yu Zhang