Patents by Inventor Feiyi Wang
Feiyi Wang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11288454Abstract: An article generation method and device, and a computer storage medium. According to an example of the method, after a content source is mined based on requirement information inputted by a user, at least one topic dimension vector may be extracted from the mined content source by using a particular topic generation model. Then, for each extracted topic dimension vector, topic sentence mining is performed on the content source according to the topic dimension vector, to obtain topic sentences corresponding to the topic dimension vector. Finally, the topic sentences corresponding to the at least one topic dimension vector are spliced and synthesized, to generate an article conforming to the requirement information.Type: GrantFiled: November 13, 2020Date of Patent: March 29, 2022Assignee: BEIJING SANKUAI ONLINE TECHNOLOGY CO., LTDInventors: Rao Fu, Juan Xu, Feiyi Wang, Peixu Hou, Zhian Yu, Biao Tang, Gong Zhang
-
Publication number: 20210374149Abstract: A sorting method is provided. The sorting method according to embodiments of the present disclosure includes: performing grouping on a data sample set according to a search request, to obtain at least one search request group; training a neural network model by using the search request group, where during the training of the neural network model, a parameter of the neural network model is adjusted according to current predicted values of clicked candidate objects and unclicked candidate objects in a same search request group and a variation of a normalized discounted cumulative gain (NDCG) before and after rank positions of the clicked candidate object and the unclicked candidate object are exchanged; and sorting, by using the neural network model, target objects associated with a target search term.Type: ApplicationFiled: July 8, 2021Publication date: December 2, 2021Inventors: Sheng ZHU, Biao TANG, Gong ZHANG, Feiyi WANG, Zhongyuan WANG, Di ZHU
-
Publication number: 20210064823Abstract: An article generation method and device, and a computer storage medium. According to an example of the method, after a content source is mined based on requirement information inputted by a user, at least one topic dimension vector may be extracted from the mined content source by using a particular topic generation model. Then, for each extracted topic dimension vector, topic sentence mining is performed on the content source according to the topic dimension vector, to obtain topic sentences corresponding to the topic dimension vector. Finally, the topic sentences corresponding to the at least one topic dimension vector are spliced and synthesized, to generate an article conforming to the requirement information.Type: ApplicationFiled: November 13, 2020Publication date: March 4, 2021Inventors: Rao FU, Juan XU, Feiyi WANG, Peixu HOU, Zhian YU, Biao TANG, Gong ZHANG
-
Patent number: 8713268Abstract: An optimized redundant array of solid state devices may include an array of one or more optimized solid-state devices and a controller coupled to the solid-state devices for managing the solid-state devices. The controller may be configured to globally coordinate the garbage collection activities of each of said optimized solid-state devices, for instance, to minimize the degraded performance time and increase the optimal performance time of the entire array of devices.Type: GrantFiled: January 28, 2011Date of Patent: April 29, 2014Assignee: UT-Battelle, LLCInventors: David A. Dillow, Youngjae Kim, Hakki S. Oral, Galen M. Shipman, Feiyi Wang
-
Publication number: 20120036309Abstract: An optimized redundant array of solid state devices may include an array of one or more optimized solid-state devices and a controller coupled to the solid-state devices for managing the solid-state devices. The controller may be configured to globally coordinate the garbage collection activities of each of said optimized solid-state devices, for instance, to minimize the degraded performance time and increase the optimal performance time of the entire array of devices.Type: ApplicationFiled: January 28, 2011Publication date: February 9, 2012Applicant: UT-BATTELLE, LLCInventors: David A. Dillow, Youngjae Kim, Hakki S. Oral, Galen M. Shipman, Feiyi Wang
-
Patent number: 7350234Abstract: An intrusion tolerant communication network and related methods is provided that places emphasis on continuity of operation and provides for an attack-survivable communication network whose network devices collectively accomplish the specified networking intent even under attack and despite active intrusions. The present invention defines methods for network intrusion tolerance in terms of the various state transitions that maximize the overall effectiveness of an intrusion tolerant communication network.Type: GrantFiled: June 11, 2002Date of Patent: March 25, 2008Assignee: Research Triangle InstituteInventors: Katerina Goseva-Popstojanova, Feiyi Wang, Rong Wang, Fengmin Gong, Kalyanaraman Vaidyanathan, Kishor Trivedi, Balamurugan Muthusamy
-
Patent number: 7076801Abstract: The invention relates to a reconfigurable scalable intrusion-tolerant network that is interposed between a service requesting client and a protected server to minimize the impact of intrusive events. The apparatus may include a proxy server for receiving the requests from a client and forwarding them to a protected server. Acceptance monitors receive the response from a protected server and apply one or more acceptance tests. A ballot monitor receives the result of the acceptance tests and determines a response to the client. The network may also include an intrusion sensor to detect threats to the network and a reconfigurer to alter the network forwarding scheme. Reconfiguration may include isolating network elements, creating parallel paths, implementing redundant operations, or assessing the validity of responses.Type: GrantFiled: June 11, 2001Date of Patent: July 11, 2006Assignee: Research Triangle InstituteInventors: Fengmin Gong, Chandramouli Sargor, Feiyi Wang
-
Publication number: 20030033542Abstract: An intrusion tolerant communication network and related methods is provided that places emphasis on continuity of operation and provides for an attack-survivable communication network whose network devices collectively accomplish the specified networking intent even under attack and despite active intrusions. The present invention defines methods for network intrusion tolerance in terms of the various state transitions that maximize the overall effectiveness of an intrusion tolerant communication network.Type: ApplicationFiled: June 11, 2002Publication date: February 13, 2003Applicant: MCNCInventors: Katerina Goseva-Popstojanova, Feiyi Wang, Rong Wang, Fengmin Gong, Kalyanaraman Vaidyanathan, Kishor Trivedi, Balamurugan Muthusamy
-
Publication number: 20020188870Abstract: The invention relates to a reconfigurable scalable intrusion-tolerant network that is interposed between a service requesting client and a protected server to minimize the impact of intrusive events. The apparatus may include a proxy server for receiving the requests from a client and forwarding them to a protected server. Acceptance monitors receive the response from a protected server and apply one or more acceptance tests. A ballot monitor receives the result of the acceptance tests and determines a response to the client. The network may also include an intrusion sensor to detect threats to the network and a reconfigurer to alter the network forwarding scheme. Reconfiguration may include isolating network elements, creating parallel paths, implementing redundant operations, or assessing the validity of responses.Type: ApplicationFiled: June 11, 2001Publication date: December 12, 2002Applicant: MCNCInventors: Fengmin Gong, Chandramouli Sargor, Feiyi Wang