Patents by Inventor Jinglei Ren
Jinglei Ren has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240093443Abstract: Disclosed in the present disclosure is a double-deck multi-span bridge construction method. According to the double-deck bridge construction method of the present disclosure, construction is carried out by using a method of disassembling a support jig frame in a graded and span-separated mode, an upper chord jig frame and a lower chord jig frame can be used in a recycle manner, and construction costs are reduced. In addition, a construction period of building the support jig frame is shortened, and other construction operations can be synchronously carried out on a span in which the jig frame is disassembled, for example, fire retardant coating construction can be carried out on a mounted bridge deck after the jig frame is disassembled, and the construction period of a double-deck multi-span bridge is effectively shortened.Type: ApplicationFiled: September 23, 2021Publication date: March 21, 2024Applicant: CHINA CONSTRUCTION SCIENCE AND INDUSTRY CORPORATION LTD.Inventors: Jinglei REN, Bing SUN, Yonggang GAO, Hongyu SHEN, Shaohui ZHU, Jianguo QI, Cui LIU, Ruihua YAN, Zhiqiang HE, Longfei LI, Sijie YANG, Huaidong ZHANG, Xu CHEN, Wei JIANG, Wenbo LI, Yingwu SUN, Yuhang ZHANG
-
Publication number: 20240069910Abstract: A method and a device for evaluating workload of programmers are provided. The method includes: acquiring an old version of program code and a new version of program code which is generated by editing the old version of program code by the programmer; parsing the old version of program code into a first syntax tree and parsing the new version of program code into a second syntax tree; generating an edit script including one or more editing operations that cause the first syntax tree to be changed into the second syntax tree; and determining a score for evaluating the workload of the programmer based on the edit script. The method further includes adjusting the score by applying various weights to achieve a more accurate evaluation.Type: ApplicationFiled: August 30, 2023Publication date: February 29, 2024Applicant: MERICO, INC.Inventors: Hezheng YIN, Jinglei REN
-
Patent number: 11816017Abstract: A tool is provided for evaluating contributions of different software developers to a software project, which considers both the structural value and non-structural value of each developer's contributions. Source code for the project is parsed to generate abstract syntax trees (ASTs) representing the code at different times during the project. The tool may perform both a structural value analysis and a non-structural value analysis of the code contributions of each developer. The structural value analysis for each developer may include a call-commit analysis of a call-commit graph generated from the ASTs to analyze function calls and commits attributable to each developer. The non-structural value analysis for each software developer may include identifying and classifying commits attributable to each developer based on impact of such commits on the project. The tool may then calculate a development value score for each developer based on the structural and non-structural metrics for each developer.Type: GrantFiled: November 4, 2019Date of Patent: November 14, 2023Assignee: MERICO, INC.Inventors: Jinglei Ren, Hezheng Yin, Roland Vogl
-
Patent number: 11762568Abstract: A method for controlling a redundant storage system is proposed. A write request to a redundant storage system is received (310). A dataset that is to be written into the redundant storage system by the write request is determined (320). A portion of the dataset is logged into the redundant storage system for data recovery in case that a fault occurs in the redundant storage system (330). Thus, only a portion of the dataset is logged and the amount of the logged data may be reduced compared with the conventional redundant storage system. Further, the redundant storage system may be recovered in response to a fault occurring in the redundant storage system.Type: GrantFiled: March 16, 2017Date of Patent: September 19, 2023Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Jinglei Ren, Thomas Moscibroda
-
Publication number: 20220382541Abstract: A tool is provided for evaluating contributions of different software developers to a software project, which considers both the structural value and non-structural value of each developer's contributions. Source code for the project is parsed to generate abstract syntax trees (ASTs) representing the code at different times during the project. The tool may perform both a structural value analysis and a non-structural value analysis of the code contributions of each developer. The structural value analysis for each developer may include a call-commit analysis of a call-commit graph generated from the ASTs to analyze function calls and commits attributable to each developer. The non-structural value analysis for each software developer may include identifying and classifying commits attributable to each developer based on impact of such commits on the project. The tool may then calculate a development value score for each developer based on the structural and non-structural metrics for each developer.Type: ApplicationFiled: November 4, 2019Publication date: December 1, 2022Applicant: Merico, Inc.Inventors: Jinglei Ren, Hezheng Yin, Roland Vogl
-
Patent number: 11327905Abstract: A computing device requests access to an application object from a remote storage system in order to locally execute application functionality without hosting application resources. An accessed object is associated with an intent in the storage system and locked. Locking an object in combination with an intent prevents computing devices that are not performing the intent from accessing the object. An intent defines one or more operations to be performed with the requested object, which are serialized as intent steps and stored in the storage system. Upon executing an intent step, the computing device stores a log entry at the storage system signifying the step's completion. A locked object remains locked until the log entries indicate every intent step as complete. Different computing devices can unlock a locked object by executing any incomplete steps of an intent associated with the locked object.Type: GrantFiled: May 19, 2020Date of Patent: May 10, 2022Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Lidong Zhou, Jacob R. Lorch, Jinglei Ren, Parveen Kumar Patel, Srinath Setty
-
Publication number: 20220075900Abstract: In implementations of the subject matter described herein, a new approach for controlling and tracing an object across a plurality of parties is proposed. A rule set may be enabled by the confirmation of a plurality of parties. The rule set may define constraints on operations related to the object. Upon receipt of a request for an operation related to the object, the requested operation may be verified based on the rule set agreed by the plurality of parties. In response to verifying that requested operation is valid, the requested operation may be performed, and a record for the operation may be created and stored in a blockchain database accessible to the plurality of parties.Type: ApplicationFiled: November 17, 2021Publication date: March 10, 2022Applicant: Microsoft Technology Licensing, LLCInventors: Ying YAN, Yang CHEN, Thomas MOSCIBRODA, Eric CHANG, Jinglei REN, Liang CHEN, Yanjie GAO
-
Patent number: 11210426Abstract: In implementations of the subject matter described herein, a new approach for controlling and tracing an object across a plurality of parties is proposed. A rule set may be enabled by the confirmation of a plurality of parties. The rule set may define constraints on operations related to the object. Upon receipt of a request for an operation related to the object, the requested operation may be verified based on the rule set agreed by the plurality of parties. In response to verifying that requested operation is valid, the requested operation may be performed, and a record for the operation may be created and stored in a blockchain database accessible to the plurality of parties.Type: GrantFiled: September 9, 2016Date of Patent: December 28, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Ying Yan, Yang Chen, Thomas Moscibroda, Eric Chang, Jinglei Ren, Liang Chen, Yanjie Gao
-
Publication number: 20210182433Abstract: In implementations of the subject matter described herein, a new approach for controlling and tracing an object across a plurality of parties is proposed. A rule set may be enabled by the confirmation of a plurality of parties. The rule set may define constraints on operations related to the object. Upon receipt of a request for an operation related to the object, the requested operation may be verified based on the rule set agreed by the plurality of parties. In response to verifying that requested operation is valid, the requested operation may be performed, and a record for the operation may be created and stored in a blockchain database accessible to the plurality of parties.Type: ApplicationFiled: September 9, 2016Publication date: June 17, 2021Applicant: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Ying YAN, Yang CHEN, Thomas MOSCIBRODA, Eric CHANG, Jinglei REN, Liang CHEN, Yanjie GAO
-
Publication number: 20200301855Abstract: A computing device requests access to an application object from a remote storage system in order to locally execute application functionality without hosting application resources. An accessed object is associated with an intent in the storage system and locked. Locking an object in combination with an intent prevents computing devices that are not performing the intent from accessing the object. An intent defines one or more operations to be performed with the requested object, which are serialized as intent steps and stored in the storage system. Upon executing an intent step, the computing device stores a log entry at the storage system signifying the step's completion. A locked object remains locked until the log entries indicate every intent step as complete. Different computing devices can unlock a locked object by executing any incomplete steps of an intent associated with the locked object.Type: ApplicationFiled: May 19, 2020Publication date: September 24, 2020Inventors: Lidong Zhou, Jacob R. Lorch, Jinglei Ren, Parveen Kumar Patel, Srinath Setty
-
Patent number: 10691622Abstract: A computing device requests access to an application object from a remote storage system in order to locally execute application functionality without hosting application resources. An accessed object is associated with an intent in the storage system and locked. Locking an object in combination with an intent prevents computing devices that are not performing the intent from accessing the object. An intent defines one or more operations to be performed with the requested object, which are serialized as intent steps and stored in the storage system. Upon executing an intent step, the computing device stores a log entry at the storage system signifying the step's completion. A locked object remains locked until the log entries indicate every intent step as complete. Different computing devices can unlock a locked object by executing any incomplete steps of an intent associated with the locked object.Type: GrantFiled: September 19, 2017Date of Patent: June 23, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Lidong Zhou, Jacob R. Lorch, Jinglei Ren, Parveen Kumar Patel, Srinath Setty
-
Publication number: 20200089406Abstract: A method for controlling a redundant storage system is proposed. A write request to a redundant storage system is received (310). A dataset that is to be written into the redundant storage system by the write request is determined (320). A portion of the dataset is logged into the redundant storage system for data recovery in case that a fault occurs in the redundant storage system (330). Thus, only a portion of the dataset is logged and the amount of the logged data may be reduced compared with the conventional redundant storage system. Further, the redundant storage system may be recovered in response to a fault occurring in the redundant storage system.Type: ApplicationFiled: March 16, 2017Publication date: March 19, 2020Applicant: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Jinglei REN, Thomas MOSCIBRODA
-
Patent number: 10579523Abstract: The subject matter described herein relates to a file system with adaptive flushing for an electronic device. The file system keeps data in memory much longer and its policy for flushing in-memory write cache to storage is application-aware and adaptive. More specifically, what parts of the cached data are ready for flushing could be determined according to the access characteristic of an application. In addition, when to do flushing can be selected flexibly at least partly based on user input interactions with an application of the electronic device or with the electronic device. Further, a multi-priority scheduling mechanism for scheduling data units that are ready to be flushed could be employed, which ensures fairness among applications and further improves flushing performance.Type: GrantFiled: August 15, 2014Date of Patent: March 3, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Jinglei Ren, Chieh-Jan Mike Liang, Thomas Moscibroda
-
Publication number: 20180349275Abstract: The subject matter described herein relates to a file system with adaptive flushing for an electronic device. The file system keeps data in memory much longer and its policy for flushing in-memory write cache to storage is application-aware and adaptive. More specifically, what parts of the cached data are ready for flushing could be determined according to the access characteristic of an application. In addition, when to do flushing can be selected flexibly at least partly based on user input interactions with an application of the electronic device or with the electronic device. Further, a multi-priority scheduling mechanism for scheduling data units that are ready to be flushed could be employed, which ensures fairness among applications and further improves flushing performance.Type: ApplicationFiled: August 15, 2014Publication date: December 6, 2018Inventors: Jinglei Ren, Mike Chieh-Jan Liang, Thomas Moscibroda
-
Publication number: 20180089110Abstract: A computing device requests access to an application object from a remote storage system in order to locally execute application functionality without hosting application resources. An accessed object is associated with an intent in the storage system and locked. Locking an object in combination with an intent prevents computing devices that are not performing the intent from accessing the object. An intent defines one or more operations to be performed with the requested object, which are serialized as intent steps and stored in the storage system. Upon executing an intent step, the computing device stores a log entry at the storage system signifying the step's completion. A locked object remains locked until the log entries indicate every intent step as complete. Different computing devices can unlock a locked object by executing any incomplete steps of an intent associated with the locked object.Type: ApplicationFiled: September 19, 2017Publication date: March 29, 2018Applicant: Microsoft Technology Licensing, LLCInventors: Lidong Zhou, Jacob R. Lorch, Jinglei Ren, Parveen Kumar Patel, Srinath Setty