Patents by Inventor Jinglei Ren

Jinglei Ren has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240093443
    Abstract: Disclosed in the present disclosure is a double-deck multi-span bridge construction method. According to the double-deck bridge construction method of the present disclosure, construction is carried out by using a method of disassembling a support jig frame in a graded and span-separated mode, an upper chord jig frame and a lower chord jig frame can be used in a recycle manner, and construction costs are reduced. In addition, a construction period of building the support jig frame is shortened, and other construction operations can be synchronously carried out on a span in which the jig frame is disassembled, for example, fire retardant coating construction can be carried out on a mounted bridge deck after the jig frame is disassembled, and the construction period of a double-deck multi-span bridge is effectively shortened.
    Type: Application
    Filed: September 23, 2021
    Publication date: March 21, 2024
    Applicant: CHINA CONSTRUCTION SCIENCE AND INDUSTRY CORPORATION LTD.
    Inventors: Jinglei REN, Bing SUN, Yonggang GAO, Hongyu SHEN, Shaohui ZHU, Jianguo QI, Cui LIU, Ruihua YAN, Zhiqiang HE, Longfei LI, Sijie YANG, Huaidong ZHANG, Xu CHEN, Wei JIANG, Wenbo LI, Yingwu SUN, Yuhang ZHANG
  • Publication number: 20240069910
    Abstract: A method and a device for evaluating workload of programmers are provided. The method includes: acquiring an old version of program code and a new version of program code which is generated by editing the old version of program code by the programmer; parsing the old version of program code into a first syntax tree and parsing the new version of program code into a second syntax tree; generating an edit script including one or more editing operations that cause the first syntax tree to be changed into the second syntax tree; and determining a score for evaluating the workload of the programmer based on the edit script. The method further includes adjusting the score by applying various weights to achieve a more accurate evaluation.
    Type: Application
    Filed: August 30, 2023
    Publication date: February 29, 2024
    Applicant: MERICO, INC.
    Inventors: Hezheng YIN, Jinglei REN
  • Patent number: 11816017
    Abstract: A tool is provided for evaluating contributions of different software developers to a software project, which considers both the structural value and non-structural value of each developer's contributions. Source code for the project is parsed to generate abstract syntax trees (ASTs) representing the code at different times during the project. The tool may perform both a structural value analysis and a non-structural value analysis of the code contributions of each developer. The structural value analysis for each developer may include a call-commit analysis of a call-commit graph generated from the ASTs to analyze function calls and commits attributable to each developer. The non-structural value analysis for each software developer may include identifying and classifying commits attributable to each developer based on impact of such commits on the project. The tool may then calculate a development value score for each developer based on the structural and non-structural metrics for each developer.
    Type: Grant
    Filed: November 4, 2019
    Date of Patent: November 14, 2023
    Assignee: MERICO, INC.
    Inventors: Jinglei Ren, Hezheng Yin, Roland Vogl
  • Patent number: 11762568
    Abstract: A method for controlling a redundant storage system is proposed. A write request to a redundant storage system is received (310). A dataset that is to be written into the redundant storage system by the write request is determined (320). A portion of the dataset is logged into the redundant storage system for data recovery in case that a fault occurs in the redundant storage system (330). Thus, only a portion of the dataset is logged and the amount of the logged data may be reduced compared with the conventional redundant storage system. Further, the redundant storage system may be recovered in response to a fault occurring in the redundant storage system.
    Type: Grant
    Filed: March 16, 2017
    Date of Patent: September 19, 2023
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Jinglei Ren, Thomas Moscibroda
  • Publication number: 20220382541
    Abstract: A tool is provided for evaluating contributions of different software developers to a software project, which considers both the structural value and non-structural value of each developer's contributions. Source code for the project is parsed to generate abstract syntax trees (ASTs) representing the code at different times during the project. The tool may perform both a structural value analysis and a non-structural value analysis of the code contributions of each developer. The structural value analysis for each developer may include a call-commit analysis of a call-commit graph generated from the ASTs to analyze function calls and commits attributable to each developer. The non-structural value analysis for each software developer may include identifying and classifying commits attributable to each developer based on impact of such commits on the project. The tool may then calculate a development value score for each developer based on the structural and non-structural metrics for each developer.
    Type: Application
    Filed: November 4, 2019
    Publication date: December 1, 2022
    Applicant: Merico, Inc.
    Inventors: Jinglei Ren, Hezheng Yin, Roland Vogl
  • Patent number: 11327905
    Abstract: A computing device requests access to an application object from a remote storage system in order to locally execute application functionality without hosting application resources. An accessed object is associated with an intent in the storage system and locked. Locking an object in combination with an intent prevents computing devices that are not performing the intent from accessing the object. An intent defines one or more operations to be performed with the requested object, which are serialized as intent steps and stored in the storage system. Upon executing an intent step, the computing device stores a log entry at the storage system signifying the step's completion. A locked object remains locked until the log entries indicate every intent step as complete. Different computing devices can unlock a locked object by executing any incomplete steps of an intent associated with the locked object.
    Type: Grant
    Filed: May 19, 2020
    Date of Patent: May 10, 2022
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Lidong Zhou, Jacob R. Lorch, Jinglei Ren, Parveen Kumar Patel, Srinath Setty
  • Publication number: 20220075900
    Abstract: In implementations of the subject matter described herein, a new approach for controlling and tracing an object across a plurality of parties is proposed. A rule set may be enabled by the confirmation of a plurality of parties. The rule set may define constraints on operations related to the object. Upon receipt of a request for an operation related to the object, the requested operation may be verified based on the rule set agreed by the plurality of parties. In response to verifying that requested operation is valid, the requested operation may be performed, and a record for the operation may be created and stored in a blockchain database accessible to the plurality of parties.
    Type: Application
    Filed: November 17, 2021
    Publication date: March 10, 2022
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Ying YAN, Yang CHEN, Thomas MOSCIBRODA, Eric CHANG, Jinglei REN, Liang CHEN, Yanjie GAO
  • Patent number: 11210426
    Abstract: In implementations of the subject matter described herein, a new approach for controlling and tracing an object across a plurality of parties is proposed. A rule set may be enabled by the confirmation of a plurality of parties. The rule set may define constraints on operations related to the object. Upon receipt of a request for an operation related to the object, the requested operation may be verified based on the rule set agreed by the plurality of parties. In response to verifying that requested operation is valid, the requested operation may be performed, and a record for the operation may be created and stored in a blockchain database accessible to the plurality of parties.
    Type: Grant
    Filed: September 9, 2016
    Date of Patent: December 28, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Ying Yan, Yang Chen, Thomas Moscibroda, Eric Chang, Jinglei Ren, Liang Chen, Yanjie Gao
  • Publication number: 20210182433
    Abstract: In implementations of the subject matter described herein, a new approach for controlling and tracing an object across a plurality of parties is proposed. A rule set may be enabled by the confirmation of a plurality of parties. The rule set may define constraints on operations related to the object. Upon receipt of a request for an operation related to the object, the requested operation may be verified based on the rule set agreed by the plurality of parties. In response to verifying that requested operation is valid, the requested operation may be performed, and a record for the operation may be created and stored in a blockchain database accessible to the plurality of parties.
    Type: Application
    Filed: September 9, 2016
    Publication date: June 17, 2021
    Applicant: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Ying YAN, Yang CHEN, Thomas MOSCIBRODA, Eric CHANG, Jinglei REN, Liang CHEN, Yanjie GAO
  • Publication number: 20200301855
    Abstract: A computing device requests access to an application object from a remote storage system in order to locally execute application functionality without hosting application resources. An accessed object is associated with an intent in the storage system and locked. Locking an object in combination with an intent prevents computing devices that are not performing the intent from accessing the object. An intent defines one or more operations to be performed with the requested object, which are serialized as intent steps and stored in the storage system. Upon executing an intent step, the computing device stores a log entry at the storage system signifying the step's completion. A locked object remains locked until the log entries indicate every intent step as complete. Different computing devices can unlock a locked object by executing any incomplete steps of an intent associated with the locked object.
    Type: Application
    Filed: May 19, 2020
    Publication date: September 24, 2020
    Inventors: Lidong Zhou, Jacob R. Lorch, Jinglei Ren, Parveen Kumar Patel, Srinath Setty
  • Patent number: 10691622
    Abstract: A computing device requests access to an application object from a remote storage system in order to locally execute application functionality without hosting application resources. An accessed object is associated with an intent in the storage system and locked. Locking an object in combination with an intent prevents computing devices that are not performing the intent from accessing the object. An intent defines one or more operations to be performed with the requested object, which are serialized as intent steps and stored in the storage system. Upon executing an intent step, the computing device stores a log entry at the storage system signifying the step's completion. A locked object remains locked until the log entries indicate every intent step as complete. Different computing devices can unlock a locked object by executing any incomplete steps of an intent associated with the locked object.
    Type: Grant
    Filed: September 19, 2017
    Date of Patent: June 23, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Lidong Zhou, Jacob R. Lorch, Jinglei Ren, Parveen Kumar Patel, Srinath Setty
  • Publication number: 20200089406
    Abstract: A method for controlling a redundant storage system is proposed. A write request to a redundant storage system is received (310). A dataset that is to be written into the redundant storage system by the write request is determined (320). A portion of the dataset is logged into the redundant storage system for data recovery in case that a fault occurs in the redundant storage system (330). Thus, only a portion of the dataset is logged and the amount of the logged data may be reduced compared with the conventional redundant storage system. Further, the redundant storage system may be recovered in response to a fault occurring in the redundant storage system.
    Type: Application
    Filed: March 16, 2017
    Publication date: March 19, 2020
    Applicant: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Jinglei REN, Thomas MOSCIBRODA
  • Patent number: 10579523
    Abstract: The subject matter described herein relates to a file system with adaptive flushing for an electronic device. The file system keeps data in memory much longer and its policy for flushing in-memory write cache to storage is application-aware and adaptive. More specifically, what parts of the cached data are ready for flushing could be determined according to the access characteristic of an application. In addition, when to do flushing can be selected flexibly at least partly based on user input interactions with an application of the electronic device or with the electronic device. Further, a multi-priority scheduling mechanism for scheduling data units that are ready to be flushed could be employed, which ensures fairness among applications and further improves flushing performance.
    Type: Grant
    Filed: August 15, 2014
    Date of Patent: March 3, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Jinglei Ren, Chieh-Jan Mike Liang, Thomas Moscibroda
  • Publication number: 20180349275
    Abstract: The subject matter described herein relates to a file system with adaptive flushing for an electronic device. The file system keeps data in memory much longer and its policy for flushing in-memory write cache to storage is application-aware and adaptive. More specifically, what parts of the cached data are ready for flushing could be determined according to the access characteristic of an application. In addition, when to do flushing can be selected flexibly at least partly based on user input interactions with an application of the electronic device or with the electronic device. Further, a multi-priority scheduling mechanism for scheduling data units that are ready to be flushed could be employed, which ensures fairness among applications and further improves flushing performance.
    Type: Application
    Filed: August 15, 2014
    Publication date: December 6, 2018
    Inventors: Jinglei Ren, Mike Chieh-Jan Liang, Thomas Moscibroda
  • Publication number: 20180089110
    Abstract: A computing device requests access to an application object from a remote storage system in order to locally execute application functionality without hosting application resources. An accessed object is associated with an intent in the storage system and locked. Locking an object in combination with an intent prevents computing devices that are not performing the intent from accessing the object. An intent defines one or more operations to be performed with the requested object, which are serialized as intent steps and stored in the storage system. Upon executing an intent step, the computing device stores a log entry at the storage system signifying the step's completion. A locked object remains locked until the log entries indicate every intent step as complete. Different computing devices can unlock a locked object by executing any incomplete steps of an intent associated with the locked object.
    Type: Application
    Filed: September 19, 2017
    Publication date: March 29, 2018
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Lidong Zhou, Jacob R. Lorch, Jinglei Ren, Parveen Kumar Patel, Srinath Setty