Patents by Inventor Niao Qing Liu

Niao Qing Liu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11354540
    Abstract: In an approach, a processor detects at least one training message delivered by a user on a social media application, the training message being accessible by an operator. A processor records training feedback performed by the operator on the social media application regarding to the at least one training message. A processor trains an analysis engine module using (i) the at least one training message as input and (ii) the training feedback as output. A processor generates a predicted feedback for a subsequent message based on the trained analysis engine module.
    Type: Grant
    Filed: September 25, 2019
    Date of Patent: June 7, 2022
    Assignee: International Business Machines Corporation
    Inventors: Qin Li, Jonathan D. Dunne, Guang Han Sui, Ping Xiao, Peng Hui Jiang, Niao Qing Liu, Xiang Zhou
  • Patent number: 11263115
    Abstract: According to one embodiment, a method, computer system, and computer program product for memory corruption diagnosis is provided. The present invention may include generating a pattern expression (PE) header file, wherein a plurality of common datatypes associated with a software program are pre-defined. The invention may further include generating a PE for each of the plurality of common datatypes, and generating a PE table by merging the generated PEs for each of the plurality of common datatypes. Upon discovery that memory corruption has occurred, the invention may include transmitting a recorded state of the software program as a core dump file to a server, and using a dump utility to identify overlay content of the core dump file. Lastly, the invention may include identifying a possible source program of the memory corruption by matching the PE tables against the illegally-written overlay content.
    Type: Grant
    Filed: December 18, 2019
    Date of Patent: March 1, 2022
    Assignee: International Business Machines Corporation
    Inventors: Guan Jun Liu, Niao Qing Liu, Ai Lian Mi, Jing Jing Wen, Bei Chun Zhou
  • Publication number: 20210089826
    Abstract: In an approach, a processor detects at least one training message delivered by a user on a social media application, the training message being accessible by an operator. A processor records training feedback performed by the operator on the social media application regarding to the at least one training message. A processor trains an analysis engine module using (i) the at least one training message as input and (ii) the training feedback as output. A processor generates a predicted feedback for a subsequent message based on the trained analysis engine module.
    Type: Application
    Filed: September 25, 2019
    Publication date: March 25, 2021
    Inventors: Qin Li, Jonathan D. Dunne, Guang Han Sui, Ping Xiao, Peng Hui Jiang, Niao Qing Liu, Xiang Zhou
  • Patent number: 10897534
    Abstract: Embodiments of the invention provide methods, systems, computer program products for managing a call waiting in a queue during a request for staff services provided by a call center. According to the method, a first voice segment received in a call made by a device is recorded first. Next, whether a part of the first voice segment is related to a first predefined voice segment is determined. The volume of device is adjusted in response to the part of the first voice segment being related to the first predefined voice segment. A user of the device is alerted in response to the part of the first voice segment being not related to the first predefined voice segment.
    Type: Grant
    Filed: September 13, 2019
    Date of Patent: January 19, 2021
    Assignee: International Business Machines Corporation
    Inventors: Guang Han Sui, Peng Hui Jiang, Qin Li, Ping Xiao, Niao Qing Liu, Xiang Zhou, Ping Ping Cheng
  • Patent number: 10880360
    Abstract: A file is transmitted to a plurality of hosts. The hosts are divided into host groups. A host in each host group is selected as a master host. A data block is received by a master host in a host group. The master host sends the data block to both a master host in a next host group and a next host in the host group in order that the next host in the host group sends the data block to a next host of the next host in the host group, and the master host in the next host group sends the data block to both a master host in a next host group of the next host group and a next host of the next host in the next host group.
    Type: Grant
    Filed: April 5, 2019
    Date of Patent: December 29, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Guang Han Sui, Peng Hui Jiang, Qin Li, Jian Hua Zhang, Ping Xiao, Niao Qing Liu, Xiang Zhou
  • Publication number: 20200322416
    Abstract: A file is transmitted to a plurality of hosts. The hosts are divided into host groups. A host in each host group is selected as a master host. A data block is received by a master host in a host group. The master host sends the data block to both a master host in a next host group and a next host in the host group in order that the next host in the host group sends the data block to a next host of the next host in the host group, and the master host in the next host group sends the data block to both a master host in a next host group of the next host group and a next host of the next host in the next host group.
    Type: Application
    Filed: April 5, 2019
    Publication date: October 8, 2020
    Inventors: Guang Han Sui, Peng Hui Jiang, Qin Li, Jian Hua Zhang, Ping Xiao, Niao Qing Liu, Xiang Zhou
  • Publication number: 20200117572
    Abstract: According to one embodiment, a method, computer system, and computer program product for memory corruption diagnosis is provided. The present invention may include generating a pattern expression (PE) header file, wherein a plurality of common datatypes associated with a software program are pre-defined. The invention may further include generating a PE for each of the plurality of common datatypes, and generating a PE table by merging the generated PEs for each of the plurality of common datatypes. Upon discovery that memory corruption has occurred, the invention may include transmitting a recorded state of the software program as a core dump file to a server, and using a dump utility to identify overlay content of the core dump file. Lastly, the invention may include identifying a possible source program of the memory corruption by matching the PE tables against the illegally-written overlay content.
    Type: Application
    Filed: December 18, 2019
    Publication date: April 16, 2020
    Inventors: Guan Jun Liu, Niao Qing Liu, Ai Lian Mi, Jing Jing Wen, Bei Chun Zhou
  • Patent number: 10540261
    Abstract: According to one embodiment, a method, computer system, and computer program product for memory corruption diagnosis is provided. The present invention may include generating a pattern expression (PE) header file, wherein a plurality of common datatypes associated with a software program are pre-defined. The invention may further include generating a PE for each of the plurality of common datatypes, and generating a PE table by merging the generated PEs for each of the plurality of common datatypes. Upon discovery that memory corruption has occurred, the invention may include transmitting a recorded state of the software program as a core dump file to a server, and using a dump utility to identify overlay content of the core dump file. Lastly, the invention may include identifying a possible source program of the memory corruption by matching the PE tables against the illegally-written overlay content.
    Type: Grant
    Filed: April 7, 2017
    Date of Patent: January 21, 2020
    Assignee: International Business Machines Corporation
    Inventors: Guan Jun Liu, Niao Qing Liu, Ai Lian Mi, Jing Jing Wen, Bei Chun Zhou
  • Patent number: 10534694
    Abstract: According to one embodiment, a method, computer system, and computer program product for memory corruption diagnosis is provided. The present invention may include generating a pattern expression (PE) header file, wherein a plurality of common datatypes associated with a software program are pre-defined. The invention may further include generating a PE for each of the plurality of common datatypes, and generating a PE table by merging the generated PEs for each of the plurality of common datatypes. Upon discovery that memory corruption has occurred, the invention may include transmitting a recorded state of the software program as a core dump file to a server, and using a dump utility to identify overlay content of the core dump file. Lastly, the invention may include identifying a possible source program of the memory corruption by matching the PE tables against the illegally-written overlay content.
    Type: Grant
    Filed: December 14, 2017
    Date of Patent: January 14, 2020
    Assignee: International Business Machines Corporation
    Inventors: Guan Jun Liu, Niao Qing Liu, Ai Lian Mi, Jing Jing Wen, Bei Chun Zhou
  • Patent number: 10387638
    Abstract: A system, method, and computer product for managing a password includes receiving a new password set by a user via a key input interface, generating a diagram based on key positions, on the key input interface, of a plurality of characters associated with said new password, storing a diagram into a memory device coupled to the processing device, and providing said diagram stored in the memory device to the user as a password hint.
    Type: Grant
    Filed: February 28, 2017
    Date of Patent: August 20, 2019
    Assignee: International Business Machines Corporation
    Inventors: Guan Jun Liu, Niao Qing Liu, Ailian Mi, Jing Jing Wen, Bei Chun Zhou
  • Patent number: 10346286
    Abstract: According to one embodiment, a method, computer system, and computer program product for memory corruption diagnosis is provided. The present invention may include generating a pattern expression (PE) header file, wherein a plurality of common datatypes associated with a software program are pre-defined. The invention may further include generating a PE for each of the plurality of common datatypes, and generating a PE table by merging the generated PEs for each of the plurality of common datatypes. Upon discovery that memory corruption has occurred, the invention may include transmitting a recorded state of the software program as a core dump file to a server, and using a dump utility to identify overlay content of the core dump file. Lastly, the invention may include identifying a possible source program of the memory corruption by matching the PE tables against the illegally-written overlay content.
    Type: Grant
    Filed: February 22, 2018
    Date of Patent: July 9, 2019
    Assignee: International Business Machines Corporation
    Inventors: Guan Jun Liu, Niao Qing Liu, Ai Lian Mi, Jing Jing Wen, Bei Chun Zhou
  • Publication number: 20180293150
    Abstract: According to one embodiment, a method, computer system, and computer program product for memory corruption diagnosis is provided. The present invention may include generating a pattern expression (PE) header file, wherein a plurality of common datatypes associated with a software program are pre-defined. The invention may further include generating a PE for each of the plurality of common datatypes, and generating a PE table by merging the generated PEs for each of the plurality of common datatypes. Upon discovery that memory corruption has occurred, the invention may include transmitting a recorded state of the software program as a core dump file to a server, and using a dump utility to identify overlay content of the core dump file. Lastly, the invention may include identifying a possible source program of the memory corruption by matching the PE tables against the illegally-written overlay content.
    Type: Application
    Filed: February 22, 2018
    Publication date: October 11, 2018
    Inventors: Guan Jun Liu, Niao Qing Liu, Ai Lian Mi, Jing Jing Wen, Bei Chun Zhou
  • Publication number: 20180293149
    Abstract: According to one embodiment, a method, computer system, and computer program product for memory corruption diagnosis is provided. The present invention may include generating a pattern expression (PE) header file, wherein a plurality of common datatypes associated with a software program are pre-defined. The invention may further include generating a PE for each of the plurality of common datatypes, and generating a PE table by merging the generated PEs for each of the plurality of common datatypes. Upon discovery that memory corruption has occurred, the invention may include transmitting a recorded state of the software program as a core dump file to a server, and using a dump utility to identify overlay content of the core dump file. Lastly, the invention may include identifying a possible source program of the memory corruption by matching the PE tables against the illegally-written overlay content.
    Type: Application
    Filed: December 14, 2017
    Publication date: October 11, 2018
    Inventors: Guan Jun Liu, Niao Qing Liu, Ai Lian Mi, Jing Jing Wen, Bei Chun Zhou
  • Publication number: 20180293148
    Abstract: According to one embodiment, a method, computer system, and computer program product for memory corruption diagnosis is provided. The present invention may include generating a pattern expression (PE) header file, wherein a plurality of common datatypes associated with a software program are pre-defined. The invention may further include generating a PE for each of the plurality of common datatypes, and generating a PE table by merging the generated PEs for each of the plurality of common datatypes. Upon discovery that memory corruption has occurred, the invention may include transmitting a recorded state of the software program as a core dump file to a server, and using a dump utility to identify overlay content of the core dump file. Lastly, the invention may include identifying a possible source program of the memory corruption by matching the PE tables against the illegally-written overlay content.
    Type: Application
    Filed: April 7, 2017
    Publication date: October 11, 2018
    Inventors: Guan Jun Liu, Niao Qing Liu, Ai Lian Mi, Jing Jing Wen, BEI CHUN ZHOU
  • Publication number: 20180247044
    Abstract: A system, method, and computer product for managing a password includes receiving a new password set by a user via a key input interface, generating a diagram based on key positions, on the key input interface, of a plurality of characters associated with said new password, storing a diagram into a memory device coupled to the processing device, and providing said diagram stored in the memory device to the user as a password hint.
    Type: Application
    Filed: February 28, 2017
    Publication date: August 30, 2018
    Inventors: Guan Jun Liu, Niao Qing Liu, Ailian Mi, Jing Jing Wen, Bei Chun Zhou
  • Patent number: 9632818
    Abstract: A mechanism is provided for identifying a performance bottleneck of a transaction in a transaction processing system. At a predefined time point, status information of an interaction between the transaction and a processing component among one or more processing components in the transaction processing system is collected. A duration of the interaction on the basis of the status information is determined. In response to the duration exceeding a predefined threshold, the interaction is identified as the performance bottleneck of the transaction in order to make changes to the transaction processing system thereby improving performance.
    Type: Grant
    Filed: July 13, 2015
    Date of Patent: April 25, 2017
    Assignee: International Business Machines Corporation
    Inventors: Ting Ting Huang, Guan Jun Liu, Niao Qing Liu, Ai Lian Mi, Bei Chun Zhou
  • Publication number: 20170109203
    Abstract: Embodiments of the present invention may schedule a task in a processing system. According to one embodiment of the present invention, a resource to be accessed by a task in a processing system is determined based on a type of a request for initiating the task. Then, a length of a task queue that records at least one task waiting for the resource is determined Next, the request is suspended in response to the length of the task queue being greater than a predefined threshold.
    Type: Application
    Filed: October 15, 2015
    Publication date: April 20, 2017
    Inventors: Guan Jun Liu, Niao Qing Liu, Ai Lian Mi, Bei Chun Zhou
  • Publication number: 20160034301
    Abstract: A mechanism is provided for identifying a performance bottleneck of a transaction in a transaction processing system. At a predefined time point, status information of an interaction between the transaction and a processing component among one or more processing components in the transaction processing system is collected. A duration of the interaction on the basis of the status information is determined. In response to the duration exceeding a predefined threshold, the interaction is identified as the performance bottleneck of the transaction in order to make changes to the transaction processing system thereby improving performance.
    Type: Application
    Filed: July 13, 2015
    Publication date: February 4, 2016
    Inventors: Ting Ting Huang, Guan Jun Liu, Niao Qing Liu, Ai Lian Mi, Bei Chun Zhou