Patents by Inventor Niao Qing Liu
Niao Qing Liu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11354540Abstract: In an approach, a processor detects at least one training message delivered by a user on a social media application, the training message being accessible by an operator. A processor records training feedback performed by the operator on the social media application regarding to the at least one training message. A processor trains an analysis engine module using (i) the at least one training message as input and (ii) the training feedback as output. A processor generates a predicted feedback for a subsequent message based on the trained analysis engine module.Type: GrantFiled: September 25, 2019Date of Patent: June 7, 2022Assignee: International Business Machines CorporationInventors: Qin Li, Jonathan D. Dunne, Guang Han Sui, Ping Xiao, Peng Hui Jiang, Niao Qing Liu, Xiang Zhou
-
Patent number: 11263115Abstract: According to one embodiment, a method, computer system, and computer program product for memory corruption diagnosis is provided. The present invention may include generating a pattern expression (PE) header file, wherein a plurality of common datatypes associated with a software program are pre-defined. The invention may further include generating a PE for each of the plurality of common datatypes, and generating a PE table by merging the generated PEs for each of the plurality of common datatypes. Upon discovery that memory corruption has occurred, the invention may include transmitting a recorded state of the software program as a core dump file to a server, and using a dump utility to identify overlay content of the core dump file. Lastly, the invention may include identifying a possible source program of the memory corruption by matching the PE tables against the illegally-written overlay content.Type: GrantFiled: December 18, 2019Date of Patent: March 1, 2022Assignee: International Business Machines CorporationInventors: Guan Jun Liu, Niao Qing Liu, Ai Lian Mi, Jing Jing Wen, Bei Chun Zhou
-
Publication number: 20210089826Abstract: In an approach, a processor detects at least one training message delivered by a user on a social media application, the training message being accessible by an operator. A processor records training feedback performed by the operator on the social media application regarding to the at least one training message. A processor trains an analysis engine module using (i) the at least one training message as input and (ii) the training feedback as output. A processor generates a predicted feedback for a subsequent message based on the trained analysis engine module.Type: ApplicationFiled: September 25, 2019Publication date: March 25, 2021Inventors: Qin Li, Jonathan D. Dunne, Guang Han Sui, Ping Xiao, Peng Hui Jiang, Niao Qing Liu, Xiang Zhou
-
Patent number: 10897534Abstract: Embodiments of the invention provide methods, systems, computer program products for managing a call waiting in a queue during a request for staff services provided by a call center. According to the method, a first voice segment received in a call made by a device is recorded first. Next, whether a part of the first voice segment is related to a first predefined voice segment is determined. The volume of device is adjusted in response to the part of the first voice segment being related to the first predefined voice segment. A user of the device is alerted in response to the part of the first voice segment being not related to the first predefined voice segment.Type: GrantFiled: September 13, 2019Date of Patent: January 19, 2021Assignee: International Business Machines CorporationInventors: Guang Han Sui, Peng Hui Jiang, Qin Li, Ping Xiao, Niao Qing Liu, Xiang Zhou, Ping Ping Cheng
-
Patent number: 10880360Abstract: A file is transmitted to a plurality of hosts. The hosts are divided into host groups. A host in each host group is selected as a master host. A data block is received by a master host in a host group. The master host sends the data block to both a master host in a next host group and a next host in the host group in order that the next host in the host group sends the data block to a next host of the next host in the host group, and the master host in the next host group sends the data block to both a master host in a next host group of the next host group and a next host of the next host in the next host group.Type: GrantFiled: April 5, 2019Date of Patent: December 29, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Guang Han Sui, Peng Hui Jiang, Qin Li, Jian Hua Zhang, Ping Xiao, Niao Qing Liu, Xiang Zhou
-
Publication number: 20200322416Abstract: A file is transmitted to a plurality of hosts. The hosts are divided into host groups. A host in each host group is selected as a master host. A data block is received by a master host in a host group. The master host sends the data block to both a master host in a next host group and a next host in the host group in order that the next host in the host group sends the data block to a next host of the next host in the host group, and the master host in the next host group sends the data block to both a master host in a next host group of the next host group and a next host of the next host in the next host group.Type: ApplicationFiled: April 5, 2019Publication date: October 8, 2020Inventors: Guang Han Sui, Peng Hui Jiang, Qin Li, Jian Hua Zhang, Ping Xiao, Niao Qing Liu, Xiang Zhou
-
Publication number: 20200117572Abstract: According to one embodiment, a method, computer system, and computer program product for memory corruption diagnosis is provided. The present invention may include generating a pattern expression (PE) header file, wherein a plurality of common datatypes associated with a software program are pre-defined. The invention may further include generating a PE for each of the plurality of common datatypes, and generating a PE table by merging the generated PEs for each of the plurality of common datatypes. Upon discovery that memory corruption has occurred, the invention may include transmitting a recorded state of the software program as a core dump file to a server, and using a dump utility to identify overlay content of the core dump file. Lastly, the invention may include identifying a possible source program of the memory corruption by matching the PE tables against the illegally-written overlay content.Type: ApplicationFiled: December 18, 2019Publication date: April 16, 2020Inventors: Guan Jun Liu, Niao Qing Liu, Ai Lian Mi, Jing Jing Wen, Bei Chun Zhou
-
Patent number: 10540261Abstract: According to one embodiment, a method, computer system, and computer program product for memory corruption diagnosis is provided. The present invention may include generating a pattern expression (PE) header file, wherein a plurality of common datatypes associated with a software program are pre-defined. The invention may further include generating a PE for each of the plurality of common datatypes, and generating a PE table by merging the generated PEs for each of the plurality of common datatypes. Upon discovery that memory corruption has occurred, the invention may include transmitting a recorded state of the software program as a core dump file to a server, and using a dump utility to identify overlay content of the core dump file. Lastly, the invention may include identifying a possible source program of the memory corruption by matching the PE tables against the illegally-written overlay content.Type: GrantFiled: April 7, 2017Date of Patent: January 21, 2020Assignee: International Business Machines CorporationInventors: Guan Jun Liu, Niao Qing Liu, Ai Lian Mi, Jing Jing Wen, Bei Chun Zhou
-
Patent number: 10534694Abstract: According to one embodiment, a method, computer system, and computer program product for memory corruption diagnosis is provided. The present invention may include generating a pattern expression (PE) header file, wherein a plurality of common datatypes associated with a software program are pre-defined. The invention may further include generating a PE for each of the plurality of common datatypes, and generating a PE table by merging the generated PEs for each of the plurality of common datatypes. Upon discovery that memory corruption has occurred, the invention may include transmitting a recorded state of the software program as a core dump file to a server, and using a dump utility to identify overlay content of the core dump file. Lastly, the invention may include identifying a possible source program of the memory corruption by matching the PE tables against the illegally-written overlay content.Type: GrantFiled: December 14, 2017Date of Patent: January 14, 2020Assignee: International Business Machines CorporationInventors: Guan Jun Liu, Niao Qing Liu, Ai Lian Mi, Jing Jing Wen, Bei Chun Zhou
-
Patent number: 10387638Abstract: A system, method, and computer product for managing a password includes receiving a new password set by a user via a key input interface, generating a diagram based on key positions, on the key input interface, of a plurality of characters associated with said new password, storing a diagram into a memory device coupled to the processing device, and providing said diagram stored in the memory device to the user as a password hint.Type: GrantFiled: February 28, 2017Date of Patent: August 20, 2019Assignee: International Business Machines CorporationInventors: Guan Jun Liu, Niao Qing Liu, Ailian Mi, Jing Jing Wen, Bei Chun Zhou
-
Patent number: 10346286Abstract: According to one embodiment, a method, computer system, and computer program product for memory corruption diagnosis is provided. The present invention may include generating a pattern expression (PE) header file, wherein a plurality of common datatypes associated with a software program are pre-defined. The invention may further include generating a PE for each of the plurality of common datatypes, and generating a PE table by merging the generated PEs for each of the plurality of common datatypes. Upon discovery that memory corruption has occurred, the invention may include transmitting a recorded state of the software program as a core dump file to a server, and using a dump utility to identify overlay content of the core dump file. Lastly, the invention may include identifying a possible source program of the memory corruption by matching the PE tables against the illegally-written overlay content.Type: GrantFiled: February 22, 2018Date of Patent: July 9, 2019Assignee: International Business Machines CorporationInventors: Guan Jun Liu, Niao Qing Liu, Ai Lian Mi, Jing Jing Wen, Bei Chun Zhou
-
Publication number: 20180293150Abstract: According to one embodiment, a method, computer system, and computer program product for memory corruption diagnosis is provided. The present invention may include generating a pattern expression (PE) header file, wherein a plurality of common datatypes associated with a software program are pre-defined. The invention may further include generating a PE for each of the plurality of common datatypes, and generating a PE table by merging the generated PEs for each of the plurality of common datatypes. Upon discovery that memory corruption has occurred, the invention may include transmitting a recorded state of the software program as a core dump file to a server, and using a dump utility to identify overlay content of the core dump file. Lastly, the invention may include identifying a possible source program of the memory corruption by matching the PE tables against the illegally-written overlay content.Type: ApplicationFiled: February 22, 2018Publication date: October 11, 2018Inventors: Guan Jun Liu, Niao Qing Liu, Ai Lian Mi, Jing Jing Wen, Bei Chun Zhou
-
Publication number: 20180293149Abstract: According to one embodiment, a method, computer system, and computer program product for memory corruption diagnosis is provided. The present invention may include generating a pattern expression (PE) header file, wherein a plurality of common datatypes associated with a software program are pre-defined. The invention may further include generating a PE for each of the plurality of common datatypes, and generating a PE table by merging the generated PEs for each of the plurality of common datatypes. Upon discovery that memory corruption has occurred, the invention may include transmitting a recorded state of the software program as a core dump file to a server, and using a dump utility to identify overlay content of the core dump file. Lastly, the invention may include identifying a possible source program of the memory corruption by matching the PE tables against the illegally-written overlay content.Type: ApplicationFiled: December 14, 2017Publication date: October 11, 2018Inventors: Guan Jun Liu, Niao Qing Liu, Ai Lian Mi, Jing Jing Wen, Bei Chun Zhou
-
Publication number: 20180293148Abstract: According to one embodiment, a method, computer system, and computer program product for memory corruption diagnosis is provided. The present invention may include generating a pattern expression (PE) header file, wherein a plurality of common datatypes associated with a software program are pre-defined. The invention may further include generating a PE for each of the plurality of common datatypes, and generating a PE table by merging the generated PEs for each of the plurality of common datatypes. Upon discovery that memory corruption has occurred, the invention may include transmitting a recorded state of the software program as a core dump file to a server, and using a dump utility to identify overlay content of the core dump file. Lastly, the invention may include identifying a possible source program of the memory corruption by matching the PE tables against the illegally-written overlay content.Type: ApplicationFiled: April 7, 2017Publication date: October 11, 2018Inventors: Guan Jun Liu, Niao Qing Liu, Ai Lian Mi, Jing Jing Wen, BEI CHUN ZHOU
-
Publication number: 20180247044Abstract: A system, method, and computer product for managing a password includes receiving a new password set by a user via a key input interface, generating a diagram based on key positions, on the key input interface, of a plurality of characters associated with said new password, storing a diagram into a memory device coupled to the processing device, and providing said diagram stored in the memory device to the user as a password hint.Type: ApplicationFiled: February 28, 2017Publication date: August 30, 2018Inventors: Guan Jun Liu, Niao Qing Liu, Ailian Mi, Jing Jing Wen, Bei Chun Zhou
-
Patent number: 9632818Abstract: A mechanism is provided for identifying a performance bottleneck of a transaction in a transaction processing system. At a predefined time point, status information of an interaction between the transaction and a processing component among one or more processing components in the transaction processing system is collected. A duration of the interaction on the basis of the status information is determined. In response to the duration exceeding a predefined threshold, the interaction is identified as the performance bottleneck of the transaction in order to make changes to the transaction processing system thereby improving performance.Type: GrantFiled: July 13, 2015Date of Patent: April 25, 2017Assignee: International Business Machines CorporationInventors: Ting Ting Huang, Guan Jun Liu, Niao Qing Liu, Ai Lian Mi, Bei Chun Zhou
-
Publication number: 20170109203Abstract: Embodiments of the present invention may schedule a task in a processing system. According to one embodiment of the present invention, a resource to be accessed by a task in a processing system is determined based on a type of a request for initiating the task. Then, a length of a task queue that records at least one task waiting for the resource is determined Next, the request is suspended in response to the length of the task queue being greater than a predefined threshold.Type: ApplicationFiled: October 15, 2015Publication date: April 20, 2017Inventors: Guan Jun Liu, Niao Qing Liu, Ai Lian Mi, Bei Chun Zhou
-
Publication number: 20160034301Abstract: A mechanism is provided for identifying a performance bottleneck of a transaction in a transaction processing system. At a predefined time point, status information of an interaction between the transaction and a processing component among one or more processing components in the transaction processing system is collected. A duration of the interaction on the basis of the status information is determined. In response to the duration exceeding a predefined threshold, the interaction is identified as the performance bottleneck of the transaction in order to make changes to the transaction processing system thereby improving performance.Type: ApplicationFiled: July 13, 2015Publication date: February 4, 2016Inventors: Ting Ting Huang, Guan Jun Liu, Niao Qing Liu, Ai Lian Mi, Bei Chun Zhou