Patents by Inventor Shao Chun Li

Shao Chun Li has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180018214
    Abstract: The present disclosure relates to identifying an origin/destination pair. Aspects include identifying an origin/destination pair in a service, which includes determining a current time when the current operation is executed in response to failure of a current operation for recording an origin/destination pair. Aspects also include determining a previous time when a last operation was executed for recording an origin/destination pair and identifying a missing point causing failure of the current operation based on a time interval between the current time and the previous time.
    Type: Application
    Filed: October 12, 2015
    Publication date: January 18, 2018
    Inventors: HAO CHEN, FENG LI, QI CHENG LI, SHAO CHUN LI, FANG QUAN XIE, XIN ZHOU
  • Patent number: 9823954
    Abstract: A method for predicting anomalies in a computer application includes during runtime of the computer application, detecting traffic metrics and incident tickets associated with the computer application, the incident ticket indicating an incident might occur in the computer application; calculating a threshold based on absolute values of second order differences associated with the traffic metrics, wherein the threshold is such that when the absolute value of the second order difference associated with the traffic metrics exceeds the threshold, a recall rate Rrecall that the computer application is recalled is maximized; obtaining predicted metrics of the computer application in a next time period based on the traffic metrics; and in response to an absolute value of a second order difference associated with the predicted metrics exceeding the threshold, predicting potential anomalies of the computer application in the next time period.
    Type: Grant
    Filed: June 22, 2015
    Date of Patent: November 21, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Wei Ye Chen, Juhnyoung Lee, Feng Li, Qi Cheng Li, Shao Chun Li, Rong Liu, Li Jun Mei, Wei Sun
  • Publication number: 20170316339
    Abstract: The methods, systems, and computer program products described herein provide optimized provisioning of replacement parts for service calls through the use of machine learning. In some aspects, historical hardware maintenance tickets may be processed to generate symptoms vectors identifying sets of symptoms associated with the hardware maintenance tickets. The symptoms vectors and corresponding parts usage records of the historical hardware maintenance tickets may be used train a decision model to predict a probability that a particular part will be used to fulfill the new hardware maintenance ticket. The predicted probability may be used by the system when generating a parts provisioning plan for the new hardware maintenance ticket.
    Type: Application
    Filed: April 29, 2016
    Publication date: November 2, 2017
    Inventors: Chang Sheng Li, Qi Cheng Li, Shao Chun Li, Soumitra Sarkar, Xin Zhou
  • Patent number: 9734556
    Abstract: A method for generating a tree map for tree map visualization includes obtaining node information of a plurality of nodes to be processed, the plurality of nodes to be processed being sub-nodes sharing a same parent node and the node information comprising at least sizes of the nodes; determining from the plurality of nodes a plurality of candidate nodes whose sizes are less than a threshold size; determining at least one super node including the plurality of candidate nodes based on the node information of the determined plurality of candidate nodes, a screen size, and the threshold size, such that when displaying in a zooming-in mode the super node on the screen, all candidate nodes in the super node are displayed at display sizes not less than the threshold size; and determining data required for displaying the tree map based on the determined super node.
    Type: Grant
    Filed: September 2, 2016
    Date of Patent: August 15, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Hao Chen, Ya Bin Dang, Howard M. Hess, Feng Li, Shao Chun Li, Xin Zhou
  • Patent number: 9734555
    Abstract: A method for generating a tree map for tree map visualization includes obtaining node information of a plurality of nodes to be processed, the plurality of nodes to be processed being sub-nodes sharing a same parent node and the node information comprising at least sizes of the nodes; determining from the plurality of nodes a plurality of candidate nodes whose sizes are less than a threshold size; determining at least one super node including the plurality of candidate nodes based on the node information of the determined plurality of candidate nodes, a screen size, and the threshold size, such that when displaying in a zooming-in mode the super node on the screen, all candidate nodes in the super node are displayed at display sizes not less than the threshold size; and determining data required for displaying the tree map based on the determined super node.
    Type: Grant
    Filed: June 22, 2015
    Date of Patent: August 15, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Hao Chen, Ya Bin Dang, Howard M. Hess, Feng Li, Shao Chun Li, Xin Zhou
  • Publication number: 20170220336
    Abstract: Aspects of the present invention generally relate to a system, method, and computer program product for transforming APIs from legacy system-of-record to new system-of-engagement using complete API process logic. API candidates are generated from execution traces for transforming the API from the legacy system to a new system of record. An embodiment of the invention is first, add implementers into a legacy systems and collect the instrumenter output as execution traces. Second, rank the execution traces and find the most frequent execution traces. Third, consolidate the execution traces by merging common trace segments. The codes covered by the consolidated execution traces will be considered as candidate API components. Fourth, expand the merged execution traces and find related execution traces and check the connectivity between different nodes.
    Type: Application
    Filed: February 2, 2016
    Publication date: August 3, 2017
    Inventors: Hao Chen, Ya Bin Dang, Shao Chun Li, Guang Tai Liang, Li Jun Mei, Zhenyu Zhang
  • Publication number: 20170161170
    Abstract: A method for predicting anomalies in a computer application includes during runtime of the computer application, detecting traffic metrics and incident tickets associated with the computer application, the incident ticket indicating an incident might occur in the computer application; calculating a threshold based on absolute values of second order differences associated with the traffic metrics, wherein the threshold is such that when the absolute value of the second order difference associated with the traffic metrics exceeds the threshold, a recall rate Rrecall that the computer application is recalled is maximized; obtaining predicted metrics of the computer application in a next time period based on the traffic metrics; and in response to an absolute value of a second order difference associated with the predicted metrics exceeding the threshold, predicting potential anomalies of the computer application in the next time period.
    Type: Application
    Filed: January 27, 2017
    Publication date: June 8, 2017
    Inventors: Wei Ye Chen, Juhnyoung Lee, Feng Li, Qi Cheng Li, Shao Chun Li, Rong Liu, Li Jun Mei, Wei Sun
  • Publication number: 20170126474
    Abstract: Technical solutions to automate alert remediation are described. One aspect includes a method that includes receiving a plurality of alerts from an application monitoring system, the plurality of alerts associated with a plurality of remediation procedures respectively. The method also includes selecting a subset of alerts from the plurality of alerts. The method also includes identifying a subset of remediation procedures corresponding to the subset of alerts and analyzing compliance, with a service level agreement, of an execution of the entire subset of remediation procedures. In response to the execution of the entire subset of remediation procedures being non-compliant, the latest alert that was added, is removed from the subset of alerts, and a remediation procedure corresponding to the latest alert is removed from the subset of remediation procedures. The method includes executing the entire subset of remediation procedures.
    Type: Application
    Filed: November 30, 2015
    Publication date: May 4, 2017
    Inventors: HAO CHEN, YA BIN DANG, SHAO CHUN LI, GUANG TAI LIANG
  • Publication number: 20170126523
    Abstract: Technical solutions to automate alert remediation are described. One aspect includes a method that includes receiving a plurality of alerts from an application monitoring system, the plurality of alerts associated with a plurality of remediation procedures respectively. The method also includes selecting a subset of alerts from the plurality of alerts. The method also includes identifying a subset of remediation procedures corresponding to the subset of alerts and analyzing compliance, with a service level agreement, of an execution of the entire subset of remediation procedures. In response to the execution of the entire subset of remediation procedures being non-compliant, the latest alert that was added, is removed from the subset of alerts, and a remediation procedure corresponding to the latest alert is removed from the subset of remediation procedures. The method includes executing the entire subset of remediation procedures.
    Type: Application
    Filed: November 3, 2015
    Publication date: May 4, 2017
    Inventors: HAO CHEN, YA BIN DANG, SHAO CHUN LI, GUANG TAI LIANG
  • Publication number: 20170103128
    Abstract: A computer-implemented method for searching for a ticket relevant to a current ticket describing an incident, a system and a computer program product for the same. The method includes extracting a topology of a first application of a server system, the first application being indicated by the current ticket; selecting a second application relevant to the first application from a plurality of candidate applications of the server system, according to the topology; and searching tickets associated with the second application for the ticket relevant to the current ticket.
    Type: Application
    Filed: October 7, 2015
    Publication date: April 13, 2017
    Inventors: Feng Li, Qi Cheng Li, Shao Chun Li, Rong Liu, Li Jun Mei
  • Publication number: 20170097823
    Abstract: Method and systems for tagging code include building a code structure based description unit association model (CDAM) that associates code units with respective description units and organizes the code units in a hierarchical structure. The CDAM is filtered to remove un-meaningful description units through cross-validation between code units. Feature tags are generated based on a weighted sum of term frequencies in the description units of the CDAM to associate features with respective code units.
    Type: Application
    Filed: October 5, 2015
    Publication date: April 6, 2017
    Inventors: Yi-Min Chee, Hao Chen, Ya Bin Dang, Shao Chun Li, Guang Tai Liang, Li Jun Mei
  • Publication number: 20170083842
    Abstract: Embodiments of the present invention may evaluate a conflict risk between parallel projects. According to one embodiment of the present invention, a dependency risk between a first project and a second project is determined based on an artifact submission history of a historical project. Then an overlap risk between the first and second projects is determined based on time schedules of the first and second projects. Next, a conflict risk between the first and second projects is evaluated based on the dependency risk and the overlap risk. Further, embodiments of the present invention may optimize the time schedules of parallel projects thereby enabling parallelization of projects.
    Type: Application
    Filed: September 21, 2015
    Publication date: March 23, 2017
    Inventors: Hao Chen, Claudio Cozzi, Ya Bin Dang, Howard M. Hess, Steven M. Kagan, Feng Li, Shao Chun Li, Jeffrey Lewis Robinson, Xin Zhou
  • Publication number: 20170083843
    Abstract: Embodiments of the present invention may evaluate a conflict risk between parallel projects. According to one embodiment of the present invention, a dependency risk between a first project and a second project is determined based on an artifact submission history of a historical project. Then an overlap risk between the first and second projects is determined based on time schedules of the first and second projects. Next, a conflict risk between the first and second projects is evaluated based on the dependency risk and the overlap risk. Further, embodiments of the present invention may optimize the time schedules of parallel projects thereby enabling parallelization of projects.
    Type: Application
    Filed: December 1, 2015
    Publication date: March 23, 2017
    Inventors: Hao Chen, Claudio Cozzi, Ya Bin Dang, Howard M. Hess, Steven M. Kagan, Feng Li, Shao Chun Li, Jeffrey Lewis Robinson, Xin Zhou
  • Publication number: 20170068721
    Abstract: Computer-implemented method for searching for information related to an incident generated in a server system, a system and a computer program product. The method includes extracting context information from a current ticket describing the incident, the context information including a first expression describing a symptom of the incident and indicating at least one component of the server system associated with the symptom; determining a data source which generates data in which the information related to the incident is to be searched for at least according to the at least one component; and using the first expression describing the symptom and a second different expression describing the symptom as keywords to search for the information related to the incident in the data.
    Type: Application
    Filed: September 8, 2015
    Publication date: March 9, 2017
    Inventors: Girish B. Chafle, Qi Cheng LI, Shao Chun Li, Anindya Neogi
  • Publication number: 20170061792
    Abstract: Integration of personalized traffic information is provided. Contextual information for a client device is collected. Based, at least in part, on the contextual information, traffic information is received. The traffic information is received from one or more broadcast stations to which the traffic information has been mapped based, at least in part, on classification of the traffic information. A communications device is caused to communicate the traffic information.
    Type: Application
    Filed: August 24, 2015
    Publication date: March 2, 2017
    Inventors: Ya Bin Dang, Feng Li, Qi Cheng Li, Shao Chun Li, Guang Tai Liang, Xin Zhou
  • Patent number: 9582270
    Abstract: A fine-grained behavior model matching based method and system for effective feature location in large legacy systems. A feature behavior analyzer extracts internal behaviors of a feature under requesting based on NLP techniques or writing rules of the feature specification and generates a feature behavior model. A method uses multiple information sources associated with each method under analyzing to generate an expressive behavior signature for each method. The method integrates control flow information of each method and the signature information of its callees, and generates a CFG-based behavior model. A feature location identifier identifies and ranks the feature-related code locations based on a similarity between the feature behavior and the code behavior models.
    Type: Grant
    Filed: April 30, 2015
    Date of Patent: February 28, 2017
    Assignee: International Business Machines Corporation
    Inventors: Hao AC Chen, Ya Bin Dang, Shao Chun Li, Guang Tai LT Liang, Li Jun Mei
  • Patent number: 9582344
    Abstract: A method for predicting anomalies in a computer application includes during runtime of the computer application, detecting traffic metrics and incident tickets associated with the computer application, the incident ticket indicating an incident might occur in the computer application; calculating a threshold based on absolute values of second order differences associated with the traffic metrics, wherein the threshold is such that when the absolute value of the second order difference associated with the traffic metrics exceeds the threshold, a recall rate Rrecall that the computer application is recalled is maximized; obtaining predicted metrics of the computer application in a next time period based on the traffic metrics; and in response to an absolute value of a second order difference associated with the predicted metrics exceeding the threshold, predicting potential anomalies of the computer application in the next time period.
    Type: Grant
    Filed: January 26, 2015
    Date of Patent: February 28, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Wei Ye Chen, Juhnyoung Lee, Feng Li, Qi Cheng Li, Shao Chun Li, Rong Liu, Li Jun Mei, Wei Sun
  • Patent number: 9575799
    Abstract: Analyzing task associations may compute artifact associations for a plurality of artifacts based on historical task submission logs. From the computed artifact associations, shared artifacts that have artifact association with targeted artifacts that are associated with planned tasks, may be determined. Task association between the planned tasks may be identified based on the shared artifacts. Task associations may be analyzed to determine one or more of task assignment and task schedule for the planned tasks.
    Type: Grant
    Filed: July 11, 2014
    Date of Patent: February 21, 2017
    Assignee: International Business Machines Corporation
    Inventors: Shivali Agarwal, Yi-Min Chee, Hao Chen, Ya Bin Dang, Feng Li, Shao Chun Li, Rong Liu, Renuka Sindhgatta, Xin Zhou
  • Publication number: 20160371814
    Abstract: A method for generating a tree map for tree map visualization includes obtaining node information of a plurality of nodes to be processed, the plurality of nodes to be processed being sub-nodes sharing a same parent node and the node information comprising at least sizes of the nodes; determining from the plurality of nodes a plurality of candidate nodes whose sizes are less than a threshold size; determining at least one super node including the plurality of candidate nodes based on the node information of the determined plurality of candidate nodes, a screen size, and the threshold size, such that when displaying in a zooming-in mode the super node on the screen, all candidate nodes in the super node are displayed at display sizes not less than the threshold size; and determining data required for displaying the tree map based on the determined super node.
    Type: Application
    Filed: September 2, 2016
    Publication date: December 22, 2016
    Inventors: Hao Chen, Ya Bin Dang, Howard M. Hess, Feng Li, Shao Chun Li, Xin Zhou
  • Publication number: 20160321069
    Abstract: A fine-grained behavior model matching based method and system for effective feature location in large legacy systems. A feature behavior analyzer extracts internal behaviors of a feature under requesting based on NLP techniques or writing rules of the feature specification and generates a feature behavior model. A method uses multiple information sources associated with each method under analyzing to generate an expressive behavior signature for each method. The method integrates control flow information of each method and the signature information of its callees, and generates a CFG-based behavior model. A feature location identifier identifies and ranks the feature-related code locations based on a similarity between the feature behavior and the code behavior models.
    Type: Application
    Filed: April 30, 2015
    Publication date: November 3, 2016
    Inventors: Hao AC Chen, Ya Bin Dang, Shao Chun Li, Guang Tai LT Liang, Li Jun Mei