Patents by Inventor Xiao LING

Xiao LING has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230185703
    Abstract: Disclosed is an automatic parsing and path analysis method for a unit test code structure. The method comprises: acquiring compiled byte codes according to a language of a test program; traversing the complied byte codes, making instrumentation codes respectively in front of important statements, and acquiring node information and a small-segment path set (SSPS); analyzing the SSPS, replacing a part therein comprising nesting to obtain a SSPS excluding nesting as a basis, initializing a path table among the nodes, updating the path table by utilizing a depth-first algorithm, and obtaining path sets according to the path table; if all the path sets have been updated, returning to continuously update the path table; and outputting the acquired path sets and a program flowchart CFG obtained by analysis. The method above is capable of acquiring the path sets efficiently, thereby improving the capability of processing path analysis in actual software unit test.
    Type: Application
    Filed: October 28, 2021
    Publication date: June 15, 2023
    Applicant: SOUTH CHINA UNIVERSITY OF TECHNOLOGY
    Inventors: Fangqing LIU, Han HUANG, Xiao LING, Feng LIN, Jie CAO, Shaoyang ZHUANG, Zhifeng HAO
  • Patent number: 11675575
    Abstract: A computer-implemented method includes receiving, by a processor, an updated version of a computer program that includes several source code changes. A compiler preprocesses the source code changes for a target computing platform. The preprocessing includes identifying a compile time condition associated with one or more computer instructions enclosed by a macro, determining a current value of the compile time condition at the time of compiling, and determining corresponding object code based on the current value. Further, a macro information record for the macro is generated that includes the compile time condition, the current value, and an identification of the computer instructions. Further, a linker preprocesses the source code changes. This preprocessing includes determining that the object code is not included in an executable file, and updating the macro information record to indicate that the macro is not included in the executable file.
    Type: Grant
    Filed: September 13, 2022
    Date of Patent: June 13, 2023
    Assignee: International Business Machines Corporation
    Inventors: Wen Ji Huang, Xiao Ling Chen, Sheng Shuang Li, Wen Bin Han, Jun Su
  • Publication number: 20230114540
    Abstract: A computer-implemented method includes receiving, by a processor, an updated version of a computer program that includes several source code changes. A compiler preprocesses the source code changes for a target computing platform. The preprocessing includes identifying a compile time condition associated with one or more computer instructions enclosed by a macro, determining a current value of the compile time condition at the time of compiling, and determining corresponding object code based on the current value. Further, a macro information record for the macro is generated that includes the compile time condition, the current value, and an identification of the computer instructions. Further, a linker preprocesses the source code changes. This preprocessing includes determining that the object code is not included in an executable file, and updating the macro information record to indicate that the macro is not included in the executable file.
    Type: Application
    Filed: September 13, 2022
    Publication date: April 13, 2023
    Inventors: Wen Ji Huang, Xiao Ling Chen, Sheng Shuang Li, Wen Bin Han, Jun Su
  • Publication number: 20230115334
    Abstract: A computer-implemented method includes preprocessing, by a compiler, a plurality of macros in a computer program. Preprocessing a macro includes identifying a compile time condition associated with the macro. Preprocessing the macro further includes determining a current value of the compile time condition at the time of compiling a computer instruction and a previous value of the compile time condition. Preprocessing the macro further includes determining a set of computer instructions enclosed by the macro. The method further includes storing a macro information record that includes the compile time condition, the current value and the previous value of the compile time condition, and an identification of the set of computer instructions enclosed by the macro.
    Type: Application
    Filed: October 11, 2021
    Publication date: April 13, 2023
    Inventors: Wen Ji HUANG, Xiao Ling CHEN, Wen Bin HAN, Sheng Shuang LI, Xiao Zhen ZHU
  • Patent number: 11620394
    Abstract: A computer-implemented method for use with a database computer system including a database data set that includes machine readable data in the form of a plurality of records, the computer-implemented method comprising: (i) defining a plurality of sets of permission rule(s); (ii) receiving a first user profile for a first user; (iii) establishing a plurality of user identities to the first user; (iv) generating a plurality of tokens; and (v) for each given user identity of the first user, adding a given token of the plurality of tokens to the first user profile and associating the given user identity and the given token.
    Type: Grant
    Filed: December 22, 2020
    Date of Patent: April 4, 2023
    Assignee: International Business Machines Corporation
    Inventors: Yuan Yuan, Xiao Ling Chen, Xiao Yang Li, Qun Wei, Hong Liang Zhao, Yu Fang
  • Publication number: 20230102795
    Abstract: A method, computer program product, and computer system for implementing tasks on managed nodes. A specified task to be performed by an Ansible module on one or more managed nodes of two or more managed nodes is received. The one or more managed nodes are determined based on an attribute value of a hostDecision attribute of the Ansible module. The attribute value may be primaryNode, allNodes, or Dynamic, where: primary Node requires the one or more managed nodes to be a primary node, allNodes requires the one or more managed nodes to be the two or more managed nodes, and Dynamic requires the one or more managed nodes to be determined dynamically based on runtime information. The Ansible module is sent to the one or more managed nodes to perform the task on the one or more managed nodes.
    Type: Application
    Filed: September 30, 2021
    Publication date: March 30, 2023
    Inventors: Xiao Zhen Zhu, Xiao Ling Chen, Yang Cao, Yun Juan Yang
  • Publication number: 20230092747
    Abstract: Embodiments of the invention include a computer-implemented method that includes accessing, using a processor, a loader library; using the processor to generate a mock library comprising a mock version of the loader library; using the processor to containerize the loader library; and using the processor to unload the loader library.
    Type: Application
    Filed: September 22, 2021
    Publication date: March 23, 2023
    Inventors: Heng Wang, Wan Yue Chen, Zhen Chen, Wen Ji Huang, Xiao Ling Chen, Dong Chen
  • Publication number: 20230092902
    Abstract: Embodiments relate to progressively validating access token. In response to intercepting an initial call for a transaction for a service from a client, a token is validated for the initial call of the transaction for the service, the validating including contacting an authentication sever and locally storing a time to live received for the token. In response to intercepting at least one successive call for the transaction for the service from the client, it is determined that the token for the at least one successive call is valid based on the time to live locally saved. The at least one successive call for the transaction for the service is permitted to pass without contacting the authentication sever.
    Type: Application
    Filed: September 20, 2021
    Publication date: March 23, 2023
    Inventors: Peng Hui Jiang, Xin Peng Liu, Wei Wu, Xiao Ling Chen
  • Publication number: 20230084206
    Abstract: Embodiments relate to methods, systems, and computer program products for path management in a processing system. In a method, in response to receiving a request for adding a target controlling unit into a processing system, a plurality of network nodes in the processing system are divided into a group of subnets based on a topology of the plurality of network nodes, the plurality of network nodes being connected to at least one controlling unit in the processing system. A workload estimation is determined, the workload estimation representing a workload to be caused by the target controlling unit to the processing system. A target subnet is selected from the group of subnets for connecting the target controlling unit into the processing system based on the workload estimation. With these embodiments, the target subnet may be selected in an automatic way such that the performance of the processing system may be increased.
    Type: Application
    Filed: September 16, 2021
    Publication date: March 16, 2023
    Inventors: YAN HUANG, HENG WANG, KAI FENG, ZHENG LEI AN, SHUANG SHUANG JIA, XIAO LING CHEN, GUANG HAN SUI, LEI WANG
  • Publication number: 20230068521
    Abstract: Embodiments of the invention include a computer-implemented method that uses a processor to access cryptographic-function constraints associated with an encrypted message. Based on a determination that the cryptographic-function constraints do not include mandatory cryptographic computing resource requirements, first resource-scaling operations are performed that include an analysis of cryptographic metrics associated with a processor. The cryptographic metrics include information associated with the encrypted message, along with performance measurements of cryptographic functions performed by the processor.
    Type: Application
    Filed: August 25, 2021
    Publication date: March 2, 2023
    Inventors: Heng Wang, Wan Yue Chen, Chen Guang Liu, Jing Li, Xiao Ling Chen, Peng Hui Jiang
  • Publication number: 20230015617
    Abstract: Compounds of the formula (I): wherein A and B together represent an optionally substituted, fused aromatic ring; X can be NRX or CRXRY; if X=NRX then n is 1 or 2 and if X=CRXRY then n is 1; RX is selected from the group consisting of H, optionally substituted C1-20 alkyl, C5-20 aryl, C3-20 heterocyclyl, amido, thioamido, ester, acyl, and sulfonyl groups; RY is selected from H, hydroxy, amino; or RX and RY may together form a spiro-C3-7 cycloalkyl or heterocyclyl group; RC1 and RC2 are both hydrogen, or when X is CRXRY, RC1, RC2, RX and RY, together with the carbon atoms to which they are attached, may form an optionally substituted fused aromatic ring; and R1 is selected from H and halo.
    Type: Application
    Filed: September 9, 2021
    Publication date: January 19, 2023
    Inventors: Niall Morrison Barr Martin, Graeme Cameron Smith, Stephen Philip Jackson, Vincent M. Loh, Xiao-Ling Fan Cockcroft, Ian Timothy Williams Matthews, Keith Allan Menear, Frank Kerrigan, Alan Ashworth
  • Publication number: 20230004419
    Abstract: A resource migration method includes obtaining virtual resource utilization of a virtual machine, inputting the virtual resource utilization of the virtual machine into an identification model, determining a resource type of the virtual machine, obtaining physical resource utilization of the at least one physical host, inputting the physical resource utilization of the at least one physical host into the identification model, determining a resource type of each of the at least one physical host, and migrating the virtual machine to one of the at least one physical host based on the resource type of the virtual machine and the resource type of each of the at least one physical host.
    Type: Application
    Filed: September 8, 2022
    Publication date: January 5, 2023
    Inventors: Leiming Du, Shuming Jing, Xiao Ling
  • Publication number: 20220417007
    Abstract: In an approach, a processor obtains an encrypted data key and a first encrypted protection key from a storage device. A processor sends the first encrypted protection key to a first device. A processor obtains a protection key from the first device, wherein the protection key is generated by the first device through decrypting the first encrypted protection key. A processor decrypts the encrypted data key using the protection key to obtain a data key.
    Type: Application
    Filed: June 24, 2021
    Publication date: December 29, 2022
    Inventors: Hong Qing Zhou, Yan Lin Ren, Zong Xiong ZX Wang, Zhang Li, Xiao Ling Chen
  • Publication number: 20220365865
    Abstract: Methods, computer program products, and/or systems are provided that perform the following operations: determining that a log multi-process debug mode is specified; obtaining a log file for debugging a source code, wherein the log file includes a plurality of log records; inserting a plurality of process identifier fields into each current log record in the log file; inserting a new log record into the log file for a created new process; and providing for performance of debugging for the source code based in part on the plurality of process identifier fields inserted into each current log record.
    Type: Application
    Filed: May 14, 2021
    Publication date: November 17, 2022
    Inventors: Xiao Ling Chen, Qi Ye, Wen Ji Huang, Heng Wang, Kui Zhang
  • Patent number: 11481200
    Abstract: A computer-implemented method includes receiving, by a processor, an updated version of a computer program that includes several source code changes. A compiler preprocesses the source code changes for a target computing platform. The preprocessing includes identifying a compile time condition associated with one or more computer instructions enclosed by a macro, determining a current value of the compile time condition at the time of compiling, and determining corresponding object code based on the current value. Further, a macro information record for the macro is generated that includes the compile time condition, the current value, and an identification of the computer instructions. Further, a linker preprocesses the source code changes. This preprocessing includes determining that the object code is not included in an executable file, and updating the macro information record to indicate that the macro is not included in the executable file.
    Type: Grant
    Filed: October 11, 2021
    Date of Patent: October 25, 2022
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Wen Ji Huang, Xiao Ling Chen, Sheng Shuang Li, Wen Bin Han, Jun Su
  • Patent number: 11455033
    Abstract: A device and a method for performing automatic adjustment and optimization display for a visible area of a screen is provided. The method includes determining position information of a viewer and the screen according to a face recognition algorithm, and determining an optimal visible area for the viewer according to a human eye view range algorithm, and adjusting a visible area of the screen according to the optimal visible area to obtain a size and layout of the visible area most suitable for viewing by the viewer.
    Type: Grant
    Filed: September 22, 2020
    Date of Patent: September 27, 2022
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Liangliang Zhang, Fangqin Huang, Yan Liu, Junqing Ma, Xiao Ling
  • Patent number: 11435276
    Abstract: Provided is a medium evaluation method for evaluating the suitability of a medium in which cell aggregates are cultured in a suspended state, by which an evaluation of whether a medium is adequate for both the cell retention performance and the cell recovery efficiency, the medium evaluation method including dispersing a plurality of particles in a medium, measuring a sedimentation velocity by which the particles settle in the medium, and using the sedimentation velocity thus measured as an index value indicating the suitability of the medium; and also provided are a medium and a culture method.
    Type: Grant
    Filed: March 26, 2019
    Date of Patent: September 6, 2022
    Assignee: FUJIFILM CORPORATION
    Inventors: Xiao Ling, Kiyokazu Hashimoto, Haruki Tomikawa
  • Publication number: 20220215064
    Abstract: A method, a computer program product and a computer system refine Internet search recommendations. The method includes receiving a search input from a user. The method also includes receiving a plurality of sets of search results from respective search engines. Each search engine utilizes a respective type of search process. Each of the sets of the search results for a selected one of the search engines is prioritized according to the type of the search process. The method further includes applying respective weights to the search engines such that the sets of search results have a modified priority based on the weights. The weights are associated with the user. Finally, the method includes generating modified search results based on the sets of search results, the weights, and the modified priority.
    Type: Application
    Filed: January 4, 2021
    Publication date: July 7, 2022
    Inventors: Jing James Xu, YI SHAO, Xiao Ling Yang, Lei Gao
  • Publication number: 20220198031
    Abstract: A computer-implemented method for use with a database computer system including a database data set that includes machine readable data in the form of a plurality of records, the computer-implemented method comprising: (i) defining a plurality of sets of permission rule(s); (ii) receiving a first user profile for a first user; (iii) establishing a plurality of user identities to the first user; (iv) generating a plurality of tokens; and (v) for each given user identity of the first user, adding a given token of the plurality of tokens to the first user profile and associating the given user identity and the given token.
    Type: Application
    Filed: December 22, 2020
    Publication date: June 23, 2022
    Inventors: Yuan Yuan, Xiao Ling Chen, Xiao Yang Li, Qun Wei, Hong Liang Zhao, Yu Fang
  • Patent number: 11368459
    Abstract: Methods, computer program products, and/or systems are provided that can perform the following operations: receiving a connection request from a first user device; creating an authentication container for the first user device; authenticating the first user device using the authentication container; in response to authentication for the first user device being successful, creating a first user request processing container for the first user device; and processing user requests received from the first user device using the first user request processing container.
    Type: Grant
    Filed: September 30, 2020
    Date of Patent: June 21, 2022
    Assignee: International Business Machines Corporation
    Inventors: Heng Wang, Xiao Ling Chen, Chen Guang Liu, Wen Qi WQ Ye, Fei Tan, Lu Lu, Jing Li, Qing Yu Pei