Patents by Inventor Xiao Xi Liu
Xiao Xi Liu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12056095Abstract: Methods and systems for managing persistent volumes include mounting a distributed filesystem, located outside the processing node, to a local mount point on the processing node. Access to the local mount point is given to a container on the processing node.Type: GrantFiled: December 23, 2020Date of Patent: August 6, 2024Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jian Ma, Guang Cheng Li, Jing Min Xu, Xiao Xi Liu, Yuan Wang, Lin Yang
-
Patent number: 11734439Abstract: Methods and systems for secure data analysis include determining that analysis provider access rules and data provider access rules are compatible. Analysis software is received from an analysis provider and a dataset is received from a data provider. The analysis software is executed on the dataset to generate an analysis output, with access to data in the dataset being constrained by the analysis provider access rules and the data provider access rules. An output of the analysis is sent to the analysis provider.Type: GrantFiled: October 18, 2018Date of Patent: August 22, 2023Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Bo Yang, Pei Ni Liu, Xiao Xi Liu, Anca Sailer
-
Patent number: 11586972Abstract: A computer-implemented method is presented for automatically generating alerting rules. The method includes identifying, via offline analytics, abnormal patterns and normal patterns from history logs based on machine learning, statistical analysis and deep learning, the history logs stored in a history log database, automatically generating the alerting rules based on the identified abnormal and normal patterns, and transmitting the alerting rules to an alerting engine for evaluation. The method further includes receiving a plurality of online log messages from a plurality of computing devices connected to a network, augmenting the plurality of online log messages, and extracting information from the plurality of augmented online log messages to be provided to the alerting engine, the alerting engine configured to approve and enforce the alerting rules automatically generated by the offline analytics processing.Type: GrantFiled: November 19, 2018Date of Patent: February 21, 2023Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Yuan Wang, Lin Yang, Xiao Xi Liu, Fan Jing Meng, Jing Min Xu, William V. Da Palma, Sandhya Kapoor, Takayuki Kushida, Hiroki Nakano
-
Patent number: 11567809Abstract: Methods and systems for deploying images to computing systems include predicting an environment for a plurality of processing nodes. Image deployment to the plurality of processing nodes is simulated to determine a subset of the plurality of processing nodes for deployment. One or more images is pre-loaded to the subset of the plurality of processing nodes in advance of a deployment time.Type: GrantFiled: October 31, 2018Date of Patent: January 31, 2023Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Yuan Wang, Guang Cheng Li, Jing Min Xu, Xiao Xi Liu, Jian Ma, Lin Yang
-
Patent number: 11556805Abstract: Performing an operation comprising transforming an input dataset to a predefined format, extracting, from the transformed dataset, a plurality of features describing the transformed dataset, and generating, by a machine learning (ML) algorithm executing on a processor and based on an ML model, a plurality of rules for modifying the transformed dataset to conform with a first data model.Type: GrantFiled: February 21, 2018Date of Patent: January 17, 2023Assignee: International Business Machines CorporationInventors: Yu Gu, Dingcheng Lil, Pei Ni Liu, Xiao Xi Liu, Daniel Dean, Yaoping Ruan, Jing Min Xu
-
Patent number: 11249960Abstract: Embodiments generally relate transforming data for a target schema. In some embodiments, a method includes receiving input data, where the input data includes a plurality of segments, and where the segments include a plurality of source fields containing target data. The method further includes characterizing the input data based at least in part on a plurality of predetermined metrics, where the predetermined metrics determine a structure of the input data. The method further includes mapping the target data in the source fields of the segments to a plurality of target fields of a target schema based at least in part on the characterizing. The method further includes populating the target fields of the target schema with the target data from the source fields based at least in part on the mapping.Type: GrantFiled: June 11, 2018Date of Patent: February 15, 2022Assignee: International Business Machines CorporationInventors: Daniel Dean, Checed A. Rodgers, Dingcheng Li, Pei Ni Liu, Xiao Xi Liu, Hui Lei, Yu Gu, Jing Min Xu, Yaoping Ruan
-
Patent number: 11113075Abstract: Embodiments of the present invention relate to a computer-implemented method, system and computer program product facilitating launching a middleware-based application. In some embodiments, a computer-implemented method includes: preparing, by a device operatively coupled to one or more processing units, an execution environment for middleware to be included in a container hosted on a machine; detecting, by the device, a request to schedule an application to be executed in the machine using the middleware; and in response to the request being detected, launching, by the device, the application within the container based on the prepared execution environment.Type: GrantFiled: November 14, 2018Date of Patent: September 7, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Guang Cheng Li, Yuan Wang, Xiao Xi Liu, Jian Ma, Jing Min Xu, Lin Yang
-
Patent number: 11055192Abstract: A log augmentation system is provided for augmenting log management in a distributed micro-services environment. The log augmentation system includes a trigger device for triggering an augmentation process responsive to micro-service related events and a context of the micro-service related events. The log augmentation system further includes an augmentation rules database with rule management components for determining an augment direction, an augmentation target, and an augmentation correlation relating to the distributed micro-services. The log augmentation system also includes a coordinator for coordinating the augmentation process in the distributed micro-service using a rule-based decision approach. The log augmentation system additionally includes a labeler for applying a set of labels to augment log entries responsive to instructions from the coordinator derived from results of the rule-based decision approach used by the coordinator.Type: GrantFiled: September 27, 2018Date of Patent: July 6, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Lin Yang, Yuan Wang, Guang Cheng Li, Jing Min Xu, Jian Ma, Xiao Xi Liu
-
Publication number: 20210117386Abstract: Methods and systems for managing persistent volumes include mounting a distributed filesystem, located outside the processing node, to a local mount point on the processing node. Access to the local mount point is given to a container on the processing node.Type: ApplicationFiled: December 23, 2020Publication date: April 22, 2021Inventors: Jian Ma, Guang Cheng Li, Jing Min Xu, Xiao Xi Liu, Yuan Wang, Lin Yang
-
Patent number: 10977005Abstract: A service running on a server for developing software collaboratively. The service includes accessing at least one repository of code for software applications. A code tree structure is extracted from the repository which represents a plurality of preexisting pipeline requirements to be used with a tree kernel similarity algorithm. At least one development repository of code is accessed. A code tree structure is extracted from the development repository of code which represents a new pipeline requirement to be used with a tree kernel similarity algorithm. A tree kernel similarity algorithm is used that includes a specified similarity function to create feature map between the new pipeline requirements with the preexisting pipeline requirements. One or more features of the new pipe line requirements are clustered. Different requirements are extracted to different definitions based upon the features that have been clustered. A preexisting pipeline requirement is selected for a highest similarity.Type: GrantFiled: June 14, 2017Date of Patent: April 13, 2021Assignee: International Business Machines CorporationInventors: Xiao Xi Liu, Jing Min Xu, Yuan Wang, Jian Ming Zhang
-
Patent number: 10901954Abstract: Methods and systems for managing persistent volumes include receiving a request from a container on a processing node to access a local mount point. A distributed filesystem located outside the processing node is mounted to a local mount point. Access to the local mount point is provided to the container.Type: GrantFiled: November 5, 2018Date of Patent: January 26, 2021Assignee: International Business Machines CorporationInventors: Jian Ma, Guang Cheng Li, Jing Min Xu, Xiao Xi Liu, Yuan Wang, Lin Yang
-
Patent number: 10838702Abstract: Computer technology facilitating optimization of a container image is provided. In one example, a computer-implemented method includes: analyzing a source container image to obtain a content of the source container image and building an initial target container image using a set of base image layers based on the content of the source container image. The computer-implemented method also includes determining content difference between the initial target container image and the source container image, and building a final target container image based on the initial target container image and the content difference.Type: GrantFiled: November 9, 2018Date of Patent: November 17, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Guang Cheng Li, Yuan Wang, Xiao Xi Liu, Jian Ma, Lin Yang, Jing Min Xu
-
Publication number: 20200160230Abstract: A computer-implemented method is presented for automatically generating alerting rules. The method includes identifying, via offline analytics, abnormal patterns and normal patterns from history logs based on machine learning, statistical analysis and deep learning, the history logs stored in a history log database, automatically generating the alerting rules based on the identified abnormal and normal patterns, and transmitting the alerting rules to an alerting engine for evaluation. The method further includes receiving a plurality of online log messages from a plurality of computing devices connected to a network, augmenting the plurality of online log messages, and extracting information from the plurality of augmented online log messages to be provided to the alerting engine, the alerting engine configured to approve and enforce the alerting rules automatically generated by the offline analytics processing.Type: ApplicationFiled: November 19, 2018Publication date: May 21, 2020Inventors: Yuan Wang, Lin Yang, Xiao Xi Liu, Fan Jing Meng, Jing Min Xu, William V. Da Palma, Sandhya Kapoor, Takayuki Kushida, Hiroki Nakano
-
Publication number: 20200150974Abstract: Embodiments of the present invention relate to a computer-implemented method, system and computer program product facilitating launching a middleware-based application. In some embodiments, a computer-implemented method includes: preparing, by a device operatively coupled to one or more processing units, an execution environment for middleware to be included in a container hosted on a machine; detecting, by the device, a request to schedule an application to be executed in the machine using the middleware; and in response to the request being detected, launching, by the device, the application within the container based on the prepared execution environment.Type: ApplicationFiled: November 14, 2018Publication date: May 14, 2020Inventors: Guang Cheng Li, Yuan Wang, Xiao Xi Liu, Jian Ma, Jing Min Xu, Lin Yang
-
Publication number: 20200150940Abstract: A computer-implemented method, computer system, and computer program product that facilitates optimization of container image are disclosed. A computer-implemented method includes: analyzing, by the one or more processing units, a source container image to obtain a content of the source container image; building, by the one or more processing units, an initial target container image using a set of base image layers based on the content of the source container image; determining, by the one or more processing units, a content difference between the initial target container image and the source container image; and building, by the one or more processing units, a final target container image based on the initial target container image and the content difference.Type: ApplicationFiled: November 9, 2018Publication date: May 14, 2020Inventors: Guang Cheng Li, Yuan Wang, Xiao Xi Liu, Jian Ma, Lin Yang, Jing Min Xu
-
Publication number: 20200142975Abstract: Methods and systems for managing persistent volumes include receiving a request from a container on a processing node to access a local mount point. A distributed filesystem located outside the processing node is mounted to a local mount point. Access to the local mount point is provided to the container.Type: ApplicationFiled: November 5, 2018Publication date: May 7, 2020Inventors: Jian Ma, Guang Cheng Li, Jing Min Xu, Xiao Xi Liu, Yuan Wang, Lin Yang
-
Publication number: 20200133740Abstract: Methods and systems for deploying images to computing systems include predicting an environment for a plurality of processing nodes. Image deployment to the plurality of processing nodes is simulated to determine a subset of the plurality of processing nodes for deployment. One or more images is pre-loaded to the subset of the plurality of processing nodes in advance of a deployment time.Type: ApplicationFiled: October 31, 2018Publication date: April 30, 2020Inventors: Yuan Wang, Guang Cheng Li, Jing Min Xu, Xiao Xi Liu, Jian Ma, Lin Yang
-
Publication number: 20200125753Abstract: Methods and systems for secure data analysis include determining that analysis provider access rules and data provider access rules are compatible. Analysis software is received from an analysis provider and a dataset is received from a data provider. The analysis software is executed on the dataset to generate an analysis output, with access to data in the dataset being constrained by the analysis provider access rules and the data provider access rules. An output of the analysis is sent to the analysis provider.Type: ApplicationFiled: October 18, 2018Publication date: April 23, 2020Inventors: Bo Yang, Pei Ni Liu, Xiao Xi Liu, Anca Sailer
-
Publication number: 20200104226Abstract: A log augmentation system is provided for augmenting log management in a distributed micro-services environment. The log augmentation system includes a trigger device for triggering an augmentation process responsive to micro-service related events and a context of the micro-service related events. The log augmentation system further includes an augmentation rules database with rule management components for determining an augment direction, an augmentation target, and an augmentation correlation relating to the distributed micro-services. The log augmentation system also includes a coordinator for coordinating the augmentation process in the distributed micro-service using a rule-based decision approach. The log augmentation system additionally includes a labeler for applying a set of labels to augment log entries responsive to instructions from the coordinator derived from results of the rule-based decision approach used by the coordinator.Type: ApplicationFiled: September 27, 2018Publication date: April 2, 2020Inventors: Lin Yang, Yuan Wang, Guang Cheng Li, Jing Min Xu, Jian Ma, Xiao Xi Liu
-
Publication number: 20200052983Abstract: A computer-implemented method for data leakage protection is disclosed. A monitoring template corresponding to the cloud application is selected based upon communication between a user and a cloud application and from a plurality of monitoring templates. A monitor is generated using the selected monitoring template. Identifying information of content shared between the user and the cloud application is obtained using the generated monitor. Data about the shared content for security analysis is obtained according to the identifying information of the shared content.Type: ApplicationFiled: October 8, 2019Publication date: February 13, 2020Inventors: HE YUAN HUANG, XIAO XI LIU, QI HU, GUAN QUN ZHANG