Patents by Inventor Xiao-Yan Tang

Xiao-Yan Tang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12277066
    Abstract: A method, including: monitoring resource utilization of an operating system (OS) with applications utilizing larger pages; determining the monitored resource utilization is greater than a threshold resource utilization; in response to the determining the monitored resource utilization is greater than a threshold resource utilization, determining a respective larger pages index value for each of the applications utilizing larger pages; and turning off larger pages utilization of a subset of the applications utilizing larger pages, wherein the subset comprises a predefined number of the applications utilizing larger pages that have highest determined larger pages index values.
    Type: Grant
    Filed: December 21, 2022
    Date of Patent: April 15, 2025
    Assignee: International Business Machines Corporation
    Inventors: Dong Hui Liu, Jing Lu, Peng Hui Jiang, Naijie Li, Xiao Yan Tang, Bao Zhang, Jun Su, Yong Yin, Jia Yu
  • Publication number: 20250094316
    Abstract: For a set in sets of candidate factors, a classification model is trained to predict a computer problem possibility, an accuracy score of the classification model is determined based on model validation, and factor weights of the candidate factors in the set are adjusted based on the accuracy score. This processing is done with respect to all sets of candidate factors. A low accuracy classification model having an accuracy score lower than a threshold criterion is selected. A higher accuracy classification model having an accuracy score that is higher than the accuracy score of the low accuracy classification model is selected. The set of candidate factors used to train the low accuracy classification model is updated using one or more of the candidate factors used to train the higher accuracy classification model. The low accuracy classification model is updated based on the updated set of candidate factors.
    Type: Application
    Filed: September 18, 2023
    Publication date: March 20, 2025
    Inventors: Dong Hui Liu, Jing Lu, Peng Hui Jiang, Xiao Yan Tang, Jun Su, Jia Yu
  • Patent number: 12248456
    Abstract: A computer-implemented method, system and computer program product for improving accuracy and efficiency of auditing databases. A table, list or index of a database is analyzed to identify metadata, which includes time series data, user data, an Internet Protocol address and operation data. The identified metadata is associated with the corresponding record or row of the table, list or index from which the metadata was extracted. A determination is then made as to whether to record a raw data image associated with the record or row of the analyzed table, list or index based on the corresponding data operation. The identified metadata as well as the recorded data images, if any, are stored in a structured audit log. Auditing information is then obtained from a structured audit log based on matching the record or row identifier (RID) associated with the query with the RID associated with the structured audit log.
    Type: Grant
    Filed: March 30, 2022
    Date of Patent: March 11, 2025
    Assignee: International Business Machines Corporation
    Inventors: Jia Tian Zhong, Peng Hui Jiang, Dong Hui Liu, Xing Xing Shen, Jia Yu, Yong Yin, Jing Lu, Xiao Yan Tang
  • Publication number: 20250036468
    Abstract: The illustrative embodiments provide for dynamic tuning of pre-initialization environment provisioning and management. An embodiment includes accepting a request from a group of applications to generate a performance-based index table for a workload based on a feature of the applications and generating the performance-based index table. The embodiment includes building a label feature by analyzing a static program feature of the applications and the performance-based index table. The embodiment includes constructing, using clustering algorithms, a model for provisioning a pre-initialization environment using the label features. The embodiment includes loading the applications into a pre-initialization environment. The embodiment includes introducing a selection policy for a switch in the pre-initialization environment in multiple applications to balance usage of a resource.
    Type: Application
    Filed: July 24, 2023
    Publication date: January 30, 2025
    Applicant: International Business Machines Corporation
    Inventors: Dong Hui Liu, Jing Lu, Peng Hui Jiang, NAIJIE LI, Xiao Yan Tang, Jia Yu
  • Publication number: 20250028558
    Abstract: A system and method for improving the performance and reducing costs of a program by automatically provisioning and managing proper memory pool cell size adaptive to each executing application. By collecting time series of historical data on the memory pool usage of applications over a period of time, respective time-series prediction models are used to process the data to predict the allocation size for applications and in particular, a predicted number of allocations and a respective predicted allocation cell size. A clustering-based method is further applied to predict the allocation size for applications, using real time execution to do scaling, complement and interpolation. A method runs a further time-series prediction model trained to predict, based on the predicted memory cell size and one or more application profile features associated with the requesting application, a tuning parameter to refine the memory pool storage area size used for handling memory allocation requests.
    Type: Application
    Filed: July 21, 2023
    Publication date: January 23, 2025
    Inventors: Dong Hui Liu, Peng Hui Jiang, Jing Lu, Xiao Yan Tang, NAIJIE LI, Jun Su, Jia Yu
  • Patent number: 12197901
    Abstract: In a first aspect of the invention, there is a computer-implemented method including: generating, by one or more processors, dependency version information for a target software application, based on activity of a compiler registered with an event handler; generating, by the one or more processors, one or more dependency sections with a dependency list for the target software application, wherein the dependency list incorporates the dependency version information; and building, by the one or more processors, a software package with the one or more dependency sections with the dependency list for the target software application.
    Type: Grant
    Filed: December 21, 2022
    Date of Patent: January 14, 2025
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Bao Zhang, Jing Lu, Dong Hui Liu, Peng Hui Jiang, Xiao Yan Tang, Yong Yin, Jia Yu
  • Patent number: 12147352
    Abstract: A method, including: identifying static application features of an application; identifying resource access features of the application; labeling a translation lookaside buffer (TLB) miss threshold of a runtime feature of the application; determining utilization of larger pages during the runtime based on the TLB miss threshold; and setting the TLB miss threshold based on the determined utilization of the larger pages.
    Type: Grant
    Filed: October 20, 2022
    Date of Patent: November 19, 2024
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Naijie Li, Dong Hui Liu, Jing Lu, Peng Hui Jiang, Xiao Yan Tang, Bao Zhang, Yong Yin, Jun Su, Jia Yu
  • Publication number: 20240273434
    Abstract: A set of tasks is extracted from workflow data of a system. A set of keywords is extracted from a task in the set of tasks. The set of keywords is expanded into an expanded set of keywords, the expanded set of keywords comprising a new keyword with a semantic relationship to a keyword in the set of keywords. A new task is generated using the expanded set of keywords. Based on a result of execution of the new task, a model of the system is adjusted, the model comprising the workflow data, the set of tasks, and the expanded set of keywords.
    Type: Application
    Filed: February 9, 2023
    Publication date: August 15, 2024
    Applicant: International Business Machines Corporation
    Inventors: Peng Hui Jiang, Dong Hui Liu, Jia Tian Zhong, Xing Xing Shen, Jing Lu, Jia Yu, Yong Yin, Xiao Yan Tang
  • Publication number: 20240232098
    Abstract: A method, including: identifying static application features of an application; identifying resource access features of the application; labeling a translation lookaside buffer (TLB) miss threshold of a runtime feature of the application; determining utilization of larger pages during the runtime based on the TLB miss threshold; and setting the TLB miss threshold based on the determined utilization of the larger pages.
    Type: Application
    Filed: October 20, 2022
    Publication date: July 11, 2024
    Inventors: Naijie Li, Dong Hui Liu, Jing Lu, Peng Hui Jiang, Xiao Yan Tang, Bao Zhang, Yong Yin, Jun Su, Jia Yu
  • Publication number: 20240211221
    Abstract: In a first aspect of the invention, there is a computer-implemented method including: generating, by one or more processors, dependency version information for a target software application, based on activity of a compiler registered with an event handler; generating, by the one or more processors, one or more dependency sections with a dependency list for the target software application, wherein the dependency list incorporates the dependency version information; and building, by the one or more processors, a software package with the one or more dependency sections with the dependency list for the target software application.
    Type: Application
    Filed: December 21, 2022
    Publication date: June 27, 2024
    Inventors: Bao Zhang, Jing Lu, Dong Hui Liu, Peng Hui Jiang, Xiao Yan Tang, Yong Yin, Jia Yu
  • Publication number: 20240211409
    Abstract: A method, including: monitoring resource utilization of an operating system (OS) with applications utilizing larger pages; determining the monitored resource utilization is greater than a threshold resource utilization; in response to the determining the monitored resource utilization is greater than a threshold resource utilization, determining a respective larger pages index value for each of the applications utilizing larger pages; and turning off larger pages utilization of a subset of the applications utilizing larger pages, wherein the subset comprises a predefined number of the applications utilizing larger pages that have highest determined larger pages index values.
    Type: Application
    Filed: December 21, 2022
    Publication date: June 27, 2024
    Inventors: Dong Hui Liu, Jing Lu, Peng Hui Jiang, Naijie Li, Xiao Yan Tang, Bao Zhang, Jun Su, Yong Yin, Jia Yu
  • Publication number: 20240134805
    Abstract: A method, including: identifying static application features of an application; identifying resource access features of the application; labeling a translation lookaside buffer (TLB) miss threshold of a runtime feature of the application; determining utilization of larger pages during the runtime based on the TLB miss threshold; and setting the TLB miss threshold based on the determined utilization of the larger pages.
    Type: Application
    Filed: October 19, 2022
    Publication date: April 25, 2024
    Inventors: Naijie Li, Dong Hui Liu, Jing Lu, Peng Hui Jiang, Xiao Yan Tang, Bao Zhang, Yong Yin, Jun Su, Jia Yu
  • Patent number: 11947993
    Abstract: A computer-implemented method includes creating a first file control block in a primary runtime environment with a first addressing mode and a second file control block in a secondary runtime environment with a second addressing mode, where both the first file control block and the second file control block describe a status of a first file of a caller program in the primary runtime environment. The parameters of the first file of the caller program in the primary runtime environment are passed to a target callee program in the secondary runtime environment. An anchor is added in the first file control block as a link to the second file control block. The first file control block are the second file control block synchronized with updates to the first file in the primary runtime environment and the passed parameters of the first file in the secondary runtime environment.
    Type: Grant
    Filed: June 22, 2021
    Date of Patent: April 2, 2024
    Assignee: International Business Machines Corporation
    Inventors: Ming Ran Liu, Jing Lu, Naijie Li, Xiao Yan Tang, Yuan Zhai, Kershaw S. Mehta
  • Patent number: 11947498
    Abstract: Methods, systems, and computer program products for de-duplicating data in executable files in a container image are disclosed. The method may include receiving a request to read a file in a first layer in a container image including a plurality of layers, wherein the file is a delta file which is from an updated executable file based on a base executable file, the base executable file is in a lower layer than the first layer in the container image, and the delta file includes block mappings between the updated executable file and the base executable file and different data between the two files, and blocks included in the two files are based on respective file structure. The method may also include restoring the updated executable file based on the delta file and the base executable file. The method may further include returning data in the updated executable file.
    Type: Grant
    Filed: May 12, 2022
    Date of Patent: April 2, 2024
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dong Hui Liu, Peng Hui Jiang, Jing Lu, Xiao Yan Tang, Jun Su, Jia Yu, Yong Yin
  • Publication number: 20240095359
    Abstract: An embodiment includes generating a caller list of callers that issue requests for calling a designated program at runtime. The embodiment also includes generating an authorized caller list of authorized callers allowed to call the designated program, wherein the authorized callers are selected from among callers on the caller list. The embodiment also includes generating an authorization key for each of the authorized callers that the designated program will require as a condition for completing call requests.
    Type: Application
    Filed: September 20, 2022
    Publication date: March 21, 2024
    Applicant: International Business Machines Corporation
    Inventors: Dong Hui Liu, Peng Hui Jiang, Jing Lu, Jia Yu, Jun Su, Xiao Yan Tang, Yong Yin
  • Publication number: 20230367745
    Abstract: Methods, systems, and computer program products for de-duplicating data in executable files in a container image are disclosed. The method may include receiving a request to read a file in a first layer in a container image including a plurality of layers, wherein the file is a delta file which is from an updated executable file based on a base executable file, the base executable file is in a lower layer than the first layer in the container image, and the delta file includes block mappings between the updated executable file and the base executable file and different data between the two files, and blocks included in the two files are based on respective file structure. The method may also include restoring the updated executable file based on the delta file and the base executable file. The method may further include returning data in the updated executable file.
    Type: Application
    Filed: May 12, 2022
    Publication date: November 16, 2023
    Inventors: Dong Hui Liu, Peng Hui Jiang, Jing Lu, Xiao Yan Tang, Jun Su, Jia Yu, Yong Yin
  • Publication number: 20230315715
    Abstract: A computer-implemented method, system and computer program product for improving accuracy and efficiency of auditing databases. A table, list or index of a database is analyzed to identify metadata, which includes time series data, user data, an Internet Protocol address and operation data. The identified metadata is associated with the corresponding record or row of the table, list or index from which the metadata was extracted. A determination is then made as to whether to record a raw data image associated with the record or row of the analyzed table, list or index based on the corresponding data operation. The identified metadata as well as the recorded data images, if any, are stored in a structured audit log. Auditing information is then obtained from a structured audit log based on matching the record or row identifier (RID) associated with the query with the RID associated with the structured audit log.
    Type: Application
    Filed: March 30, 2022
    Publication date: October 5, 2023
    Inventors: Jia Tian Zhong, Peng Hui Jiang, Dong Hui Liu, Xing Xing Shen, Jia Yu, Yong Yin, Jing Lu, Xiao Yan Tang
  • Patent number: 11689362
    Abstract: An example operation may include one or more of generating an initial seed and allocating one or more authorized bits of the initial seed to a plurality of blocks in a distributed ledger, storing the initial seed and an identification of which authorized bits of the initial seed are allocated to each block of the distributed ledger, receiving a final seed value that is partially generated by each of a plurality of nodes configured to access the distributed ledger based on authorized bits of respective blocks updated by each respective node, and generating a random sequence value based on the final seed value and storing the random sequence value in a block of the distributed ledger.
    Type: Grant
    Filed: January 29, 2021
    Date of Patent: June 27, 2023
    Assignee: International Business Machines Corporation
    Inventors: Si Bin Fan, David Kaminsky, Tao Liu, Jing Lu, Xiao Yan Tang, Jun Zhang
  • Publication number: 20230185903
    Abstract: A first memory page in a memory of the computer is allocated as a first stack to buffer meta data for function calls in the program. A memory protection key for the first memory page is generated. A second memory page in the memory is allocated as a second stack to buffer user data for function calls in the program.
    Type: Application
    Filed: December 14, 2021
    Publication date: June 15, 2023
    Inventors: Naijie Li, Jing Lu, Ming Ran Liu, Xiao Yan Tang, Yuan Zhai, Guang Han Sui
  • Patent number: 11675593
    Abstract: Embodiments of the invention are directed to updating a dynamic library. Aspects include receiving an indication that the dynamic library has been updated and identifying all program modules that depend on the dynamic library. Aspects also include, for each program module that depends on the dynamic library, reassigning an application program interface (API) address for a current version of the dynamic library to an API address of the updated version of the dynamic library.
    Type: Grant
    Filed: August 31, 2021
    Date of Patent: June 13, 2023
    Assignee: International Business Machines Corporation
    Inventors: Jing Lu, Dong Hui Liu, Xiao Yan Tang, Yong Yin, Peng Hui Jiang, Xiang Zu, Jia Yu