Patents by Inventor Xiao Yan Tian
Xiao Yan Tian has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240232191Abstract: An example operation may include one or more of storing an index that comprises identifiers of role-based access privileges for a plurality of users with respect to a database, receiving a database query associated with a user from a software program, identifying data records within the database that the user has permission to access based on database accessibility rights of the user stored within the index, prior to execution of the database query, loading the identified data records into the memory and filtering out other data records from the database which the user does not have permission to access, and executing the database query on the identified data records loaded from the database and returning query results from the execution to the software program.Type: ApplicationFiled: October 21, 2022Publication date: July 11, 2024Inventors: Jia Tian Zhong, Peng Hui Jiang, Ming Lei Zhang, Ting Ting Zhan, Le Chang, Zhen Liu, Xiao Yan Tian
-
Publication number: 20240134852Abstract: An example operation may include one or more of storing an index that comprises identifiers of role-based access privileges for a plurality of users with respect to a database, receiving a database query associated with a user from a software program, identifying data records within the database that the user has permission to access based on database accessibility rights of the user stored within the index, prior to execution of the database query, loading the identified data records into the memory and filtering out other data records from the database which the user does not have permission to access, and executing the database query on the identified data records loaded from the database and returning query results from the execution to the software program.Type: ApplicationFiled: October 20, 2022Publication date: April 25, 2024Inventors: Jia Tian Zhong, Peng Hui Jiang, Ming Lei Zhang, Ting Ting Zhan, Le Chang, Zhen Liu, Xiao Yan Tian
-
Patent number: 11748236Abstract: Examples described herein provide a computer-implemented method for multi-user debugging of a program. The method includes receiving a first request from a first developer to initiate a debug of the program and receiving a second request from a second developer to initiate the debug of the program. The method further includes, responsive to receiving the first request and the second request, initiating the debug of the program. The method further includes sending first source code for the program to the first developer, wherein the first source code is associated with the first developer. The method further includes sending second source code for the program to the second developer, wherein the second source code is associated with the second developer. The method further includes updating the program responsive to receiving a change to at least one of the first source code or the second source code.Type: GrantFiled: September 7, 2021Date of Patent: September 5, 2023Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Zhen Liu, Jia Tian Zhong, Le Chang, Ming Lei Zhang, Ting Ting Zhan, Xiao Yan Tian
-
Patent number: 11645045Abstract: Source code of a golden version and a next version of a program is received in which procedure calls are modified to call from an entry point table (EPT) with index numbers corresponding to procedure memory addresses. An executable defect-free golden version program and next version program with a defect are received. A first entry point table (first EPT) for the new version program and a second EPT for the golden version program are generated. A series of substitutions of procedures from the second EPT to the first EPT is performed and an order of substitutions includes: a module set, a module of the module set, a procedure set of the module, and a procedure of the procedure set. The defect producing procedure is identified by substituting in order until the defect is absent and proceeding to the next substitution in order.Type: GrantFiled: February 7, 2022Date of Patent: May 9, 2023Assignee: International Business Machines CorporationInventors: Zhen Liu, Jia Tian Zhong, Le Chang, Ming Lei Zhang, Ting Ting Zhan, Xiao Yan Tian
-
Publication number: 20230071020Abstract: Examples described herein provide a computer-implemented method for multi-user debugging of a program. The method includes receiving a first request from a first developer to initiate a debug of the program and receiving a second request from a second developer to initiate the debug of the program. The method further includes, responsive to receiving the first request and the second request, initiating the debug of the program. The method further includes sending first source code for the program to the first developer, wherein the first source code is associated with the first developer. The method further includes sending second source code for the program to the second developer, wherein the second source code is associated with the second developer. The method further includes updating the program responsive to receiving a change to at least one of the first source code or the second source code.Type: ApplicationFiled: September 7, 2021Publication date: March 9, 2023Inventors: Zhen Liu, Jia Tian Zhong, Le Chang, Ming Lei Zhang, Ting Ting Zhan, Xiao Yan Tian
-
Patent number: 11392473Abstract: Provided is a method for determining data storage is insufficient for a program. A processor may receive a set of marked data associated with a set of source code. The processor may identify a scope of the code associated with the marked data. The processor may generate a first set of instructions for taking a first snapshot of a variable storage space associated with the marked data when entering the scope and a second snapshot of the variable storage space when exiting the scope. The processor may generate a second set of instructions for comparing the first and second snapshots to determine a usage amount of the variable storage. The processor may generate a third set of instructions for performing an action in response to the usage amount of the variable storage space exceeding a threshold. The processor may compile the code into an executable.Type: GrantFiled: December 10, 2020Date of Patent: July 19, 2022Assignee: International Business Machines CorporationInventors: Zhen Liu, Ming Lei Zhang, Jia Tian Zhong, Le Chang, Ting Ting Zhan, Xiao Yan Tian
-
Publication number: 20220188206Abstract: Provided is a method for determining data storage is insufficient for a program. A processor may receive a set of marked data associated with a set of source code. The processor may identify a scope of the code associated with the marked data. The processor may generate a first set of instructions for taking a first snapshot of a variable storage space associated with the marked data when entering the scope and a second snapshot of the variable storage space when exiting the scope. The processor may generate a second set of instructions for comparing the first and second snapshots to determine a usage amount of the variable storage. The processor may generate a third set of instructions for performing an action in response to the usage amount of the variable storage space exceeding a threshold. The processor may compile the code into an executable.Type: ApplicationFiled: December 10, 2020Publication date: June 16, 2022Inventors: Zhen Liu, Ming Lei Zhang, Jia Tian Zhong, Le Chang, Ting Ting Zhan, Xiao Yan Tian
-
Publication number: 20220179623Abstract: Source code of a golden version and a next version of a program is received in which procedure calls are modified to call from an entry point table (EPT) with index numbers corresponding to procedure memory addresses. An executable defect-free golden version program and next version program with a defect are received. A first entry point table (first EPT) for the new version program and a second EPT for the golden version program are generated. A series of substitutions of procedures from the second EPT to the first EPT is performed and an order of substitutions includes: a module set, a module of the module set, a procedure set of the module, and a procedure of the procedure set. The defect producing procedure is identified by substituting in order until the defect is absent and proceeding to the next substitution in order.Type: ApplicationFiled: February 7, 2022Publication date: June 9, 2022Inventors: ZHEN LIU, Jia Tian Zhong, Le Chang, Ming Lei Zhang, Ting Ting Zhan, Xiao Yan Tian
-
Patent number: 11288041Abstract: Source code of a golden version and a next version of a program is received in which procedure calls are modified to call from an entry point table (EPT) with index numbers corresponding to procedure memory addresses. An executable defect-free golden version program and next version program with a defect are received. A first entry point table (first EPT) for the new version program and a second EPT for the golden version program are generated. A series of substitutions of procedures from the second EPT to the first EPT is performed and an order of substitutions includes: a module set, a module of the module set, a procedure set of the module, and a procedure of the procedure set. The defect producing procedure is identified by substituting in order until the defect is absent and proceeding to the next substitution in order.Type: GrantFiled: December 3, 2020Date of Patent: March 29, 2022Assignee: International Business Machines CorporationInventors: Zhen Liu, Jia Tian Zhong, Le Chang, Ming Lei Zhang, Ting Ting Zhan, Xiao Yan Tian