Patents by Inventor Xing Xing Shen
Xing Xing Shen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11928513Abstract: Mechanisms are provided for scheduling a workload in a cloud computing system. A cloud affinity factor (CAF) computer model is trained, via a machine learning process based on a training dataset comprising static characteristics of a workload binary for a workload, and dynamic characteristics corresponding to historical performance data for the workload, such that the trained CAF computer model predicts a performance classification for a given workload binary. The trained CAF computer model processes a new workload to generate a performance classification for the new workload. Cloud affinity factor(s) are generated based on the performance classification for the new workload. Node affinity and dispatch rule(s) are applied to the cloud affinity factor(s) to select one or more nodes of the cloud computing system to which to dispatch the workload. The workload is then scheduled on the selected one or more nodes.Type: GrantFiled: December 28, 2022Date of Patent: March 12, 2024Assignee: International Business Machines CorporationInventors: Peng Hui Jiang, Dong Hui Liu, Jia Tian Zhong, Xing Xing Shen, Jia Yu, Yong Yin
-
Publication number: 20240020312Abstract: Disclosed are a computer-implemented method, a system and a computer program product for record management in a time series database (TSDB). In the computer-implemented method for record management in a TSDB, time series records can be obtained from distributed sources by one or more processing units. The records can be divided into different record groups based on a timestamp of each of the records by one or more processing units. The records in each of the record groups can be normalized into normalized records by one or more processing units. The normalized records can be stored in the TSDB by one or more processing units.Type: ApplicationFiled: July 14, 2022Publication date: January 18, 2024Inventors: Huai Long Zhang, Peng Hui Jiang, Xing Xing Shen, Ming Lei Zhang
-
Publication number: 20230409568Abstract: A method, computer system, and a computer program for monitoring synchronization and aggregation are provided. The method may include receiving a plurality of metrics and identifying a plurality of metadata associated with the plurality of metrics. The method may further include calculating a hash value of the plurality of metadata based on the plurality of metrics. The method may further include detecting at least one modification to the plurality of metadata based on the hash value and updating the plurality of metrics based on the at least one modification in which the plurality of metrics are displayed in a self-adapting metric diagram.Type: ApplicationFiled: June 16, 2022Publication date: December 21, 2023Inventors: Bao Zhang, XI QING ZHANG, Jin Hong Fu, He Huang, Shi Chong Ma, Jia Yu, Mu Chen, HUI Zhang, Ran Ren, XING XING SHEN
-
Patent number: 11822910Abstract: Aspects of the invention include includes detecting a change in a code section of a source code in relation to a reference code section. An incremental section is created in object code, the incremental section includes an object code section describing the change in the code section and a symbol section describing a change to a symbol associated with the changed code section. The incremental section is attached to a software update. The software update to a target computer system.Type: GrantFiled: October 14, 2021Date of Patent: November 21, 2023Assignee: International Business Machines CorporationInventors: Bao Zhang, Jin Hong Fu, Shi Chong Ma, He Huang, Yong Yin, Jia Tian Zhong, Xing Xing Shen, Jia Yu
-
Publication number: 20230315715Abstract: A computer-implemented method, system and computer program product for improving accuracy and efficiency of auditing databases. A table, list or index of a database is analyzed to identify metadata, which includes time series data, user data, an Internet Protocol address and operation data. The identified metadata is associated with the corresponding record or row of the table, list or index from which the metadata was extracted. A determination is then made as to whether to record a raw data image associated with the record or row of the analyzed table, list or index based on the corresponding data operation. The identified metadata as well as the recorded data images, if any, are stored in a structured audit log. Auditing information is then obtained from a structured audit log based on matching the record or row identifier (RID) associated with the query with the RID associated with the structured audit log.Type: ApplicationFiled: March 30, 2022Publication date: October 5, 2023Inventors: Jia Tian Zhong, Peng Hui Jiang, Dong Hui Liu, Xing Xing Shen, Jia Yu, Yong Yin, Jing Lu, Xiao Yan Tang
-
Publication number: 20230222107Abstract: A method includes receiving, by a computing device, a first transaction from a user device for a first version of a database record; generating, by the computing device, a bit for the database record; receiving, by the computing device, a second transaction from a second user device for a second version of the database record; locking, by the computing device, the database record; determining, by the computing device, a modification between the first version of the database record and the second version of the database record; and updating, by the computing device, the bit in response to the modification.Type: ApplicationFiled: January 11, 2022Publication date: July 13, 2023Inventors: Shuo Li, Xiaobo Wang, Sheng Yan Sun, Jia Tian Zhong, Xing Xing Shen
-
Patent number: 11663072Abstract: A computer-implemented method includes receiving, by a computing system, an update for a computer program executing on the computing system. The method further includes determining, by the computing system, a data structure that is affected by the update by checking a structure change information included in the update. The method further includes checking, by the computing system, instance-count of the data structure, the instance-count representing a number of instances of the data structure in a memory of the computing system. The method further includes based on a determination that the instance-count is zero, applying, by the computing system, the update to the computer program.Type: GrantFiled: September 17, 2021Date of Patent: May 30, 2023Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gan Zhang, Le Chang, Ming Lei Zhang, Xing Xing Shen, Shan Gao, Guang Han Sui, Zeng Yu Peng
-
Patent number: 11647356Abstract: Software for proximity positioning that performs the following operations: (i) receiving at least one parameter via an advertising channel of a first protocol, wherein the at least one parameter is encoded in an advertising packet of the first protocol, and wherein the first protocol supports a first proximity positioning technology; (ii) extracting the encoded at least one parameter from the advertising packet; and (iii) performing, by a second proximity positioning technology different from the first proximity positioning technology, a measurement of distance based, at least in part, on the at least one parameter.Type: GrantFiled: October 13, 2020Date of Patent: May 9, 2023Assignee: International Business Machines CorporationInventors: Yong Yin, Jia Tian Zhong, Dong Hui Liu, Peng Hui Jiang, Xing Xing Shen, Li Cao, Jia Yu
-
Publication number: 20230118695Abstract: Aspects of the invention include includes detecting a change in a code section of a source code in relation to a reference code section. An incremental section is created in object code, the incremental section includes an object code section describing the change in the code section and a symbol section describing a change to a symbol associated with the changed code section. The incremental section is attached to a software update. The software update to a target computer system.Type: ApplicationFiled: October 14, 2021Publication date: April 20, 2023Inventors: Bao Zhang, Jin Hong Fu, Shi Chong Ma, He Huang, Yong Yin, Jia Tian Zhong, XING XING SHEN, Jia Yu
-
Patent number: 11620205Abstract: A computer-implemented method for determining influence of applications on system performance includes collecting, by a processor, for several applications that are executing on a computing system, respective instrumentation data during multiple time-segments. The method further includes determining, for each of the applications, a performance value and a robustness value for each of the time-segments based on the respective instrumentation data. Further, using the performance value and robustness value for each time-segment, multiple health-waveforms are generated, where a health-waveform is generated for each respective application. The method further includes determining, by the processor, an influence-factor of a first application on a second application, the first application and the second application are executing on the computing system.Type: GrantFiled: October 19, 2020Date of Patent: April 4, 2023Assignee: International Business Machines CorporationInventors: Li Cao, Xing Xing Shen, Zhi Li, He Jiang Jia, Bo Tong Liu, Xiao Dong Li, Sheng Jie BJ Han
-
Publication number: 20230091512Abstract: A computer-implemented method includes receiving, by a computing system, an update for a computer program executing on the computing system. The method further includes determining, by the computing system, a data structure that is affected by the update by checking a structure change information included in the update. The method further includes checking, by the computing system, instance-count of the data structure, the instance-count representing a number of instances of the data structure in a memory of the computing system. The method further includes based on a determination that the instance-count is zero, applying, by the computing system, the update to the computer program.Type: ApplicationFiled: September 17, 2021Publication date: March 23, 2023Inventors: Gan ZHANG, Le CHANG, Ming Lei ZHANG, Xing Xing SHEN, Shan GAO, Guang Han SUI, Zeng Yu PENG
-
Publication number: 20230092253Abstract: Aspects of the invention include determining an event associated with a computing system, the event occurring at a first time, obtaining system data associated with the computing system, determining a system state of the computing system at the first time based on the system data, determining, based on the system state, two or more system data clusters comprising clustered system data associated with the system state of the computing system, determining, via an interpolation algorithm, an interpolated data value for the first time based on the system data, and adjusting the interpolated data value based on a determination that the interpolate data value is outside the two or more system data clusters.Type: ApplicationFiled: September 17, 2021Publication date: March 23, 2023Inventors: Zhi LI, Xing Xing SHEN, Xiao Dong LI, He Jiang JIA, Sheng Jie BJ HAN, Ye TIAN, Bo Tong LIU, Peng Hui JIANG
-
Publication number: 20230081324Abstract: A computer-implemented method includes receiving, by a processing unit, from a first tenant, a query to retrieve data from a nonrelational database system. The method further includes determining, by the processing unit, that an index associated with the query is cached in a shared index cache, wherein the shared index cache stores indexes for a plurality of tenants. The method further includes retrieving, by the processing unit, a result of the query based on the index in the shared index cache. The method further includes outputting, by the processing unit, the result of the query.Type: ApplicationFiled: September 15, 2021Publication date: March 16, 2023Inventors: Peng Hui JIANG, Xing Xing SHEN, Guang Han SUI, Jun SU, Hai Ling ZHANG
-
Patent number: 11580210Abstract: Embodiments of the present invention relate to password authentication. According to an embodiment of the present invention, a password associated with a user identification is received from a user device. The password is authenticated based on a preset relationship between a seed password and a graphical password associated with the user identification. The seed password consists of a string of characters. The graphical password is a directed path traversing all keys of a keypad in an order. Each of the keys represents one of the characters and is associated with an order number according to the order of the keys being traversed. The preset relationship is that the password consists of respective order numbers associated with respective keys representing corresponding characters of the seed password.Type: GrantFiled: February 18, 2021Date of Patent: February 14, 2023Assignee: International Business Machines CorporationInventors: Jia Tian Zhong, Xing Xing Shen, Peng Hui Jiang, Dong Hui Liu, Yong Yin, Jia Yu
-
Patent number: 11558448Abstract: In an approach for a sparse information sharing system, a processor receives a request from a host owner for a host to become a server of an information sharing system, wherein the request specifies at least one type of information the server will maintain and provide to visitors of the server. A processor syncs the server with other servers of the information sharing system with information of the specified at least one type of information. A processor, responsive to the server receiving updated information from a visitor of the server, notifies the other servers of the updated information.Type: GrantFiled: September 22, 2021Date of Patent: January 17, 2023Assignee: International Business Machines CorporationInventors: Guang Han Sui, Peng Hui Jiang, Xing Xing Shen, Jun Su, Hai Ling Zhang
-
Publication number: 20220398191Abstract: A method for heap space management includes, in response to a determination that consumption of a first heap space of an application exceeds a first threshold, determining whether a second heap space of the application after garbage collection is sufficient to accommodate data stored in the first heap space. The method further includes, in response to a determination that the second heap space after the garbage collection is sufficient to accommodate the data, performing the garbage collection on the second heap space. The method further includes storing the data into the second heap space.Type: ApplicationFiled: June 11, 2021Publication date: December 15, 2022Inventors: Gan Zhang, XING XING SHEN, Shan Gao, Le Chang, Ming Lei Zhang, Zeng Yu Peng
-
Patent number: 11526437Abstract: A method for heap space management includes, in response to a determination that consumption of a first heap space of an application exceeds a first threshold, determining whether a second heap space of the application after garbage collection is sufficient to accommodate data stored in the first heap space. The method further includes, in response to a determination that the second heap space after the garbage collection is sufficient to accommodate the data, performing the garbage collection on the second heap space. The method further includes storing the data into the second heap space.Type: GrantFiled: June 11, 2021Date of Patent: December 13, 2022Assignee: International Business Machines CorporationInventors: Gan Zhang, Xing Xing Shen, Shan Gao, Le Chang, Ming Lei Zhang, Zeng Yu Peng
-
Publication number: 20220261470Abstract: Embodiments of the present invention relate to password authentication. According to an embodiment of the present invention, a password associated with a user identification is received from a user device. The password is authenticated based on a preset relationship between a seed password and a graphical password associated with the user identification. The seed password consists of a string of characters. The graphical password is a directed path traversing all keys of a keypad in an order. Each of the keys represents one of the characters and is associated with an order number according to the order of the keys being traversed. The preset relationship is that the password consists of respective order numbers associated with respective keys representing corresponding characters of the seed password.Type: ApplicationFiled: February 18, 2021Publication date: August 18, 2022Inventors: Jia Tian Zhong, XING XING SHEN, Peng Hui Jiang, Dong Hui Liu, Yong Yin, Jia Yu
-
Patent number: 11379468Abstract: Aspects of the invention include computer-implemented method that includes generating a preliminary control flow graph from memory dump data and compiler listing data in response to an exception event at a computing program. Code segments associated with each block of the preliminary control flow graph are translated to Boolean statements. Each Boolean statement is determined to be either satisfied or unsatisfied based on input values retrieved from the memory dump data. An edge property value of a first edge and a second edge of a plurality of edges of the preliminary control flow graph based are calculated based on a satisfaction of the Boolean statements. The edge property value of the first edge is compared to the edge property value of the second edge. The preliminary control flow graph is refined by deleting the first edge of the plurality of edges based at least in part on the comparison.Type: GrantFiled: May 12, 2021Date of Patent: July 5, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Bao Zhang, Shi Chong Ma, Jin Hong Fu, He Huang, Jia Tian Zhong, Xing Xing Shen, Xiang Zu, Jia Yu
-
Patent number: 11354320Abstract: A method and system for determining causes. The method includes generating a set of cause indices. Each cause index includes a cause, at least one pattern, and a probability of the cause for the pattern. The method also includes receiving a data set, and determining that one or more indexed patterns match a pattern in the data set. Further, the method includes retrieving causes for the indexed patterns that match the pattern in the data set, as well as determining probabilities of the retrieved causes for the pattern in the data set.Type: GrantFiled: October 11, 2018Date of Patent: June 7, 2022Assignee: International Business Machines CorporationInventors: Jia Yu, Jia Tian Zhong, Xing Xing Shen, Zhan Peng Huo, Zhi Li Guan, Peng Hui Jiang