Patents by Inventor Yan Qi
Yan Qi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9503921Abstract: Embodiments of the present invention relate to a method for determining a scrambling code conflict and an apparatus for determining a scrambling code conflict. The method includes: determining a serving cell before a handover of a user equipment fails, and determining a current serving cell of the user equipment; and comparing frequencies and scrambling codes of the current serving cell and a neighboring cell of the serving cell before the handover fails, and determining, according to a result of the comparing, that a scrambling code conflict exists between the current serving cell and the neighboring cell of the serving cell before the handover fails. A probability of a handover failure of a user equipment is reduced, so as to ensure that a service of the user equipment runs normally.Type: GrantFiled: June 18, 2015Date of Patent: November 22, 2016Assignee: Huawei Technologies Co., Ltd.Inventors: Xi Luo, Yan Qi, Huan Zhang, Ping Song
-
Publication number: 20160260314Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for access and control of networked devices. In one aspect, a method includes receiving a request for access to a security system device; determining whether the device is set to a first mode or a second mode; and in response to determining that the device is in the second mode, generating one or more notifications to authorized users identifying the access to the security device.Type: ApplicationFiled: March 7, 2016Publication date: September 8, 2016Applicant: MivaLife Mobile Technology, Inc.Inventors: Keqin Gu, Yan Qi, Kuochun Lee, Shicong Wang
-
Patent number: 9424260Abstract: Techniques for data assignment from an external distributed file system (DFS) to a database management system (DBMS) are provided. Data blocks from the DFS are represented as first nodes and access module processors of the DBMS are represented as second nodes. A graph is produced with the first and second nodes. Assignments are made for the first nodes to the second nodes based on evaluation of the graph to integrate the DFS with the DBMS.Type: GrantFiled: March 18, 2014Date of Patent: August 23, 2016Assignee: Teradata US, Inc.Inventors: Yan Qi, Yu Xu, Olli Pekka Kostamaa, Jian Wen
-
Patent number: 9372676Abstract: Apparatus and methods are provided for controlling the loading status of DLLs. Specifically, a streaming program compiler is provided. The compiler includes operation modules for calling DLLs during streaming program execution; association table generating units for generating association tables according to user-defined rules, where the association table includes entries indicating (i) stream branches of the streaming program and (ii) an operation module corresponding to the stream branches; and a trigger generating unit for generating a trigger based on user-defined rules, where the trigger generating unit (i) determines which conditions for loading and unloading DLLs fit the streaming program, (ii) matches these conditions to a particular stream branch to identify a matched stream branch, and (iii) sends out triggering signals indicating the matched stream branch. This invention also provides a corresponding method and controller.Type: GrantFiled: November 8, 2013Date of Patent: June 21, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Rui Hou, Zhi Yu Liu, Huayong Wang, Yan Qi Wang
-
Publication number: 20160132576Abstract: Techniques and mechanisms described herein facilitate the management of data centers. According to various embodiments, a first query dispatcher at a first data center may be disabled. The first data center may include a first data cluster and a first database. The first query dispatcher may be configured to dispatch queries to access data in the first data cluster and in a second data cluster at a second data center. The second data cluster may replicate data stored in the first data cluster. Metadata stored in the first database may be replicated to a second database in the second data center. The metadata may describe a state of the first data cluster. A second query dispatcher may be enabled at the second data center. The second query dispatcher may be configured to dispatch queries to access data in the second data cluster.Type: ApplicationFiled: November 7, 2014Publication date: May 12, 2016Applicant: Turn Inc.Inventors: Yan Qi, Mingxi Wu
-
Patent number: 9286259Abstract: The present invention provides a method and an apparatus for lowering I/O power of a computer system and a computer system. According to an aspect of the present invention, there is provided a method for lowering I/O power of a computer system, comprising: buffering a plurality of ways of data to be sent to a bus; encoding each of the plurality of ways of data buffered from n bits to n+m bits based on an encoding rule, wherein n and m are both an integer larger than or equal to 1, the encoding rule is used to lower code switching frequency; and sending the plurality of ways of data encoded to the bus.Type: GrantFiled: October 10, 2008Date of Patent: March 15, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Yu Li, Wen Bo Shen, Yan Qi Wang, Yudong Yang
-
Patent number: 9280890Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for access and control of networked devices. In one aspect, a method includes receiving a request for access to a security system device; determining whether the device is set to a first mode or a second mode; and in response to determining that the device is in the second mode, generating one or more notifications to authorized users identifying the access to the security device.Type: GrantFiled: March 28, 2014Date of Patent: March 8, 2016Assignee: MivaLife Mobile Technology, Inc.Inventors: Keqin Gu, Yan Qi, Kuochun Lee, Shicong Wang
-
Publication number: 20150373538Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for configuring secure wireless networks. One of the methods includes receiving, at a security system management device, protocol and key information for establishing a connection as a client device to the wireless IP device, wherein the protocol and key information is received in response to a user transmitting an identifier for the IP device to a service provider system; establishing communication with the wireless IP device, wherein the wireless IP device is acting as an access point device; exchanging keys with the wireless IP device; rebooting the security system management device to become an access point for the secure wireless network; and establishing communication with the wireless IP device, wherein the wireless IP device has become a wireless client.Type: ApplicationFiled: August 31, 2015Publication date: December 24, 2015Inventors: Longgang Huang, Keqin Gu, Tsungyen Chen, Yan Qi
-
Publication number: 20150289151Abstract: Embodiments of the present invention relate to a method for determining a scrambling code conflict and an apparatus for determining a scrambling code conflict. The method includes: determining a serving cell before a handover of a user equipment fails, and determining a current serving cell of the user equipment; and comparing frequencies and scrambling codes of the current serving cell and a neighboring cell of the serving cell before the handover fails, and determining, according to a result of the comparing, that a scrambling code conflict exists between the current serving cell and the neighboring cell of the serving cell before the handover fails. A probability of a handover failure of a user equipment is reduced, so as to ensure that a service of the user equipment runs normally.Type: ApplicationFiled: June 18, 2015Publication date: October 8, 2015Inventors: Xi Luo, Yan Qi, Huan Zhang, Ping Song
-
Publication number: 20150279198Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for access and control of networked devices. In one aspect, a method includes receiving a request for access to a security system device; determining whether the device is set to a first mode or a second mode; and in response to determining that the device is in the second mode, generating one or more notifications to authorized users identifying the access to the security device.Type: ApplicationFiled: March 28, 2014Publication date: October 1, 2015Applicant: Oplink Communications, Inc.Inventors: Keqin Gu, Yan Qi, Kuochun Lee, Shicong Wang
-
Publication number: 20150281138Abstract: The present application discloses a method of generating an automatic reply (auto-reply) message. A server receives a text message directed to a content provider, and obtains content information of a webpage associated with the content provider. The content information of the webpage includes predetermined tags and information concerning content items of the webpage. The server then composes an auto-reply message according to a specific keyword of the text message, and specifically, information of at least one content item is extracted according to an auto-reply rule. The auto-reply rule is included in an auto-reply rule database that further includes a plurality of keywords and the content items of the webpage semantically correlated with the keywords based on the set of predetermined tags. The server then returns the auto-reply message including the information of the at least one content item corresponding to the specific keyword for display on the client device.Type: ApplicationFiled: May 13, 2015Publication date: October 1, 2015Inventors: Xun Niu, Yanan Zhao, Jihua Huang, Haiyang Wang, Yuhao Chen, Yan Qi, Jiyan Huang, Zhaohong Ma, Guodong Zhang, Jing Xu
-
Patent number: 9125049Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for configuring secure wireless networks. One of the methods includes receiving, at a security system management device, protocol and key information for establishing a connection as a client device to the wireless IP device, wherein the protocol and key information is received in response to a user transmitting an identifier for the IP device to a service provider system; establishing communication with the wireless IP device, wherein the wireless IP device is acting as an access point device; exchanging keys with the wireless IP device; rebooting the security system management device to become an access point for the secure wireless network; and establishing communication with the wireless IP device, wherein the wireless IP device has become a wireless client.Type: GrantFiled: March 15, 2013Date of Patent: September 1, 2015Assignee: Oplink Communications, Inc.Inventors: Longgang Huang, Keqin Gu, Tsungyen Chen, Yan Qi
-
Publication number: 20150244653Abstract: This application discloses a method implemented on a client system for creating an automatic reply (auto-reply) message. The client system obtains content information of a webpage including information concerning a plurality of content items. A graphical user interface is displayed and includes a preview of the webpage including the plurality of content items of the webpage. Then, the auto-reply message is composed in accordance with a user selection of a specific content item of the webpage in the webpage preview, and at least includes corresponding information of the selected content item. The auto-reply message is further associated with one or more predefined keywords according to one or more auto-reply rules, and sent with these predefined keywords to a server system. The server system is configured to return the auto-reply message automatically to a subscriber device in response to a user inquiry including at least one of the predefined keywords.Type: ApplicationFiled: May 13, 2015Publication date: August 27, 2015Inventors: Xun NIU, Yanan ZHAO, Jihua HUANG, Haiyang WANG, Yuhao CHEN, Yan QI, Jiyan HUANG, Zhaohong MA, Guodong ZHANG, Jing XU
-
Publication number: 20150077250Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for managing communications. One of the systems includes a plurality of security systems, each security system including a secure network coupling a plurality of security devices; a plurality of user devices authorized to send and receive communications associated with a respective security system of the plurality of security systems; and a service provider system configured to manage communications for each of the plurality of security systems with respective user devices, wherein, the service provider system or the user devices are configured to communicate with a push service to send push notifications.Type: ApplicationFiled: September 18, 2013Publication date: March 19, 2015Inventors: Kuochun Lee, Yan Qi, Qiang Xie
-
Patent number: 8903803Abstract: Current data records having a start and end time are transformed into a 2D space having a first dimension for each data record's start time and a second dimension for each data record's end time. Historical queries specifying data ranges are obtained. A response was previously sent for each historical query and specifying a sub-portion of data records that overlap with such historical query's specified data range. Partitioning schemes for the current data records in the 2D space are generated. An optimum partitioning scheme having a lowest cost is selected based on costs of executing the historical queries with respect to each of the partitioning schemes. The optimum partitioning scheme is applied on the current data records, including newly received data records, in the 2D space so that any subsequently received queries are applied against the current data records as partitioned by the optimum partitioning scheme in the 2D space.Type: GrantFiled: June 18, 2014Date of Patent: December 2, 2014Assignee: Turn Inc.Inventors: Ahmed Moustafa Hussein Aly, Hazem Elmeleegy, Yan Qi
-
Publication number: 20140279074Abstract: A data management apparatus for digital advertising includes a data integration processor for collecting and storing data from providers, resolving heterogeneity of the data at schema and data levels, and performing validity checks of the data; an analytics processor for receiving validated data from the data integration processor and providing to users custom, nesting-aware, SQL-like query language and a library of data mining methods, machine learning models, and analytical user profiles (AUP); and an activation processor for encapsulating complex computations performed in real-time, segment evaluation, and online user classification using runtime user profiles (RUP).Type: ApplicationFiled: June 21, 2013Publication date: September 18, 2014Inventors: Songting CHEN, Ali DASDAN, Hazem ELMELEEGY, Santanu KOLAY, Yinan LI, Yan QI, Peter WILMOT, Mingxi WU
-
Publication number: 20140281990Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for controlling security systems. One of the methods includes receiving, at a mobile device, an input to present camera video content; presenting, in a user interface, a first array of video content, wherein the respective video content is associated with a first security system location; receiving a user input to present a second array of video content, wherein the respective video content is associated with a second security system location, and wherein the user input comprises a touch input; and presenting, in the user interface, the second array of video content.Type: ApplicationFiled: March 15, 2013Publication date: September 18, 2014Applicant: Oplink Communications, Inc.Inventors: Keqin Gu, Yan Qi, Tsungyen Chen
-
Publication number: 20140281478Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for configuring secure wireless networks. One of the methods includes receiving, at a security system management device, protocol and key information for establishing a connection as a client device to the wireless IP device, wherein the protocol and key information is received in response to a user transmitting an identifier for the IP device to a service provider system; establishing communication with the wireless IP device, wherein the wireless IP device is acting as an access point device; exchanging keys with the wireless IP device; rebooting the security system management device to become an access point for the secure wireless network; and establishing communication with the wireless IP device, wherein the wireless IP device has become a wireless client.Type: ApplicationFiled: March 15, 2013Publication date: September 18, 2014Applicant: Oplink Communications, Inc.Inventors: Longgang Huang, Keqin Gu, Tsungyen Chen, Yan Qi
-
Publication number: 20140222871Abstract: Techniques for data assignment from an external distributed file system (DFS) to a database management system (DBMS) are provided. Data blocks from the DFS are represented as first nodes and access module processors of the DBMS are represented as second nodes. A graph is produced with the first and second nodes. Assignments are made for the first nodes to the second nodes based on evaluation of the graph to integrate the DFS with the DBMS.Type: ApplicationFiled: March 18, 2014Publication date: August 7, 2014Applicant: Teradata US, Inc.Inventors: Yan Qi, Yu Xu, Olli Pekka Kostamaa, Jian Wen
-
Patent number: 8799590Abstract: A system enabling Transactional Memory with overflow prediction mechanism, comprising: prediction unit for predicting the mode for the next execution of a transaction based on the final status of the previous execution of the transaction; execution unit for executing the transaction in the execution mode predicted by the prediction unit, wherein the execution mode comprises overflow mode and non-overflow made. According to this invention, before a transaction is executed, it is predicted whether or not the transaction will overflow, and therefore, the execution of the transaction which is necessary to determine whether or not an overflow will occur is saved.Type: GrantFiled: May 8, 2009Date of Patent: August 5, 2014Assignee: International Business Machines CorporationInventors: Hua Yong Wang, Charles Brian Hall, Yan Qi Wang, Zhi Yong Liang, Xiao Wei Shen