Patents by Inventor Yuanyuan DONG

Yuanyuan DONG has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180275970
    Abstract: Information concerning software bugs including bug detection, bug prediction data and/or historical bug data can be used to determine whether it is safe to commit, integrate, deploy and/or deliver a software change. If the change is deemed unsafe, the change can be rejected automatically. Alternatively, the change can proceed following approval by an administrator, supervisor, implementer, manager and/or other designated approval mechanism. Actions taken to override a block can be recorded along with information concerning failed deployments and/or deliveries, a higher than normal customer failure rate after deployment and/or delivery or through manual data entry.
    Type: Application
    Filed: March 24, 2017
    Publication date: September 27, 2018
    Inventors: Muiris Woulfe, Poornima Muthukumar, Yuanyuan Dong
  • Publication number: 20180253506
    Abstract: Embodiments of the disclosure provide a data write-in method and apparatus. The data write-in method includes: selecting a target replica server from a plurality of replica servers managed by a metadata server according to remaining capacity of the plurality of replica servers; selecting a write-in disk in the target replica server according to remaining capacity and load of disks managed by the target replica server; and storing write-in data into the write-in disk through the target replica server.
    Type: Application
    Filed: May 3, 2018
    Publication date: September 6, 2018
    Inventors: Chengyu DONG, Jiaji ZHU, Haiyong ZHANG, Feng CAO, Yong WANG, Wenhui YAO, Junping WU, Yang WU, Yuanyuan DONG, Dongzheng WU, Jing LU
  • Publication number: 20180150742
    Abstract: A probabilistic machine learning model is generated to identify potential bugs in a source code file. Source code files with and without bugs are analyzed to find features indicative of a pattern of the context of a software bug, wherein the context is based on a syntactic structure of the source code. The features may be extracted from a line of source code, a method, a class and/or any combination thereof. The features are then converted into a binary representation of feature vectors that train a machine learning model to predict the likelihood of a software bug in a source code file.
    Type: Application
    Filed: November 28, 2016
    Publication date: May 31, 2018
    Inventors: MUIRIS WOULFE, POORNIMA MUTHUKUMAR, ALBERT AGRAZ SANCHEZ, YUANYUAN DONG, SONAL KUMAR, MAKSAT MARATOV, MARCIN MOZEJKO, PIOTR SARNICKI, ANIKET VIDYADHAR PEDNEKAR
  • Publication number: 20180121531
    Abstract: A method including sending an update request to replica servers listed in a copy list respectively; receiving respective response information from a respective replica server of the replica servers after an update of a respective data copy in the respective replica server is completed; in response to determining that a number of response information received in a preset update time is less than a total number of the replica servers, modifying a status of copy information corresponding to a replica server that has not sent a response information to a status of continuing to update; in response to determining that response information from the replica servers with the status of continuing to update has not been received within a preset continuous update time, deleting corresponding copy information; updating a list attribute value of the copy list; and sending the updated list attribute value to a central server.
    Type: Application
    Filed: December 22, 2017
    Publication date: May 3, 2018
    Inventors: Yuanyuan Dong, Weibin Yan, Chao Shi, Li Xu, Leilei Tian
  • Publication number: 20180089297
    Abstract: A data copy method comprises: acquiring, by a destination server, a data block identifier, version information and hole information; transmitting, by the destination server, the data block identifier, the version information and the hole information to a source terminal server so as to enable the source server to find corresponding data according to the data block identifier, the version information and the hole information; receiving, by the destination server, a response message carrying the data transmitted by the source server and copying the data to a hole corresponding to the data block identifier, the version information and the hole according to the response message.
    Type: Application
    Filed: November 10, 2017
    Publication date: March 29, 2018
    Inventors: Yuanyuan Dong, Li Xu, Weibin Yan, Puyuan Yang, Kai Li
  • Publication number: 20180046656
    Abstract: Multidimensional key based construction of a filterable hierarchy is provided. A data service initiates operations to construct the hierarchy by joining current node-key elements with an element delimiter into a current node string. Child node elements are also joined with the element delimiter into child node string(s). The child node string(s) are further encapsulated with nesting delimiter(s) and the resulting string is concatenated to the current node string. Next, parent node elements are joined with the element delimiter. The current node-key is generated by concatenating the parent node string to the current node string (that includes the child node string(s)) with a parent delimiter. The current node-key is inserted into a representation for the current node within a data structure.
    Type: Application
    Filed: August 12, 2016
    Publication date: February 15, 2018
    Applicant: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Muiris Woulfe, Poornima Muthukumar, Yuanyuan Dong
  • Publication number: 20170270480
    Abstract: A product or service is enhanced by optimizing success factors associated with the product or service. A enhancement application initiates operations to compute a predicted score (of a success of the product or service) and a suggestion to achieve the predicted score by retrieving performance and/or configuration data associated with existing products or services from a data source. The performance and/or configuration data is analyzed to generate a model of success factors associated with the existing products or services. Next, configuration conditions of a current product are received from a stakeholder. In response, predicted score(s) are computed for the success factors using the model by simulating the configuration conditions of the current product or service on the model. Furthermore, the predicted score(s) and/or suggestion(s) to achieve the predicted score(s) are provided in a visualization to the stakeholder.
    Type: Application
    Filed: March 17, 2016
    Publication date: September 21, 2017
    Inventors: Muiris Woulfe, Albert Agraz Sanchez, Poornima Muthukumar, Andreas Balzer, Yuanyuan Dong
  • Publication number: 20160320974
    Abstract: A method for updating data in a distributed storage system is disclosed. The method may comprise receiving, by a sender terminal device, an update request; obtaining, by the sender terminal device, update data and control information from the update request; sending, by the sender terminal device, the update data, via a data update request, to a receiver terminal device; and sending, by the sender terminal device, the control information, via a control information update request, to the receiver terminal device.
    Type: Application
    Filed: April 13, 2016
    Publication date: November 3, 2016
    Inventors: Yuanyuan DONG, Li XU, Weibin YAN, Kai LI, Puyuan YANG, Yemin SUI