-
公开(公告)号:US20240095359A1
公开(公告)日:2024-03-21
申请号:US17948400
申请日:2022-09-20
Applicant: International Business Machines Corporation
Inventor: Dong Hui Liu , Peng Hui Jiang , Jing Lu , Jia Yu , Jun Su , Xiao Yan Tang , Yong Yin
CPC classification number: G06F21/566 , G06F21/51 , G06F2221/033
Abstract: An embodiment includes generating a caller list of callers that issue requests for calling a designated program at runtime. The embodiment also includes generating an authorized caller list of authorized callers allowed to call the designated program, wherein the authorized callers are selected from among callers on the caller list. The embodiment also includes generating an authorization key for each of the authorized callers that the designated program will require as a condition for completing call requests.
-
公开(公告)号:US20230367745A1
公开(公告)日:2023-11-16
申请号:US17663182
申请日:2022-05-12
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Dong Hui Liu , Peng Hui Jiang , Jing Lu , Xiao Yan Tang , Jun Su , Jia Yu , Yong Yin
IPC: G06F16/174
CPC classification number: G06F16/1756
Abstract: Methods, systems, and computer program products for de-duplicating data in executable files in a container image are disclosed. The method may include receiving a request to read a file in a first layer in a container image including a plurality of layers, wherein the file is a delta file which is from an updated executable file based on a base executable file, the base executable file is in a lower layer than the first layer in the container image, and the delta file includes block mappings between the updated executable file and the base executable file and different data between the two files, and blocks included in the two files are based on respective file structure. The method may also include restoring the updated executable file based on the delta file and the base executable file. The method may further include returning data in the updated executable file.
-
公开(公告)号:US11675593B2
公开(公告)日:2023-06-13
申请号:US17462071
申请日:2021-08-31
Applicant: International Business Machines Corporation
Inventor: Jing Lu , Dong Hui Liu , Xiao Yan Tang , Yong Yin , Peng Hui Jiang , Xiang Zu , Jia Yu
CPC classification number: G06F9/3838 , G06F8/65 , G06F8/656 , G06F9/34 , G06F9/44521 , G06F9/541
Abstract: Embodiments of the invention are directed to updating a dynamic library. Aspects include receiving an indication that the dynamic library has been updated and identifying all program modules that depend on the dynamic library. Aspects also include, for each program module that depends on the dynamic library, reassigning an application program interface (API) address for a current version of the dynamic library to an API address of the updated version of the dynamic library.
-
公开(公告)号:US20230061270A1
公开(公告)日:2023-03-02
申请号:US17462071
申请日:2021-08-31
Applicant: International Business Machines Corporation
Inventor: Jing Lu , Dong Hui Liu , Xiao Yan Tang , Yong Yin , Peng Hui Jiang , Xiang Zu , Jia Yu
Abstract: Embodiments of the invention are directed to updating a dynamic library. Aspects include receiving an indication that the dynamic library has been updated and identifying all program modules that depend on the dynamic library. Aspects also include, for each program module that depends on the dynamic library, reassigning an application program interface (API) address for a current version of the dynamic library to an API address of the updated version of the dynamic library.
-
公开(公告)号:US20220374233A1
公开(公告)日:2022-11-24
申请号:US17327903
申请日:2021-05-24
Applicant: International Business Machines Corporation
Inventor: Ming Ran Liu , Xiao Yan Tang , Bao Zhang , Jing Lu , Dong Hui Liu , Peng Hui Jiang , Yong Yin , Jia Yu
Abstract: In an approach for improving data access performance in memory, a processor monitors each data access to a data element in the memory from an application, wherein the application has a plurality of functions. A processor records, during runtime, each data access into a monitoring element table, wherein the record for each data access includes an identity, a start address, an end address, and a memory page number. A processor clusters recorded data accesses for each function based on a distance between data elements accessed in sequence. A processor allocates, based on the data element clustering result, the data elements in a same cluster into a same memory unit in the memory.
-
公开(公告)号:US11347523B2
公开(公告)日:2022-05-31
申请号:US17089847
申请日:2020-11-05
Applicant: International Business Machines Corporation
Inventor: Xiao Ling Chen , Zhan Peng Huo , Yong Yin , Dong Hui Liu , Qi Li , Jia Yu , Jiang Yi Liu , Xiao Xuan Fu , Cheng Fang Wang
IPC: G06F9/445
Abstract: Techniques include executing a software program having a function call to a shared library and reloading the shared library without stopping execution of the software program. A global offset table (GOT) is updated responsive to resolving a link address associated with the function call. An entry in GOT included a link address field, an index field, and a resolved field, the updating including updating the index field with an affirmative value and marking the resolved field with an affirmative flag for the entry in the GOT. Responsive to reloading the shared library, the entry in the GOT is found having the affirmative value in the index field and the affirmative flag in the resolved field. An address value in the link address field is returned for the entry having the affirmative value in the index field, responsive to a subsequent execution of the function call to the shared library.
-
公开(公告)号:US20210123753A1
公开(公告)日:2021-04-29
申请号:US16662450
申请日:2019-10-24
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Dong Hui Liu , Peng Hui Jiang , Yong Yin , Jia Yu , Jia Tian Zhong , Xing Xing Shen
Abstract: The present invention relates to a method for enhanced path mapping based on safety consideration. To provide a method to determine a superior path from at least two alternative paths, it is proposed that the navigation system adds one or more new safety parameters based on safety consideration in path mapping process and calculate a path safety index for the alternative paths. The safety parameters may include a biometric index of at least one of drivers of vehicles on the alternative paths, a physical status of the vehicles or environment, a driving habits index of at least one of drivers of the vehicles and/or an autonomous vehicle safety index of at least one of the vehicles.
-
公开(公告)号:US12277066B2
公开(公告)日:2025-04-15
申请号:US18085706
申请日:2022-12-21
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Dong Hui Liu , Jing Lu , Peng Hui Jiang , Naijie Li , Xiao Yan Tang , Bao Zhang , Jun Su , Yong Yin , Jia Yu
IPC: G06F3/00 , G06F12/00 , G06F12/0882 , G06F12/1009 , G06F12/1027 , G06F13/00
Abstract: A method, including: monitoring resource utilization of an operating system (OS) with applications utilizing larger pages; determining the monitored resource utilization is greater than a threshold resource utilization; in response to the determining the monitored resource utilization is greater than a threshold resource utilization, determining a respective larger pages index value for each of the applications utilizing larger pages; and turning off larger pages utilization of a subset of the applications utilizing larger pages, wherein the subset comprises a predefined number of the applications utilizing larger pages that have highest determined larger pages index values.
-
公开(公告)号:US12197901B2
公开(公告)日:2025-01-14
申请号:US18085615
申请日:2022-12-21
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Bao Zhang , Jing Lu , Dong Hui Liu , Peng Hui Jiang , Xiao Yan Tang , Yong Yin , Jia Yu
Abstract: In a first aspect of the invention, there is a computer-implemented method including: generating, by one or more processors, dependency version information for a target software application, based on activity of a compiler registered with an event handler; generating, by the one or more processors, one or more dependency sections with a dependency list for the target software application, wherein the dependency list incorporates the dependency version information; and building, by the one or more processors, a software package with the one or more dependency sections with the dependency list for the target software application.
-
公开(公告)号:US20240273434A1
公开(公告)日:2024-08-15
申请号:US18107787
申请日:2023-02-09
Applicant: International Business Machines Corporation
Inventor: Peng Hui Jiang , Dong Hui Liu , Jia Tian Zhong , Xing Xing Shen , Jing Lu , Jia Yu , Yong Yin , Xiao Yan Tang
IPC: G06Q10/0633 , G06Q10/067
CPC classification number: G06Q10/0633 , G06Q10/067
Abstract: A set of tasks is extracted from workflow data of a system. A set of keywords is extracted from a task in the set of tasks. The set of keywords is expanded into an expanded set of keywords, the expanded set of keywords comprising a new keyword with a semantic relationship to a keyword in the set of keywords. A new task is generated using the expanded set of keywords. Based on a result of execution of the new task, a model of the system is adjusted, the model comprising the workflow data, the set of tasks, and the expanded set of keywords.
-
-
-
-
-
-
-
-
-