-
41.
公开(公告)号:US09495131B2
公开(公告)日:2016-11-15
申请号:US14641765
申请日:2015-03-09
Applicant: International Business Machines Corporation
Inventor: Dong Chen , Noel A. Eisley , Philip Heidelberger , Burkhard Steinmacher-Burow
CPC classification number: G06F7/38 , G06F7/485 , G06F9/30014 , G06F9/30025 , G06F9/3885 , G06F2207/3808
Abstract: To add floating point numbers in a parallel computing system, a collective logic device receives the floating point numbers from computing nodes. The collective logic devices converts the floating point numbers to integer numbers. The collective logic device adds the integer numbers and generating a summation of the integer numbers. The collective logic device converts the summation to a floating point number. The collective logic device performs the receiving, the converting the floating point numbers, the adding, the generating and the converting the summation in one pass. One pass indicates that the computing nodes send inputs only once to the collective logic device and receive outputs only once from the collective logic device.
-
公开(公告)号:US20160110256A1
公开(公告)日:2016-04-21
申请号:US14973021
申请日:2015-12-17
Applicant: International Business Machines Corporation
Inventor: Alan Gara , Dong Chen , Philip Heidelberger , Martin Ohmacht
CPC classification number: G06F11/1076 , G06F11/1064 , G06F2212/403 , H03M1/0687 , H03M13/13 , H03M13/2707 , H03M13/271 , H03M13/29 , H03M13/616
Abstract: A method and system are disclosed for providing combined error code protection and subgroup parity protection for a given group of n bits. The method comprises the steps of identifying a number, m, of redundant bits for said error protection; and constructing a matrix P, wherein multiplying said given group of n bits with P produces m redundant error correction code (ECC) protection bits, and two columns of P provide parity protection for subgroups of said given group of n bits. In the preferred embodiment of the invention, the matrix P is constructed by generating permutations of m bit wide vectors with three or more, but an odd number of, elements with value one and the other elements with value zero; and assigning said vectors to rows of the matrix P.
-
公开(公告)号:US20130138759A1
公开(公告)日:2013-05-30
申请号:US13729937
申请日:2012-12-28
Applicant: International Business Machines Corporation
Inventor: Dong Chen , Philip Heidelberger
IPC: G06F15/167
CPC classification number: G06F15/167 , G06F11/141
Abstract: A system, method and computer program product for supporting system initiated checkpoints in parallel computing systems. The system and method generates selective control signals to perform checkpointing of system related data in presence of messaging activity associated with a user application running at the node. The checkpointing is initiated by the system such that checkpoint data of a plurality of network nodes may be obtained even in the presence of user applications running on highly parallel computers that include ongoing user messaging activity.
Abstract translation: 一种用于在并行计算系统中支持系统启动的检查点的系统,方法和计算机程序产品。 系统和方法产生选择性控制信号,以在存在与在节点处运行的用户应用相关联的消息传送活动的情况下执行系统相关数据的检查点。 检查点由系统启动,使得即使在存在包括正在进行的用户消息活动的高度并行计算机上的用户应用的情况下,也可以获得多个网络节点的检查点数据。
-
公开(公告)号:US20250077588A1
公开(公告)日:2025-03-06
申请号:US18238987
申请日:2023-08-28
Applicant: International Business Machines Corporation
Inventor: Dong Chen , Ming Lei Zhang , Yuan Jie Zhang , Yin Xi Guo , Ting Ting Zhan
IPC: G06F16/93 , G06F16/215 , G06F16/23 , G06F40/174 , G06F40/279
Abstract: A computer-implemented method, according to one embodiment, includes: receiving copies of notes that were originally recorded by participants, the notes corresponding to a source document. Note fragments in the received copies of notes are identified and one or more machine learning models are used to compare the identified note fragments to pages and paragraphs in the source document that the respective note fragments are located in. Based at least in part on the comparison, the identified note fragments are merged with a copy of the source document to form a pseudo-source document. Furthermore, the pseudo-source document is output.
-
公开(公告)号:US11823193B2
公开(公告)日:2023-11-21
申请号:US16029958
申请日:2018-07-09
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Ting Yin , Dong Chen , Ting Ting BJ Zhan , Xiang Juan Meng , Yin Xia
CPC classification number: G06Q20/40145 , A61B5/053
Abstract: Methods, computer program products, systems are provided for securely performing electronic transactions over a network. An acoustic wave signal is received. The acoustic wave signal is encoded with at least an identifier of a payer of a transaction and transaction information of the transaction. The identifier of the payer and the transaction information is then obtained from the acoustic wave signal. A bone conduction characteristic of the payer is retrieved based on the identifier of the payer and based on the received bone conduction characteristic of the payer, the payer is verified. Completion of the transaction is allowed based on the transaction information in response to the payer being verified.
-
公开(公告)号:US20230335123A1
公开(公告)日:2023-10-19
申请号:US17719543
申请日:2022-04-13
Applicant: International Business Machines Corporation
Inventor: Ju Ling Liu , Xiang Wei Li , Dong Chen , Ye Chuan Wang , Ting Ting Zhan , Wei Yan , Yu An
IPC: G10L15/187 , G10L25/63 , G10L15/04 , G10L15/22 , G06T11/20
CPC classification number: G10L15/187 , G10L25/63 , G10L15/04 , G10L15/22 , G06T11/203
Abstract: A computer-implemented method for generating personalized audio data is disclosed. The computer-implemented method includes receiving user input data, wherein the user input data is at least one of text or audio. The computer-implemented method further includes segmenting the user input data into a set of sentences. The computer-implemented method further includes generating, for each sentence in the set of sentences, a voice image, wherein the voice image includes at least one pronunciation tag and wave line associated with a sentence. The computer-implemented method further includes modifying the user input data based, at least in part on, the wave line and pronunciation tag of the voice image.
-
公开(公告)号:US11704433B2
公开(公告)日:2023-07-18
申请号:US17026360
申请日:2020-09-21
Applicant: International Business Machines Corporation
Inventor: Jun Su , Jin Zhang , Dong Chen , Xi Mei Kong
CPC classification number: G06F21/6245 , G06F16/55 , G06N5/04 , G06N20/00 , H04L63/1425
Abstract: Embodiments of the present invention provide a computer system a computer program product, and a method that comprises identifying privacy data within received data by identifying markers that are indicative of privacy data within the received data; generating a respective classification of an object within the identified privacy data; assigning values to the generated respective classification of the object based on a perceived threat level associated with the identified privacy data; and in response to determining that the assigned value of the received data triggers an alert associated with a predetermined threshold for privacy, automatically preventing distribution of the received data from a computing device to another computing device.
-
公开(公告)号:US11621978B2
公开(公告)日:2023-04-04
申请号:US15850215
申请日:2017-12-21
Applicant: International Business Machines Corporation
Inventor: Dong Chen , Wu Mi Zhong , Ting Yin , Zhi Li Guan , Yang Liang , Shao Jun Ding
Abstract: A method, computer program product, and system includes a processor(s) obtaining an authorization failure from a target application because an access request was denied based on insufficient permissions of a user. The processor(s) institutes a mock interface with a visual appearance of the target application. The mock interface displays predefined data and the target application displays dynamic data, from the server(s) executing the target application. The processor(s) obtains, via the mock interface, a request to change the permissions of the user to the target application, which includes a selection, by the user, through the mock interface, of one or more individual permissions displayed in the mock interface. The processor(s) automatically generates a customized security policy comprising the selection, where based on applying the customized security policy, repeating the access request results in authorized access to the target application.
-
公开(公告)号:US11620275B2
公开(公告)日:2023-04-04
申请号:US17412353
申请日:2021-08-26
Applicant: International Business Machines Corporation
Inventor: Dong Chen , Peng Hui Jiang , Jing Bai , Ting Ting Zhan , Xiaoli Duan , Jun Su
Abstract: Embodiments of the invention are directed to synchronous multi-point update of associated text. Aspects include receiving, from a user, a request to associate a first text with one or more other instances of the first text and looking up the first text in a text association table. Based on determining that no entry in the text association table corresponds to the first text, aspects include creating an entry in the text association table corresponding to the first text. Aspects also include adding an address of the first text to the entry in the text association table. Based on detecting a change to one of the first text and one of the one or more other instances of the first text, aspects further include updating the first text and each of the one or more other instances of the first text that was not changed.
-
公开(公告)号:US20230068592A1
公开(公告)日:2023-03-02
申请号:US17412353
申请日:2021-08-26
Applicant: International Business Machines Corporation
Inventor: Dong Chen , Peng Hui Jiang , Jing Bai , Ting Ting Zhan , Xiaoli Duan , Jun Su
Abstract: Embodiments of the invention are directed to synchronous multi-point update of associated text. Aspects include receiving, from a user, a request to associate a first text with one or more other instances of the first text and looking up the first text in a text association table. Based on determining that no entry in the text association table corresponds to the first text, aspects include creating an entry in the text association table corresponding to the first text. Aspects also include adding an address of the first text to the entry in the text association table. Based on detecting a change to one of the first text and one of the one or more other instances of the first text, aspects further include updating the first text and each of the one or more other instances of the first text that was not changed.
-
-
-
-
-
-
-
-
-