-
公开(公告)号:US12293166B2
公开(公告)日:2025-05-06
申请号:US17648306
申请日:2022-01-19
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Lei Wang , Xiao Ling Chen , Zheng Lei An , Yan Huang , Dong Chen
Abstract: A method, system, and computer program product for improving debugging efficiency through fallibility skip functionality are provided. The method initiates a fallibility skip mode within a programming environment. The method identifies a code module to be translated from a first coding language to a second coding language. The code module including a function statement. A modified function statement is generated based on the function statement and the initiation of the fallibility skip mode. One or more exception handling functions are added based on the modified function statement and the fallibility skip mode. The method generates a modified code module in the second coding language based on the fallibility skip mode.
-
公开(公告)号:US20250124828A1
公开(公告)日:2025-04-17
申请号:US18379160
申请日:2023-10-12
Applicant: International Business Machines Corporation
Inventor: Dong Chen , Xiang Wei Li , Xiang Juan Meng , Ting Ting Zhan , Xiao Juan Chen , Ye Huo
Abstract: A method for correcting dimensional distortion when viewing a display at an angle is disclosed. In one embodiment, such a method identifies a line of sight of a user relative to a display. The method determines an angle of the line of sight relative to the display and a displacement of the user relative to the display. Using the angle and the displacement, the method determines an adjustment needed to reduce dimensional distortion of content on the display caused by the angle and the displacement. The method applies the adjustment to the content. In certain embodiments, applying the adjustment includes one or more of altering a size of the content on the display, altering proportions of the content on the display, and altering an orientation of the content on the display. A corresponding system and computer program product are also disclosed.
-
公开(公告)号:US20250071238A1
公开(公告)日:2025-02-27
申请号:US18236181
申请日:2023-08-21
Applicant: International Business Machines Corporation
Inventor: Dong Chen , Ming Lei Zhang , Ting Ting Zhan , Yuan Jie Zhang , Yin Xi Guo
IPC: H04N7/15 , H04L65/401
Abstract: A computer-implemented method, according to one approach, includes: receiving a request to add a subset of participants on a group call to a private communication channel. The group call includes a shared communication channel extending between the participants, the shared communication channel being configured to exchange information between the participants. The method further includes evaluating statuses of the participants in the subset. Moreover, in response to determining that the participants in the subset are not already included on a different private communication channel, and that the participants in the subset are not actively being added to a different private communication channel, the subset of participants are added to the private communication channel.
-
公开(公告)号:US20240094902A1
公开(公告)日:2024-03-21
申请号:US17948490
申请日:2022-09-20
Applicant: International Business Machines Corporation
Inventor: Xiang Wei Li , Dong Chen , Ye Chuan Wang , Ting Ting Zhan , Ju Ling Liu , Yu An , Wei Yan
IPC: G06F3/04895 , G10L15/22
CPC classification number: G06F3/04895 , G10L15/22 , G09B5/06
Abstract: A method for selecting an application and associated operational guidance to utilize on a mobile device is disclosed. In one embodiment, such a method identifies a selected environment of interest. Within the selected environment, the method identifies one or more applications that are commonly utilized by users within the selected environment and documents the one or more applications. The method detects physical entry of a particular user into the selected environment and, in response to detecting the entry, automatically notifies the particular user of the one or more applications that are commonly utilized within the selected environment. In certain embodiments, the method enables the user to quickly launch the one or more applications and/or provides operational guidance to the user with regard to using the one or more applications. A corresponding system and computer program product are also disclosed.
-
公开(公告)号:US11841876B2
公开(公告)日:2023-12-12
申请号:US17482406
申请日:2021-09-22
Applicant: International Business Machines Corporation
Inventor: He Fang Zhang , Xue Bo , De Song Li , Wen Kui Zhou , Yin Xia , Dong Chen
CPC classification number: G06F16/273 , G06F16/2379 , G06N20/00
Abstract: Techniques are described with regard to managing transaction size during a database replication process. An associated computer-implemented method includes identifying each of at least one transaction associated with at least one source database stored in a replication capture memory, identifying at least one potential excessive memory transaction by applying, via at least one machine learning pattern detection model, pattern detection to each of the at least one transaction stored in the replication capture memory, and constructing at least one compact data unit associated with each of the at least one potential excessive memory transaction. The computer-implemented method further includes facilitating compact data unit transmission to a replication apply server system in order to replicate the at least one compact data unit associated with each of the at least one potential excessive memory transaction to at least one target database via a replication apply server application.
-
公开(公告)号:US11632397B2
公开(公告)日:2023-04-18
申请号:US16514607
申请日:2019-07-17
Applicant: International Business Machines Corporation
Inventor: Dong Chen , Wu Mi Zhong , Ting Yin , Zhi Li Guan , Yang Liang , Shao Jun Ding
Abstract: A method, computer program product, and system includes a processor(s) obtaining an authorization failure from a target application because an access request was denied based on insufficient permissions of a user. The processor(s) institutes a mock interface with a visual appearance of the target application. The mock interface displays predefined data and the target application displays dynamic data, from the server(s) executing the target application. The processor(s) obtains, via the mock interface, a request to change the permissions of the user to the target application, which includes a selection, by the user, through the mock interface, of one or more individual permissions displayed in the mock interface. The processor(s) automatically generates a customized security policy comprising the selection, where based on applying the customized security policy, repeating the access request results in authorized access to the target application.
-
公开(公告)号:US20230042683A1
公开(公告)日:2023-02-09
申请号:US17394240
申请日:2021-08-04
Applicant: International Business Machines Corporation
Inventor: Peng Fei Tian , Ting Ting Zhan , Jing Bai , Dong Chen , Jun Su , Zhen Rong Wang , Shu Tang
IPC: G06F40/30 , G06F40/284 , G06F16/33 , G06F16/335 , G06F16/338 , G06K9/72 , G06K9/62
Abstract: A computer-implemented method, system and computer program product for improving understandability of text by a user. A final word vector for each word in a sentence of a document is computed, such as by averaging a first word vector and a second word vector for that word. Furthermore, elements of a user portrait are vectorized. A distance is then computed between a vector for each word in the sentence and a vectorized element in the user’s portrait which is summed to form an evaluation result for the element. An evaluation result is also formed for every other element in the user’s portrait by performing such a computation step. A “final evaluation result” is then generated corresponding to the evaluation results for every element in the user’s portrait. The document is then transformed in response to the final evaluation result indicating a lack of understanding of the sentence by the user.
-
公开(公告)号:US20220292120A1
公开(公告)日:2022-09-15
申请号:US17198802
申请日:2021-03-11
Applicant: International Business Machines Corporation
Inventor: Peng Hui Jiang , Jun Su , Dong Chen , Huai Ying HY Xia , Su Liu
Abstract: An embodiment includes receiving a request to delete a specified document from a primary shard of a sharded database. The embodiment also includes inserting a soft-deletion document to a soft-deletion shard, wherein the soft-deletion document identifies the specified document, which remains in the primary shard. The embodiment also includes receiving a query from a client application, wherein the specified document satisfies the query. The embodiment also includes blocking the specified document from being returned in response to the query while the soft-deletion document associated with the specified document remains in the soft-deletion shard.
-
公开(公告)号:US20210116774A1
公开(公告)日:2021-04-22
申请号:US17136700
申请日:2020-12-29
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Yin Xia , Ting Yin , Dong Chen , Ting Ting BJ Zhan , Xiang Juan Meng
Abstract: An anti-peep screen is provided. The anti-peep screen includes a casing, a plurality of microspheres within the casing, wherein each of the microspheres includes a colorless transparent fluid fill and a plurality of charged particles, and a base electrode within the casing adjacent to the plurality of microspheres.
-
公开(公告)号:US10979337B2
公开(公告)日:2021-04-13
申请号:US16775804
申请日:2020-01-29
Applicant: International Business Machines Corporation
Inventor: Dong Chen , Noel A. Eisley , Philip Heidelberger
IPC: G06F15/17 , H04L12/701 , H04L12/721 , G06F15/173
Abstract: A method, system and computer program product are disclosed for routing data packet in a computing system comprising a multidimensional torus compute node network including a multitude of compute nodes, and an I/O node network including a plurality of I/O nodes. In one embodiment, the method comprises assigning to each of the data packets a destination address identifying one of the compute nodes; providing each of the data packets with a toio value; routing the data packets through the compute node network to the destination addresses of the data packets; and when each of the data packets reaches the destination address assigned to said each data packet, routing said each data packet to one of the I/O nodes if the toio value of said each data packet is a specified value. In one embodiment, each of the data packets is also provided with an ioreturn value used to route the data packets through the compute node network.
-
-
-
-
-
-
-
-
-