-
公开(公告)号:US20230136606A1
公开(公告)日:2023-05-04
申请号:US17518069
申请日:2021-11-03
Applicant: International Business Machines Corporation
Inventor: Xiao Yan Tang , Naijie Li , Jing Lu , Ming Ran Liu , Yuan Zhai , Kershaw S. Mehta
Abstract: Global variables are shared between programs associated with different addressing modes. A first program of an application records an allocated address to a global variable in a global variable sharing area (GVSA). The first program is associated with a first addressing mode. The first program specifies the global variable to be shared across different addressing modes. An address of the GVSA is passed to a second program of the application that is loaded after the first program has been loaded. The second program is associated with a second addressing mode different from the first addressing mode. The second program also specifies the global variable in the second program to be shared across different addressing modes. The second program retrieves the allocated address to the global variable from the GVSA based on the address of the GVSA. The second program accesses the global variable based on the retrieved allocated address.
-
公开(公告)号:US11500653B2
公开(公告)日:2022-11-15
申请号:US16782107
申请日:2020-02-05
Applicant: International Business Machines Corporation
Inventor: Ming Ran Liu , Bao Zhang , Naijie Li , Jing Lu , Xiao Yan Tang , Kershaw S. Mehta
Abstract: Techniques for signal handling between programs associated with different addressing modes in a computer system are described herein. An aspect includes, based on a signal occurring during execution of a first program in a first runtime environment, wherein the first program and the first runtime environment are associated with a first addressing mode, invoking a first signal exit routine associated with the first addressing mode. Another aspect includes allocating a signal information area (SIA) by the first signal exit routine. Another aspect includes calling a second signal exit routine associated with a second addressing mode that is different from the first addressing mode with an address of the SIA. Another aspect includes allocating a mirror SIA by the second signal exit routine. Another aspect includes handling the signal, and resuming execution based on the handling of the signal.
-
公开(公告)号:US11200070B2
公开(公告)日:2021-12-14
申请号:US16054693
申请日:2018-08-03
Applicant: International Business Machines Corporation
Inventor: Bao Zhang , Jing Lu , Jin Hong Fu , Shi Chong Ma , Xiao Ling Chen , Yuk L. Chan
IPC: G06F9/445 , G06F8/41 , G06F8/54 , G06F16/901
Abstract: Aspects of the present disclosure are directed to methods, systems, and computer program products for using dynamic-link library based on memory size. In the method, a request for calling a first function in a Dynamic-link library (DLL) at runtime is received first. A size of a memory allocated to the DLL is then determined. Then call relationship of functions in the DLL is obtained. At last, functions related to the first function in the DLL are loaded into the memory allocated to the DLL based on the size of the memory allocated to the DLL and call relationship of functions in the DLL.
-
公开(公告)号:US20190273610A1
公开(公告)日:2019-09-05
申请号:US15910975
申请日:2018-03-02
Applicant: International Business Machines Corporation
Inventor: Si Bin Fan , David Kaminsky , Tao Liu , Jing Lu , Xiao Yan Tang , Jun Zhang
Abstract: An example operation may include one or more of generating an initial seed and allocating one or more authorized bits of the initial seed to a plurality of blocks in a distributed ledger, storing the initial seed and an identification of which authorized bits of the initial seed are allocated to each block of the distributed ledger, receiving a final seed value that is partially generated by each of a plurality of nodes configured to access the distributed ledger based on authorized bits of respective blocks updated by each respective node, and generating a random sequence value based on the final seed value and storing the random sequence value in a block of the distributed ledger.
-
公开(公告)号:US09794081B2
公开(公告)日:2017-10-17
申请号:US14667861
申请日:2015-03-25
Applicant: International Business Machines Corporation
IPC: H04L12/18 , H04L12/713 , H04L12/761 , H04L12/46 , H04L12/715 , H04L12/721
CPC classification number: H04L12/185 , H04L12/184 , H04L12/4641 , H04L41/12 , H04L45/16 , H04L45/586 , H04L45/64 , H04L45/70
Abstract: For logical multicasting in overlay networks, at a data processing system, an original unicast packet is received from a first component in a first computing node in an overlay network. To cause multicasting in the overlay network the received original unicast packet was unicast by the first computing node only to the data processing system, and a multicast data structure for the overlay network is maintained only by the data processing system, the multicast data structure containing information of each receiver that is configured to receive unicast packets during logical multicasting in the overlay network. From a set of subscriber receivers in the multicast data structure, a subset of the subscriber receivers is selected. A copy of the original unicast packet is unicast to each subscriber receiver in the subset.
-
公开(公告)号:US09628369B2
公开(公告)日:2017-04-18
申请号:US14702286
申请日:2015-05-01
Applicant: International Business Machines Corporation
Inventor: Fuhui Li , Jing Lu , Jiuxing Nie , Jun Yao
IPC: H04L12/721 , H04L29/08 , H04L12/751
CPC classification number: H04L45/02 , H04L12/4633 , H04L45/124 , H04L45/245 , H04L45/50 , H04L45/66 , H04L69/324
Abstract: The present invention discloses a method for processing non-unicast routes information in a TRILL network and a corresponding RBridge, wherein the RBridge has a neighbor relation with a plurality of other RBridges in the TRILL network, and the RBridge is the RBridge which computes non-unicast routes information in the neighbor relation, and in the method, the RBridge executes steps of: sending an acknowledgement message to the plurality of other RBridges, wherein the acknowledgement message acknowledges that the RBridge is the RBridge which computes the non-unicast routes information; obtaining a network topology related to the non-unicast routes information in the TRILL network; computing the non-unicast routes information based on the network topology; and distributing the computed non-unicast routes information to the plurality of other RBridges. The method and the corresponding RBridge are capable of reducing consumption of CPU resource of RBridges in the TRILL network.
-
公开(公告)号:US20160285641A1
公开(公告)日:2016-09-29
申请号:US14667861
申请日:2015-03-25
Applicant: International Business Machines Corporation
IPC: H04L12/18 , H04L12/713 , H04L12/46 , H04L12/761
CPC classification number: H04L12/185 , H04L12/184 , H04L12/4641 , H04L41/12 , H04L45/16 , H04L45/586 , H04L45/64 , H04L45/70
Abstract: For logical multicasting in overlay networks, at a data processing system, an original unicast packet is received from a first component in a first computing node in an overlay network. To cause multicasting in the overlay network the received original unicast packet was unicast by the first computing node only to the data processing system, and a multicast data structure for the overlay network is maintained only by the data processing system, the multicast data structure containing information of each receiver that is configured to receive unicast packets during logical multicasting in the overlay network. From a set of subscriber receivers in the multicast data structure, a subset of the subscriber receivers is selected. A copy of the original unicast packet is unicast to each subscriber receiver in the subset.
Abstract translation: 对于覆盖网络中的逻辑多播,在数据处理系统中,从覆盖网络中的第一计算节点中的第一组件接收原始单播分组。 为了在覆盖网络中进行组播,接收到的原始单播分组由第一计算节点单播到数据处理系统,并且覆盖网络的组播数据结构仅由数据处理系统维护,组播数据结构包含信息 被配置为在覆盖网络中的逻辑多播期间接收单播分组的每个接收机。 从多播数据结构中的一组用户接收机中选择用户接收机的子集。 原始单播包的副本是单播到该子集中的每个订户接收者。
-
公开(公告)号:US12147352B2
公开(公告)日:2024-11-19
申请号:US17970122
申请日:2022-10-20
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Naijie Li , Dong Hui Liu , Jing Lu , Peng Hui Jiang , Xiao Yan Tang , Bao Zhang , Yong Yin , Jun Su , Jia Yu
IPC: G06F12/00 , G06F12/1027 , G06F13/00 , G06N20/00
Abstract: A method, including: identifying static application features of an application; identifying resource access features of the application; labeling a translation lookaside buffer (TLB) miss threshold of a runtime feature of the application; determining utilization of larger pages during the runtime based on the TLB miss threshold; and setting the TLB miss threshold based on the determined utilization of the larger pages.
-
公开(公告)号:US20240211221A1
公开(公告)日:2024-06-27
申请号:US18085615
申请日:2022-12-21
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Bao Zhang , Jing Lu , Dong Hui Liu , Peng Hui Jiang , Xiao Yan Tang , Yong Yin , Jia Yu
Abstract: In a first aspect of the invention, there is a computer-implemented method including: generating, by one or more processors, dependency version information for a target software application, based on activity of a compiler registered with an event handler; generating, by the one or more processors, one or more dependency sections with a dependency list for the target software application, wherein the dependency list incorporates the dependency version information; and building, by the one or more processors, a software package with the one or more dependency sections with the dependency list for the target software application.
-
10.
公开(公告)号:US20230315715A1
公开(公告)日:2023-10-05
申请号:US17708440
申请日:2022-03-30
Applicant: International Business Machines Corporation
Inventor: Jia Tian Zhong , Peng Hui Jiang , Dong Hui Liu , Xing Xing Shen , Jia Yu , Yong Yin , Jing Lu , Xiao Yan Tang
IPC: G06F16/23
CPC classification number: G06F16/2365
Abstract: A computer-implemented method, system and computer program product for improving accuracy and efficiency of auditing databases. A table, list or index of a database is analyzed to identify metadata, which includes time series data, user data, an Internet Protocol address and operation data. The identified metadata is associated with the corresponding record or row of the table, list or index from which the metadata was extracted. A determination is then made as to whether to record a raw data image associated with the record or row of the analyzed table, list or index based on the corresponding data operation. The identified metadata as well as the recorded data images, if any, are stored in a structured audit log. Auditing information is then obtained from a structured audit log based on matching the record or row identifier (RID) associated with the query with the RID associated with the structured audit log.
-
-
-
-
-
-
-
-
-