-
公开(公告)号:US20180292921A1
公开(公告)日:2018-10-11
申请号:US16009645
申请日:2018-06-15
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: SI BIN FAN , PING XIAO , Jun Zhang , XiaoLin Zhang , Jia Zou
IPC: G06F3/0354 , H04W4/12 , H04L12/58 , G06F3/0485
CPC classification number: G06F3/03543 , G06F3/0482 , G06F3/0485 , G09G5/34 , G09G2340/145 , H04L51/04 , H04W4/12
Abstract: In an approach to quick browsing of content displayed on a computing device, a computer monitors a scrolling operation in a first display mode on a computing device in which a plurality of information items are displayed. The computer determines whether a speed of the scrolling operation exceeds a threshold value, and then in response to the speed of the scrolling operation exceeding a threshold value, switches the first display mode to a second display mode.
-
公开(公告)号:US20180232297A1
公开(公告)日:2018-08-16
申请号:US15434187
申请日:2017-02-16
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: SI BIN FAN , XIAO FENG GUAN , CHEN JIANG , YAN RONG SHEN , CHANG NING SONG , PING XIAO
IPC: G06F11/36
CPC classification number: G06F11/3624 , G06F11/362
Abstract: A computer implemented method for selecting breakpoints for cross-layer debugging is provided. The method includes receiving code comprising a plurality of layers, and executing a static analysis of the code to obtain a use-definition (UD) chain, alias information, and a parameter mapping for each of the plurality of layers. The method also includes determining a statement of the code that produces one of an error and a failure, and generating a table comprising a plurality of fields including a working statement field, watching variable field, and a watching function field. The method includes adding the determined statement to the working statement field and performing a cross-layer analysis includes identifying at least one used variable and its associated alias as watching variables from the added working statement, searching the code based on the watching variable field. The method includes generating cross-layer suspect code points based on the cross-layer analysis.
-
公开(公告)号:US20210089544A1
公开(公告)日:2021-03-25
申请号:US16580040
申请日:2019-09-24
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: PING XIAO , JOE WINCHESTER , JENNY JING HE , ADRIAN KYTE , CHENG FANG WANG
IPC: G06F16/2457 , G06F16/2455
Abstract: Aspects of the invention include determining artifact data associated with an artifact, segmenting the artifact data into a plurality of portions, associating each portion in the plurality of portions with one or more resources, receiving a query associated with the artifact, determining a candidate resource from the one or more resources based on the query, and initializing a communication session with the candidate resource and a requesting application associated with the query.
-
公开(公告)号:US20190324742A1
公开(公告)日:2019-10-24
申请号:US15960610
申请日:2018-04-24
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: PING XIAO , Su Liu , Si Bin Fan , Meng Wan , Xue Yong Zhang
Abstract: A computer-implemented method includes detecting a first user is editing a first version of a content piece. A first feature set value is determined, describing a first set of values of one or more features of the first version. Based on the first feature set value, a first maturity score of the first version is determined, using a mapping. It is detected that a second user is editing a second version of the content piece in parallel with the first user editing the first version. A second feature set value is determined, describing a second set of values of the one or more features of the second version of the content piece. Based on the second feature set value, a second maturity score of the second version is determined, using the mapping. It is detected that the second maturity score meets a maturity threshold. Thus, a remedial action is performed.
-
-
-