-
公开(公告)号:US20240134852A1
公开(公告)日:2024-04-25
申请号:US17970626
申请日:2022-10-20
发明人: Jia Tian Zhong , Peng Hui Jiang , Ming Lei Zhang , Ting Ting Zhan , Le Chang , Zhen Liu , Xiao Yan Tian
IPC分类号: G06F16/2453 , G06F11/34 , G06F21/62
CPC分类号: G06F16/24542 , G06F11/3409 , G06F21/6218 , G06F2221/2141
摘要: An example operation may include one or more of storing an index that comprises identifiers of role-based access privileges for a plurality of users with respect to a database, receiving a database query associated with a user from a software program, identifying data records within the database that the user has permission to access based on database accessibility rights of the user stored within the index, prior to execution of the database query, loading the identified data records into the memory and filtering out other data records from the database which the user does not have permission to access, and executing the database query on the identified data records loaded from the database and returning query results from the execution to the software program.
-
公开(公告)号:US20220398191A1
公开(公告)日:2022-12-15
申请号:US17345142
申请日:2021-06-11
发明人: Gan Zhang , XING XING SHEN , Shan Gao , Le Chang , Ming Lei Zhang , Zeng Yu Peng
IPC分类号: G06F12/02 , G06F12/0875
摘要: A method for heap space management includes, in response to a determination that consumption of a first heap space of an application exceeds a first threshold, determining whether a second heap space of the application after garbage collection is sufficient to accommodate data stored in the first heap space. The method further includes, in response to a determination that the second heap space after the garbage collection is sufficient to accommodate the data, performing the garbage collection on the second heap space. The method further includes storing the data into the second heap space.
-
公开(公告)号:US20230071020A1
公开(公告)日:2023-03-09
申请号:US17467906
申请日:2021-09-07
发明人: Zhen Liu , Jia Tian Zhong , Le Chang , Ming Lei Zhang , Ting Ting Zhan , Xiao Yan Tian
摘要: Examples described herein provide a computer-implemented method for multi-user debugging of a program. The method includes receiving a first request from a first developer to initiate a debug of the program and receiving a second request from a second developer to initiate the debug of the program. The method further includes, responsive to receiving the first request and the second request, initiating the debug of the program. The method further includes sending first source code for the program to the first developer, wherein the first source code is associated with the first developer. The method further includes sending second source code for the program to the second developer, wherein the second source code is associated with the second developer. The method further includes updating the program responsive to receiving a change to at least one of the first source code or the second source code.
-
公开(公告)号:US11288041B1
公开(公告)日:2022-03-29
申请号:US17111260
申请日:2020-12-03
发明人: Zhen Liu , Jia Tian Zhong , Le Chang , Ming Lei Zhang , Ting Ting Zhan , Xiao Yan Tian
摘要: Source code of a golden version and a next version of a program is received in which procedure calls are modified to call from an entry point table (EPT) with index numbers corresponding to procedure memory addresses. An executable defect-free golden version program and next version program with a defect are received. A first entry point table (first EPT) for the new version program and a second EPT for the golden version program are generated. A series of substitutions of procedures from the second EPT to the first EPT is performed and an order of substitutions includes: a module set, a module of the module set, a procedure set of the module, and a procedure of the procedure set. The defect producing procedure is identified by substituting in order until the defect is absent and proceeding to the next substitution in order.
-
公开(公告)号:US11663072B2
公开(公告)日:2023-05-30
申请号:US17477621
申请日:2021-09-17
发明人: Gan Zhang , Le Chang , Ming Lei Zhang , Xing Xing Shen , Shan Gao , Guang Han Sui , Zeng Yu Peng
CPC分类号: G06F11/0793 , G06F8/65 , G06F11/302
摘要: A computer-implemented method includes receiving, by a computing system, an update for a computer program executing on the computing system. The method further includes determining, by the computing system, a data structure that is affected by the update by checking a structure change information included in the update. The method further includes checking, by the computing system, instance-count of the data structure, the instance-count representing a number of instances of the data structure in a memory of the computing system. The method further includes based on a determination that the instance-count is zero, applying, by the computing system, the update to the computer program.
-
公开(公告)号:US11645045B2
公开(公告)日:2023-05-09
申请号:US17666264
申请日:2022-02-07
发明人: Zhen Liu , Jia Tian Zhong , Le Chang , Ming Lei Zhang , Ting Ting Zhan , Xiao Yan Tian
CPC分类号: G06F8/22 , G06F8/433 , G06F8/71 , G06F11/368 , G06F11/3608
摘要: Source code of a golden version and a next version of a program is received in which procedure calls are modified to call from an entry point table (EPT) with index numbers corresponding to procedure memory addresses. An executable defect-free golden version program and next version program with a defect are received. A first entry point table (first EPT) for the new version program and a second EPT for the golden version program are generated. A series of substitutions of procedures from the second EPT to the first EPT is performed and an order of substitutions includes: a module set, a module of the module set, a procedure set of the module, and a procedure of the procedure set. The defect producing procedure is identified by substituting in order until the defect is absent and proceeding to the next substitution in order.
-
公开(公告)号:US11526437B1
公开(公告)日:2022-12-13
申请号:US17345142
申请日:2021-06-11
发明人: Gan Zhang , Xing Xing Shen , Shan Gao , Le Chang , Ming Lei Zhang , Zeng Yu Peng
IPC分类号: G06F12/02 , G06F12/0875
摘要: A method for heap space management includes, in response to a determination that consumption of a first heap space of an application exceeds a first threshold, determining whether a second heap space of the application after garbage collection is sufficient to accommodate data stored in the first heap space. The method further includes, in response to a determination that the second heap space after the garbage collection is sufficient to accommodate the data, performing the garbage collection on the second heap space. The method further includes storing the data into the second heap space.
-
公开(公告)号:US20220179623A1
公开(公告)日:2022-06-09
申请号:US17666264
申请日:2022-02-07
发明人: ZHEN LIU , Jia Tian Zhong , Le Chang , Ming Lei Zhang , Ting Ting Zhan , Xiao Yan Tian
摘要: Source code of a golden version and a next version of a program is received in which procedure calls are modified to call from an entry point table (EPT) with index numbers corresponding to procedure memory addresses. An executable defect-free golden version program and next version program with a defect are received. A first entry point table (first EPT) for the new version program and a second EPT for the golden version program are generated. A series of substitutions of procedures from the second EPT to the first EPT is performed and an order of substitutions includes: a module set, a module of the module set, a procedure set of the module, and a procedure of the procedure set. The defect producing procedure is identified by substituting in order until the defect is absent and proceeding to the next substitution in order.
-
公开(公告)号:US20240232191A9
公开(公告)日:2024-07-11
申请号:US17970626
申请日:2022-10-21
发明人: Jia Tian Zhong , Peng Hui Jiang , Ming Lei Zhang , Ting Ting Zhan , Le Chang , Zhen Liu , Xiao Yan Tian
IPC分类号: G06F16/2453 , G06F11/34 , G06F21/62
CPC分类号: G06F16/24542 , G06F11/3409 , G06F21/6218 , G06F2221/2141
摘要: An example operation may include one or more of storing an index that comprises identifiers of role-based access privileges for a plurality of users with respect to a database, receiving a database query associated with a user from a software program, identifying data records within the database that the user has permission to access based on database accessibility rights of the user stored within the index, prior to execution of the database query, loading the identified data records into the memory and filtering out other data records from the database which the user does not have permission to access, and executing the database query on the identified data records loaded from the database and returning query results from the execution to the software program.
-
公开(公告)号:US11748236B2
公开(公告)日:2023-09-05
申请号:US17467906
申请日:2021-09-07
发明人: Zhen Liu , Jia Tian Zhong , Le Chang , Ming Lei Zhang , Ting Ting Zhan , Xiao Yan Tian
CPC分类号: G06F11/3664 , G06F8/77 , G06F21/6218
摘要: Examples described herein provide a computer-implemented method for multi-user debugging of a program. The method includes receiving a first request from a first developer to initiate a debug of the program and receiving a second request from a second developer to initiate the debug of the program. The method further includes, responsive to receiving the first request and the second request, initiating the debug of the program. The method further includes sending first source code for the program to the first developer, wherein the first source code is associated with the first developer. The method further includes sending second source code for the program to the second developer, wherein the second source code is associated with the second developer. The method further includes updating the program responsive to receiving a change to at least one of the first source code or the second source code.
-
-
-
-
-
-
-
-
-