-
公开(公告)号:US20230136606A1
公开(公告)日:2023-05-04
申请号:US17518069
申请日:2021-11-03
发明人: Xiao Yan Tang , Naijie Li , Jing Lu , Ming Ran Liu , Yuan Zhai , Kershaw S. Mehta
摘要: Global variables are shared between programs associated with different addressing modes. A first program of an application records an allocated address to a global variable in a global variable sharing area (GVSA). The first program is associated with a first addressing mode. The first program specifies the global variable to be shared across different addressing modes. An address of the GVSA is passed to a second program of the application that is loaded after the first program has been loaded. The second program is associated with a second addressing mode different from the first addressing mode. The second program also specifies the global variable in the second program to be shared across different addressing modes. The second program retrieves the allocated address to the global variable from the GVSA based on the address of the GVSA. The second program accesses the global variable based on the retrieved allocated address.
-
公开(公告)号:US11500653B2
公开(公告)日:2022-11-15
申请号:US16782107
申请日:2020-02-05
发明人: Ming Ran Liu , Bao Zhang , Naijie Li , Jing Lu , Xiao Yan Tang , Kershaw S. Mehta
摘要: Techniques for signal handling between programs associated with different addressing modes in a computer system are described herein. An aspect includes, based on a signal occurring during execution of a first program in a first runtime environment, wherein the first program and the first runtime environment are associated with a first addressing mode, invoking a first signal exit routine associated with the first addressing mode. Another aspect includes allocating a signal information area (SIA) by the first signal exit routine. Another aspect includes calling a second signal exit routine associated with a second addressing mode that is different from the first addressing mode with an address of the SIA. Another aspect includes allocating a mirror SIA by the second signal exit routine. Another aspect includes handling the signal, and resuming execution based on the handling of the signal.
-
公开(公告)号:US20190273610A1
公开(公告)日:2019-09-05
申请号:US15910975
申请日:2018-03-02
发明人: Si Bin Fan , David Kaminsky , Tao Liu , Jing Lu , Xiao Yan Tang , Jun Zhang
摘要: An example operation may include one or more of generating an initial seed and allocating one or more authorized bits of the initial seed to a plurality of blocks in a distributed ledger, storing the initial seed and an identification of which authorized bits of the initial seed are allocated to each block of the distributed ledger, receiving a final seed value that is partially generated by each of a plurality of nodes configured to access the distributed ledger based on authorized bits of respective blocks updated by each respective node, and generating a random sequence value based on the final seed value and storing the random sequence value in a block of the distributed ledger.
-
公开(公告)号:US20240211221A1
公开(公告)日:2024-06-27
申请号:US18085615
申请日:2022-12-21
发明人: Bao Zhang , Jing Lu , Dong Hui Liu , Peng Hui Jiang , Xiao Yan Tang , Yong Yin , Jia Yu
摘要: In a first aspect of the invention, there is a computer-implemented method including: generating, by one or more processors, dependency version information for a target software application, based on activity of a compiler registered with an event handler; generating, by the one or more processors, one or more dependency sections with a dependency list for the target software application, wherein the dependency list incorporates the dependency version information; and building, by the one or more processors, a software package with the one or more dependency sections with the dependency list for the target software application.
-
5.
公开(公告)号:US20230315715A1
公开(公告)日:2023-10-05
申请号:US17708440
申请日:2022-03-30
发明人: Jia Tian Zhong , Peng Hui Jiang , Dong Hui Liu , Xing Xing Shen , Jia Yu , Yong Yin , Jing Lu , Xiao Yan Tang
IPC分类号: G06F16/23
CPC分类号: G06F16/2365
摘要: A computer-implemented method, system and computer program product for improving accuracy and efficiency of auditing databases. A table, list or index of a database is analyzed to identify metadata, which includes time series data, user data, an Internet Protocol address and operation data. The identified metadata is associated with the corresponding record or row of the table, list or index from which the metadata was extracted. A determination is then made as to whether to record a raw data image associated with the record or row of the analyzed table, list or index based on the corresponding data operation. The identified metadata as well as the recorded data images, if any, are stored in a structured audit log. Auditing information is then obtained from a structured audit log based on matching the record or row identifier (RID) associated with the query with the RID associated with the structured audit log.
-
公开(公告)号:US20220405118A1
公开(公告)日:2022-12-22
申请号:US17353945
申请日:2021-06-22
发明人: Ming Ran Liu , Jing Lu , NAIJIE LI , Xiao Yan Tang , Yuan Zhai , Kershaw S. Mehta
摘要: Aspects of the invention include creating a first file control block in a primary runtime environment with a first addressing mode and a second file control block in a second runtime environment with a second addressing mode, where both the first file control block and the second file control block describe a status of a first file of a caller program in the primary runtime environment. The parameters of the first file of the caller program in the primary runtime environment are passed to a target callee program in the secondary runtime environment. An anchor is added in the first file control block as a link to the second file control block. The first file control block are the second file control block synchronized with updates to the first file in the primary runtime environment and the passed parameters of the first file in the secondary runtime environment.
-
公开(公告)号:US11288105B2
公开(公告)日:2022-03-29
申请号:US16939289
申请日:2020-07-27
发明人: Jing Lu , Bao Zhang , Ming Ran Liu , Tie Liu , Xiao Yan Tang , Xiang Zu
摘要: Provided is a method for preventing deadlocks between competing threads. The method includes receiving a lock request from a first thread and, in response, identifying a potential deadlock with a second thread. In response, the method includes determining whether to deny the lock request, which includes: determining whether a first duration for which the first thread will hold the lock to complete its job is longer than a second duration for which the second thread will hold the lock to complete its job; determining whether the second thread will start to use the lock soon relative to the first duration; and determining whether both the first and second threads will complete their respective jobs within a time limit if the lock is denied to the first thread while the second thread completes its job. The method further includes denying the request for the requested lock from the first thread.
-
公开(公告)号:US20240273434A1
公开(公告)日:2024-08-15
申请号:US18107787
申请日:2023-02-09
发明人: Peng Hui Jiang , Dong Hui Liu , Jia Tian Zhong , Xing Xing Shen , Jing Lu , Jia Yu , Yong Yin , Xiao Yan Tang
IPC分类号: G06Q10/0633 , G06Q10/067
CPC分类号: G06Q10/0633 , G06Q10/067
摘要: A set of tasks is extracted from workflow data of a system. A set of keywords is extracted from a task in the set of tasks. The set of keywords is expanded into an expanded set of keywords, the expanded set of keywords comprising a new keyword with a semantic relationship to a keyword in the set of keywords. A new task is generated using the expanded set of keywords. Based on a result of execution of the new task, a model of the system is adjusted, the model comprising the workflow data, the set of tasks, and the expanded set of keywords.
-
公开(公告)号:US20240134805A1
公开(公告)日:2024-04-25
申请号:US17970122
申请日:2022-10-19
发明人: Naijie Li , Dong Hui Liu , Jing Lu , Peng Hui Jiang , Xiao Yan Tang , Bao Zhang , Yong Yin , Jun Su , Jia Yu
IPC分类号: G06F12/1027 , G06N20/00
CPC分类号: G06F12/1027 , G06N20/00 , G06F2212/684
摘要: A method, including: identifying static application features of an application; identifying resource access features of the application; labeling a translation lookaside buffer (TLB) miss threshold of a runtime feature of the application; determining utilization of larger pages during the runtime based on the TLB miss threshold; and setting the TLB miss threshold based on the determined utilization of the larger pages.
-
公开(公告)号:US11947498B2
公开(公告)日:2024-04-02
申请号:US17663182
申请日:2022-05-12
发明人: Dong Hui Liu , Peng Hui Jiang , Jing Lu , Xiao Yan Tang , Jun Su , Jia Yu , Yong Yin
IPC分类号: G06F16/00 , G06F16/174
CPC分类号: G06F16/1756
摘要: Methods, systems, and computer program products for de-duplicating data in executable files in a container image are disclosed. The method may include receiving a request to read a file in a first layer in a container image including a plurality of layers, wherein the file is a delta file which is from an updated executable file based on a base executable file, the base executable file is in a lower layer than the first layer in the container image, and the delta file includes block mappings between the updated executable file and the base executable file and different data between the two files, and blocks included in the two files are based on respective file structure. The method may also include restoring the updated executable file based on the delta file and the base executable file. The method may further include returning data in the updated executable file.
-
-
-
-
-
-
-
-
-