-
1.
公开(公告)号:US20180293148A1
公开(公告)日:2018-10-11
申请号:US15482101
申请日:2017-04-07
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Guan Jun Liu , Niao Qing Liu , Ai Lian Mi , Jing Jing Wen , BEI CHUN ZHOU
Abstract: According to one embodiment, a method, computer system, and computer program product for memory corruption diagnosis is provided. The present invention may include generating a pattern expression (PE) header file, wherein a plurality of common datatypes associated with a software program are pre-defined. The invention may further include generating a PE for each of the plurality of common datatypes, and generating a PE table by merging the generated PEs for each of the plurality of common datatypes. Upon discovery that memory corruption has occurred, the invention may include transmitting a recorded state of the software program as a core dump file to a server, and using a dump utility to identify overlay content of the core dump file. Lastly, the invention may include identifying a possible source program of the memory corruption by matching the PE tables against the illegally-written overlay content.
-
公开(公告)号:US20170109203A1
公开(公告)日:2017-04-20
申请号:US14883678
申请日:2015-10-15
Applicant: International Business Machines Corporation
Inventor: Guan Jun Liu , Niao Qing Liu , Ai Lian Mi , Bei Chun Zhou
IPC: G06F9/50
CPC classification number: G06F9/5027 , G06F2209/5022
Abstract: Embodiments of the present invention may schedule a task in a processing system. According to one embodiment of the present invention, a resource to be accessed by a task in a processing system is determined based on a type of a request for initiating the task. Then, a length of a task queue that records at least one task waiting for the resource is determined Next, the request is suspended in response to the length of the task queue being greater than a predefined threshold.
-
公开(公告)号:US11354540B2
公开(公告)日:2022-06-07
申请号:US16581807
申请日:2019-09-25
Applicant: International Business Machines Corporation
Inventor: Qin Li , Jonathan D. Dunne , Guang Han Sui , Ping Xiao , Peng Hui Jiang , Niao Qing Liu , Xiang Zhou
Abstract: In an approach, a processor detects at least one training message delivered by a user on a social media application, the training message being accessible by an operator. A processor records training feedback performed by the operator on the social media application regarding to the at least one training message. A processor trains an analysis engine module using (i) the at least one training message as input and (ii) the training feedback as output. A processor generates a predicted feedback for a subsequent message based on the trained analysis engine module.
-
公开(公告)号:US10346286B2
公开(公告)日:2019-07-09
申请号:US15902161
申请日:2018-02-22
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Guan Jun Liu , Niao Qing Liu , Ai Lian Mi , Jing Jing Wen , Bei Chun Zhou
Abstract: According to one embodiment, a method, computer system, and computer program product for memory corruption diagnosis is provided. The present invention may include generating a pattern expression (PE) header file, wherein a plurality of common datatypes associated with a software program are pre-defined. The invention may further include generating a PE for each of the plurality of common datatypes, and generating a PE table by merging the generated PEs for each of the plurality of common datatypes. Upon discovery that memory corruption has occurred, the invention may include transmitting a recorded state of the software program as a core dump file to a server, and using a dump utility to identify overlay content of the core dump file. Lastly, the invention may include identifying a possible source program of the memory corruption by matching the PE tables against the illegally-written overlay content.
-
公开(公告)号:US20180247044A1
公开(公告)日:2018-08-30
申请号:US15444489
申请日:2017-02-28
Applicant: International Business Machines Corporation
Inventor: Guan Jun Liu , Niao Qing Liu , Ailian Mi , Jing Jing Wen , Bei Chun Zhou
Abstract: A system, method, and computer product for managing a password includes receiving a new password set by a user via a key input interface, generating a diagram based on key positions, on the key input interface, of a plurality of characters associated with said new password, storing a diagram into a memory device coupled to the processing device, and providing said diagram stored in the memory device to the user as a password hint.
-
公开(公告)号:US20210089826A1
公开(公告)日:2021-03-25
申请号:US16581807
申请日:2019-09-25
Applicant: international Business Machines Corporation
Inventor: Qin Li , Jonathan D. Dunne , Guang Han Sui , Ping Xiao , Peng Hui Jiang , Niao Qing Liu , Xiang Zhou
Abstract: In an approach, a processor detects at least one training message delivered by a user on a social media application, the training message being accessible by an operator. A processor records training feedback performed by the operator on the social media application regarding to the at least one training message. A processor trains an analysis engine module using (i) the at least one training message as input and (ii) the training feedback as output. A processor generates a predicted feedback for a subsequent message based on the trained analysis engine module.
-
公开(公告)号:US20200322416A1
公开(公告)日:2020-10-08
申请号:US16375905
申请日:2019-04-05
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Guang Han Sui , Peng Hui Jiang , Qin Li , Jian Hua Zhang , Ping Xiao , Niao Qing Liu , Xiang Zhou
IPC: H04L29/08
Abstract: A file is transmitted to a plurality of hosts. The hosts are divided into host groups. A host in each host group is selected as a master host. A data block is received by a master host in a host group. The master host sends the data block to both a master host in a next host group and a next host in the host group in order that the next host in the host group sends the data block to a next host of the next host in the host group, and the master host in the next host group sends the data block to both a master host in a next host group of the next host group and a next host of the next host in the next host group.
-
公开(公告)号:US10387638B2
公开(公告)日:2019-08-20
申请号:US15444489
申请日:2017-02-28
Applicant: International Business Machines Corporation
Inventor: Guan Jun Liu , Niao Qing Liu , Ailian Mi , Jing Jing Wen , Bei Chun Zhou
Abstract: A system, method, and computer product for managing a password includes receiving a new password set by a user via a key input interface, generating a diagram based on key positions, on the key input interface, of a plurality of characters associated with said new password, storing a diagram into a memory device coupled to the processing device, and providing said diagram stored in the memory device to the user as a password hint.
-
公开(公告)号:US10897534B1
公开(公告)日:2021-01-19
申请号:US16569806
申请日:2019-09-13
Applicant: International Business Machines Corporation
Inventor: Guang Han Sui , Peng Hui Jiang , Qin Li , Ping Xiao , Niao Qing Liu , Xiang Zhou , Ping Ping Cheng
IPC: H04M3/428 , G10L15/22 , G10L21/0316 , G10L15/26 , G10L21/043
Abstract: Embodiments of the invention provide methods, systems, computer program products for managing a call waiting in a queue during a request for staff services provided by a call center. According to the method, a first voice segment received in a call made by a device is recorded first. Next, whether a part of the first voice segment is related to a first predefined voice segment is determined. The volume of device is adjusted in response to the part of the first voice segment being related to the first predefined voice segment. A user of the device is alerted in response to the part of the first voice segment being not related to the first predefined voice segment.
-
公开(公告)号:US10540261B2
公开(公告)日:2020-01-21
申请号:US15482101
申请日:2017-04-07
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Guan Jun Liu , Niao Qing Liu , Ai Lian Mi , Jing Jing Wen , Bei Chun Zhou
Abstract: According to one embodiment, a method, computer system, and computer program product for memory corruption diagnosis is provided. The present invention may include generating a pattern expression (PE) header file, wherein a plurality of common datatypes associated with a software program are pre-defined. The invention may further include generating a PE for each of the plurality of common datatypes, and generating a PE table by merging the generated PEs for each of the plurality of common datatypes. Upon discovery that memory corruption has occurred, the invention may include transmitting a recorded state of the software program as a core dump file to a server, and using a dump utility to identify overlay content of the core dump file. Lastly, the invention may include identifying a possible source program of the memory corruption by matching the PE tables against the illegally-written overlay content.
-
-
-
-
-
-
-
-
-