-
公开(公告)号:US20220121548A1
公开(公告)日:2022-04-21
申请号:US17073504
申请日:2020-10-19
发明人: Li Cao , XING XING SHEN , Zhi Li , He Jiang Jia , Bo Tong Liu , Xiao Dong LI , Sheng Jie BJ Han
摘要: A computer-implemented method for determining influence of applications on system performance includes collecting, by a processor, for several applications that are executing on a computing system, respective instrumentation data during multiple time-segments. The method further includes determining, for each of the applications, a performance value and a robustness value for each of the time-segments based on the respective instrumentation data. Further, using the performance value and robustness value for each time-segment, multiple health-waveforms are generated, where a health-waveform is generated for each respective application. The method further includes determining, by the processor, an influence-factor of a first application on a second application, the first application and the second application are executing on the computing system. The method further includes adjusting, by the processor, allocation of a computer resource by releasing the computer resource from the first application and allocating the computer resource to the second application based on the influence-factor.
-
公开(公告)号:US20230409568A1
公开(公告)日:2023-12-21
申请号:US17807264
申请日:2022-06-16
发明人: Bao Zhang , XI QING ZHANG , Jin Hong Fu , He Huang , Shi Chong Ma , Jia Yu , Mu Chen , HUI Zhang , Ran Ren , XING XING SHEN
IPC分类号: G06F16/242 , G06F16/2457 , G06F16/23 , G06F16/25
CPC分类号: G06F16/244 , G06F16/2457 , G06F16/2358 , G06F16/258
摘要: A method, computer system, and a computer program for monitoring synchronization and aggregation are provided. The method may include receiving a plurality of metrics and identifying a plurality of metadata associated with the plurality of metrics. The method may further include calculating a hash value of the plurality of metadata based on the plurality of metrics. The method may further include detecting at least one modification to the plurality of metadata based on the hash value and updating the plurality of metrics based on the at least one modification in which the plurality of metrics are displayed in a self-adapting metric diagram.
-
公开(公告)号:US20230118695A1
公开(公告)日:2023-04-20
申请号:US17501018
申请日:2021-10-14
发明人: Bao Zhang , Jin Hong Fu , Shi Chong Ma , He Huang , Yong Yin , Jia Tian Zhong , XING XING SHEN , Jia Yu
摘要: Aspects of the invention include includes detecting a change in a code section of a source code in relation to a reference code section. An incremental section is created in object code, the incremental section includes an object code section describing the change in the code section and a symbol section describing a change to a symbol associated with the changed code section. The incremental section is attached to a software update. The software update to a target computer system.
-
公开(公告)号:US20220398191A1
公开(公告)日:2022-12-15
申请号:US17345142
申请日:2021-06-11
发明人: Gan Zhang , XING XING SHEN , Shan Gao , Le Chang , Ming Lei Zhang , Zeng Yu Peng
IPC分类号: G06F12/02 , G06F12/0875
摘要: A method for heap space management includes, in response to a determination that consumption of a first heap space of an application exceeds a first threshold, determining whether a second heap space of the application after garbage collection is sufficient to accommodate data stored in the first heap space. The method further includes, in response to a determination that the second heap space after the garbage collection is sufficient to accommodate the data, performing the garbage collection on the second heap space. The method further includes storing the data into the second heap space.
-
公开(公告)号:US20220261470A1
公开(公告)日:2022-08-18
申请号:US17178329
申请日:2021-02-18
发明人: Jia Tian Zhong , XING XING SHEN , Peng Hui Jiang , Dong Hui Liu , Yong Yin , Jia Yu
摘要: Embodiments of the present invention relate to password authentication. According to an embodiment of the present invention, a password associated with a user identification is received from a user device. The password is authenticated based on a preset relationship between a seed password and a graphical password associated with the user identification. The seed password consists of a string of characters. The graphical password is a directed path traversing all keys of a keypad in an order. Each of the keys represents one of the characters and is associated with an order number according to the order of the keys being traversed. The preset relationship is that the password consists of respective order numbers associated with respective keys representing corresponding characters of the seed password.
-
-
-
-