| 12430173 |
Approach to gracefully resolve retry storms |
Yue Wang, Xin Peng Liu, Liang Wang, Biao Chai |
2025-09-30 |
| 12335163 |
Managing a connection pool for cloud-based applications accessing databases |
Peng Hui Jiang, Biao Chai, Xinpeng Liu, Yue Wang, Liang Wang |
2025-06-17 |
| 11953972 |
Selective privileged container augmentation |
Yue Wang, Xin Peng Liu, Liang Wang, Biao Chai |
2024-04-09 |
| 11853810 |
Edge time sharing across clusters via dynamic task migration based on task priority and subtask result sharing |
Yue Wang, Xin Peng Liu, Zheng Li |
2023-12-26 |
| 11809880 |
Dynamically verifying ingress configuration changes |
Xin Peng Liu, Yue Wang, Liang Wang, Zheng Li, Biao Chai |
2023-11-07 |
| 11798001 |
Progressively validating access tokens |
Peng Hui Jiang, Xin Peng Liu, Xiao Ling Chen |
2023-10-24 |
| 11645109 |
Managing failures in edge computing environments |
Yue Wang, Xin Peng Liu, Liang Wang, Zheng Li |
2023-05-09 |
| 11210156 |
Intelligent distributed tracing |
Xin Peng Liu, Yue Wang, Ju Bo Tian, Jing Jing Pan, Liang Wang |
2021-12-28 |
| 11200138 |
Policy-based request tracing using a computer |
Ju Bo Tian, Yue Wang, Xin Peng Liu |
2021-12-14 |
| 10572383 |
Caching a block of data in a multi-tenant cache storage device based on space usage boundary estimates |
Yan Liu, Yue Liu, Fei Qi |
2020-02-25 |
| 9894076 |
Data protection and sharing |
Chen Li, Xiran Li, Graham A. Watts |
2018-02-13 |
| 9509641 |
Message transmission for distributed computing systems |
Yong Li, Rong Xiang, Wangli Zheng |
2016-11-29 |
| 8910118 |
Extracting business rules of a service-oriented architecture (SOA) system |
Lei He, Xin Peng Liu, Xue Wang, Yue Wang |
2014-12-09 |