Chang Jie Guo’s research while affiliated with IBM Research - Thomas J. Watson Research Center and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (16)


Access request authentication and authorization information generation
  • Patent
  • Full-text available

May 2015

·

24 Reads

Chang Jie Guo

·

Hongbin Lin

·

Peng Ji

·

[...]

·

An access request authentication method, an authorization information generation method, an access request authentication system, and a hardware device. The access request authentication method includes: obtaining the current clock information; receiving a first access request, where the first access request includes a first input code; and determining whether to authorize the first access request based on the current clock information and the first input code.

Download

Controlling the use of computing resources in a database as a service

May 2015

·

15 Reads

A method and apparatus controls use of a computing resource by multiple tenants in DBaaS service. The method includes intercepting a task that is to access a computer resource, the task being an operating system process or thread; identifying a tenant that is in association with the task from the multiple tenants; determining other tasks of the tenant that access the computing resource; and controlling the use of the computing resource by the task, so that the total amount of usage of the computing resource by the task and the other tasks does not exceed the limit of usage of the computing resource for the tenant.


Locating isolation points in an application under multi-tenant environment

February 2015

·

9 Reads

·

2 Citations

A computer implemented method for locating isolation points in an application under multi-tenant environment includes scanning, using a computer device an application by using scanning rules, to obtain potential isolation points and relationships between the potential isolation points; specifying at least one isolation point among the potential isolation points; and screening an isolation point from the potential isolation points by using relationships between the specified at least one isolation point and the remaining potential isolation points.


Database system and method of optimizing cross database query

July 2014

·

13 Reads

A database system and a method of optimizing cross-database query. The database system includes a plurality of databases. At least two of the databases are stored with one or more data collections composed of tables with the same structure. A federated view of the data collection is created on each of the databases. A request routing layer for routing, in response to a query request crossing the data collections, the query request crossing the data collections to one of the at least two databases according to a predetermined routing rule, so as to query by using the federated view of the database.


Method and system for reconstructing error response messages under web application environment

September 2013

·

6 Reads

A computer-implemented method and system for reconstructing a response message to an improper accessing request in a web application environment. The method includes: obtaining the URL of a web application to be accessed by the improper accessing request and the error parameter information of the improper accessing request; obtaining a response template based on the obtained URL of the web application to be accessed; and merging the obtained error parameter information of the improper accessing request with the obtained response template to generate a reconstructed response message for the improper accessing request. The system includes: a message obtaining device; a response message template obtaining device; and a response message merging device.


Processing materialized tables in a multi-tenant application system

September 2013

·

18 Reads

A method, system and computer program for processing materialized tables in a multi-tenant application system, wherein in the multi-tenant application system, a plurality of tenants share one or more basic-tables. According to the data access history information of the plurality of tenants, an update pattern analyzer analyzes the similarity of the update patterns for one or more basic-tables by the plurality of tenants. Furthermore, according to the similarity analyzed by the update pattern analyzer, a tenant grouping means groups the plurality of tenants into a plurality of tenant groups. Additionally, according to the tenant groups grouped by the tenant grouping means, a materialized table constructor constructs the tenant group materialized tables from the one or more basic-tables.


Method and apparatus for resource transfer

July 2013

·

8 Reads

A method and apparatus for transferring resources from a server to a client, wherein the resources are for an object in an application. According to the present invention, resources needed by the object are determined. Resources which have usages that are less than a threshold according to statistics are removed from the determined resources. The remainder of the determined resources, which are needed by the object, is transferred to the client. According to the present invention, users do not have to wait for a long time before they can see a web page.


Initializing a multi-tenant database

July 2013

·

18 Reads

A method and system for initializing a multi-tenant database. The method includes the steps of: executing a trial of a legacy initialization tool on a trial database; capturing database statements issued by the legacy initialization tool during the step of executing a trial; capturing trial execution results of the database statements; executing the legacy initialization tool on a multi-tenant database; intercepting the database statements issued by the legacy initialization tool during the step of executing the legacy initialization tool on the multi-tenant database; and executing a mock of intercepted database statements corresponding to types of the database statements, types of tables involved in the database statements, and the trial execution results of the database statements, where at least one of the steps is carried out using a computer device.


Initializing a multi-tenant database

July 2013

·

24 Reads

A method and system for initializing a multi-tenant database. The method includes the steps of: executing a trial of a legacy initialization tool on a trial database; capturing database statements issued by the legacy initialization tool during the step of executing a trial; capturing trial execution results of the database statements; executing the legacy initialization tool on a multi-tenant database; intercepting the database statements issued by the legacy initialization tool during the step of executing the legacy initialization tool on the multi-tenant database; and executing a mock of intercepted database statements corresponding to types of the database statements, types of tables involved in the database statements, and the trial execution results of the database statements, where at least one of the steps is carried out using a computer device.


Multi-tenancy data storage and access method and apparatus

July 2013

·

16 Reads

A method, apparatus, and a computer program product for storing and accessing multi-tenancy data. The method includes the steps of: creating a plurality of table sets in one or more databases, wherein each table set is used to store data of a group of tenants selected from a plurality of tenants; accessing data of a tenant in a table set in response to receiving a data access request from the tenant; and recording relationships between the tenants and the table sets in a multi-tenancy metadata repository, wherein the step of accessing the data of the tenant comprises the steps of finding the table set by querying the metadata repository and accessing the data of the tenant in the table set based on the result received from the query of the metadata repository.


Citations (4)


... Enterprise applications typically apply the design pattern Domain Model [10,8], which is an object layer consisting of related classes, so-called Business Objects (BOs) 1 . Each BO models a business data entity, such as sales order, or invoice. ...

Reference:

A practical approach for detecting multi-tenancy data interference
Locating isolation points in an application under multi-tenant environment
  • Citing Patent
  • February 2015

... Abdul et al. [21] they can provide great opportunities to harness the power of cloud infrastructure enabling the tenants to increase the consolidation of data layer operational entities to be dedicated, isolated, and shared. The use of infrastructure can also be done in other ways by applying a multitenant management pattern [22], [23] such as the model-view-controller (MVC), model-view-presenter (MVP), and model-view-view-model (MVVM). Each pattern includes some different aspects of the tenant management systematics. ...

A Study and Performance Evaluation of the Multi-Tenant Data Tier Design Patterns for Service Oriented Computing
  • Citing Article
  • January 2008

... Public cloud usage has grown steadily in recent years and is forecast to continue to grow even further, with Software as a Service (SaaS) remaining the largest segment (Gartner Inc. 2024). As public cloud SaaS adoptions increase, their integration into existing IT architectures towards hybrid clouds must be properly managed (Sun et al. 2008). However, managing this integration poses a number of challenges for organizations, e.g., changes to contractual commitments, different definitions and formulations of Service Level Agreements (SLA), or the economic evaluation of SLA breaches (Seifert et al. 2023), to name just a few. ...

Software as a Service: Configuration and Customization Perspectives
  • Citing Article
  • September 2008

... These essential data to monitor conditions and determine when irrigation is needed, collected by soil moisture sensors, weather stations and plant sensors [6]. The software delivery model change made business process execution simple and efficient [7] from distributed to service oriented architecture. Automatic irrigation systems allow irrigation to be controlled and scheduled remotely on mobile by the delivery. ...

A Framework for Native Multi-Tenancy Application Development and Management
  • Citing Conference Paper
  • August 2007