Wen Hao An’s research while affiliated with IBM and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (5)


Transporting residue of vehicle position data via wireless network
  • Patent

May 2015

·

7 Reads

Wen Hao An

·

·

Bo Gao

·

[...]

·

Yuzhou Zhang

The invention relates to compressed data transmission in wireless data communication. Disclosed are methods and apparatuses for transporting residue of vehicle position data via a wireless network. A disclosed method for transporting residue of vehicle position data via a wireless network, includes the steps of: receiving data for updating residue encoding schema from a monitoring server; constructing a residue encoding schema based on the data, thereby producing a constructed residue encoding schema; and storing the constructed residue encoding schema such that the constructed residue encoding schema will become the current residue encoding schema; where: the constructed residue encoding schema is constructed such that each residue of the constructed residue encoding schema corresponds to a code; and the constructed residue encoding schema is constructed such that a residue having a relatively high probability of occurrence corresponds to a code of relatively short length.


Controlling the use of computing resources in a database as a service

May 2015

·

15 Reads

A method and apparatus controls use of a computing resource by multiple tenants in DBaaS service. The method includes intercepting a task that is to access a computer resource, the task being an operating system process or thread; identifying a tenant that is in association with the task from the multiple tenants; determining other tasks of the tenant that access the computing resource; and controlling the use of the computing resource by the task, so that the total amount of usage of the computing resource by the task and the other tasks does not exceed the limit of usage of the computing resource for the tenant.


Locating isolation points in an application under multi-tenant environment

February 2015

·

9 Reads

·

2 Citations

A computer implemented method for locating isolation points in an application under multi-tenant environment includes scanning, using a computer device an application by using scanning rules, to obtain potential isolation points and relationships between the potential isolation points; specifying at least one isolation point among the potential isolation points; and screening an isolation point from the potential isolation points by using relationships between the specified at least one isolation point and the remaining potential isolation points.


Processing materialized tables in a multi-tenant application system
  • Patent
  • Full-text available

September 2013

·

18 Reads

A method, system and computer program for processing materialized tables in a multi-tenant application system, wherein in the multi-tenant application system, a plurality of tenants share one or more basic-tables. According to the data access history information of the plurality of tenants, an update pattern analyzer analyzes the similarity of the update patterns for one or more basic-tables by the plurality of tenants. Furthermore, according to the similarity analyzed by the update pattern analyzer, a tenant grouping means groups the plurality of tenants into a plurality of tenant groups. Additionally, according to the tenant groups grouped by the tenant grouping means, a materialized table constructor constructs the tenant group materialized tables from the one or more basic-tables.

Download

A Study and Performance Evaluation of the Multi-Tenant Data Tier Design Patterns for Service Oriented Computing

January 2008

·

753 Reads

·

73 Citations

Multi-tenancy is one of key characteristics of the service oriented computing especially for Software as a Service (SaaS) to leverage economy of scale to drive down total cost of ownership for both service consumer and provider. This paper aims to study the technologies to build a cost-effective, secure and scalable multi-tenant infrastructure, especially in data tier. We first explore all the key implementation patterns of data tier multi-tenancy on aspects of isolation, security, customization & scalability etc. Furthermore, we mainly evaluate the performance of these design patterns on aspects of isolation and security via a series of experiments and simulations. This paper also identifies the potential performance bottlenecks, summarizes corresponding optimization approaches and best implementation practices for different multi-tenant business usage models.

Citations (2)


... Enterprise applications typically apply the design pattern Domain Model [10,8], which is an object layer consisting of related classes, so-called Business Objects (BOs) 1 . Each BO models a business data entity, such as sales order, or invoice. ...

Reference:

A practical approach for detecting multi-tenancy data interference
Locating isolation points in an application under multi-tenant environment
  • Citing Patent
  • February 2015

... Abdul et al. [21] they can provide great opportunities to harness the power of cloud infrastructure enabling the tenants to increase the consolidation of data layer operational entities to be dedicated, isolated, and shared. The use of infrastructure can also be done in other ways by applying a multitenant management pattern [22], [23] such as the model-view-controller (MVC), model-view-presenter (MVP), and model-view-view-model (MVVM). Each pattern includes some different aspects of the tenant management systematics. ...

A Study and Performance Evaluation of the Multi-Tenant Data Tier Design Patterns for Service Oriented Computing
  • Citing Article
  • January 2008