Fenglian
Fenglian Li, Beijing CN
Patent application number | Description | Published |
---|---|---|
20130146950 | SEMICONDUCTOR DEVICE AND MANUFACTURING METHOD THEREOF - A semiconductor device and manufacture method thereof include a silicide material formed on a source region and a drain region on opposite sides of a gate, wherein the gate having sidewalls on both side surfaces is formed on a substrate. The gate has a first sidewall spacer and a second sidewall spacer on each sidewall, the first spacer has a horizontal portion and a vertical portion, the horizontal portion is located between the second sidewall spacer and the substrate, the vertical portion is located between the second sidewall spacer and the sidewalls. A protecting layer is selectively deposited on the silicide material. | 06-13-2013 |
Fenglian Li, Anyang CN
Patent application number | Description | Published |
---|---|---|
20140020130 | csRRM2 GENE AND ITS USE FOR IMPROVING TRAITS IN INDUSTRIAL CROPS - The present invention clones the second RNA recognition motif (RRM2) gene of FCA-γ gene in | 01-16-2014 |
Fenglian Li, Shanghai CN
Patent application number | Description | Published |
---|---|---|
20150035084 | MOS TRANSISTORS AND FABRICATION METHOD THEREOF - A method is provided for fabricating an MOS transistor. The method includes providing a semiconductor substrate; and forming a ploy silicon dummy gate structure having a high-K gate dielectric layer, a high-K gate dielectric protection layer containing nitrogen and a poly silicon dummy gate on the semiconductor substrate. The method also includes forming a source region and a drain region in the semiconductor substrate at both sides of the poly silicon dummy gate structure. Further, the method includes removing the poly silicon dummy gate to form a trench exposing the high-K gate dielectric protection layer containing nitrogen and performing a nitrogen treatment process to repair defects in the high-K gate dielectric protection layer containing nitrogen caused by removing the poly silicon dummy gate. Further, the method also includes forming a metal gate structure in the trench. | 02-05-2015 |
20150243523 | METHOD OF MANUFACTURING A SEMICONDUCTOR DEVICE - A method of manufacturing a semiconductor device is provided. The method includes providing a semiconductor substrate including a transistor and a dummy gate disposed on the transistor, removing the dummy gate on the transistor, performing treatment using hydrogen (H | 08-27-2015 |
Fenglian Xu, Eastleigh GB
Patent application number | Description | Published |
---|---|---|
20150193519 | MODELING AND VISUALIZING LEVEL-BASED HIERARCHIES - Flexibly modeling and visualizing a level-based hierarchy. A first level set and a second level set are identified from a first data set and a second data set in a first domain and a second domain, respectively. A first relationship type to be used between the first level set and the second level set is received. A first hierarchy is formalized, including at least the first level set and the second level set joined in a hierarchical relationship according to the first relationship type. | 07-09-2015 |
20150193531 | MODELING AND VISUALIZING LEVEL-BASED HIERARCHIES - Flexibly modeling and visualizing a level-based hierarchy. A first level set and a second level set are identified from a first data set and a second data set in a first domain and a second domain, respectively. A first relationship type to be used between the first level set and the second level set is received. A first hierarchy is formalized, including at least the first level set and the second level set joined in a hierarchical relationship according to the first relationship type. | 07-09-2015 |
Fenglian Xu, Hampshire GB
Patent application number | Description | Published |
---|---|---|
20150271327 | VERIFYING TELEPHONE CALLER ORIGIN - An aspect includes verifying a telephone caller origin carried out at a security application. The verifying includes activating a security process during an active telephone call to a user received at a first call identifier, accessing registered user service providers to obtain contact details of a registered service provider purporting to be the origin of the active telephone call, and sending a query to the obtained contact details of the registered service provider. The query includes the first call identifier. The verifying also includes receiving a returned query result confirming or denying that the telephone call is from the registered service provider. | 09-24-2015 |
Fenglian Xu, Knightwood GB
Patent application number | Description | Published |
---|---|---|
20120030201 | QUERYING DOCUMENTS USING SEARCH TERMS - Techniques are disclosed for searching a set of documents using search terms. In one embodiment, a summary is provided for each document in the set. Search terms are received, and the set of documents are parsed using the received search terms. A first relevance value is calculated using only the summary of each document. A subset of documents having the highest relevance is provided by using the first relevance value. The subset of documents is parsed using the received search terms, to calculate a second relevance value for each document using the respective document. Query results are provided, the query results including documents having the highest relevance according to the second relevance value. | 02-02-2012 |
Fenglian Xu, Hursley GB
Patent application number | Description | Published |
---|---|---|
20160094640 | PROCESSING A MESSAGE RECEIVED BY A MESSAGE SERVER - A message received by a message server is processed. The message server includes a query store for storing query requests, value data for the query requests, and response time data for the query requests. A message is received and at least one query request is determined from the message. The at least one query request is sent to a query server. A timeout period is determined from the response time data for a query request stored in the query store. In the case that no response to the query request is received within the timeout period, a value is determined from the value data for the query request stored in the query store. Alternatively, in the case that a response to the query request is received within the timeout period, a value is determined from the response, value data for the value is stored in the query store, and response time data for the period the response took to be received is stored in the query store. An action in response to the message is then determined using the value obtained from the query store or the value obtained from the response, and the action is performed. | 03-31-2016 |
Fenglian Xu, Chandlers Ford GB
Patent application number | Description | Published |
---|---|---|
20120174205 | USER PROFILE AND USAGE PATTERN BASED USER IDENTIFICATION PREDICTION - Embodiments of the present invention provide method, system and computer program product for user profile and usage pattern based user ID prediction. In accordance with an embodiment of the invention, a user can request a user ID to access a portion of a computing system. One or more characteristics of the user, such as a role or location can be determined and correlated to one or more different additional user ID options. In this regard, the additional user ID options can be a suggested alternative user ID for use by the user commensurate with the role or location of the user, or with past patterns of other users considered similar to the user based upon the characteristics of the user. In this way, the predictive nature of the foregoing methodology can assist the user in requesting a most appropriate user ID based upon the characteristics of the user and also in requesting a user ID which may be required in the future by the user based upon predictive patterns of system usage of other like users so as to save time and improve work efficiency. | 07-05-2012 |
20120216277 | USER PROFILE AND USAGE PATTERN BASED USER IDENTIFICATION PREDICTION - Embodiments of the present invention provide method, system and computer program product for user profile and usage pattern based user ID prediction. In accordance with an embodiment of the invention, a user can request a user ID to access a portion of a computing system. One or more characteristics of the user, such as a role or location can be determined and correlated to one or more different additional user ID options. In this regard, the additional user ID options can be a suggested alternative user ID for use by the user commensurate with the role or location of the user, or with past patterns of other users considered similar to the user based upon the characteristics of the user. | 08-23-2012 |
20130007767 | AUTOMATED GENERATION OF SERVICE DEFINITIONS FOR MESSAGE QUEUE APPLICATION CLIENTS - A method, system, and computer program product fo automatically generating service definitions for application clients of a message broker is provided. The method includes retrieving a trace of interactions between different application instances and corresponding message queues in a message brokering system. Thereafter, messages in the trace can be analyzed to identify the application instances and related message exchange data. Finally, a service definition document can be generated for each identified application instance using the related message exchange data to describe computational services provided by the identified application instance. | 01-03-2013 |
20140164386 | INTELLIGENT SOFTWARE INSTALLATION - A computer system determines a category of users to which a user of a computer belongs. The computer system determines a relationship between the category of users and at least one program available for installation from the computer system. Based on the determined relationship, the computer system determines that at least one feature of the at least one program are of potential interest to the user of the computer. The computer system notifies the user of the at least one feature of the at least one program of potential interest. | 06-12-2014 |
20150242247 | SHARED RESOURCE UPDATING - Method and system are provided for updating data at a shared resource in a concurrent user environment. The method includes: a first client application carrying out the steps of pulling data from a shared resource for update wherein the data includes a timestamp of a last update; requesting a lock on the data only allowing updates from the first client for a set period of time; working on the data whether or not a lock is in place for the first client application. Wherein when a first client application applies to update the data, a check is carried out to compare the timestamp of the data updated by the first client application with the current timestamp of the data, and if these do not match, the update fails. | 08-27-2015 |
Fenglian Xu, Winchester GB
Patent application number | Description | Published |
---|---|---|
20120304151 | REALTIME TRACKING OF SOFTWARE COMPONENTS - The disclosure is for run-time accessing a software component is provided, together with a computer system embodying the same, and a software utility directing the method. Initially a software component is loaded and analysed to identify one or more features thereof, which features are checked against a database. Following the check, the component is classified as one of at least first, second, and third component types. A first component type is run without amendment. A second component type is replaced by a component of equivalent functionality prior to running. A third component type is blocked from running. | 11-29-2012 |
20120304152 | REALTIME TRACKING OF SOFTWARE COMPONENTS - The disclosure is for run-time accessing a software component is provided, together with a computer system embodying the same, and a software utility directing the method. Initially a software component is loaded and analysed to identify one or more features thereof, which features are checked against a database. Following the check, the component is classified as one of at least first, second, and third component types. A first component type is run without amendment. A second component type is replaced by a component of equivalent functionality prior to running. A third component type is blocked from running. | 11-29-2012 |
20140059044 | NODE VALIDATION IN A NETWORK - A method of operating a network of connected nodes comprises the steps of maintaining a trust value for each node in the network, maintaining one or more attributes for each node in the network, each attribute comprising a value and a respective confidence level, and performing a validation of a specific attribute of a specific node. The validation comprises the steps of querying nodes connected to the specific node for specific attribute values for the specific node, creating a results set from the returned attribute values from the connected nodes and the trust values of the connected nodes, and processing the results set according to a predefined algorithm to determine a new value and/or a new confidence level for the specific attribute of the specific node. | 02-27-2014 |