C
Chung-Sheng Li
Researcher at IBM
Publications - 4
Citations - 173
Chung-Sheng Li is an academic researcher from IBM. The author has contributed to research in topics: Data processing system & Corrective maintenance. The author has an hindex of 3, co-authored 4 publications receiving 153 citations.
Papers
More filters
Journal ArticleDOI
Software defined environments: an introduction
Chung-Sheng Li,B. L. Brech,S. Crowder,D. M. Dias,Hubertus Franke,Matt R. Hogstrom,D. Lindquist,Giovanni Pacifici,Stefan Pappe,B. Rajaraman,Josyula R. Rao,Radha P. Ratnaparkhi,Rodney A. Smith,M. D. Williams +13 more
TL;DR: The key elements within software defined environments include capability-based resource abstraction, goal-based and policy-based workload definition, and outcome-based continuous mapping of the workload to the available resources.
Journal ArticleDOI
Predictive maintenance based on event-log analysis: a case study
TL;DR: This paper presents a general classification-based failure prediction method for target equipment types and shares insights on how to optimize the model parameters, select the most effective features, and tune classifiers to build a high-performance prediction model.
Patent
Systems, methods and computer programs providing impact mitigation of cyber-security failures
Youssef Drissi,II Rick A. Hamilton,Colin Harrison,Jack L. Kouloheris,Pratap Pattnaik,Josyula R. Rao,Chung-Sheng Li +6 more
TL;DR: In this paper, the authors present a method and system to operate a governed data processing system in concert with a GDP system to detect a deviation from modeled user and governed processing system behavior.
Patent
Methods and apparatus for enhancing business services resiliency using continuous fragmentation cell technology
TL;DR: A method for enhancing resiliency of a service includes: decomposing at least one component associated with the service into a plurality of corresponding smaller elements; encrypting the elements to generate a corresponding plurality of encrypted elements; decomposing each of the encrypted elements into a corresponding smaller fragments; replicating each fragment; encapsulating the fragments into respective intelligent components, each of which corresponding to a given one of the encapsulated fragments; storing each component being configured to independently determine a location of a first storage element in which to store itself; and moving the intelligent components from the first storage elements