Patents by Inventor Alaa S. Youssef

Alaa S. Youssef has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240126526
    Abstract: Mechanisms are provided for improving performance of container images. Container image chunks are generated from a container image file and input into one or more trained machine learning (ML) computer models, trained to classify container image chunks with regard to a plurality of container image performance characteristic classifications. For each container image chunk it is determined whether the a corresponding classification is negative, and in response to the classification being negative, an entry in a knowledge base having patterns of content matching content in the container image chunk is identified to determine one or more reasons for modification of the chunk specified in the entry. A notification output is generated specifying the container image chunks, their corresponding container image performance characteristic classifications, and the reasons for modification of the chunks.
    Type: Application
    Filed: October 14, 2022
    Publication date: April 18, 2024
    Inventors: Abhishek Malvankar, Alaa S. Youssef, Chen Wang, Mariusz Sabath
  • Publication number: 20230418687
    Abstract: A computer-implemented method, a computer system and a computer program product boost efficiency through energy-aware workload placement. The method includes obtaining an energy profile for a plurality of computer servers and power consumption data for each computer server in the plurality of computer servers. The method also includes determining an optimal temperature for each computer server in the plurality of computer servers based on the energy profile. The method further includes determining a target processor utilization for each computer server in the plurality of computer servers based on the optimal temperature. In addition, the method includes calculating an efficiency rank for each computer server in the plurality of computer servers based on the target processor utilization and the power consumption data. Lastly, the method includes deploying a workload on a computer server with a highest efficiency rank.
    Type: Application
    Filed: June 28, 2022
    Publication date: December 28, 2023
    Inventors: Asser Nasreldin Tantawi, Tamar Eilam, Ramachandra Rao Kolluri, Eun Kyung LEE, Arun Vishwanath, Alaa S. Youssef
  • Publication number: 20230214257
    Abstract: Systems, computer-implemented methods, and computer program products to facilitate using multiple quota trees in resource scheduling are provided. According to an embodiment, a system can comprise a processor that executes computer executable components stored in memory. The computer executable components comprise an evaluation component that executes admissibility of a job request based on a scope property of one or more quota trees that apply to the job request.
    Type: Application
    Filed: January 5, 2022
    Publication date: July 6, 2023
    Inventors: Lior Aronovich, Alaa S. Youssef, Asser Nasreldin Tantawi, Diana Jeanne Arroyo, Marius Ion Danciu
  • Publication number: 20230214267
    Abstract: Systems, computer-implemented methods, and computer program products to facilitate optimization of resource usage based on quota trees are provided. According to an embodiment, a system can comprise a processor that executes computer executable components stored in memory. The computer executable components comprise a determination component that determines one or more quota trees that classify a job request as inadmissible. The computer executable components further comprise an optimization component that optimizes resource usage to enable admissibility of the job request based on the one or more quota trees.
    Type: Application
    Filed: January 5, 2022
    Publication date: July 6, 2023
    Inventors: Lior Aronovich, Alaa S. Youssef, Asser Nasreldin Tantawi, Diana Jeanne Arroyo, Marius Ion Danciu
  • Patent number: 11677549
    Abstract: A processor may generate one or more encrypted policies associated with a policy creator. A processor may generate token metadata associated with a user utilizing the one or more encrypted policies. A processor may encrypt the token metadata to form encrypted token metadata. A processor may send the one or more encrypted policies and the encrypted token metadata to a policy evaluator. The policy evaluator may evaluate the one or more encrypted policies and the encrypted token metadata. The processor may return a response. The response may be based on the evaluation by the policy evaluator.
    Type: Grant
    Filed: March 30, 2021
    Date of Patent: June 13, 2023
    Assignee: International Business Machines Corporation
    Inventors: Jia Jun Brandon Lum, Mariusz Sabath, Alaa S. Youssef
  • Patent number: 11663505
    Abstract: A shift-left analysis system receives information regarding an application implemented by one or more microservices. The system determines a microservice performance metric based on a performance prediction model for each microservice of the application. The system outputs an application performance metric for the application based on the microservice performance metrics determined for the one or more microservices of application.
    Type: Grant
    Filed: March 10, 2020
    Date of Patent: May 30, 2023
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jinho Hwang, Li Zhang, Maja Vukovic, Alaa S. Youssef
  • Patent number: 11528197
    Abstract: One or more systems, computer-implemented methods, and computer program products to facilitate a process for consensus regarding proceeding with a request of a transaction are provided. A system can comprise a memory that stores computer executable components and a processor that executes the computer executable components stored in the memory. The computer executable components can comprise a services component that operates a service of a transaction, where the services component approaches consensus regarding a request of the transaction by communicating with one or more other services components that operate one or more other services immediately upstream or downstream in the transaction to the service. The services component can approach the consensus by communicating only with the one or more other services components. To approach the consensus, the services component can communicate one or more messages that include one or more requests, votes or final decisions.
    Type: Grant
    Filed: August 4, 2021
    Date of Patent: December 13, 2022
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Alaa S. Youssef, Jim Alain Laredo
  • Patent number: 11513842
    Abstract: Systems, computer-implemented methods, and computer program products that can facilitate performance biased resource scheduling based on runtime performance of a certain workload type on one or more nodes are provided. According to an embodiment, a system can comprise a memory that stores computer executable components and a processor that executes the computer executable components stored in the memory. The computer executable components can comprise a performance component that assigns performance points to different nodes based on execution of one or more workload types. The computer executable components can further comprise a scheduler extender component that modifies a scheduling decision to run a workload type on a node based on the performance points.
    Type: Grant
    Filed: October 3, 2019
    Date of Patent: November 29, 2022
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Chen Wang, Stefania V. Costache, Alaa S. Youssef, Ali Kanso, Tonghoon Suk, Asser Narsreldin Tantawi
  • Publication number: 20220335318
    Abstract: Techniques regarding anomaly forecasting are provided. For example, one or more embodiments described herein can comprise a system, which can comprise a memory that can store computer executable components. The system can also comprise a processor, operably coupled to the memory, and that can execute the computer executable components stored in the memory. The computer executable components can comprise a forecast component that can determine a probability of a computer application executing an anomaly state based on a probabilistic graph that is incrementally updated while the computer application is running.
    Type: Application
    Filed: June 23, 2021
    Publication date: October 20, 2022
    Inventors: Chen Wang, Alaa S. Youssef, Josep Lluis Berral Garcia
  • Patent number: 11474905
    Abstract: Methods, computer program products, and/or systems are provided that perform the following operations: obtaining data indicative of a node failure; obtaining data associated with nodes and pods started on each node; generating a causation score for each pod associated with a failed node, wherein each pod associated with the failed node is designated as a candidate pod for the node failure; determining pod rescheduling for each candidate pod associated with the failed node based, at least in part, on a pod ranking of the causation score for each pod; and providing the pod rescheduling to a node cluster to restart each pod associated with the failed node.
    Type: Grant
    Filed: December 10, 2020
    Date of Patent: October 18, 2022
    Assignee: International Business Machines Corporation
    Inventors: Chen Wang, Ali Kanso, Alaa S. Youssef
  • Publication number: 20220321335
    Abstract: A processor may generate one or more encrypted policies associated with a policy creator. A processor may generate token metadata associated with a user utilizing the one or more encrypted policies. A processor may encrypt the token metadata to form encrypted token metadata. A processor may send the one or more encrypted policies and the encrypted token metadata to a policy evaluator. The policy evaluator may evaluate the one or more encrypted policies and the encrypted token metadata. The processor may return a response. The response may be based on the evaluation by the policy evaluator.
    Type: Application
    Filed: March 30, 2021
    Publication date: October 6, 2022
    Inventors: JIA JUN BRANDON LUM, Mariusz Sabath, Alaa S. Youssef
  • Publication number: 20220188192
    Abstract: Methods, computer program products, and/or systems are provided that perform the following operations: obtaining data indicative of a node failure; obtaining data associated with nodes and pods started on each node; generating a causation score for each pod associated with a failed node, wherein each pod associated with the failed node is designated as a candidate pod for the node failure; determining pod rescheduling for each candidate pod associated with the failed node based, at least in part, on a pod ranking of the causation score for each pod; and providing the pod rescheduling to a node cluster to restart each pod associated with the failed node.
    Type: Application
    Filed: December 10, 2020
    Publication date: June 16, 2022
    Inventors: Chen Wang, Ali Kanso, Alaa S. Youssef
  • Patent number: 11263333
    Abstract: An example operation may include one or more one or more of receiving two or more authorization decisions from two or more authorization entities into a blockchain system, recording the two or more authorization decisions into one or more blocks of a blockchain of the blockchain system, determining, by the blockchain system, whether the two or more authorization decisions satisfy a policy to authorize access to at least one of a device or identifiable content on the device, and when the two or more authorization decisions satisfy the policy, authorizing access to a public key that can be used to gain access to the device.
    Type: Grant
    Filed: April 25, 2019
    Date of Patent: March 1, 2022
    Assignee: International Business Machines Corporation
    Inventors: Alaa S. Youssef, Giovanni Pacifici, Dimitrios Pendarakis
  • Patent number: 11170105
    Abstract: Verifying authenticity of software updates is provided. An update executable and an update behavior profile corresponding to a software update are hashed using a cryptographic hash function. A hash of the update executable and the update behavior profile is signed using a private key to form a hashed update digital signature.
    Type: Grant
    Filed: February 28, 2019
    Date of Patent: November 9, 2021
    Assignee: International Business Machines Corporation
    Inventors: Jia Jun Brandon Lum, Alaa S. Youssef
  • Publication number: 20210287108
    Abstract: A shift-left analysis system receives information regarding an application implemented by one or more microservices. The system determines a microservice performance metric based on a performance prediction model for each microservice of the application. The system outputs an application performance metric for the application based on the microservice performance metrics determined for the one or more microservices of application.
    Type: Application
    Filed: March 10, 2020
    Publication date: September 16, 2021
    Inventors: Jinho Hwang, Li Zhang, Maja Vukovic, Alaa S. Youssef
  • Publication number: 20210103468
    Abstract: Systems, computer-implemented methods, and computer program products that can facilitate performance biased resource scheduling based on runtime performance of a certain workload type on one or more nodes are provided. According to an embodiment, a system can comprise a memory that stores computer executable components and a processor that executes the computer executable components stored in the memory. The computer executable components can comprise a performance component that assigns performance points to different nodes based on execution of one or more workload types. The computer executable components can further comprise a scheduler extender component that modifies a scheduling decision to run a workload type on a node based on the performance points.
    Type: Application
    Filed: October 3, 2019
    Publication date: April 8, 2021
    Inventors: Chen Wang, Stefania V. Costache, Alaa S. Youssef, Ali Kanso, Tonghoon Suk, Asser Narsreldin Tantawi
  • Patent number: 10915369
    Abstract: Technology for selecting job characteristics to determine the similarity among jobs in terms of performance. Technology based on similarity among jobs calculated by selected characteristics for determining jobs that are likely to lead to successful performance of a requested new job by a cloud. Also, technology based on similarity among jobs calculated by selected characteristics for determining jobs that are likely to lead to failure when performing a requested new job by the cloud. When the new job request is accepted, because its characteristics of the new job matches job characteristics characterized by success and/or fails to match job characteristics characterized by failure, then the new job is said to lead to a “reward” or an “expected reward” because the new job will be rewarded by being allowed to use, by an admission controller of a cloud management system, use of cloud computing resources of the cloud.
    Type: Grant
    Filed: November 29, 2018
    Date of Patent: February 9, 2021
    Assignee: International Business Machines Corporation
    Inventors: Chen Wang, Ali Kanso, Stefania V. Costache, Alaa S. Youssef, Malgorzata Steinder
  • Publication number: 20200342132
    Abstract: An example operation may include one or more one or more of receiving two or more authorization decisions from two or more authorization entities into a blockchain system, recording the two or more authorization decisions into one or more blocks of a blockchain of the blockchain system, determining, by the blockchain system, whether the two or more authorization decisions satisfy a policy to authorize access to at least one of a device or identifiable content on the device, and when the two or more authorization decisions satisfy the policy, authorizing access to a public key that can be used to gain access to the device.
    Type: Application
    Filed: April 25, 2019
    Publication date: October 29, 2020
    Applicants: International Business Machines Corporation, International Business Machines Corporation
    Inventors: Alaa S. Youssef, Giovanni Pacifici, Dimitrios Pendarakis
  • Publication number: 20200279044
    Abstract: Verifying authenticity of software updates is provided. An update executable and an update behavior profile corresponding to a software update are hashed using a cryptographic hash function. A hash of the update executable and the update behavior profile is signed using a private key to form a hashed update digital signature.
    Type: Application
    Filed: February 28, 2019
    Publication date: September 3, 2020
    Inventors: Jia Jun Brandon Lum, Alaa S. Youssef
  • Publication number: 20200174842
    Abstract: Technology for selecting job characteristics to determine the similarity among jobs in terms of performance. Technology based on similarity among jobs calculated by selected characteristics for determining jobs that are likely to lead to successful performance of a requested new job by a cloud. Also, technology based on similarity among jobs calculated by selected characteristics for determining jobs that are likely to lead to failure when performing a requested new job by the cloud. When the new job request is accepted, because its characteristics of the new job matches job characteristics characterized by success and/or fails to match job characteristics characterized by failure, then the new job is said to lead to a “reward” or an “expected reward” because the new job will be rewarded by being allowed to use, by an admission controller of a cloud management system, use of cloud computing resources of the cloud.
    Type: Application
    Filed: November 29, 2018
    Publication date: June 4, 2020
    Inventors: Chen Wang, Ali Kanso, Stefania V. Costache, Alaa S. Youssef, Malgorzata Steinder