Patents by Inventor Alexandre V. Evfimievski
Alexandre V. Evfimievski has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11194826Abstract: A computer-implemented method is provided that includes identifying an input dataset formatted as an input matrix, the input matrix including a plurality of rows and a plurality of columns. The computer-implemented method also includes dividing the input matrix into a plurality of input matrix blocks. Further, the computer-implemented method includes distributing the input matrix blocks to a plurality of different machines across a distributed filesystem, and sampling, by at least two of the different machines in parallel, at least two of the input matrix blocks. Finally, the computer-implemented method includes generating at least one sample matrix based on the sampling of the at least two of the input matrix blocks.Type: GrantFiled: February 8, 2019Date of Patent: December 7, 2021Assignee: International Business Machines CorporationInventors: Douglas R. Burdick, Alexandre V. Evfimievski, Berthold Reinwald, Sebastian Schelter
-
Publication number: 20190171641Abstract: A computer-implemented method is provided that includes identifying an input dataset formatted as an input matrix, the input matrix including a plurality of rows and a plurality of columns. The computer-implemented method also includes dividing the input matrix into a plurality of input matrix blocks. Further, the computer-implemented method includes distributing the input matrix blocks to a plurality of different machines across a distributed filesystem, and sampling, by at least two of the different machines in parallel, at least two of the input matrix blocks. Finally, the computer-implemented method includes generating at least one sample matrix based on the sampling of the at least two of the input matrix blocks.Type: ApplicationFiled: February 8, 2019Publication date: June 6, 2019Inventors: Douglas R. Burdick, Alexandre V. Evfimievski, Berthold Reinwald, Sebastian Schelter
-
Patent number: 10229168Abstract: A computer-implemented method is provided that includes identifying an input dataset formatted as an input matrix, the input matrix including a plurality of rows and a plurality of columns. The computer-implemented method also includes dividing the input matrix into a plurality of input matrix blocks. Further, the computer-implemented method includes distributing the input matrix blocks to a plurality of different machines across a distributed filesystem, and sampling, by at least two of the different machines in parallel, at least two of the input matrix blocks. Finally, the computer-implemented method includes generating at least one sample matrix based on the sampling of the at least two of the input matrix blocks.Type: GrantFiled: November 20, 2015Date of Patent: March 12, 2019Assignee: International Business Machines CorporationInventors: Douglas R. Burdick, Alexandre V. Evfimievski, Berthold Reinwald, Sebastian Schelter
-
Publication number: 20170147673Abstract: A computer-implemented method is provided that includes identifying an input dataset formatted as an input matrix, the input matrix including a plurality of rows and a plurality of columns. The computer-implemented method also includes dividing the input matrix into a plurality of input matrix blocks. Further, the computer-implemented method includes distributing the input matrix blocks to a plurality of different machines across a distributed filesystem, and sampling, by at least two of the different machines in parallel, at least two of the input matrix blocks. Finally, the computer-implemented method includes generating at least one sample matrix based on the sampling of the at least two of the input matrix blocks.Type: ApplicationFiled: November 20, 2015Publication date: May 25, 2017Inventors: Douglas R. Burdick, Alexandre V. Evfimievski, Berthold Reinwald, Sebastian Schelter
-
Patent number: 8141160Abstract: System and methods are provided for managing and mitigating privacy risks in a system having a network of processing elements. According to one method, there is receive a request for at least one output product from the system. The request includes a set of privacy parameters. At least one set of workflow generating strategies are created that results in the output product having a privacy risk value below a predefined threshold. At least one of the workflow generating strategies is deployed for automatically producing the at least one output product.Type: GrantFiled: July 26, 2006Date of Patent: March 20, 2012Assignee: International Business Machines CorporationInventors: Kay S. Anderson, Alexandre V. Evfimievski, Mark D. Feblowitz, Genady Grabarnik, Nagui Halim, Zhen Liu, Ralf Rantzau, Anton V. Riabov, Angela Schuett, Ramakrishnan Srikant, Grant Wagner
-
Patent number: 8032924Abstract: A method for protecting information in a distributed stream processing system, including: assigning a principal label to a processing component; assigning a first channel label to a first communication channel that is input to the processing component; comparing the principal label to the first channel label to determine if the processing component can read data attributes of the first channel label; and reading the data attributes of the first channel label when the principal label is equal to or has precedence over the first channel label, wherein the principal label includes a read label and a write label and at least one of a selection label, an addition label or a suppression label.Type: GrantFiled: May 30, 2008Date of Patent: October 4, 2011Assignee: International Business Machines CorporationInventors: Weifeng Chen, Alexandre V. Evfimievski, Zhen Liu, Ralf Rantzau, Anton Viktorovich Riabov, Pankaj Rohatgi, Angela Marie Schuett, Ramakrishnan Srikant, Grant Wagner
-
Publication number: 20100242120Abstract: System and methods are provided for managing and mitigating privacy risks in a system having a network of processing elements. According to one method, there is receive a request for at least one output product from the system. The request includes a set of privacy parameters. At least one set of workflow generating strategies are created that results in the output product having a privacy risk value below a predefined threshold. At least one of the workflow generating strategies is deployed for automatically producing the at least one output product.Type: ApplicationFiled: July 26, 2006Publication date: September 23, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kay S. Anderson, Alexandre V. Evfimievski, Mark D. Feblowitz, Genady Grabarnik, Nagui Halim, Zhen Liu, Ralf Rantzau, Anton V. Riabov, Angela Schuett, Ramakrishnan Srikant, Grant Wagner
-
Publication number: 20090064343Abstract: A method for protecting information in a distributed stream processing system, including: assigning a principal label to a processing component; assigning a first channel label to a first communication channel that is input to the processing component; comparing the principal label to the first channel label to determine if the processing component can read data attributes of the first channel label; and reading the data attributes of the first channel label when the principal label is equal to or has precedence over the first channel label, wherein the principal label includes a read label and a write label and at least one of a selection label, an addition label or a suppression label.Type: ApplicationFiled: May 30, 2008Publication date: March 5, 2009Inventors: Weifeng Chen, Alexandre V. Evfimievski, Zhen Liu, Ralf Rantzau, Anton Viktorovich Riabov, Pankaj Rohatgi, Angela Marie Schuett, Ramakrishnan Srikant, Grant Wagner
-
Publication number: 20090006380Abstract: A system and method is provided for identifying the source of an unauthorized database disclosure. The system and method stores a plurality of past database queries and determines the relevance of the results of the past database queries (query results) to a sensitive table containing the unauthorized disclosed data. The system and method also ranks the past database queries based on the determined relevance. A list of the most relevant past database queries can then be generated which are ranked according to the relevance, such that the highest ranked queries on the list are most similar to said disclosed data. Three techniques used in embodiments of the invention include partial tuple matching, statistical linkage and deviation probability gain.Type: ApplicationFiled: May 31, 2008Publication date: January 1, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Rakesh Agrawal, Alexandre V. Evfimievski, Gerald Kiernan, Raja Velu
-
Publication number: 20090006431Abstract: A system and method is provided for identifying the source of an unauthorized database disclosure. The system and method stores a plurality of past database queries and determines the relevance of the results of the past database queries (query results) to a sensitive table containing the unauthorized disclosed data. The system and method also ranks the past database queries based on the determined relevance. A list of the most relevant past database queries can then be generated which are ranked according to the relevance, such that the highest ranked queries on the list are most similar to said disclosed data. Three techniques used in embodiments of the invention include partial tuple matching, statistical linkage and deviation probability gain.Type: ApplicationFiled: June 29, 2007Publication date: January 1, 2009Applicant: International Business Machines CorporationInventors: Rakesh Agrawal, Alexandre V. Evfimievski, Gerald Kiernan, Raja Velu
-
Publication number: 20080034439Abstract: A method for protecting information in a distributed stream processing system, including: assigning a principal label to a processing component; assigning a first channel label to a first communication channel that is input to the processing component; comparing the principal label to the first channel label to determine if the processing component can read data attributes of the first channel label; and reading the data attributes of the first channel label when the principal label is equal to or has precedence over the first channel label, wherein the principal label includes a read label and a write label and at least one of a selection label, an addition label or a suppression label.Type: ApplicationFiled: August 1, 2006Publication date: February 7, 2008Inventors: Weifeng Chen, Alexandre V. Evfimievski, Zhen Liu, Ralf Rantzau, Anton Viktorovich Riabov, Pankaj Rohatgi, Angela Marie Schuett, Ramakrishnan Srikant, Grant Wagner