Patents by Inventor Tim U. Scheideler

Tim U. Scheideler has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10382094
    Abstract: A method and system for tracking a course of a cable using electromagnetic waves. A first transceiver sends to a second transceiver a first signal wirelessly in a linear line. The second transceiver sends back to the first transceiver the first signal in the linear line. A first distance between the first transceiver and the second transceiver is determined by determining a total transmission time for a first wireless signal travelling from the first transceiver to the second transceiver and back to the first transceiver. A second signal, aligned with the first signal, is transmitted from the first transceiver into the cable. The second transceiver receives the second signal wirelessly from the cable. A second distance between the first transceiver and the second transceiver is determined by comparing a phase difference between the first signal received by the second transmitter and the second signal received by the second transmitter.
    Type: Grant
    Filed: November 28, 2017
    Date of Patent: August 13, 2019
    Assignee: International Business Machines Corporation
    Inventors: Petra Sabine Buehrer, Florian Graf, Thorsten Muehge, Tim U. Scheideler, Raphael Waltert
  • Publication number: 20190235961
    Abstract: A method, computer system, and computer program product for eliminating a redundant node from a knowledge graph is provided. A structural analysis of a knowledge graph is performed by determining that two nodes have a similar structure. An empirical analysis is performed by determining a search result correlation of potentially redundant nodes, said search result correlation comprising a correlation of search result nodes generated from different search queries to said knowledge graph or a correlation of search results due to selected search result nodes in subtrees of said potentially redundant nodes. Results of said structural analysis and said empirical analysis are combined to generate a redundancy confidence level value for two said nodes. One of said two nodes is determined as redundant. One of said two redundant nodes is removed from the knowledge graph.
    Type: Application
    Filed: January 26, 2018
    Publication date: August 1, 2019
    Inventors: Andrea Giovannini, Tim U. Scheideler, Erik Rueger, Thomas Snellgrove, Stefan Ravizza, Florian Graf
  • Publication number: 20190165834
    Abstract: A method and system for tracking a course of a cable using electromagnetic waves. A first transceiver sends to a second transceiver a first signal wirelessly in a linear line. The second transceiver sends back to the first transceiver the first signal in the linear line. A first distance between the first transceiver and the second transceiver is determined by determining a total transmission time for a first wireless signal travelling from the first transceiver to the second transceiver and back to the first transceiver. A second signal, aligned with the first signal, is transmitted from the first transceiver into the cable. The second transceiver receives the second signal wirelessly from the cable. A second distance between the first transceiver and the second transceiver is determined by comparing a phase difference between the first signal received by the second transmitter and the second signal received by the second transmitter.
    Type: Application
    Filed: November 28, 2017
    Publication date: May 30, 2019
    Inventors: Petra Sabine Buehrer, Florian Graf, Thorsten Muehge, Tim U. Scheideler, Raphael Waltert
  • Publication number: 20190163835
    Abstract: A computer program product, system, and method for building a knowledge graph may include receiving a plurality of new nodes, receiving a base knowledge graph having existing nodes selectively connected by existing edges, and superimposing the new nodes onto selected ones of the existing nodes of the base knowledge graph. The method may further include connecting the new nodes by creating a new edge with a new weight between at least two of the new nodes if corresponding existing nodes in the underlying base knowledge graph have a connection via zero or a predetermined maximum number of existing edges, wherein the new weight is determined based on the existing weights of the existing edges of connections between the corresponding existing nodes, and detaching the new nodes with the new edges from the base knowledge graph.
    Type: Application
    Filed: November 27, 2017
    Publication date: May 30, 2019
    Inventors: Tim U. Scheideler, Stefan Ravizza, Andrea Giovannini, Avdyl Haxhaj, Simon Streit, Florian Graf
  • Publication number: 20190155926
    Abstract: A method and system for deleting a node of a knowledge graph may be provided. The method comprises receiving knowledge graph data comprising nodes and edges, determining a first relevance degree value for a node and a second relevance degree value for the node, combining the first and the second relevance degree value and marking the node as deletable if the final relevance degree value is above a predefined relevance threshold value. The method comprises further applying queries against the knowledge graph, wherein at least a certain number of such queries invokes accessing of a node, marked as deletable, revising at least one of the first and second relevance degree value based on the accessing of the node marked as deletable, and deleting the node, marked as deletable, if over a predetermined period of time queries against the knowledge graph invoke no access of the node marked as deletable.
    Type: Application
    Filed: November 20, 2017
    Publication date: May 23, 2019
    Inventors: Tim U. Scheideler, Thomas Snellgrove, Stefan Ravizza, Andrea Giovannini, Florian Graf, Stefan Mayer, Erik Rueger
  • Publication number: 20190095920
    Abstract: Methods, computer program products, and systems are presented. The methods include customer specific information exchange and an adjustment of the privacy level of this information. For this purpose an abstraction layer and an obfuscation module are introduced. Using a “fraud vector” a risk assessment is performed on the obfuscated transaction data.
    Type: Application
    Filed: September 26, 2017
    Publication date: March 28, 2019
    Inventors: BOAS BETZLER, PETRA S. BUEHRER, TIM U. SCHEIDELER, MATTHIAS SEUL
  • Publication number: 20190095923
    Abstract: Methods, computer program products, and systems are presented. The methods include customer specific information exchange and an adjustment of the privacy level of this information. For this purpose an abstraction layer and an obfuscation module are introduced. Using a “fraud vector” a risk assessment is performed on the obfuscated transaction data.
    Type: Application
    Filed: November 8, 2017
    Publication date: March 28, 2019
    Inventors: BOAS BETZLER, PETRA S. BUEHRER, TIM U. SCHEIDELER, MATTHIAS SEUL
  • Publication number: 20190073598
    Abstract: A method includes receiving a first query by a computing device and assigning the first query to a plurality of cognitive engines, wherein each of the plurality of cognitive engines include different characteristics for processing data. The method also includes, responsive to receiving a response from each of the plurality of cognitive engines for the first query, comparing the received responses from the plurality of cognitive engines. The method also included responsive to determining a difference between a first response from a first cognitive engine and a second response from a second cognitive engine is above a predetermined threshold value, performing a response mediation process until the difference is below the predetermined threshold value. The method also includes selecting a first final response from the received responses for the first query and the second query and displaying the first final response to a user.
    Type: Application
    Filed: September 5, 2017
    Publication date: March 7, 2019
    Inventors: Andrea Giovannini, Florian Graf, Stefan Ravizza, Tim U. Scheideler
  • Publication number: 20190026048
    Abstract: A cognitive hierarchical storage-management system receives feedback describing users' satisfaction with the way that prior data-access requests have been serviced. The system uses this feedback to associate each previously requested data element's metadata and storage tier with a level of user satisfaction. As feedback continues to be received, the system uses machine-learning methods to identify how closely specific metadata patterns correlate with certain levels of user satisfaction and with certain storage tiers. The system then uses these associations when determining whether it should migrate data associated with a particular metadata pattern to a different tier.
    Type: Application
    Filed: July 20, 2017
    Publication date: January 24, 2019
    Inventors: Thorsten Muehge, Stefan M. Ravizza, Erik Rueger, Tim U. Scheideler
  • Publication number: 20180121296
    Abstract: Automatically configuring backup client systems and backup server systems in a backup environment includes the following steps: determining if a new backup client system is available in the backup environment; in case of an available new backup client system a backup configuration module performs the sub-steps of: determining data types the new backup client system has to backup; determining corresponding backup policies for the determined data types based on a backup policy table mapping data types with backup policies; selecting a backup server system for the determined data types based on a backup server table including connection details of available backup server systems; configuring the determined backup policies for the data types of the new backup client system on the selected backup server systems; and updating the backup server table with an identifier of the new backup client system and an identifier of the backup policy.
    Type: Application
    Filed: December 27, 2017
    Publication date: May 3, 2018
    Inventors: Andre Gaschler, Nils Haustein, Dominic Mueller-Wicke, Tim U. Scheideler, Joerg Walter
  • Patent number: 9916459
    Abstract: Methods, systems, and computer program products for encrypting photograph metadata are provided. An image file is received. The image file includes digital image data and a plurality of data fields. A first data field of the plurality of data fields includes a first metadata. A rule set for modifying the first metadata is received. In response to determining that at least one rule of the rule set corresponds to the first metadata, the first metadata is encrypted based to create a second metadata. The second metadata is stored in the image file.
    Type: Grant
    Filed: August 21, 2015
    Date of Patent: March 13, 2018
    Assignee: International Business Machines Corporation
    Inventors: Erik Rueger, Tim U. Scheideler, Matthias Seul, Thomas A. Snellgrove
  • Patent number: 9892003
    Abstract: Automatically configuring backup client systems and backup server systems in a backup environment includes the following steps: determining if a new backup client system is available in the backup environment; in case of an available new backup client system a backup configuration module performs the sub-steps of: determining data types the new backup client system has to backup; determining corresponding backup policies for the determined data types based on a backup policy table mapping data types with backup policies; selecting a backup server system for the determined data types based on a backup server table including connection details of available backup server systems; configuring the determined backup policies for the data types of the new backup client system on the selected backup server systems; and updating the backup server table with an identifier of the new backup client system and an identifier of the backup policy.
    Type: Grant
    Filed: February 11, 2015
    Date of Patent: February 13, 2018
    Assignee: International Business Machines Corporation
    Inventors: Andre Gaschler, Nils Haustein, Dominic Mueller-Wicke, Tim U. Scheideler, Joerg Walter
  • Patent number: 9864659
    Abstract: Embodiments include a method and associated system and computer program product. A capacity utilization of an application system and a backup system for a first period of time is monitored, resulting in retrieving utilization statistics indicative of the capacity utilization. An application load score for the application system and a backup load score for the backup system are determined for several time slots of a backup schedule. For each time slot, a suitability score is determined, by combining the application load score and the backup load score. The suitability score is indicative of a suitability of the application system and the backup system in combination for execution of a backup during the time slot. A first time slot whose suitability score does not exceed a predefined threshold is selected. The backup is scheduled for the first time slot for the application system and for the backup system.
    Type: Grant
    Filed: November 10, 2015
    Date of Patent: January 9, 2018
    Assignee: International Business Machines Corporation
    Inventors: Oliver Roehrsheim, Erik Rueger, Tim U. Scheideler, Thomas A. Snellgrove
  • Patent number: 9858438
    Abstract: An approach for managing photograph metadata anonymization is provided. The approach receives, by one or more processors, a photograph file, wherein the photograph file comprises a digital photograph and a first metadata. The approach receives, by one or more processors, a rule set for modifying the first metadata. The approach determines, by one or more processors, whether at least one rule of the rule set corresponds to a datum of the first metadata. Responsive to determining at least one rule corresponds to at least one datum of the first metadata, the approach modifies, by one or more processors, the first metadata based on the rule set to create a second metadata. The approach stores, by one or more processors, the first metadata in a database.
    Type: Grant
    Filed: March 26, 2015
    Date of Patent: January 2, 2018
    Assignee: International Business Machines Corporation
    Inventors: Erik Rueger, Tim U. Scheideler, Thomas A. Snellgrove
  • Patent number: 9860131
    Abstract: A method for automated policy-based localization of one or more virtual servers within a distributed network comprising a plurality of data centers includes the steps of: (i) receiving a policy, the policy defining at least one rule regarding localization of a virtual server within the network; (ii) storing the defined policy in a policy database; (iii) calculating, using a policy engine and the defined policy, a current policy score for a virtual server within the distributed network; (iv) optimizing, using a re-deployment engine and the defined policy, the calculated policy score for the virtual server by relocating the virtual server to a new data center within the distributed network; and (v) creating an alert, if the defined policy is violated by relocating the virtual server.
    Type: Grant
    Filed: January 7, 2016
    Date of Patent: January 2, 2018
    Assignee: International Business Machines Corporation
    Inventors: Stefan Mayer, Erik Rueger, Tim U. Scheideler, Thomas A. Snellgrove
  • Publication number: 20170201421
    Abstract: A method for automated policy-based localization of one or more virtual servers within a distributed network comprising a plurality of data centers includes the steps of: (i) receiving a policy, the policy defining at least one rule regarding localization of a virtual server within the network; (ii) storing the defined policy in a policy database; (iii) calculating, using a policy engine and the defined policy, a current policy score for a virtual server within the distributed network; (iv) optimizing, using a re-deployment engine and the defined policy, the calculated policy score for the virtual server by relocating the virtual server to a new data center within the distributed network; and (v) creating an alert, if the defined policy is violated by relocating the virtual server.
    Type: Application
    Filed: January 7, 2016
    Publication date: July 13, 2017
    Applicant: International Business Machines Corporation
    Inventors: Stefan Mayer, Erik Rueger, Tim U. Scheideler, Thomas A. Snellgrove
  • Publication number: 20170132089
    Abstract: Embodiments include a method and associated system and computer program product. A capacity utilization of an application system and a backup system for a first period of time is monitored, resulting in retrieving utilization statistics indicative of the capacity utilization. An application load score for the application system and a backup load score for the backup system are determined for several time slots of a backup schedule. For each time slot, a suitability score is determined, by combining the application load score and the backup load score. The suitability score is indicative of a suitability of the application system and the backup system in combination for execution of a backup during the time slot. A first time slot whose suitability score does not exceed a predefined threshold is selected. The backup is scheduled for the first time slot for the application system and for the backup system.
    Type: Application
    Filed: November 10, 2015
    Publication date: May 11, 2017
    Inventors: Oliver Roehrsheim, Erik Rueger, Tim U. Scheideler, Thomas A. Snellgrove
  • Publication number: 20170053122
    Abstract: Methods, systems, and computer program products for encrypting photograph metadata are provided. An image file is received. The image file includes digital image data and a plurality of data fields. A first data field of the plurality of data fields includes a first metadata. A rule set for modifying the first metadata is received. In response to determining that at least one rule of the rule set corresponds to the first metadata, the first metadata is encrypted based to create a second metadata. The second metadata is stored in the image file.
    Type: Application
    Filed: August 21, 2015
    Publication date: February 23, 2017
    Inventors: Erik Rueger, Tim U. Scheideler, Matthias Seul, Thomas A. Snellgrove
  • Publication number: 20160283743
    Abstract: An approach for managing photograph metadata anonymization is provided. The approach receives, by one or more processors, a photograph file, wherein the photograph file comprises a digital photograph and a first metadata. The approach receives, by one or more processors, a rule set for modifying the first metadata. The approach determines, by one or more processors, whether at least one rule of the rule set corresponds to a datum of the first metadata. Responsive to determining at least one rule corresponds to at least one datum of the first metadata, the approach modifies, by one or more processors, the first metadata based on the rule set to create a second metadata. The approach stores, by one or more processors, the first metadata in a database.
    Type: Application
    Filed: March 26, 2015
    Publication date: September 29, 2016
    Inventors: Erik Rueger, Tim U. Scheideler, Thomas A. Snellgrove
  • Patent number: 9442803
    Abstract: A method and a distributed backup system for data backup are provided. The distributed backup system comprises a plurality of computer devices connected by a network. In the system, one of the computer devices comprises a program for managing data backup in the distributed data backup system. In the system, one of the computer devices comprises a first storage space for storing its own files and a second storage space for storing backup files of other computer devices. In the system, the one of the computer devices comprises a first database for storing metadata files of its own files and a second database for storing metadata files of the backup files of the other computer devices.
    Type: Grant
    Filed: June 24, 2014
    Date of Patent: September 13, 2016
    Assignee: International Business Machines Corporation
    Inventors: Erik Rueger, Tim U. Scheideler