Patents by Inventor Yishai Abraham Feldman
Yishai Abraham Feldman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240160966Abstract: An approach is disclosed that receives a set of descriptive material with logic that verifies whether a solution satisfies one or more problem constraints. The descriptive material also computes a value of an objective function that is achieved. The approach generates an output to input to an optimization engine. The output is based on analyzing the set of descriptive material. The approach then processes the output with the optimization engine with the processing resulting in a set of optimization results.Type: ApplicationFiled: November 15, 2022Publication date: May 16, 2024Inventors: Yishai Abraham Feldman, Eliezer Segev Wasserkrug, Aviad Sela
-
Patent number: 11861519Abstract: A system for generating a statistical model for fault diagnosis comprising at least one hardware processor, adapted to: extract a plurality of structured values, each associated with at least one of a plurality of semantic entities of a semantic model or at least one of a plurality of semantic relationships of the semantic model, from structured historical information organized in an identified structure and related to at least some of a plurality of historical events, the semantic model represents an ontology of an identified diagnosis domain, each of the plurality of semantic entities relates to at least one of a plurality of domain entities existing in the identified diagnosis domain, and each of the plurality of semantic relationships connects two of the plurality of semantic entities and represents a parent-child relationship therebetween; extract a plurality of unstructured values, each associated with at least one of the plurality of semantic entities.Type: GrantFiled: September 5, 2021Date of Patent: January 2, 2024Inventors: Eliezer Segev Wasserkrug, Yishai Abraham Feldman, Evgeny Shindin, Sergey Zeltyn
-
Publication number: 20230237222Abstract: In some examples, a system for generating optimization constraints includes a memory device to store human-generated constraint and/or objective definitions that have been programmed in a general-purpose programming language by a human user, and a processor configured to generate labeled data for a plurality of solutions to an optimization problem using the stored constraint and/or objective definitions. The processor is also configured to generate a formal constraint and/or objective model from the labeled constraint and/or objective data, wherein the formal constraint and/or objective model comprises automatically generated constraint and/or objective definitions that are syntactically different from the human-generated constraint and/or objective definitions and syntactically correct for a specific optimization engine.Type: ApplicationFiled: January 24, 2022Publication date: July 27, 2023Inventors: Eliezer Segev WASSERKRUG, Yishai Abraham FELDMAN, Eitan Daniel FARCHI
-
Publication number: 20230152766Abstract: A control system, computer program product, and method for generating a logically-represented policy for a control system operating based on a CMDP model are provided. The control system directs the operation of a controlled application system that is subject to a constraint. The method includes receiving, at the control system, data corresponding to control action variables and system state variables relating to the controlled application system, data corresponding to a cost/reward, and data corresponding to the constraint, and automatically training a CMDP model for the operation of the controlled application system based on the received data, where the CMDP model is formulated using dual linear programming, and where the CMDP model includes a policy corresponding to occupation measures that are decision variables of the dual linear programming formulation. The method also includes automatically generating a logically-represented policy for the control system based on the policy of the CMDP model.Type: ApplicationFiled: November 17, 2021Publication date: May 18, 2023Inventors: Alexander ZADOROJNIY, Yishai Abraham FELDMAN, Lan Ngoc HOANG
-
Publication number: 20220198274Abstract: A system and a method for increasing the classification confidence, with lesser dependence on large sets of training data, obtained by one or more machine learning based algorithms, by analyzing unstructured information using unstructured analysis pipeline comprising a probabilistic network such as a Bayesian network. The probabilistic network may comprise nodes associated with elements and cues defined by experts, and require fewer labelled data samples to train. The confidence level of the elements may be determined by machine learning and unstructured analysis methods and processed by the probabilistic network to estimate the confidence for a characterization quantity.Type: ApplicationFiled: December 23, 2020Publication date: June 23, 2022Inventors: Evgeny Shindin, Eliezer Segev Wasserkrug, Yishai Abraham Feldman
-
Publication number: 20210398006Abstract: A system for generating a statistical model for fault diagnosis comprising at least one hardware processor, adapted to: extract a plurality of structured values, each associated with at least one of a plurality of semantic entities of a semantic model or at least one of a plurality of semantic relationships of the semantic model, from structured historical information organized in an identified structure and related to at least some of a plurality of historical events, the semantic model represents an ontology of an identified diagnosis domain, each of the plurality of semantic entities relates to at least one of a plurality of domain entities existing in the identified diagnosis domain, and each of the plurality of semantic relationships connects two of the plurality of semantic entities and represents a parent-child relationship therebetween; extract a plurality of unstructured values, each associated with at least one of the plurality of semantic entities.Type: ApplicationFiled: September 5, 2021Publication date: December 23, 2021Inventors: Eliezer Segev Wasserkrug, Yishai Abraham Feldman, Evgeny Shindin, Sergey Zeltyn
-
Patent number: 9298924Abstract: A computer implemented method for automatically fixing a security vulnerability in a source code is disclosed. The method includes obtaining identification of code that sends tainted data to corresponding sink code in the source code; and automatically fixing the vulnerability by automatically performing code modification which is selected from the group of code modifications consisting of: code motion and code duplication.Type: GrantFiled: January 22, 2013Date of Patent: March 29, 2016Assignee: International Business Machines CorporationInventors: Aharon Abadi, Yishai Abraham Feldman, Ran Ettinger, Jonathan Bnayahu, Omer Tripp, Yinnon Haviv, Adi Sharabani, Omri Weisman
-
Patent number: 8819637Abstract: A computer implemented method for automatically fixing a security vulnerability in a source code. The method includes obtaining identification of a code block that includes a code that sends tainted data to a corresponding sink code in the source code and automatically fixing the vulnerability by automatically performing code modification which is selected from the group of code modifications consisting of: code motion and code duplication.Type: GrantFiled: June 3, 2010Date of Patent: August 26, 2014Assignee: International Business Machines CorporationInventors: Aharon Abadi, Yishai Abraham Feldman, Ran Ettinger, Jonathan Bnayahu, Omer Tripp, Yinnon Haviv, Adi Sharabani, Omri Weisman
-
Patent number: 8621430Abstract: A method of code transformation supporting temporal abstraction of parameters is provided herein. The method includes the following stages: extracting a set of statements from an original code and further creating a residual code being the original code without the statements, wherein two or more of the extracted statements are not on a same loop in the original code; adding conditions from the original code to the extracted set of statements, such that the added conditions are sufficient to render the set of statements executable; adding statements from the original code to the residual code, such that the added statements are sufficient to render the residual code executable; and adding code portions and variables to the set of statements and the residual code, such that a passing of values between the enhanced set of statements and the residual code maintains a respective passing of values in the original code.Type: GrantFiled: March 3, 2011Date of Patent: December 31, 2013Assignee: International Business Machines CorporationInventors: Aharon Abadi, Jonathan Bnayahu, Ran Ettinger, Yishai Abraham Feldman
-
Patent number: 8539466Abstract: A method of determining suitable insertion points for inserting string sanitizers in a computer code is provided herein. The method includes the following stages: obtaining: (i) a computer code associated with a data flow of externally supplied data, from one or more sources to one or more sinks, (ii) locations of the sources, and (iii) locations of the sinks; building a graph representing control paths, data paths and semantic relationships between the control paths and the data paths of the computer code; associating all tainted data paths on the graph, being data paths that go from sources to sinks and do not include a sanitizer; and determining, on the tainted data paths, potential control paths suitable for sanitizer insertion.Type: GrantFiled: May 23, 2011Date of Patent: September 17, 2013Assignee: International Business Machines CorporationInventors: Aharon Abadi, Jonathan Bnayahu, Ran Ettinger, Yishai Abraham Feldman, Yinnon Avraham Haviv, Adi Sharabani
-
Publication number: 20130133075Abstract: A computer implemented method for automatically fixing a security vulnerability in a source code is disclosed. The method includes obtaining identification of code that sends tainted data to corresponding sink code in the source code; and automatically fixing the vulnerability by automatically performing code modification which is selected from the group of code modifications consisting of: code motion and code duplication. Also disclosed are computer program product and data processing system.Type: ApplicationFiled: January 22, 2013Publication date: May 23, 2013Applicant: International Business Machines CorporationInventors: Aharon Abadi, Yishai Abraham Feldman, Ran Ettinger, Jonathan Bnayahu, Omer Tripp, Yinnon Haviv, Adi Sharabani, Omri Weisman
-
Publication number: 20120304161Abstract: A method of determining suitable insertion points for inserting string sanitizers in a computer code is provided herein. The method includes the following stages: obtaining: (i) a computer code associated with a data flow of externally supplied data, from one or more sources to one or more sinks, (ii) locations of the sources, and (iii) locations of the sinks; building a graph representing control paths, data paths and semantic relationships between the control paths and the data paths of the computer code; associating all tainted data paths on the graph, being data paths that go from sources to sinks and do not include a sanitizer; and determining, on the tainted data paths, potential control paths suitable for sanitizer insertion.Type: ApplicationFiled: May 23, 2011Publication date: November 29, 2012Applicant: International Business Machines CorporationInventors: Aharon Ahadi, Jonathan Bnayahu, Ran Ettinger, Yishai Abraham Feldman, Yinnon Avraham Haviv, Adi Sharabani
-
Patent number: 8286149Abstract: A novel and useful mechanism for optimizing the detection of dependencies in a software system via feedback between static and dynamic engines. The present invention enables dynamic analysis to be more effective by using the results of static analysis to identify sections that need to be traced during dynamic analysis. The method also increases the accuracy of static analysis by using dynamic values as inputs to static analysis. Dynamic values used as inputs for static analysis are a result of dynamic analysis. The mechanism first executes a static analysis, then executes a dynamic analysis targeting the sections identified by the static analysis and finally executes a static analysis using the dynamic values identified during the dynamic analysis in order to detect dependencies.Type: GrantFiled: October 15, 2007Date of Patent: October 9, 2012Assignee: International Business Machines CorporationInventors: Nurit Dor, Yishai Abraham Feldman, Inbal Ronen, Sara Porat
-
Publication number: 20120227029Abstract: A method of code transformation supporting temporal abstraction of parameters is provided herein. The method includes the following stages: extracting a set of statements from an original code and further creating a residual code being the original code without the statements, wherein two or more of the extracted statements are not on a same loop in the original code; adding conditions from the original code to the extracted set of statements, such that the added conditions are sufficient to render the set of statements executable; adding statements from the original code to the residual code, such that the added statements are sufficient to render the residual code executable; and adding code portions and variables to the set of statements and the residual code, such that a passing of values between the enhanced set of statements and the residual code maintains a respective passing of values in the original code.Type: ApplicationFiled: March 3, 2011Publication date: September 6, 2012Applicant: International Business Machines CorporationInventors: Aharon Abadi, Jonathan Bnayahu, Ran Ettinger, Yishai Abraham Feldman
-
Publication number: 20090100415Abstract: A novel and useful mechanism for optimizing the detection of dependencies in a software system via feedback between static and dynamic engines. The present invention enables dynamic analysis to be more effective by using the results of static analysis to identify sections that need to be traced during dynamic analysis. The method also increases the accuracy of static analysis by using dynamic values as inputs to static analysis. Dynamic values used as inputs for static analysis are a result of dynamic analysis. The mechanism first executes a static analysis, then executes a dynamic analysis targeting the sections identified by the static analysis and finally executes a static analysis using the dynamic values identified during the dynamic analysis in order to detect dependencies.Type: ApplicationFiled: October 15, 2007Publication date: April 16, 2009Inventors: Nurit Dor, Yishai Abraham Feldman, Inbal Ronen, Sara Porat