Patents by Inventor Anton Riabov
Anton Riabov has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8799294Abstract: A number of Web 2.0 sites support collaborative tagging systems, which allow users to tag resources with keywords. The tags enable search and retrieval of resources both for the user and for other users, using interfaces like a conventional search form or a tag cloud. A tag hierarchy-based search and retrieval system is provided that enhances the existing interfaces by improving search recall and allowing the discovery of even poorly annotated resources. The system uses tag co-occurrence information to automatically learn tag hierarchies. The learned hierarchies are used for automatically inferring additional tags to resources. These inferences are used to improve the recall of queries issued from a search form or via a tag cloud. The learned hierarchies can be viewed as an emergent ontology that is built up through the collaborative wisdom of a large number of users.Type: GrantFiled: May 15, 2008Date of Patent: August 5, 2014Assignee: International Business Machines CorporationInventors: Eric Bouillet, Zhen Liu, Anand Ranganathan, Anton Riabov
-
Patent number: 8429758Abstract: A risk assessment system and method includes an information system configured to disclose information to a third party. A risk determination model is configured to compute identifiability risk for on one or more records in storage. The identifiability risk is compared to a threshold prior to being disclosed wherein the information system is informed of the identifiability risk exceeding the threshold prior to disclosure to the third party.Type: GrantFiled: July 27, 2012Date of Patent: April 23, 2013Assignee: International Business Machines CorporationInventors: Weifeng Chen, Zhen Liu, Anton Riabov, Angela Marie Schuett
-
Patent number: 8332959Abstract: A risk assessment system and method includes an information system configured to disclose information to a third party. A risk determination model is configured to compute identifiability risk for on one or more records in storage. The identifiability risk is compared to a threshold prior to being disclosed wherein the information system is informed of the identifiability risk exceeding the threshold prior to disclosure to the third party.Type: GrantFiled: June 4, 2008Date of Patent: December 11, 2012Assignee: International Business Machines CorporationInventors: Weifeng Chen, Zhen Liu, Anton Riabov, Angela Marie Schuett
-
Publication number: 20120291144Abstract: A risk assessment system and method includes an information system configured to disclose information to a third party. A risk determination model is configured to compute identifiability risk for on one or more records in storage. The identifiability risk is compared to a threshold prior to being disclosed wherein the information system is informed of the identifiability risk exceeding the threshold prior to disclosure to the third party.Type: ApplicationFiled: July 27, 2012Publication date: November 15, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Weifeng CHEN, Zhen LIU, Anton RIABOV, Angela Marie SCHUETT
-
Patent number: 8040824Abstract: A method for constructing an overlay multicast tree to deliver data from a source to an identified group of nodes is provided in which a plurality of nodes are identified and mapped into multidimensional Euclidean space. A geometric region is constructing having a size that is the minimum size necessary to contain the source and all the nodes. Once constructed, a tree is created beginning at the source and including all of the nodes within the geometric region.Type: GrantFiled: July 14, 2009Date of Patent: October 18, 2011Assignee: International Business Machines CorporationInventors: Zhen Liu, Anton Riabov, Li Zhang
-
Patent number: 7710881Abstract: A method for group communication over a network of processors comprises determining an overlay spanning tree comprising an origin node and at least one receiving node, and controlling a source communication rate to be less than or equal to a bottleneck rate of the overlay spanning tree.Type: GrantFiled: November 25, 2003Date of Patent: May 4, 2010Assignee: International Business Machines CorporationInventors: Francois Baccelli, Augustin Chaintreau, Zhen Liu, Anton Riabov, Sambit Sahu
-
Publication number: 20090287674Abstract: A number of Web 2.0 sites support collaborative tagging systems, which allow users to tag resources with keywords. The tags enable search and retrieval of resources both for the user and for other users, using interfaces like a conventional search form or a tag cloud. A tag hierarchy-based search and retrieval system is provided that enhances the existing interfaces by improving search recall and allowing the discovery of even poorly annotated resources. The system uses tag co-occurrence information to automatically learn tag hierarchies. The learned hierarchies are used for automatically inferring additional tags to resources. These inferences are used to improve the recall of queries issued from a search form or via a tag cloud. The learned hierarchies can be viewed as an emergent ontology that is built up through the collaborative wisdom of a large number of users.Type: ApplicationFiled: May 15, 2008Publication date: November 19, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Eric Bouillet, Zhen Liu, Anand Ranganathan, Anton Riabov
-
Publication number: 20090268733Abstract: A method for constructing an overlay multicast tree to deliver data from a source to an identified group of nodes is provided in which a plurality of nodes are identified and mapped into multidimensional Euclidean space. A geometric region is constructing having a size that is the minimum size necessary to contain the source and all the nodes. Once constructed, a tree is created beginning at the source and including all of the nodes within the geometric region.Type: ApplicationFiled: July 14, 2009Publication date: October 29, 2009Applicant: International Business Machines CorporationInventors: Zhen Liu, Anton Riabov, Li Zhang
-
Patent number: 7593353Abstract: A method for constructing an overlay multicast tree to deliver data from a source to an identified group of nodes is provided in which a plurality of nodes are identified and mapped into multidimensional Euclidean space. A geometric region is constructing having a size that is the minimum size necessary to contain the source and all the nodes. Once constructed, a tree is created beginning at the source and including all of the nodes within the geometric region.Type: GrantFiled: March 13, 2004Date of Patent: September 22, 2009Assignee: International Business Machines CorporationInventors: Zhen Liu, Anton Riabov, Li Zhang
-
Publication number: 20090228990Abstract: A risk assessment system and method includes an information system configured to disclose information to a third party. A risk determination model is configured to compute identifiability risk for on one or more records in storage. The identifiability risk is compared to a threshold prior to being disclosed wherein the information system is informed of the identifiability risk exceeding the threshold prior to disclosure to the third party.Type: ApplicationFiled: June 4, 2008Publication date: September 10, 2009Inventors: Weifeng Chen, Zhen Liu, Anton Riabov, Angela Marie Schuett
-
Patent number: 7355975Abstract: The present invention addresses scalability and end-to-end reliability in overlay multicast networks. A simple end-system multicast architecture that is both scalable in throughput and reliable in an end-to-end way is used. In this architecture, the transfers between nodes use TCP with backpressure mechanisms to provide data packet transfers between intermediate nodes having finite-size forwarding buffers. There is also a finite-size backup buffer in each node to store copies of packets which are copied out from the receiver window to the forwarding buffers. These backup buffers are used when TCP connections are re-established to supply copies of data packets for the children nodes after their parent node fails, maintaining a complete sequence of data packets to all nodes within the multicast overlay network. The architecture provides end-to-end reliability, tolerates multiple simultaneous node failures and provides positive throughput for any group size and any buffer size.Type: GrantFiled: April 30, 2004Date of Patent: April 8, 2008Assignee: International Business Machines CorporationInventors: Zhen Liu, Francois Baccelli, Augustin Chaintreau, Anton Riabov
-
Publication number: 20080005778Abstract: A risk assessment system and method includes an information system configured to disclose information to a third party. A risk determination model is configured to compute identifiability risk for on one or more records in storage. The identifiability risk is compared to a threshold prior to being disclosed wherein the information system is informed of the identifiability risk exceeding the threshold prior to disclosure to the third party.Type: ApplicationFiled: July 3, 2006Publication date: January 3, 2008Inventors: Weifeng Chen, Zhen Liu, Anton Riabov, Angela Marie Schuett
-
Publication number: 20070250331Abstract: A computer implemented method, apparatus, and computer usable program code for performing automatic planning in a compositional system. Parameter substitution is performed in response to receiving a planning language input. Actions are preprocessed in response to performing parameter substitution. A backward search is performed for potential solutions in response to preprocessing actions. A domain description is used for performing parameter substitution, preprocessing, and performing a backward search. Actions within the domain description have one or more inputs and one or more outputs. The planning language input specifies at least one goal and at least one action. A description of an action includes at least one description of action preconditions and at least one description of action effects. The action preconditions include predicates that must hold on input streams connected to the action in a valid workflow.Type: ApplicationFiled: April 5, 2006Publication date: October 25, 2007Applicant: International Business Machines CorporationInventors: Zhen Liu, Anton Riabov
-
Publication number: 20070245298Abstract: A stream processing system provides a description language for stream processing workflow composition. A domain definition data structure in the description language defines all stream processing components available to the stream processing system. Responsive to receiving a stream processing request, a planner translates the stream processing request into a problem definition. The problem definition defines stream properties that must be satisfied by property values associated with one or more output streams. The planner generates a workflow that satisfies the problem definition given the domain definition data structure.Type: ApplicationFiled: April 18, 2006Publication date: October 18, 2007Applicant: International Business Machines CorporationInventors: Genady Grabarnik, Zhen Liu, Anton Riabov
-
Publication number: 20070204020Abstract: An automatic planning system is provided for stream processing workflow composition. End users provide requests to the automatic planning system. The requests are goal-based problems to be solved by the automatic planning system, which then generates plan graphs to form stream processing applications. A scheduler deploys and schedules the stream processing applications for execution within an operating environment. The operating environment then returns the results to the end users.Type: ApplicationFiled: February 24, 2006Publication date: August 30, 2007Applicant: International Business Machines CorporationInventors: Kay Anderson, Joseph Bigus, Mark Feblowitz, Genady Grabarnik, Nagui Halim, Zhen Liu, Anton Riabov
-
Publication number: 20070162976Abstract: An exemplary method is provided for managing and mitigating security risks through planning. A first security-related information of a requested product is received. A second security-related information of resources that are available for producing the requested product is received. A multi-stage process with security risks managed by the first security-related information and the second security-related information is performed to produce the requested product.Type: ApplicationFiled: January 10, 2006Publication date: July 12, 2007Applicant: International Business Machines CorporationInventors: Kay Anderson, Pau-Chen Cheng, Mark Feblowitz, Genady Grabarnik, Shai Halevi, Nagui Halim, Trent Jaeger, Paul Karger, Zhen Liu, Ronald Perez, Anton Riabov, Pankaj Rohatgi, Angela Schuett, Michael Steiner, Grant Wagner
-
Publication number: 20050243722Abstract: The present invention addresses scalability and end-to-end reliability in overlay multicast networks. A simple end-system multicast architecture that is both scalable in throughput and reliable in an end-to-end way is used. In this architecture, the transfers between nodes use TCP with backpressure mechanisms to provide data packet transfers between intermediate nodes having finite-size forwarding buffers. There is also a finite-size backup buffer in each node to store copies of packets which are copied out from the receiver window to the forwarding buffers. These backup buffers are used when TCP connections are re-established to supply copies of data packets for the children nodes after their parent node fails, maintaining a complete sequence of data packets to all nodes within the multicast overlay network. The architecture provides end-to-end reliability, tolerates multiple simultaneous node failures and provides positive throughput for any group size and any buffer size.Type: ApplicationFiled: April 30, 2004Publication date: November 3, 2005Inventors: Zhen Liu, Francois Baccelli, Augustin Chaintreau, Anton Riabov
-
Publication number: 20050201405Abstract: A method for constructing an overlay multicast tree to deliver data from a source to an identified group of nodes is provided in which a plurality of nodes are identified and mapped into multidimensional Euclidean space. A geometric region is constructing having a size that is the minimum size necessary to contain the source and all the nodes. Once constructed, a tree is created beginning at the source and including all of the nodes within the geometric region.Type: ApplicationFiled: March 13, 2004Publication date: September 15, 2005Inventors: Zhen Liu, Anton Riabov, Li Zhang
-
Publication number: 20050111387Abstract: A method for group communication over a network of processors comprises determining an overlay spanning tree comprising an origin node and at least one receiving node, and controlling a source communication rate to be less than or equal to a bottleneck rate of the overlay spanning tree.Type: ApplicationFiled: November 25, 2003Publication date: May 26, 2005Inventors: Francois Baccelli, Augustin Chaintreau, Zhen Liu, Anton Riabov, Sambit Sahu