Patents by Inventor Anton Riabov

Anton Riabov has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8799294
    Abstract: A number of Web 2.0 sites support collaborative tagging systems, which allow users to tag resources with keywords. The tags enable search and retrieval of resources both for the user and for other users, using interfaces like a conventional search form or a tag cloud. A tag hierarchy-based search and retrieval system is provided that enhances the existing interfaces by improving search recall and allowing the discovery of even poorly annotated resources. The system uses tag co-occurrence information to automatically learn tag hierarchies. The learned hierarchies are used for automatically inferring additional tags to resources. These inferences are used to improve the recall of queries issued from a search form or via a tag cloud. The learned hierarchies can be viewed as an emergent ontology that is built up through the collaborative wisdom of a large number of users.
    Type: Grant
    Filed: May 15, 2008
    Date of Patent: August 5, 2014
    Assignee: International Business Machines Corporation
    Inventors: Eric Bouillet, Zhen Liu, Anand Ranganathan, Anton Riabov
  • Patent number: 8429758
    Abstract: A risk assessment system and method includes an information system configured to disclose information to a third party. A risk determination model is configured to compute identifiability risk for on one or more records in storage. The identifiability risk is compared to a threshold prior to being disclosed wherein the information system is informed of the identifiability risk exceeding the threshold prior to disclosure to the third party.
    Type: Grant
    Filed: July 27, 2012
    Date of Patent: April 23, 2013
    Assignee: International Business Machines Corporation
    Inventors: Weifeng Chen, Zhen Liu, Anton Riabov, Angela Marie Schuett
  • Patent number: 8332959
    Abstract: A risk assessment system and method includes an information system configured to disclose information to a third party. A risk determination model is configured to compute identifiability risk for on one or more records in storage. The identifiability risk is compared to a threshold prior to being disclosed wherein the information system is informed of the identifiability risk exceeding the threshold prior to disclosure to the third party.
    Type: Grant
    Filed: June 4, 2008
    Date of Patent: December 11, 2012
    Assignee: International Business Machines Corporation
    Inventors: Weifeng Chen, Zhen Liu, Anton Riabov, Angela Marie Schuett
  • Publication number: 20120291144
    Abstract: A risk assessment system and method includes an information system configured to disclose information to a third party. A risk determination model is configured to compute identifiability risk for on one or more records in storage. The identifiability risk is compared to a threshold prior to being disclosed wherein the information system is informed of the identifiability risk exceeding the threshold prior to disclosure to the third party.
    Type: Application
    Filed: July 27, 2012
    Publication date: November 15, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Weifeng CHEN, Zhen LIU, Anton RIABOV, Angela Marie SCHUETT
  • Patent number: 8040824
    Abstract: A method for constructing an overlay multicast tree to deliver data from a source to an identified group of nodes is provided in which a plurality of nodes are identified and mapped into multidimensional Euclidean space. A geometric region is constructing having a size that is the minimum size necessary to contain the source and all the nodes. Once constructed, a tree is created beginning at the source and including all of the nodes within the geometric region.
    Type: Grant
    Filed: July 14, 2009
    Date of Patent: October 18, 2011
    Assignee: International Business Machines Corporation
    Inventors: Zhen Liu, Anton Riabov, Li Zhang
  • Patent number: 7710881
    Abstract: A method for group communication over a network of processors comprises determining an overlay spanning tree comprising an origin node and at least one receiving node, and controlling a source communication rate to be less than or equal to a bottleneck rate of the overlay spanning tree.
    Type: Grant
    Filed: November 25, 2003
    Date of Patent: May 4, 2010
    Assignee: International Business Machines Corporation
    Inventors: Francois Baccelli, Augustin Chaintreau, Zhen Liu, Anton Riabov, Sambit Sahu
  • Publication number: 20090287674
    Abstract: A number of Web 2.0 sites support collaborative tagging systems, which allow users to tag resources with keywords. The tags enable search and retrieval of resources both for the user and for other users, using interfaces like a conventional search form or a tag cloud. A tag hierarchy-based search and retrieval system is provided that enhances the existing interfaces by improving search recall and allowing the discovery of even poorly annotated resources. The system uses tag co-occurrence information to automatically learn tag hierarchies. The learned hierarchies are used for automatically inferring additional tags to resources. These inferences are used to improve the recall of queries issued from a search form or via a tag cloud. The learned hierarchies can be viewed as an emergent ontology that is built up through the collaborative wisdom of a large number of users.
    Type: Application
    Filed: May 15, 2008
    Publication date: November 19, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Eric Bouillet, Zhen Liu, Anand Ranganathan, Anton Riabov
  • Publication number: 20090268733
    Abstract: A method for constructing an overlay multicast tree to deliver data from a source to an identified group of nodes is provided in which a plurality of nodes are identified and mapped into multidimensional Euclidean space. A geometric region is constructing having a size that is the minimum size necessary to contain the source and all the nodes. Once constructed, a tree is created beginning at the source and including all of the nodes within the geometric region.
    Type: Application
    Filed: July 14, 2009
    Publication date: October 29, 2009
    Applicant: International Business Machines Corporation
    Inventors: Zhen Liu, Anton Riabov, Li Zhang
  • Patent number: 7593353
    Abstract: A method for constructing an overlay multicast tree to deliver data from a source to an identified group of nodes is provided in which a plurality of nodes are identified and mapped into multidimensional Euclidean space. A geometric region is constructing having a size that is the minimum size necessary to contain the source and all the nodes. Once constructed, a tree is created beginning at the source and including all of the nodes within the geometric region.
    Type: Grant
    Filed: March 13, 2004
    Date of Patent: September 22, 2009
    Assignee: International Business Machines Corporation
    Inventors: Zhen Liu, Anton Riabov, Li Zhang
  • Publication number: 20090228990
    Abstract: A risk assessment system and method includes an information system configured to disclose information to a third party. A risk determination model is configured to compute identifiability risk for on one or more records in storage. The identifiability risk is compared to a threshold prior to being disclosed wherein the information system is informed of the identifiability risk exceeding the threshold prior to disclosure to the third party.
    Type: Application
    Filed: June 4, 2008
    Publication date: September 10, 2009
    Inventors: Weifeng Chen, Zhen Liu, Anton Riabov, Angela Marie Schuett
  • Patent number: 7355975
    Abstract: The present invention addresses scalability and end-to-end reliability in overlay multicast networks. A simple end-system multicast architecture that is both scalable in throughput and reliable in an end-to-end way is used. In this architecture, the transfers between nodes use TCP with backpressure mechanisms to provide data packet transfers between intermediate nodes having finite-size forwarding buffers. There is also a finite-size backup buffer in each node to store copies of packets which are copied out from the receiver window to the forwarding buffers. These backup buffers are used when TCP connections are re-established to supply copies of data packets for the children nodes after their parent node fails, maintaining a complete sequence of data packets to all nodes within the multicast overlay network. The architecture provides end-to-end reliability, tolerates multiple simultaneous node failures and provides positive throughput for any group size and any buffer size.
    Type: Grant
    Filed: April 30, 2004
    Date of Patent: April 8, 2008
    Assignee: International Business Machines Corporation
    Inventors: Zhen Liu, Francois Baccelli, Augustin Chaintreau, Anton Riabov
  • Publication number: 20080005778
    Abstract: A risk assessment system and method includes an information system configured to disclose information to a third party. A risk determination model is configured to compute identifiability risk for on one or more records in storage. The identifiability risk is compared to a threshold prior to being disclosed wherein the information system is informed of the identifiability risk exceeding the threshold prior to disclosure to the third party.
    Type: Application
    Filed: July 3, 2006
    Publication date: January 3, 2008
    Inventors: Weifeng Chen, Zhen Liu, Anton Riabov, Angela Marie Schuett
  • Publication number: 20070250331
    Abstract: A computer implemented method, apparatus, and computer usable program code for performing automatic planning in a compositional system. Parameter substitution is performed in response to receiving a planning language input. Actions are preprocessed in response to performing parameter substitution. A backward search is performed for potential solutions in response to preprocessing actions. A domain description is used for performing parameter substitution, preprocessing, and performing a backward search. Actions within the domain description have one or more inputs and one or more outputs. The planning language input specifies at least one goal and at least one action. A description of an action includes at least one description of action preconditions and at least one description of action effects. The action preconditions include predicates that must hold on input streams connected to the action in a valid workflow.
    Type: Application
    Filed: April 5, 2006
    Publication date: October 25, 2007
    Applicant: International Business Machines Corporation
    Inventors: Zhen Liu, Anton Riabov
  • Publication number: 20070245298
    Abstract: A stream processing system provides a description language for stream processing workflow composition. A domain definition data structure in the description language defines all stream processing components available to the stream processing system. Responsive to receiving a stream processing request, a planner translates the stream processing request into a problem definition. The problem definition defines stream properties that must be satisfied by property values associated with one or more output streams. The planner generates a workflow that satisfies the problem definition given the domain definition data structure.
    Type: Application
    Filed: April 18, 2006
    Publication date: October 18, 2007
    Applicant: International Business Machines Corporation
    Inventors: Genady Grabarnik, Zhen Liu, Anton Riabov
  • Publication number: 20070204020
    Abstract: An automatic planning system is provided for stream processing workflow composition. End users provide requests to the automatic planning system. The requests are goal-based problems to be solved by the automatic planning system, which then generates plan graphs to form stream processing applications. A scheduler deploys and schedules the stream processing applications for execution within an operating environment. The operating environment then returns the results to the end users.
    Type: Application
    Filed: February 24, 2006
    Publication date: August 30, 2007
    Applicant: International Business Machines Corporation
    Inventors: Kay Anderson, Joseph Bigus, Mark Feblowitz, Genady Grabarnik, Nagui Halim, Zhen Liu, Anton Riabov
  • Publication number: 20070162976
    Abstract: An exemplary method is provided for managing and mitigating security risks through planning. A first security-related information of a requested product is received. A second security-related information of resources that are available for producing the requested product is received. A multi-stage process with security risks managed by the first security-related information and the second security-related information is performed to produce the requested product.
    Type: Application
    Filed: January 10, 2006
    Publication date: July 12, 2007
    Applicant: International Business Machines Corporation
    Inventors: Kay Anderson, Pau-Chen Cheng, Mark Feblowitz, Genady Grabarnik, Shai Halevi, Nagui Halim, Trent Jaeger, Paul Karger, Zhen Liu, Ronald Perez, Anton Riabov, Pankaj Rohatgi, Angela Schuett, Michael Steiner, Grant Wagner
  • Publication number: 20050243722
    Abstract: The present invention addresses scalability and end-to-end reliability in overlay multicast networks. A simple end-system multicast architecture that is both scalable in throughput and reliable in an end-to-end way is used. In this architecture, the transfers between nodes use TCP with backpressure mechanisms to provide data packet transfers between intermediate nodes having finite-size forwarding buffers. There is also a finite-size backup buffer in each node to store copies of packets which are copied out from the receiver window to the forwarding buffers. These backup buffers are used when TCP connections are re-established to supply copies of data packets for the children nodes after their parent node fails, maintaining a complete sequence of data packets to all nodes within the multicast overlay network. The architecture provides end-to-end reliability, tolerates multiple simultaneous node failures and provides positive throughput for any group size and any buffer size.
    Type: Application
    Filed: April 30, 2004
    Publication date: November 3, 2005
    Inventors: Zhen Liu, Francois Baccelli, Augustin Chaintreau, Anton Riabov
  • Publication number: 20050201405
    Abstract: A method for constructing an overlay multicast tree to deliver data from a source to an identified group of nodes is provided in which a plurality of nodes are identified and mapped into multidimensional Euclidean space. A geometric region is constructing having a size that is the minimum size necessary to contain the source and all the nodes. Once constructed, a tree is created beginning at the source and including all of the nodes within the geometric region.
    Type: Application
    Filed: March 13, 2004
    Publication date: September 15, 2005
    Inventors: Zhen Liu, Anton Riabov, Li Zhang
  • Publication number: 20050111387
    Abstract: A method for group communication over a network of processors comprises determining an overlay spanning tree comprising an origin node and at least one receiving node, and controlling a source communication rate to be less than or equal to a bottleneck rate of the overlay spanning tree.
    Type: Application
    Filed: November 25, 2003
    Publication date: May 26, 2005
    Inventors: Francois Baccelli, Augustin Chaintreau, Zhen Liu, Anton Riabov, Sambit Sahu