Patents by Inventor Bhavna Agrawal

Bhavna Agrawal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240047279
    Abstract: Embodiments of the invention are directed to a computer-implemented method. A non-limiting example of the computer-implemented method includes accessing, using a processor system, a process-step sequence that includes a plurality process-steps and a plurality of queue-times. A process-step sequence mining operation is applied to the process-step sequence, wherein the process-step sequence mining operation is operable to make a prediction of an impact of a portion of the process-step sequence on a characteristic of a product generated by the process-step sequence.
    Type: Application
    Filed: August 5, 2022
    Publication date: February 8, 2024
    Inventors: Robert Jeffrey Baseman, Elham Khabiri, Anuradha Bhamidipaty, Yingjie Li, Srideepika Jayaraman, Bhavna Agrawal, Jeffrey Owen Kephart
  • Publication number: 20230097150
    Abstract: Tabular data is accessed that contains multiple entries of alphanumeric data. Multiple tokens are generated of the multiple entries of alphanumeric data using a tokenization process. The tokenization process maintains jargon-specific features of the alphanumeric data. Multiple embeddings of the multiple entries of alphanumeric data are generated using the tokens. The embeddings capture similarity of the multiple entries considering all of global features, column features, and row features in the tokens of the tabular data. A neural network is used to predict probabilities for pre-defined classes for the tabular data using the generated embeddings.
    Type: Application
    Filed: September 24, 2021
    Publication date: March 30, 2023
    Inventors: Bhavna Agrawal, Elham Khabiri, Yingjie Li, Pranav Girish Sankhe
  • Publication number: 20230085001
    Abstract: Users of an endpoint remediation system can be assigned to different roles, from which they can request exceptions, approve exceptions, and/or enable remediation on endpoint devices. The compliance scanning and enforcing process can be automated, while allowing entities to request and/or approve certain exceptions. Therefore, security compliance for customers can be actively managed to provide visibility to the endpoint device compliance state at any time.
    Type: Application
    Filed: November 18, 2022
    Publication date: March 16, 2023
    Inventors: Constantin Mircea Adam, Richard Jay Cohen, Robert Filepp, Milton H. Hernandez, Brian Peterson, Maja Vukovic, Sai ZENG, Guan Qun Zhang, Bhavna Agrawal
  • Publication number: 20230073564
    Abstract: Temporal and spatially integrated forecast modeling includes generating a plurality of forecast models for a plurality of short-term to long-term time periods for a plurality of locations. Temporally integrating the plurality of forecast models sequentially over the plurality of time periods for the plurality of locations and spatially integrating the temporally integrated plurality of forecast models for each location hierarchically over the geographic areas. The forecast models are autoregressive distributed lag models with different explanatory variables for the short-term and long-term forecast models. The temporally integrating includes recursively integrating the plurality of forecast models over the time periods from the short-term to the long-term time periods and the spatially integrating includes recursively integrating the temporally integrated plurality of forecast models hierarchically from larger size geographic areas to smaller size geographic areas.
    Type: Application
    Filed: August 27, 2021
    Publication date: March 9, 2023
    Inventors: Zhengliang Xue, Bhavna Agrawal, Anuradha Bhamidipaty, Yingjie Li, Shuxin Lin
  • Publication number: 20230029218
    Abstract: A concept associated with a feature used in machine learning model can be determined, the feature extracted from a first data source. A second data source containing the concept can be identified. An additional feature can be generated by performing a natural language processing on the second data source. The feature and the additional feature can be merged. A second machine learning model can be generated, which use the merged feature. A prediction result of the first machine learning model can be compared with a prediction result of the second machine learning model relative to ground truth data, to evaluate effective of the merged feature. Based on the evaluated effectiveness, the feature can be augmented with the merged feature in machine learning.
    Type: Application
    Filed: July 20, 2021
    Publication date: January 26, 2023
    Inventors: Anuradha Bhamidipaty, Yingjie Li, Shuxin Lin, Zhengliang Xue, Bhavna Agrawal
  • Patent number: 11533296
    Abstract: Users of an endpoint remediation system can be assigned to different roles, from which they can request exceptions, approve exceptions, and/or enable remediation on endpoint devices. The compliance scanning and enforcing process can be automated, while allowing entities to request and/or approve certain exceptions. Therefore, security compliance for customers can be actively managed to provide visibility to the endpoint device compliance state at any time.
    Type: Grant
    Filed: September 1, 2017
    Date of Patent: December 20, 2022
    Assignee: KYNDRYL, INC.
    Inventors: Constantin Mircea Adam, Richard Jay Cohen, Robert Filepp, Milton H. Hernandez, Brian Peterson, Maja Vukovic, Sai Zeng, Guan Qun Zhang, Bhavna Agrawal
  • Patent number: 11502995
    Abstract: Users of an endpoint remediation system can be assigned to different roles, from which they can request exceptions, approve exceptions, and/or enable remediation on endpoint devices. The compliance scanning and enforcing process can be automated, while allowing entities to request and/or approve certain exceptions. Therefore, security compliance for customers can be actively managed to provide visibility to the endpoint device compliance state at any time.
    Type: Grant
    Filed: December 14, 2017
    Date of Patent: November 15, 2022
    Assignee: KYNDRYL, INC.
    Inventors: Constantin Mircea Adam, Richard Jay Cohen, Robert Filepp, Milton H. Hernandez, Brian Peterson, Maja Vukovic, Sai Zeng, Guan Qun Zhang, Bhavna Agrawal
  • Publication number: 20220019742
    Abstract: A method is provided for creating a semantic model for submitting search queries thereto. The method includes an act of receiving data from one or more input sources in an entity and relationship capture service of a situational awareness engine. The method further includes an act of extracting entities and relationships between the entities in two or more extraction services, where the two or more extraction services include at least two of a table-to-graph service, an event-to-graph service, a sensor-to-graph service, a text-to-graph service, and an image-to-graph service. The method includes an act of generating a semantic model based on fusion and labeling the extracted data provided by the at least two extraction services, where the semantic model can receive a search query and respond to the search query based on the generated semantic model.
    Type: Application
    Filed: July 20, 2020
    Publication date: January 20, 2022
    Inventors: Anuradha Bhamidipaty, Elham Khabiri, Shuxin Lin, Jeffrey Owen Kephart, Yingjie Li, Bhavna Agrawal
  • Patent number: 10984452
    Abstract: Content is selectively provided to users of mobile devices within a venue including an on-site wireless network. User authorization requests and/or user account registration data are transmitted to the on-site wireless network from mobile devices within the venue. Attributes such as user interests and professions, which comprise inferred user profiles, are obtained using the network traffic data. Identities of mobile devices are established based on a combination including two or more of network identifiers, mobile device signatures, and browser signatures. The inferred user profiles are correlated with the mobile device identities. The inferred user profiles are aggregated into user profile groups and then matched with a content provider's intended target profiles. Content is transmitted to the mobile devices corresponding to the intended target profiles and based on correlation of the inferred user profiles with identities of the devices.
    Type: Grant
    Filed: July 13, 2017
    Date of Patent: April 20, 2021
    Assignee: International Business Machines Corporation
    Inventors: Bhavna Agrawal, Nikolaos Anerousis, Frank A. Schaffa, Jin Xiao
  • Patent number: 10778353
    Abstract: Providing real-time awareness of an audience to a presenter during the presentation. In response to presenting a presentation to an audience, information is automatically collected about the audience from sensors positioned amongst the audience. The collected information about the audience is analyzed and, during the presentation, recommendations are made to the presenter for improving the presentation based on the collected information.
    Type: Grant
    Filed: January 24, 2019
    Date of Patent: September 15, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Bhavna Agrawal, Ruchi Mahindru, Karin Murthy, Sharon M. Trewin
  • Publication number: 20200244380
    Abstract: Providing real-time awareness of an audience to a presenter during the presentation. In response to presenting a presentation to an audience, information is automatically collected about the audience from sensors positioned amongst the audience. The collected information about the audience is analyzed and, during the presentation, recommendations are made to the presenter for improving the presentation based on the collected information.
    Type: Application
    Filed: January 24, 2019
    Publication date: July 30, 2020
    Inventors: Bhavna Agrawal, Ruchi Mahindru, Karin Murthy, Sharon M. Trewin
  • Publication number: 20190075081
    Abstract: Users of an endpoint remediation system can be assigned to different roles, from which they can request exceptions, approve exceptions, and/or enable remediation on endpoint devices. The compliance scanning and enforcing process can be automated, while allowing entities to request and/or approve certain exceptions. Therefore, security compliance for customers can be actively managed to provide visibility to the endpoint device compliance state at any time.
    Type: Application
    Filed: September 1, 2017
    Publication date: March 7, 2019
    Inventors: Constantin Mircea Adam, Richard Jay Cohen, Robert Filepp, Milton H. Hernandez, Brian Peterson, Maja Vukovic, Sai Zeng, Guan Qun Zhang, Bhavna Agrawal
  • Publication number: 20190019221
    Abstract: Content is selectively provided to users of mobile devices within a venue including an on-site wireless network. User authorization requests and/or user account registration data are transmitted to the on-site wireless network from mobile devices within the venue. Attributes such as user interests and professions, which comprise inferred user profiles, are obtained using the network traffic data. Identities of mobile devices are established based on a combination including two or more of network identifiers, mobile device signatures, and browser signatures. The inferred user profiles are correlated with the mobile device identities. The inferred user profiles are aggregated into user profile groups and then matched with a content provider's intended target profiles. Content is transmitted to the mobile devices corresponding to the intended target profiles and based on correlation of the inferred user profiles with identities of the devices.
    Type: Application
    Filed: July 13, 2017
    Publication date: January 17, 2019
    Inventors: Bhavna Agrawal, Nikolaos Anerousis, Frank A. Schaffa, Jin Xiao
  • Publication number: 20190019222
    Abstract: Content is selectively provided to users of mobile devices within a venue including an on-site wireless network. User authorization requests and/or user account registration data are transmitted to the on-site wireless network from mobile devices within the venue. Attributes such as user interests and professions, which comprise inferred user profiles, are obtained using the network traffic data. Identities of mobile devices are established based on a combination including two or more of network identifiers, mobile device signatures, and browser signatures. The inferred user profiles are correlated with the mobile device identities. The inferred user profiles are aggregated into user profile groups and then matched with a content provider's intended target profiles. Content is transmitted to the mobile devices corresponding to the intended target profiles and based on correlation of the inferred user profiles with identities of the devices.
    Type: Application
    Filed: December 31, 2017
    Publication date: January 17, 2019
    Inventors: Bhavna Agrawal, Nikolaos Anerousis, Frank A. Schaffa, Jin Xiao
  • Publication number: 20180357608
    Abstract: A method and system of characterizing a job market is provided. The available job postings of a job market are determined. For each job posting, one or more technical skills, a job role level, and one or more professional capabilities related to the job posting are determined. The professional capabilities are aggregated by job dimensions. The determined technical skills and the professional capabilities of each job posting and the aggregated professional capabilities are stored in a database as reference data. A job capability profile for one or more job dimensions is provided based on the stored reference data in the database.
    Type: Application
    Filed: June 7, 2017
    Publication date: December 13, 2018
    Inventors: Bhavna Agrawal, Yi-Min Chee, Rong Liu, Wanita Sherchan, Cheuk Hay Sin, Michael Eng Yeow Tan
  • Patent number: 9456004
    Abstract: For each of a plurality of endpoints of an information technology system having a plurality of security policies, a probability of being safe of each of said endpoints is determined according to each of said security policies. Said determining takes into account probability of security compromise for a single violation of each given one of said security policies. A risk-aware compliance metric is determined for said information technology system based on each of said probabilities of being safe for each of said endpoints and each of said policies. At least one of an operation and a remediation is carried out on said information technology system based on said risk-aware compliance metric. Techniques for optimizing risk-aware compliance are also provided.
    Type: Grant
    Filed: June 5, 2014
    Date of Patent: September 27, 2016
    Assignee: GLOBALFOUNDRIES INC.
    Inventors: Bhavna Agrawal, Daniel M. Coffman, Frank A. Schaffa, Robert M. Delmonico
  • Publication number: 20140366082
    Abstract: For each of a plurality of endpoints of an information technology system having a plurality of security policies, a probability of being safe of each of said endpoints is determined according to each of said security policies. Said determining takes into account probability of security compromise for a single violation of each given one of said security policies. A risk-aware compliance metric is determined for said information technology system based on each of said probabilities of being safe for each of said endpoints and each of said policies. At least one of an operation and a remediation is carried out on said information technology system based on said risk-aware compliance metric. Techniques for optimizing risk-aware compliance are also provided.
    Type: Application
    Filed: June 5, 2014
    Publication date: December 11, 2014
    Inventors: Bhavna Agrawal, Daniel M. Coffman, Frank A. Schaffa, Robert M. Delmonico
  • Publication number: 20130283223
    Abstract: In one embodiment, the invention is a method and apparatus for variation enabling statistical testing using deterministic multi-corner timing analysis. One embodiment of a method for obtaining statistical timing data for an integrated circuit chip includes obtaining deterministic multi-corner timing data for the integrated circuit chip and constructing the statistical timing data from the deterministic multi-corner timing data.
    Type: Application
    Filed: April 24, 2012
    Publication date: October 24, 2013
    Applicant: International Business Machines Corporation
    Inventors: Bhavna Agrawal, David S. Kung, Jinjun Xiong, Vladimir Zolotov
  • Patent number: 8560994
    Abstract: In one embodiment, the invention is a method and apparatus for variation enabling statistical testing using deterministic multi-corner timing analysis. One embodiment of a method for obtaining statistical timing data for an integrated circuit chip includes obtaining deterministic multi-corner timing data for the integrated circuit chip and constructing the statistical timing data from the deterministic multi-corner timing data.
    Type: Grant
    Filed: April 24, 2012
    Date of Patent: October 15, 2013
    Assignee: International Business Machines Corporation
    Inventors: Bhavna Agrawal, David S. Kung, Jinjun Xiong, Vladimir Zolotov
  • Publication number: 20120266119
    Abstract: A method for constructing delay rules which include the effects of MIS simulations for static timing analysis with reduced cost. The present method includes constructing skew windows for applying MIS penalties purely from SIS data, and scales the MIS penalties during rule use based upon how closely the skews in the use case approach the edge of the skew window. The method applies both to timing rule construction for a library of circuits and to timing rule construction for macros where only part of the circuits in the macro may be sensitive to skew between macro inputs.
    Type: Application
    Filed: April 18, 2011
    Publication date: October 18, 2012
    Applicant: International Business Machines Corporation
    Inventors: Jeffrey P. Soreff, Bhavna Agrawal, David J. Hathaway