Patents by Inventor Eric J. Rozner

Eric J. Rozner has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20170075960
    Abstract: In an approach to cooperative evidence gathering, a first computing device receives a request for data corresponding to an event, where a second computing device detecting the event initiates the request for data. The first computing device aggregates data from one or more sensors, the one or more sensors associated with one or more first computing devices within a proximity of a location of the event. The first computing device determines whether at least a portion of the aggregated data is applicable to the event.
    Type: Application
    Filed: January 29, 2016
    Publication date: March 16, 2017
    Inventors: Justin G. Manweiler, Jan S. Rellermeyer, Eric J. Rozner, James Xenidis
  • Publication number: 20170076394
    Abstract: In an approach to cooperative evidence gathering, a first computing device receives a request for data corresponding to an event, where a second computing device detecting the event initiates the request for data. The first computing device aggregates data from one or more sensors, the one or more sensors associated with one or more first computing devices within a proximity of a location of the event. The first computing device determines whether at least a portion of the aggregated data is applicable to the event.
    Type: Application
    Filed: September 11, 2015
    Publication date: March 16, 2017
    Inventors: Justin G. Manweiler, Jan S. Rellermeyer, Eric J. Rozner, James Xenidis
  • Publication number: 20170041036
    Abstract: Provided are techniques for automatically protecting portable and wearable electronic devices from potential hazards by predicting when such hazards may occur. Techniques may include monitoring a plurality of sensors on the mobile computing device; receiving, on the mobile computing device, context data from a plurality of context-service applications; selecting a set of device-protection policies based upon an availability of the plurality of sensors and the plurality of context-service applications, wherein the set of device-protection policies are configured to determine a level of risk to the mobile computing device based on sensor data received from the plurality of sensors and the context data; applying the sensor data and the context data to the set of device-protection policies to generate the level of risk; and triggering a self-protection action if the level of risk exceeds a pre-determined threshold level of risk.
    Type: Application
    Filed: August 5, 2015
    Publication date: February 9, 2017
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Maggie Phung, Eric J. Rozner, Chin Ngai Sze, Zhennan Wang
  • Publication number: 20170005978
    Abstract: Techniques are disclosed enabling a wireless device to associate other wireless devices within a communication range of the wireless device as belonging to a specific individuals or groups recognized by the wireless device. In one embodiment, a first set of data including an identifier broadcast from the other wireless device in proximity to the wireless device is received by the wireless device. The wireless device identifies a user in a set of event data available on the wireless device. The wireless device evaluates the set of event data and the identifier to correlate the identifier of the other wireless device with the user. Upon determining that the identifier from the other wireless device has an association with the user identified in the set of event data, the wireless device assigns a display label to represent the other wireless device on the wireless device.
    Type: Application
    Filed: August 24, 2015
    Publication date: January 5, 2017
    Inventors: Su LIU, Eric J. ROZNER, Chin Ngai SZE, Yaoguang WEI
  • Publication number: 20170006453
    Abstract: Techniques are disclosed enabling a wireless device to associate other wireless devices within a communication range of the wireless device as belonging to a specific individuals or groups recognized by the wireless device. In one embodiment, a first set of data including an identifier broadcast from the other wireless device in proximity to the wireless device is received by the wireless device. The wireless device identifies a user in a set of event data available on the wireless device. The wireless device evaluates the set of event data and the identifier to correlate the identifier of the other wireless device with the user. Upon determining that the identifier from the other wireless device has an association with the user identified in the set of event data, the wireless device assigns a display label to represent the other wireless device on the wireless device.
    Type: Application
    Filed: June 30, 2015
    Publication date: January 5, 2017
    Inventors: Su LIU, Eric J. ROZNER, Chin Ngai SZE, Yaoguang WEI
  • Publication number: 20160359994
    Abstract: For customizing content according to a dynamically changing audience, a mobile device associated with a member of the audience is detected to be present within a defined area. A locale preference corresponding to the member is collected from the mobile device. The locale preference is analyzed to determine whether the locale preference is also a locale preference of a threshold number of members of the audience. When the locale preference is also the locale preference of the threshold number of members of the audience, the locale preference is weighted according to a weighting rule to form a weighted common locale preference. When a weight of the weighted common locale preference exceeds a threshold weight, the weighted common locale preference is selected and used to configure the content, forming customized content. The customized content is delivered to a public presentation device present in the defined area.
    Type: Application
    Filed: June 3, 2015
    Publication date: December 8, 2016
    Applicant: International Business Machines Corporation
    Inventors: SU LIU, Eric J. Rozner, Chin Ngai Sze, Yaoguang Wei
  • Publication number: 20160357579
    Abstract: For customizing content according to a dynamically changing audience, a mobile device associated with a member of the audience is detected to be present within a defined area. A locale preference corresponding to the member is collected from the mobile device. The locale preference is analyzed to determine whether the locale preference is also a locale preference of a threshold number of members of the audience. When the locale preference is also the locale preference of the threshold number of members of the audience, the locale preference is weighted according to a weighting rule to form a weighted common locale preference. When a weight of the weighted common locale preference exceeds a threshold weight, the weighted common locale preference is selected and used to configure the content, forming customized content. The customized content is delivered to a public presentation device present in the defined area.
    Type: Application
    Filed: August 24, 2015
    Publication date: December 8, 2016
    Applicant: International Business Machines Corporation
    Inventors: Su Liu, Eric J. Rozner, Chin Ngai Sze, Yaoguang Wei
  • Publication number: 20160234127
    Abstract: A network adapter for handling packet reordering receives a set of packets. The network adapter is configured to aggregate a subset of in-sequence packets from the set of packets into at least one segment before passing the at least one segment from the network adapter to a next layer in a protocol stack. An in-sequence packet from the set of packets is stored into a first segment. Responsive to receiving an out of sequence packet in the set of packets, the out of sequence packet is stored in a second segment. An adaptive timeout timer is activated responsive to receiving the out of sequence packet, and the first segment is held at the network adapter while the adaptive timeout timer runs. Prior to the adaptive timeout timer expiring, a missing packet is received and included in the first segment. The network adapter sends the first segment to the next layer.
    Type: Application
    Filed: February 9, 2015
    Publication date: August 11, 2016
    Applicant: International Business Machines Corporation
    Inventors: KANAK B. AGARWAL, Wesley M. Felter, Keqiang He, Eric J. Rozner
  • Publication number: 20160218976
    Abstract: A method, system, and computer program product for determining a congestion value in a networking component in a data network are provided in the illustrative embodiments. A first packet is set to use a first priority level and a second packet is set to use a second priority level. The second priority level is lower than the first priority level. The second packet is transmitted after the first packet to the networking component, causing the networking component to transmit the first and the second packets after they are received at the networking component. A function is applied to an arrival delay to compute the congestion value of the networking component, wherein the arrival delay comprises a length of an elapsed period between receiving a transmission of the first packet from the networking component and receiving a transmission of the second packet from the networking component.
    Type: Application
    Filed: January 22, 2015
    Publication date: July 28, 2016
    Applicant: International Business Machines Corporation
    Inventors: Kanak B. Agarwal, Wesley M. Felter, Keqiang He, Eric J. Rozner
  • Publication number: 20160212055
    Abstract: At an application at a sender system, when an amount of data to be transmitted from the sender exceeds a flow size threshold, the data is divided into a set of chunks of a size. According to a mapping selection rule, a subset is selected from a set of selected label mappings, wherein each label mapping in the subset maps an original label in the data to a different virtual label. For a chunk, when by routing the chunk to a first networking component corresponding to a first virtual label a fraction of the amount of data that will have been routed to the first component will exceed a mapping threshold, the original label in the chunk is replaced with a second virtual label from a second label mapping in the subset. The chunk is routed to a second networking component corresponding to the second virtual label.
    Type: Application
    Filed: January 21, 2015
    Publication date: July 21, 2016
    Applicant: International Business Machines Corporation
    Inventors: KANAK B. AGARWAL, John B. Carter, Wesley M. Felter, Keqiang He, Eric J. Rozner