Patents by Inventor Isabelle Marie Rouvellou

Isabelle Marie Rouvellou has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9317432
    Abstract: Techniques for maintaining consistent replicas of data are disclosed. By way of example, a method for managing copies of objects within caches, in a system including multiple caches, includes the following steps. Consistent copies of objects are maintained within the caches. A home cache for each object is maintained, wherein the home cache maintains information identifying other caches likely containing a copy of the object. In response to a request to update an object, the home cache for the object is contacted to identify other caches which might have copies of the object.
    Type: Grant
    Filed: January 9, 2008
    Date of Patent: April 19, 2016
    Assignee: International Business Machines Corporation
    Inventors: Judah M. Diament, Arun Kwangil Iyengar, Thomas A. Mikalsen, Isabelle Marie Rouvellou
  • Patent number: 8977845
    Abstract: Improved access control techniques for use in a service-oriented computing environment are disclosed. For example, one method for authenticating a client in a service-oriented environment, wherein the service-oriented environment includes a plurality of services, includes the following steps. At least one service of the plurality of services is invoked. State information is associated with the at least one service invoked. The state information is used to authenticate a client with at least one service. Further, a method for access control in a service-oriented environment, wherein the service-oriented environment includes a plurality of services, includes the following steps. A rule specification language is provided. At least one rule is specified using the rule specification language. A verification is performed to determine whether or not the client satisfies the at least one rule. The client is granted access to a service when the client satisfies the at least one rule.
    Type: Grant
    Filed: April 12, 2007
    Date of Patent: March 10, 2015
    Assignee: International Business Machines Corporation
    Inventors: Arun Kwangil Iyengar, Thomas A. Mikalsen, Isabelle Marie Rouvellou, Mudhakar Srivalso, Jian Yin
  • Patent number: 8341212
    Abstract: Techniques are disclosed for generation and refinement of service descriptions based on records of invocations of the services, i.e., service description refinement based on actual service use. For example, a method for describing one or more services in a service-oriented environment comprised of one or more clients invoking the one or more services comprises the following steps. An initial description is established for at least one of the one or more services. Information is collected from one or more service invocations including at least one of a client identity, a value of at least one parameter, a return value, and an execution time. The information is analyzed to refine the description.
    Type: Grant
    Filed: October 30, 2008
    Date of Patent: December 25, 2012
    Assignee: International Business Machines Corporation
    Inventors: Judah M. Diament, Arun Kwangil Iyengar, Thomas Arthur Mikalsen, Isabelle Marie Rouvellou, Ignacio Silva-Lepe, Revathi Subramanian
  • Patent number: 8108910
    Abstract: Techniques are disclosed for adaptively determining trust in client-server environments. By way of example, a method for assigning a trust level to a client in a client-server environment including at least one client communicating with a plurality of servers includes the following steps. Information associated with a server s1 and a server s2 different from s1 is obtained regarding a request r1 sent by a client and received by s1 and a request r2 sent by the client and received by s2. The obtained information is utilized to assign at least one trust level to the client.
    Type: Grant
    Filed: October 16, 2007
    Date of Patent: January 31, 2012
    Assignee: International Business Machines Corporation
    Inventors: William G. Conner, II, Arun Kwangil Iyengar, Thomas A. Mikalsen, Isabelle Marie Rouvellou
  • Patent number: 8108855
    Abstract: Deploying a set of virtual software resource templates to a plurality of nodes is provided. The process identifies a set of virtual machine images and metadata to form a set of virtual software resource templates. The process creates a model that indicates a performance metric based on a number of nodes on which a number of virtual machine images is deployed. The process receives a quality of service requirement. The process determines, using the model, a sufficient number of virtual software resource templates in the set of virtual software resource templates and a sufficient number of nodes in the plurality of nodes to fulfill the quality of service requirement. The process deploys the sufficient number of virtual software resource templates on the sufficient number of nodes using the metadata.
    Type: Grant
    Filed: September 12, 2007
    Date of Patent: January 31, 2012
    Assignee: International Business Machines Corporation
    Inventors: Daniel Manuel Dias, Arun Kwangil Iyengar, Isabelle Marie Rouvellou, Hidayatullah Habeebullah Shaikh, Jian Yin
  • Publication number: 20100114620
    Abstract: Techniques are disclosed for generation and refinement of service descriptions based on records of invocations of the services, i.e., service description refinement based on actual service use. For example, a method for describing one or more services in a service-oriented environment comprised of one or more clients invoking the one or more services comprises the following steps. An initial description is established for at least one of the one or more services. Information is collected from one or more service invocations including at least one of a client identity, a value of at least one parameter, a return value, and an execution time. The information is analyzed to refine the description.
    Type: Application
    Filed: October 30, 2008
    Publication date: May 6, 2010
    Inventors: Judah M. Diament, Arun Kwangil Iyengar, Thomas Arthur Mikalsen, Isabelle Marie Rouvellou, Ignacio Silva-Lepe, Revathi Subramanian
  • Publication number: 20090177841
    Abstract: Techniques for maintaining consistent replicas of data are disclosed. By way of example, a method for managing copies of objects within caches, in a system including multiple caches, includes the following steps. Consistent copies of objects are maintained within the caches. A home cache for each object is maintained, wherein the home cache maintains information identifying other caches likely containing a copy of the object. In response to a request to update an object, the home cache for the object is contacted to identify other caches which might have copies of the object.
    Type: Application
    Filed: January 9, 2008
    Publication date: July 9, 2009
    Inventors: Judah M. Diament, Arun Kwangil Iyengar, Thomas A. Mikalsen, Isabelle Marie Rouvellou
  • Publication number: 20090100504
    Abstract: Techniques are disclosed for adaptively determining trust in client-server environments. By way of example, a method for assigning a trust level to a client in a client-server environment including at least one client communicating with a plurality of servers includes the following steps. Information associated with a server s1 and a server s2 different from s1 is obtained regarding a request r1 sent by a client and received by s1 and a request r2 sent by the client and received by s2. The obtained information is utilized to assign at least one trust level to the client.
    Type: Application
    Filed: October 16, 2007
    Publication date: April 16, 2009
    Inventors: William G. Conner, II, Arun Kwangil Iyengar, Thomas A. Mikalsen, Isabelle Marie Rouvellou
  • Publication number: 20080256357
    Abstract: Improved access control techniques for use in a service-oriented computing environment are disclosed. For example, one method for authenticating a client in a service-oriented environment, wherein the service-oriented environment includes a plurality of services, includes the following steps. At least one service of the plurality of services is invoked. State information is associated with the at least one service invoked. The state information is used to authenticate a client with at least one service. Further, a method for access control in a service-oriented environment, wherein the service-oriented environment includes a plurality of services, includes the following steps. A rule specification language is provided. At least one rule is specified using the rule specification language. A verification is performed to determine whether or not the client satisfies the at least one rule. The client is granted access to a service when the client satisfies the at least one rule.
    Type: Application
    Filed: April 12, 2007
    Publication date: October 16, 2008
    Inventors: Arun Kwangil Iyengar, Thomas A. Mikalsen, Isabelle Marie Rouvellou, Mudhakar Srivalso, Jian Yin
  • Publication number: 20080163194
    Abstract: The illustrative embodiments described herein provide a computer-implemented method, apparatus, and computer program product for deploying a set of virtual software resource templates to a plurality of nodes. The process identifies a set of virtual machine images and metadata to form a set of virtual software resource templates. The process creates a model that indicates a performance metric based on a number of nodes on which a number of virtual machine images is deployed. The process receives a quality of service requirement. The process determines, using the model, a sufficient number of virtual software resource templates in the set of virtual software resource templates and a sufficient number of nodes in the plurality of nodes to fulfill the quality of service requirement. The process deploys the sufficient number of virtual software resource templates on the sufficient number of nodes using the metadata.
    Type: Application
    Filed: September 12, 2007
    Publication date: July 3, 2008
    Inventors: Daniel Manuel Dias, Arun Kwangil Iyengar, Isabelle Marie Rouvellou, Hidayatullah Habeebullah Shaikh, Jian Yin
  • Patent number: 6954924
    Abstract: There is provided a method for employing a trigger point in a logic flow. The trigger point has at least one function associated therewith. A default strategy set is associated with the at least one function of the trigger point. The default strategy set has a capability of being replaced, in whole or in part, by a non-default strategy set. The strategy sets are for implementing the at least one function of the trigger point. The trigger point is dynamically configured, including establishing at least one context for the trigger point that respectively specifies a location of the strategy sets. The trigger point is executed when encountered during an execution of the logic flow, including selectively executing at least a portion of at least one of the default strategy set and the non-default strategy set based upon a current context from among the at least one context.
    Type: Grant
    Filed: September 20, 2001
    Date of Patent: October 11, 2005
    Assignee: International Business Machines Corporation
    Inventors: Louis R. Degenaro, Shawn William Lauzon, Jon Kendall Peterson, Dianne E. Richards, Isabelle Marie Rouvellou, Scott E. Waldner
  • Patent number: 6697826
    Abstract: An information-handling system operable within a distributed object computing environment (DOCE) is disclosed that includes an object-based program for controlling object searching in a constraint-based filtering mode over said DOCE. The object-based program for controlling object searching further comprises means for providing hierarchical storage of a name/binding value during a search. Additionally, the object-based program includes a means for providing the addition of properties as name/value pair sequence to each node within a tree search performed by the object-based program. Further, the search mechanism includes means for providing recursive searching of the group properties as well as means for providing meta-knowledge of the class within the DOCE for attribute search.
    Type: Grant
    Filed: March 20, 1996
    Date of Patent: February 24, 2004
    Assignee: International Business Machines Corporation
    Inventors: Vinoj Narayan Kumar, Isabelle Marie Rouvellou, Donald Francis Ferguson
  • Publication number: 20030056201
    Abstract: There is provided a method for employing a trigger point in a logic flow. The trigger point has at least one function associated therewith. A default strategy set is associated with the at least one function of the trigger point. The default strategy set has a capability of being replaced, in whole or in part, by a non-default strategy set. The strategy sets are for implementing the at least one function of the trigger point. The trigger point is dynamically configured, including establishing at least one context for the trigger point that respectively specifies a location of the strategy sets. The trigger point is executed when encountered during an execution of the logic flow, including selectively executing at least a portion of at least one of the default strategy set and the non-default strategy set based upon a current context from among the at least one context.
    Type: Application
    Filed: September 20, 2001
    Publication date: March 20, 2003
    Applicant: International Business Machines Corporation
    Inventors: Louis R. Degenaro, Shawn William Lauzon, Jon Kendall Peterson, Dianne E. Richards, Isabelle Marie Rouvellou, Scott E. Waldner