Patents by Inventor Janusz Marecki
Janusz Marecki has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10970389Abstract: Methods and systems for determining a reallocation of resources are described. A device may determine initial allocation data that indicates a first amount of resources allocated to a plurality of areas. The device may determine a set of attacker expected rewards based on the initial allocation data. The device may determine a set of defender expected rewards based on the attacker expected rewards. The device may determine moving rewards indicating defensive scores in response to movement of the resources among the plurality of areas. The device may determine defender response rewards indicating defensive scores resulting from an optimal attack on the plurality of areas. The device may generate reallocation data indicating an allocation of a second amount of resources to the plurality of areas. The second amount of resources may maximize the moving rewards and the defender response rewards.Type: GrantFiled: January 2, 2018Date of Patent: April 6, 2021Assignee: International Business Machines CorporationInventors: Janusz Marecki, Fei Fang, Dharmashankar Subramanian
-
Publication number: 20190205534Abstract: Methods and systems for determining a reallocation of resources are described. A device may determine initial allocation data that indicates a first amount of resources allocated to a plurality of areas. The device may determine a set of attacker expected rewards based on the initial allocation data. The device may determine a set of defender expected rewards based on the attacker expected rewards. The device may determine moving rewards indicating defensive scores in response to movement of the resources among the plurality of areas. The device may determine defender response rewards indicating defensive scores resulting from an optimal attack on the plurality of areas. The device may generate reallocation data indicating an allocation of a second amount of resources to the plurality of areas. The second amount of resources may maximize the moving rewards and the defender response rewards.Type: ApplicationFiled: January 2, 2018Publication date: July 4, 2019Inventors: Janusz Marecki, Fei Fang, Dharmashankar Subramanian
-
Patent number: 10025981Abstract: A method of operating an image detection device includes receiving an image, dividing the image into a plurality of patches, grouping ones of the plurality of patches, generating a set of saccadic paths through the plurality of patches of the image, generating a cluster-direction sequence for each saccadic path, generating a policy function for identifying an object in a new image using a combination of the cluster-direction sequences, and operating the image detection device using the policy function to identify an object in the new image.Type: GrantFiled: December 24, 2017Date of Patent: July 17, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ban Kawas, Arvind Kumar, Janusz Marecki, Sharathchandra U. Pankanti
-
Publication number: 20180121723Abstract: A method of operating an image detection device includes receiving an image, dividing the image into a plurality of patches, grouping ones of the plurality of patches, generating a set of saccadic paths through the plurality of patches of the image, generating a cluster-direction sequence for each saccadic path, generating a policy function for identifying an object in a new image using a combination of the cluster-direction sequences, and operating the image detection device using the policy function to identify an object in the new image.Type: ApplicationFiled: December 24, 2017Publication date: May 3, 2018Inventors: BAN KAWAS, ARVIND KUMAR, JANUSZ MARECKI, SHARATHCHANDRA U. PANKANTI
-
Patent number: 9870503Abstract: A method of operating an image detection device includes receiving an image, dividing the image into a plurality of patches, grouping ones of the plurality of patches, generating a set of saccadic paths through the plurality of patches of the image, generating a cluster-direction sequence for each saccadic path, generating a policy function for identifying an object in a new image using a combination of the cluster-direction sequences, and operating the image detection device using the policy function to identify an object in the new image.Type: GrantFiled: December 31, 2015Date of Patent: January 16, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ban Kawas, Arvind Kumar, Janusz Marecki, Sharathchandra U. Pankanti
-
Publication number: 20170193294Abstract: A method of operating an image detection device includes receiving an image, dividing the image into a plurality of patches, grouping ones of the plurality of patches, generating a set of saccadic paths through the plurality of patches of the image, generating a cluster-direction sequence for each saccadic path, generating a policy function for identifying an object in a new image using a combination of the cluster-direction sequences, and operating the image detection device using the policy function to identify an object in the new image.Type: ApplicationFiled: December 31, 2015Publication date: July 6, 2017Inventors: BAN KAWAS, ARVIND KUMAR, JANUSZ MARECKI, SHARATHCHANDRA U. PANKANTI
-
Publication number: 20170161626Abstract: A method for determining a policy that considers observations delayed at runtime is disclosed. The method includes constructing a model of a stochastic decision process that receives delayed observations at run time, wherein the stochastic decision process is executed by an agent, finding an agent policy according to a measure of an expected total reward of a plurality of agent actions within the stochastic decision process over a given time horizon, and bounding an error of the agent policy according to an observation delay of the received delayed observations.Type: ApplicationFiled: September 30, 2014Publication date: June 8, 2017Inventors: Mary E. Helander, Janusz Marecki, Ramesh Natarajan, Bonnie K. Ray
-
Publication number: 20150019458Abstract: A method for determining an optimal multi-stage asset management policy includes providing a plurality of decision epochs and a number of admissible asset health levels for each decision epoch, providing a portfolio of assets over the admissible asset health levels in an initial decision epoch, providing a plurality of state transition probabilities between states of an underlying asset health dynamics process for the decision epochs, where each state corresponds to a percentage of assets that has a given health level in a given decision epoch, providing an action set to which admissible actions of the state transition probabilities belong, where an action changes a state transition probability, and determining cost functions of the admissible actions on a per-asset basis, where operational targets impose constraints on probabilities that the asset health of the portfolio of assets, in one or more decision epochs, is within a specified range.Type: ApplicationFiled: July 9, 2014Publication date: January 15, 2015Inventors: CHITRA DORAI, JANUSZ MARECKI, MAREK PETRIK, RUSLAN STARUSHOK, DHARMASHANKAR SUBRAMANIAN
-
Patent number: 8793211Abstract: System, method and computer program product for modelling information sharing domains as Partially Observable Markov Decision Processes (POMDP), and that provides solutions that view the information sharing as a sequential process where the trustworthiness of the information recipients is monitored using data leakage detection mechanisms. In one embodiment, the system, method and computer program product performs (i) formulating information sharing decisions using Partially Observable Markov Decision Processes combined with a digital watermarking leakage detection mechanism, and (ii) deriving optimal information sharing strategies for the sender and optimal information leakage strategies for a recipient as a function of the efficacy of the underlying monitoring mechanism. By employing POMDPs in information sharing domains, users (senders) can maximize the expected reward of their data/information sharing actions.Type: GrantFiled: August 19, 2010Date of Patent: July 29, 2014Assignee: International Business Machines CorporationInventors: Janusz Marecki, Mudhakar Srivatsa
-
Patent number: 8545332Abstract: A system, method and computer program product for planning actions in a repeated Stackelberg Game, played for a fixed number of rounds, where the payoffs or preferences of the follower are initially unknown to the leader, and a prior probability distribution over follower types is available. In repeated Bayesian Stackelberg games, the objective is to maximize the leader's cumulative expected payoff over the rounds of the game. The optimal plans in such games make intelligent tradeoffs between actions that reveal information regarding the unknown follower preferences, and actions that aim for high immediate payoff. The method solves for such optimal plans according to a Monte Carlo Tree Search method wherein simulation trials draw instances of followers from said prior probability distribution. Some embodiments additionally implement a method for pruning dominated leader strategies.Type: GrantFiled: February 2, 2012Date of Patent: October 1, 2013Assignee: International Business Machines CorporationInventors: Janusz Marecki, Richard B. Segal, Gerald J. Tesauro
-
Publication number: 20130204412Abstract: A system, method and computer program product for planning actions in a repeated Stackelberg Game, played for a fixed number of rounds, where the payoffs or preferences of the follower are initially unknown to the leader, and a prior probability distribution over follower types is available. In repeated Bayesian Stackelberg games, the objective is to maximize the leader's cumulative expected payoff over the rounds of the game. The optimal plans in such games make intelligent tradeoffs between actions that reveal information regarding the unknown follower preferences, and actions that aim for high immediate payoff. The method solves for such optimal plans according to a Monte Carlo Tree Search method wherein simulation trials draw instances of followers from said prior probability distribution. Some embodiments additionally implement a method for pruning dominated leader strategies.Type: ApplicationFiled: February 2, 2012Publication date: August 8, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Janusz Marecki, Richard B. Segal, Gerald J. Tesauro
-
Patent number: 8364511Abstract: Efficient heuristic methods are described for approximating the optimal leader strategy for security domains where threats come from unknown adversaries. These problems can be modeled as Bayes-Stackelberg games. An embodiment of the heuristic method can include defining a patrolling or security domain problem as a mixed-integer quadratic program. The mixed-integer quadratic program can be converted to a mixed-integer linear program. For a single follower (e.g., robber or terrorist) scenario, the mixed-integer linear program can be solved, subject to appropriate constraints. For embodiments applicable to multiple follower situations, the relevant mixed-integer quadratic program and related mixed-integer linear program can be decomposed, e.g., by changing the response function for the follower from a pure strategy to a weighted combination over various pure follower strategies where the weights are probabilities of occurrence of each of the follower types.Type: GrantFiled: May 24, 2012Date of Patent: January 29, 2013Assignee: University of Southern CaliforniaInventors: Milind Tambe, Praveen Paruchuri, Fernando Ordóñez, Sarit Kraus, Jonathan Pearce, Janusz Marecki
-
Publication number: 20120330727Abstract: Efficient heuristic methods are described for approximating the optimal leader strategy for security domains where threats come from unknown adversaries. These problems can be modeled as Bayes-Stackelberg games. An embodiment of the heuristic method can include defining a patrolling or security domain problem as a mixed-integer quadratic program. The mixed-integer quadratic program can be converted to a mixed-integer linear program. For a single follower (e.g., robber or terrorist) scenario, the mixed-integer linear program can be solved, subject to appropriate constraints. For embodiments applicable to multiple follower situations, the relevant mixed-integer quadratic program and related mixed-integer linear program can be decomposed, e.g., by changing the response function for the follower from a pure strategy to a weighted combination over various pure follower strategies where the weights are probabilities of occurrence of each of the follower types.Type: ApplicationFiled: May 24, 2012Publication date: December 27, 2012Applicant: UNIVERSITY OF SOUTHERN CALIFORNIAInventors: Milind Tambe, Praveen Paruchuri, Fernando Ordóñez, Sarit Kraus, Jonathan Pearce, Janusz Marecki
-
Patent number: 8224681Abstract: Techniques are described for Stackelberg games, in which one agent (the leader) must commit to a strategy that can be observed by other agents (the followers or adversaries) before they choose their own strategies, in which the leader is uncertain about the types of adversaries it may face. Such games are important in security domains, where, for example, a security agent (leader) must commit to a strategy of patrolling certain areas, and robbers (followers) have a chance to observe this strategy over time before choosing their own strategies of where to attack. An efficient exact algorithm is described for finding the optimal strategy for the leader to commit to in these games. This algorithm, Decomposed Optimal Bayesian Stackelberg Solver or “DOBSS,” is based on a novel and compact mixed-integer linear programming formulation. The algorithm can be implemented in a method, software, and/or system including computer or processor functionality.Type: GrantFiled: October 17, 2008Date of Patent: July 17, 2012Assignee: University of Southern CaliforniaInventors: Milind Tambe, Praveen Paruchuri, Fernando Ordóñez, Sarit Kraus, Jonathan Pearce, Janusz Marecki
-
Patent number: 8195490Abstract: Efficient heuristic methods are described for approximating the optimal leader strategy for security domains where threats come from unknown adversaries. These problems can be modeled as Bayes-Stackelberg games. An embodiment of the heuristic method can include defining a patrolling or security domain problem as a mixed-integer quadratic program. The mixed-integer quadratic program can be converted to a mixed-integer linear program. For a single follower (e.g., robber or terrorist) scenario, the mixed-integer linear program can be solved, subject to appropriate constraints. For embodiments applicable to multiple follower situations, the relevant mixed-integer quadratic program and related mixed-integer linear program can be decomposed, e.g., by changing the response function for the follower from a pure strategy to a weighted combination over various pure follower strategies where the weights are probabilities of occurrence of each of the follower types.Type: GrantFiled: October 15, 2008Date of Patent: June 5, 2012Assignee: University of Southern CaliforniaInventors: Milind Tambe, Praveen Paruchuri, Fernando Ordóñez, Sarit Kraus, Jonathan Pearce, Janusz Marecki
-
Publication number: 20120047103Abstract: System, method and computer program product for modelling information sharing domains as Partially Observable Markov Decision Processes (POMDP), and that provides solutions that view the information sharing as a sequential process where the trustworthiness of the information recipients is monitored using data leakage detection mechanisms. In one embodiment, the system, method and computer program product performs (i) formulating information sharing decisions using Partially Observable Markov Decision Processes combined with a digital watermarking leakage detection mechanism, and (ii) deriving optimal information sharing strategies for the sender and optimal information leakage strategies for a recipient as a function of the efficacy of the underlying monitoring mechanism. By employing POMDPs in information sharing domains, users (senders) can maximize the expected reward of their data/information sharing actions.Type: ApplicationFiled: August 19, 2010Publication date: February 23, 2012Applicant: International Business Machines CorporationInventors: Janusz Marecki, Mudhakar Srivatsa
-
Publication number: 20110282801Abstract: System, method and computer program product for modelling Risk-Sensitive Partially-Observable Markov Decision Processes (POMDPs), e.g., in a high-risk domain such as financial planning and solving such equations exactly, such that agents maximize the expected utility of their actions. The system and method employs an exact algorithm for solving Risk-Sensitive POMDPs, for piecewise linear utility functions, by representing underlying value functions with sets of piecewise bilinear functions—computed using functional value iteration—and pruning the dominated bilinear functions using efficient linear programming approximations of underlying non-convex bilinear programs.Type: ApplicationFiled: May 14, 2010Publication date: November 17, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Janusz Marecki
-
Publication number: 20090119239Abstract: Efficient heuristic methods are described for approximating the optimal leader strategy for security domains where threats come from unknown adversaries. These problems can be modeled as Bayes-Stackelberg games. An embodiment of the heuristic method can include defining a patrolling or security domain problem as a mixed-integer quadratic program. The mixed-integer quadratic program can be converted to a mixed-integer linear program. For a single follower (e.g., robber or terrorist) scenario, the mixed-integer linear program can be solved, subject to appropriate constraints. For embodiments applicable to multiple follower situations, the relevant mixed-integer quadratic program and related mixed-integer linear program can be decomposed, e.g., by changing the response function for the follower from a pure strategy to a weighted combination over various pure follower strategies where the weights are probabilities of occurrence of each of the follower types.Type: ApplicationFiled: October 15, 2008Publication date: May 7, 2009Applicant: UNIVERSITY OF SOUTHERN CALIFORNIAInventors: Milind Tambe, Praveen Paruchuri, Fernando Ordonez, Sarit Kraus, Jonathan Pearce, Janusz Marecki
-
Publication number: 20090099987Abstract: Techniques are described for Stackelberg games, in which one agent (the leader) must commit to a strategy that can be observed by other agents (the followers or adversaries) before they choose their own strategies, in which the leader is uncertain about the types of adversaries it may face. Such games are important in security domains, where, for example, a security agent (leader) must commit to a strategy of patrolling certain areas, and robbers (followers) have a chance to observe this strategy over time before choosing their own strategies of where to attack. An efficient exact algorithm is described for finding the optimal strategy for the leader to commit to in these games. This algorithm, Decomposed Optimal Bayesian Stackelberg Solver or “DOBSS,” is based on a novel and compact mixed-integer linear programming formulation. The algorithm can be implemented in a method, software, and/or system including computer or processor functionality.Type: ApplicationFiled: October 17, 2008Publication date: April 16, 2009Applicant: UNIVERSITY OF SOUTHERN CALIFORNIAInventors: Milind Tambe, Praveen Paruchuri, Fernando Ordonez, Sarit Kraus, Jonathan Pearce, Janusz Marecki