Patents by Inventor Jin Xiao
Jin Xiao has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10419489Abstract: A method and system of processing an information technology (IT) electronic request is provided. The electronic request is received in natural language from a user. Parameters of the electronic request are extracted. A risk of the electronic request is determined. A policy based on the parameters and the risk of the electronic request is determined and executed. A level of trust between the user and the computer device is calculated based on the determined risk and an outcome of the execution of the policy. A conversation pattern of the computer device toward the user is adjusted based on the calculated level of trust.Type: GrantFiled: May 4, 2017Date of Patent: September 17, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Anup K. Kalia, Maja Vukovic, Frederick Y. Wu, Jin Xiao
-
Patent number: 10380558Abstract: The present invention provides a method, system, and computer program product of an intelligent self-service delivery advisor. In an embodiment, the present invention includes, in response to receiving computer system service data, identifying, by a second computer system, a computer system service category among a plurality of computer system categories, identifying, by the second computer system, one or more computer system service tasks, based on the computer system service data and the computer system service category, selecting, by the second computer system, a catalog among a plurality of catalogs, based on the one or more computer system service tasks and the computer system service data, generating, by the second computer system, one or more suggestions based on the catalog and the one or more computer system service tasks; and displaying, displaying by the second computer system, the one or more suggestion on a display logically coupled to the computer system.Type: GrantFiled: November 8, 2017Date of Patent: August 13, 2019Assignee: International Business Machines CorporationInventors: Maja Vukovic, Nikolaos Anerousis, Anup Kalia, Jin Xiao
-
Publication number: 20190188319Abstract: Techniques for generating domain and client-specific application program interface recommendations are provided. In one example, a computer-implemented method comprises modifying, by a device operatively coupled to a processor, a description of a client application program interface by removing text data associated with the description of the client application program interface, resulting in a modified description of the client application program interface. The computer-implemented method can further comprise analyzing, by the device, a performance associated with the client application program interface to generate an ontology based on a semantic similarity between the modified description of the client application program interface and one or more previous descriptions of one or more previous client application program interfaces.Type: ApplicationFiled: December 20, 2017Publication date: June 20, 2019Inventors: Nikolaos Anerousis, Anup Kalia, Chen Lin, Maja Vukovic, Jin Xiao
-
Publication number: 20190188276Abstract: Techniques for generating domain and client-specific application program interface recommendations are provided. In one example, a computer-implemented method comprises determining a semantic similarity between a first client application program interface and a second client application program interface based on a modified client application program interface being generated by removing text data associated with a first description of the first client application program interface. The computer-implemented method can further comprise matching the first description to a second description of the second client application program interface based on the semantic similarity, resulting in on or more matched client application program interfaces. Additionally, the computer-implemented method can further comprise associating the first client application program interface with a community based on the one or more matched client application program interfaces.Type: ApplicationFiled: December 20, 2017Publication date: June 20, 2019Inventors: Nikolaos Anerousis, Anup Kalia, Chen Lin, Maja Vukovic, Jin Xiao
-
Publication number: 20190179894Abstract: Techniques facilitating causing a information technology change service action in response to a received instructive command are provided. In one example, a computer-implemented method can comprise receiving a command from a device, wherein an intent of the command relates to performing an information technology change service action. The computer-implemented method can also comprise determining the intent of the command and selecting a service from a federation of services based on the information indicative of the intent of the command. The computer-implemented method can further comprise ordering the service relative to another service of the federation of services based on a determined level of confidence that the service will facilitate performing the information technology change service action. Moreover, the computer-implemented method can comprise activating the service based on an order of the service relative to the other service and the information indicative of the intent of the command.Type: ApplicationFiled: December 12, 2017Publication date: June 13, 2019Inventors: Nikolaos Anerousis, Anup Kalia, Frederick Yung-Fung Wu, Jin Xiao, Maja Vukovic
-
Publication number: 20190173813Abstract: Techniques facilitating maintenance of tribal knowledge for accelerated compliance control deployment are provided. In one example, a system includes a memory that stores computer executable components and a processor that executes computer executable components stored in the memory, wherein the computer executable components include a knowledge base generation component that generates a knowledge graph corresponding to respective commitments created via tribal exchanges, the knowledge graph comprising a semantic level and an operational level; a semantic graph population component that populates the semantic level of the knowledge graph based on identified parties to the respective commitments; and an operational graph population component that populates the operational level of the knowledge graph based on tracked status changes associated with the respective commitments.Type: ApplicationFiled: December 5, 2017Publication date: June 6, 2019Inventors: Constantin Mircea Adam, Muhammed Fatih Bulut, Richard Baxter Hull, Anup Kalia, Maja Vukovic, Jin Xiao
-
Publication number: 20190139004Abstract: The present invention provides a method, system, and computer program product of an intelligent self-service delivery advisor. In an embodiment, the present invention includes, in response to receiving computer system service data, identifying, by a second computer system, a computer system service category among a plurality of computer system categories, identifying, by the second computer system, one or more computer system service tasks, based on the computer system service data and the computer system service category, selecting, by the second computer system, a catalog among a plurality of catalogs, based on the one or more computer system service tasks and the computer system service data, generating, by the second computer system, one or more suggestions based on the catalog and the one or more computer system service tasks; and displaying, displaying by the second computer system, the one or more suggestion on a display logically coupled to the computer system.Type: ApplicationFiled: November 8, 2017Publication date: May 9, 2019Inventors: Maja Vukovic, Nikolaos Anerousis, Anup Kalia, Jin Xiao
-
Publication number: 20190019222Abstract: Content is selectively provided to users of mobile devices within a venue including an on-site wireless network. User authorization requests and/or user account registration data are transmitted to the on-site wireless network from mobile devices within the venue. Attributes such as user interests and professions, which comprise inferred user profiles, are obtained using the network traffic data. Identities of mobile devices are established based on a combination including two or more of network identifiers, mobile device signatures, and browser signatures. The inferred user profiles are correlated with the mobile device identities. The inferred user profiles are aggregated into user profile groups and then matched with a content provider's intended target profiles. Content is transmitted to the mobile devices corresponding to the intended target profiles and based on correlation of the inferred user profiles with identities of the devices.Type: ApplicationFiled: December 31, 2017Publication date: January 17, 2019Inventors: Bhavna Agrawal, Nikolaos Anerousis, Frank A. Schaffa, Jin Xiao
-
Publication number: 20190019221Abstract: Content is selectively provided to users of mobile devices within a venue including an on-site wireless network. User authorization requests and/or user account registration data are transmitted to the on-site wireless network from mobile devices within the venue. Attributes such as user interests and professions, which comprise inferred user profiles, are obtained using the network traffic data. Identities of mobile devices are established based on a combination including two or more of network identifiers, mobile device signatures, and browser signatures. The inferred user profiles are correlated with the mobile device identities. The inferred user profiles are aggregated into user profile groups and then matched with a content provider's intended target profiles. Content is transmitted to the mobile devices corresponding to the intended target profiles and based on correlation of the inferred user profiles with identities of the devices.Type: ApplicationFiled: July 13, 2017Publication date: January 17, 2019Inventors: Bhavna Agrawal, Nikolaos Anerousis, Frank A. Schaffa, Jin Xiao
-
Publication number: 20180324215Abstract: A method and system of processing an information technology (IT) electronic request is provided. The electronic request is received in natural language from a user. Parameters of the electronic request are extracted. A risk of the electronic request is determined. A policy based on the parameters and the risk of the electronic request is determined and executed. A level of trust between the user and the computer device is calculated based on the determined risk and an outcome of the execution of the policy. A conversation pattern of the computer device toward the user is adjusted based on the calculated level of trust.Type: ApplicationFiled: May 4, 2017Publication date: November 8, 2018Inventors: Anup K. Kalia, Maja Vukovic, Frederick Y. Wu, Jin Xiao
-
Patent number: 10070328Abstract: Predictive network traffic management in a computer network. Information relating to events likely to have an adverse impact on network traffic, based on predefined parameters of network performance, is collected from the Internet. Details that may be used to predict network traffic density is extracted from the collected events information, and a predicted traffic density, based on the details is generated. Based on the predicted network traffic density, a traffic pattern is generated. A best-matching traffic pattern template to the generated traffic pattern is identified in a store of traffic pattern templates. Based on the best-matching traffic pattern template, bandwidth on the network is provisioned via an SDN controller.Type: GrantFiled: August 20, 2015Date of Patent: September 4, 2018Assignee: International Business Mahcines CorporationInventors: Nikolaos Anerousis, Jinho Hwang, Jin Xiao
-
Patent number: 9882797Abstract: A software-defined passive optical network includes a set of optical network terminals, a set of passive optical network ports, and a plurality of splitters. Each of the optical network terminals is connected to a single one of the passive optical network ports through a given one of the splitters, and the network is divided into a plurality of areas, each of which is assigned a given fraction of the passive optical network ports. Passive optical network port utilization is monitored for each of the plurality of areas; for those of the areas determined to have passive optical network port overutilization, the number of the passive optical network ports assigned thereto is increased; and for those of the areas determined to have passive optical network port underutilization, the number of the passive optical network ports assigned thereto is reduced.Type: GrantFiled: October 28, 2015Date of Patent: January 30, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ahmed Amokrane, Nikolaos Anerousis, Jinho Hwang, Jin Xiao
-
Patent number: 9832282Abstract: Disclosed are application-aware packet transmission methods and apparatuses for a terminal. The application-aware packet transmission method comprises classifying applications according to delay sensitivities of the applications, determining a transmission pattern of packets for the classified applications; and transmitting the packets based on the determined transmission pattern. Thus, a battery of the terminal may be efficiently managed by applying user preferences and configuring transmission patterns of packets to be transmitted for each application differently. In addition, degradation of application performances and user experiences for the uses of applications can be prevented.Type: GrantFiled: September 16, 2014Date of Patent: November 28, 2017Assignee: POSTECH ACADEMY—INDUSTRY FOUNDATIONInventors: Won Ki Hong, Jian Li, Jin Xiao, Raouf Boutaba
-
Patent number: 9755936Abstract: A software-defined passive optical network includes a set of optical network terminals, a set of passive optical network ports, and a plurality of splitters. Each of the optical network terminals is connected to a single one of the passive optical network ports through a given one of the splitters, and the network is divided into a plurality of areas, each of which is assigned a given fraction of the passive optical network ports. Passive optical network port utilization is monitored for each of the plurality of areas; for those of the areas determined to have passive optical network port overutilization, the number of the passive optical network ports assigned thereto is increased; and for those of the areas determined to have passive optical network port underutilization, the number of the passive optical network ports assigned thereto is reduced.Type: GrantFiled: December 9, 2015Date of Patent: September 5, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ahmed Amokrane, Nikolaos Anerousis, Jinho Hwang, Jin Xiao
-
Patent number: 9756121Abstract: Network routing and load balancing in a software design network (SDN)-enabled computing environment may be provided. Input data discovered from a source computing environment is received, wherein one or more of components of the source computing environment are to be migrated to a target computing environment, the input data comprising at least source configuration information and utilization information. Target compute resources, network design and system management design may be determined based on the input data, and a new network configuration generated as output. Based on these design decisions, the steady-state network management using SDN is proposed. The new network configuration may be transmitted to an SDN controller associated with the target computing environment for storing as flow table rules. The SDN controller pushes the flow table rules to one or more routing switches, the flow table rules for performing the network routing and the load balancing.Type: GrantFiled: June 24, 2015Date of Patent: September 5, 2017Assignee: International Business Machines CorporationInventors: Jinho Hwang, Jill L. Jermyn, Maja Vukovic, Jin Xiao
-
Publication number: 20170054641Abstract: Predictive network traffic management in a computer network. Information relating to events likely to have an adverse impact on network traffic, based on predefined parameters of network performance, is collected from the Internet. Details that may be used to predict network traffic density is extracted from the collected events information, and a predicted traffic density, based on the details is generated. Based on the predicted network traffic density, a traffic pattern is generated. A best-matching traffic pattern template to the generated traffic pattern is identified in a store of traffic pattern templates. Based on the best-matching traffic pattern template, bandwidth on the network is provisioned via an SDN controller.Type: ApplicationFiled: August 20, 2015Publication date: February 23, 2017Inventors: Nikolaos Anerousis, Jinho Hwang, Jin Xiao
-
Publication number: 20160381124Abstract: Network routing and load balancing in a software design network (SDN)-enabled computing environment may be provided. Input data discovered from a source computing environment is received, wherein one or more of components of the source computing environment are to be migrated to a target computing environment, the input data comprising at least source configuration information and utilization information. Target compute resources, network design and system management design may be determined based on the input data, and a new network configuration generated as output. Based on these design decisions, the steady-state network management using SDN is proposed. The new network configuration may be transmitted to an SDN controller associated with the target computing environment for storing as flow table rules. The SDN controller pushes the flow table rules to one or more routing switches, the flow table rules for performing the network routing and the load balancing.Type: ApplicationFiled: June 24, 2015Publication date: December 29, 2016Inventors: Jinho Hwang, Jill L. Jermyn, Maja Vukovic, Jin Xiao
-
Publication number: 20160127811Abstract: A software-defined passive optical network includes a set of optical network terminals, a set of passive optical network ports, and a plurality of splitters. Each of the optical network terminals is connected to a single one of the passive optical network ports through a given one of the splitters, and the network is divided into a plurality of areas, each of which is assigned a given fraction of the passive optical network ports. Passive optical network port utilization is monitored for each of the plurality of areas; for those of the areas determined to have passive optical network port overutilization, the number of the passive optical network ports assigned thereto is increased; and for those of the areas determined to have passive optical network port underutilization, the number of the passive optical network ports assigned thereto is reduced.Type: ApplicationFiled: December 9, 2015Publication date: May 5, 2016Inventors: Ahmed Amokrane, Nikolaos Anerousis, Jinho Hwang, Jin Xiao
-
Publication number: 20160127216Abstract: A software-defined passive optical network includes a set of optical network terminals, a set of passive optical network ports, and a plurality of splitters. Each of the optical network terminals is connected to a single one of the passive optical network ports through a given one of the splitters, and the network is divided into a plurality of areas, each of which is assigned a given fraction of the passive optical network ports. Passive optical network port utilization is monitored for each of the plurality of areas; for those of the areas determined to have passive optical network port overutilization, the number of the passive optical network ports assigned thereto is increased; and for those of the areas determined to have passive optical network port underutilization, the number of the passive optical network ports assigned thereto is reduced.Type: ApplicationFiled: October 28, 2015Publication date: May 5, 2016Inventors: Ahmed Amokrane, Nikolaos Anerousis, Jinho Hwang, Jin Xiao
-
Publication number: 20150172155Abstract: Disclosed are application-aware packet transmission methods and apparatuses for a terminal. The application-aware packet transmission method comprises classifying applications according to delay sensitivities of the applications, determining a transmission pattern of packets for the classified applications; and transmitting the packets based on the determined transmission pattern. Thus, a battery of the terminal may be efficiently managed by applying user preferences and configuring transmission patterns of packets to be transmitted for each application differently. In addition, degradation of application performances and user experiences for the uses of applications can be prevented.Type: ApplicationFiled: September 16, 2014Publication date: June 18, 2015Inventors: Won Ki HONG, Jian LI, Jin XIAO, Raouf BOUTABA