Patents by Inventor Kay Schwendimann Anderson

Kay Schwendimann Anderson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8561199
    Abstract: A system and method for processing an information unit/packet (IU) in a stream processing system includes decomposing an IU into sub-information units persisted other than in the IU. An index or reference is generated in the IU for retrieving the persisted sub-information units during processing.
    Type: Grant
    Filed: January 11, 2007
    Date of Patent: October 15, 2013
    Assignee: International Business Machines Corporation
    Inventors: Kay Schwendimann Anderson, Joseph Phillip Bigus, Eric Bouillet, Parijat Dube, Mark David Feblowitz, David Alson George, Nagui Halim
  • Patent number: 8276192
    Abstract: A method for security planning with hard security constraints includes: receiving security-related requirements of a network to be developed using system inputs and processing components; and generating the network according to the security-related requirements, wherein the network satisfies hard security constraints.
    Type: Grant
    Filed: May 30, 2008
    Date of Patent: September 25, 2012
    Assignee: International Business Machines Corporation
    Inventors: Kay Schwendimann Anderson, Pau-Chen Cheng, Genady Ya. Grabarnik, Paul Ashley Karger, Marc Lelarge, Zhen Liu, Anton Viktorovich Riabov, Pankaj Rohatgi, Angela Marie Schuett, Grant Wagner
  • Patent number: 8132259
    Abstract: A method for security planning with soft security constraints, include: receiving security-related requirements of a workflow to be developed using system inputs and processing components; and generating at least one proposed workflow according to the security-related requirements, wherein the at least one proposed workflow satisfies soft constraints.
    Type: Grant
    Filed: January 4, 2007
    Date of Patent: March 6, 2012
    Assignee: International Business Machines Corporation
    Inventors: Kay Schwendimann Anderson, Pau-Chen Cheng, Trenton Ray Jaeger, Zhen Liu, Anton Viktorovich Riabov, Pankaj Rohatgi, Angela Schuett Reninger, Grant Wagner
  • Patent number: 7958093
    Abstract: A system and method for optimizing a storage system to support short data object lifetimes and highly utilized storage space are provided. With the system and method, data objects are clustered based on when they are anticipated to be deleted. When an application stores data, the application provides an indicator of the expected lifetime of the data, which may be a retention value, a relative priority of the data object, or the like. Data objects having similar expected lifetimes are clustered together in common data structures so that clusters of objects may be deleted efficiently in a single operation. Expected lifetimes may be changed by applications automatically. The system automatically determines how to handle these changes in expected lifetime using one or more of copying the data object, reclassifying the container in which the data object is held, and ignoring the change in expected lifetime for a time to investigate further changes in expected lifetime of other data objects.
    Type: Grant
    Filed: September 17, 2004
    Date of Patent: June 7, 2011
    Assignee: International Business Machines Corporation
    Inventors: Kay Schwendimann Anderson, Frederick Douglis, Nagui Halim, John Davis Palmer, Elizabeth Suzanne Richards, David Tao, William Harold Tetzlaff, John Michael Tracey, Joel Leonard Wolf
  • Publication number: 20090271874
    Abstract: A system and method for processing an information unit/packet (IU) in a stream processing system includes decomposing an IU into sub-information units persisted other than in the IU. An index or reference is generated in the IU for retrieving the persisted sub-information units during processing.
    Type: Application
    Filed: January 11, 2007
    Publication date: October 29, 2009
    Inventors: Kay Schwendimann Anderson, Joseph Phillip Bigus, Eric Bouillet, Parijat Dube, Mark David Feblowitz, David Alson George, Nagui Halim
  • Publication number: 20090055890
    Abstract: A method for security planning with hard security constraints includes: receiving security-related requirements of a network to be developed using system inputs and processing components; and generating the network according to the security-related requirements, wherein the network satisfies hard security constraints.
    Type: Application
    Filed: May 30, 2008
    Publication date: February 26, 2009
    Inventors: Kay Schwendimann Anderson, Pau-Chen Cheng, Genady Ya. Grabarnik, Paul Ashley Karger, Marc Lelarge, Zhen Liu, Anton Viktotovich Riabov, Pankai Rohatgi, Angela Marie Schuett, Grant Wagner
  • Publication number: 20080168529
    Abstract: A method for security planning with soft security constraints, include: receiving security-related requirements of a workflow to be developed using system inputs and processing components; and generating at least one proposed workflow according to the security-related requirements, wherein the at least one proposed workflow satisfies soft constraints.
    Type: Application
    Filed: January 4, 2007
    Publication date: July 10, 2008
    Inventors: Kay Schwendimann Anderson, Pau-Chen Cheng, Trenton Ray Jaeger, Zhen Liu, Anton Viktorovich Riabov, Pankaj Rohatgi, Angela Schuett Reninger, Grant Wagner
  • Publication number: 20080071716
    Abstract: A method and apparatus for solving a planning problem generates multiple efficient, alternate plans, one of which is selected for execution. Cost and quality metrics are used for describing and comparing the multiple plans. A planner narrows down a large number of possible solutions or plans to solve the problem based on a domain description including parameters that play a role in cost and quality computation. The method and apparatus can be used in planning stream processing workflows, threat detection and prevention, including intrusion detection, travel planning and planetary exploration.
    Type: Application
    Filed: August 31, 2006
    Publication date: March 20, 2008
    Inventors: Kay Schwendimann Anderson, Genady Ya. Grabarnik, Nagui Halim, Zhen Liu, Anton Viktorovich Riabov
  • Publication number: 20080016547
    Abstract: A method for security planning with hard security constraints includes: receiving security-related requirements of a network to be developed using system inputs and processing components; and generating the network according to the security-related requirements, wherein the network satisfies hard security constraints.
    Type: Application
    Filed: July 11, 2006
    Publication date: January 17, 2008
    Inventors: Kay Schwendimann Anderson, Pau-Chen Cheng, Genady Ya. Grabarnik, Paul Ashley Karger, Marc Lelarge, Zhen Liu, Anton Viktorovich Riabov, Pankaj Rohatgi, Angela Marie Schuett, Grant Wagner