Patents by Inventor Maja Vukovic

Maja Vukovic has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20170140322
    Abstract: The present invention provides a method, system, and computer program for selecting a plurality of workers to accomplish a task. The method includes: identifying a task from a description; extracting at least one cognitive skill from the description of the task using machine learning methods; generating a group cognitive map which includes the at least one cognitive skill; and selecting a plurality of workers to accomplish the task based on at least the group cognitive map, wherein the plurality of workers comprises at least on artificial intelligent (AI) agent.
    Type: Application
    Filed: November 16, 2015
    Publication date: May 18, 2017
    Inventors: James R. Kozloski, Clifford A. Pickover, Maja Vukovic
  • Patent number: 9639404
    Abstract: Software that uses machine logic based algorithms to help determine and/or prioritize an application programming interface's (API) desirability to a user based on how closely the API's terms of service (ToS) meet the users' ToS preferences. The software performs the following steps: (i) receiving a set of API ToS feature information that includes identifying information for at least one API and respectively associated ToS features for each identified API; (ii) receiving ToS preference information that relates to ToS related preferences for a user; and (iii) evaluating a strength of a match between each respective API identified in the API ToS feature information set and the ToS preference information to yield a match value for each API identified in the API ToS feature information set.
    Type: Grant
    Filed: June 15, 2016
    Date of Patent: May 2, 2017
    Assignee: International Business Machines Corporation
    Inventors: Jim A. Laredo, Sriram K. Rajagopal, Maja Vukovic, John E. Wittern
  • Publication number: 20170109815
    Abstract: Embodiments of the present invention disclose a method, computer program product, and system for performing auctions of cloud based resources. A plurality of requests for a set of cloud based resources are received. A set of preferences associated with the received plurality of requests are received. Data is received that is associated with the set of cloud based resources. The data includes an index of available resources, a cost value associated with one or more available resources of the available resources, and a rate of consumption value of available resources of the available resources. An auction technique is established for matching a subset of cloud based resources within the set of cloud based resources and an associated request of the plurality of requests. A match is determined between a subset of cloud based resources and a received request, the match is the output of the established auction technique.
    Type: Application
    Filed: October 16, 2015
    Publication date: April 20, 2017
    Inventors: Kun Bai, Yun-Wu Huang, Jinho Hwang, Clifford A. Pickover, Maja Vukovic, Christopher C. Young
  • Patent number: 9612767
    Abstract: Context aware dynamic composition of migration plans may be provided. A request for application or image migration may be received. Target machines and associated configuration may be identified. Resources and a schedule may be allocated. An appropriate tooling for each migration action may be selected. An artificial intelligence aspect of the migration planning process may continuously replan migration based on monitored changes in the context of source or target environment.
    Type: Grant
    Filed: June 23, 2015
    Date of Patent: April 4, 2017
    Assignee: International Business Machines Corporation
    Inventors: Yunwu Huang, Jinho Hwang, Dennis A. Perpetua, Jr., Maja Vukovic, Christopher C. Young
  • Patent number: 9612765
    Abstract: Context aware dynamic composition of migration plans may be provided. A request for application or image migration may be received. Target machines and associated configuration may be identified. Resources and a schedule may be allocated. An appropriate tooling for each migration action may be selected. An artificial intelligence aspect of the migration planning process may continuously replan migration based on monitored changes in the context of source or target environment.
    Type: Grant
    Filed: November 19, 2014
    Date of Patent: April 4, 2017
    Assignee: International Business Machines Corporation
    Inventors: Yunwu Huang, Jinho Hwang, Dennis A. Perpetua, Jr., Maja Vukovic, Christopher C. Young
  • Publication number: 20170083403
    Abstract: Managing data backup during workload migration is provided. A set of workloads for migration from a source environment to a target environment is identified in response to receiving a request to migrate the set of workloads. The migration of the set of workloads is initiated from the source environment to the target environment along with migration of backup data corresponding to the set of workloads. A backup configuration transformation from a backup configuration corresponding to the source environment to a set of backup configurations corresponding to the target environment is determined based on semantic matching between characteristics of the backup configuration corresponding to the source environment and characteristics of the set of backup configurations corresponding to the target environment, a state of the source environment, backup configuration transformation actions, and a goal state of the target environment.
    Type: Application
    Filed: September 21, 2015
    Publication date: March 23, 2017
    Inventors: VALENTINA SALAPURA, MAJA VUKOVIC
  • Patent number: 9600244
    Abstract: Embodiments include methods, and computer program products of cognitive programming editor system in a computer system. Aspects include: providing programmers' cognitive characteristics patterns and programming policies to a code controller, collecting computer code from programmers through cognitive skill agents, analyzing collected code by code controller using a cognitive vulnerability checker, providing collaborative programming by sharing online editor with programmers, and storing obtained cognitive characteristics patterns of programmers to a database. The analyzing may include assessing and responding to cognitive needs of the programmers through the cognitive skill agents. Cognitive vulnerability checker may include character pattern matching, type qualifier, data flow analysis, vulnerability pattern-based model checking, and individual programmer vulnerability analysis.
    Type: Grant
    Filed: December 9, 2015
    Date of Patent: March 21, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jinho Hwang, Minkyong Kim, Clifford A. Pickover, Maja Vukovic
  • Publication number: 20170076372
    Abstract: A method, a computer program product, and a computer system for computer implemented software-as-a-service (SaaS) license trading. A computer evaluates license offerings for a SaaS capability accessible by an application program interface, in response to receiving from a user a request for a license for the SaaS capability. The computer evaluates one or more cognitive requirements, based on functional features. The computer determines one or more matching SaaS capabilities and licenses thereof. The computer evaluates attributes of one or more providers and attributes of the one or more matching SaaS capabilities and the licenses thereof. The computer places bids for the one or more matching SaaS capabilities and the licenses thereof.
    Type: Application
    Filed: September 16, 2015
    Publication date: March 16, 2017
    Inventors: James R. Kozloski, Clifford A. Pickover, Maja Vukovic
  • Patent number: 9565129
    Abstract: A method and a system may automatically compute optimized target resources and identify configurations given discovered source properties and dependencies of machines, while prioritizing performance in the target environment. An algorithm and/or tools for programmatically identifying and locating business application instances in an infrastructure, based on weighted similarity metric may be also provided.
    Type: Grant
    Filed: September 30, 2014
    Date of Patent: February 7, 2017
    Assignee: International Business Machines Corporation
    Inventors: Kun Bai, Jinho Hwang, Jill L. Jermyn, Michael E. Nidd, Michael Tacci, Maja Vukovic
  • Patent number: 9560075
    Abstract: An electronic communication evaluating device determines a suspicion level for an initial electronic communication. The initial electronic communication is addressed to an addressed entity that is associated with an electronic communication receiver. In response to the suspicion level exceeding a predetermined level, a communication switching device reroutes the initial electronic communication from the addressed entity to a cognitive honeypot. The cognitive honeypot transmits, to the electronic communication transmitting system, emulation electronic communications that emulate the addressed entity until a predefined state of the communication session occurs.
    Type: Grant
    Filed: October 22, 2014
    Date of Patent: January 31, 2017
    Assignee: International Business Machines Corporation
    Inventors: Itzhack Goldberg, James R. Kozloski, Clifford A. Pickover, Neil Sondhi, Maja Vukovic
  • Publication number: 20170023378
    Abstract: Embodiments include method, systems and computer program products for route planning to reduce exposure to radiation. Aspects include receiving an origin and a destination for a vehicle and determining a plurality of available routes between the origin and the destination. Aspects also include calculating, by a processor, a radiation score for each of the plurality of available routes and presenting one or more of the plurality of available routes with an expected travel time and the radiation score for each of the plurality of available routes.
    Type: Application
    Filed: June 3, 2016
    Publication date: January 26, 2017
    Inventors: JAMES R. KOZLOSKI, CLIFFORD A. PICKOVER, MAJA VUKOVIC
  • Publication number: 20170003861
    Abstract: A method of operating a computer system using a cognitively aware control includes receiving an input to the cognitively aware control, wherein the cognitively aware control is associated with a first action, determining, by a user assessment module of the computer system, a cognitive state of a user of an application executed by the computer system and associated with the cognitively aware control, and selecting a second action in response to the input to the cognitively aware control and the cognitive state of the user, wherein the second action is performed by the computer system.
    Type: Application
    Filed: June 30, 2015
    Publication date: January 5, 2017
    Inventors: Minkyong Kim, James R. Kozloski, Clifford A. Pickover, Maja Vukovic
  • Publication number: 20160378852
    Abstract: Embodiments are directed to an information processing system for generating answers in response to questions. The system includes a memory, a processor system communicatively coupled to the memory. The processor system is configured to store in the memory data of a corpus of a predetermined entity, and receive a question comprising a natural language format. The processor circuit is further configured to analyze the data of the corpus of the predetermined entity to derive an emulated answer to the question, wherein the emulated answer includes an emulation of an actual answer that would be provided by the predetermined entity.
    Type: Application
    Filed: June 29, 2015
    Publication date: December 29, 2016
    Inventors: Itzhack Goldberg, James R. Kozloski, Clifford A. Pickover, Maja Vukovic
  • Publication number: 20160381124
    Abstract: Network routing and load balancing in a software design network (SDN)-enabled computing environment may be provided. Input data discovered from a source computing environment is received, wherein one or more of components of the source computing environment are to be migrated to a target computing environment, the input data comprising at least source configuration information and utilization information. Target compute resources, network design and system management design may be determined based on the input data, and a new network configuration generated as output. Based on these design decisions, the steady-state network management using SDN is proposed. The new network configuration may be transmitted to an SDN controller associated with the target computing environment for storing as flow table rules. The SDN controller pushes the flow table rules to one or more routing switches, the flow table rules for performing the network routing and the load balancing.
    Type: Application
    Filed: June 24, 2015
    Publication date: December 29, 2016
    Inventors: Jinho Hwang, Jill L. Jermyn, Maja Vukovic, Jin Xiao
  • Publication number: 20160371992
    Abstract: Selecting an instructional video is provided. It is determined that a query is requesting information on how to perform a procedure. A set of instructional videos are accessed corresponding to the information on how to perform the procedure. Information regarding a user of a client device that submitted the query is retrieved from at least one of a set of databases and a set of monitoring devices located on the user via a network. Physiological changes are predicted in the user's current cognitive state based on the information regarding the user retrieved from the set of databases and the set of monitoring devices. An instructional video is selected in the set of instructional videos corresponding to the information on how to perform the procedure based on the user's current cognitive state indicated in the retrieved information regarding the user of the client device.
    Type: Application
    Filed: June 16, 2015
    Publication date: December 22, 2016
    Inventors: James R. Kozloski, Clifford A. Pickover, Maja Vukovic
  • Publication number: 20160373289
    Abstract: A method, system, and/or computer program product ensures regulatory compliance during application migration to cloud-based containers. In response to receiving a message directing an application to be migrated to a container cloud, the application is matched to multiple containers described in a container registry, where each container is matched to a service that provides a server. A regulatory rule by which at least one of the server, the application, and requisite containers are governed is identified. In response to detecting a change to at least one of the server, the application, and the requisite containers so that there is noncompliance with a regulatory rule, a chain of compliance services is automatically recomposed using an artificial intelligence planning technology.
    Type: Application
    Filed: June 17, 2015
    Publication date: December 22, 2016
    Inventors: Milton H. Hernandez, Jill L. Jermyn, Clifford A. Pickover, Maja Vukovic
  • Publication number: 20160364213
    Abstract: One or more processors receive information regarding a program module that includes a description of a function, license terms, and non-functional properties of the program module. The license terms, the description of function, and the non-functional properties of the program module are identified, based on an analysis of the information. An object of interest of each license term of the license terms is determined, such that the object of interest is directed to a condition influencing license term compliance. Rules corresponding to compliance of the one or more license terms of the program module are determined, and the analyzed information of the program module is stored in a meta-model format organized into categories including the description of function, the one or more license terms, and the non-functional properties of the program module, utilizing standardized syntax and semantics.
    Type: Application
    Filed: August 24, 2016
    Publication date: December 15, 2016
    Inventors: Nicholas C. M. Fuller, Jim A. Laredo, Hui Lei, Sriram K. Rajagopal, Maja Vukovic, Liangzhao Zeng
  • Patent number: 9515993
    Abstract: A method, a computer program product, and a computer system for automatically migrating servers into an environment of multiple firewalls. A computer creates a graph representing the servers and connectivity, based on connectivity strengths and resource requirements. The computer groups the servers into multiple groups by using a graph based partitioning algorithm which considers the connectivity strengths and the resource requirements. The computer creates two adjacency matrices, one for local rules and the other for global rules. The computer adds endpoints to a local adjacency list, in response to determining that the endpoints are in a respective one of the multiple groups. The computer adds endpoints to a global adjacency list, in response to determining that the endpoints are not in respective one of the multiple groups. The computer converts the adjacency lists to firewall rules for the respective one of the multiple groups.
    Type: Grant
    Filed: May 13, 2015
    Date of Patent: December 6, 2016
    Assignee: International Business Machines Corporation
    Inventors: Jinho Hwang, Jill L. Jermyn, Harigovind V. Ramasamy, Maja Vukovic
  • Publication number: 20160337480
    Abstract: Performing server virtual machine image migration and dependent server virtual machine image discovery in parallel is provided. Migration of a server virtual machine image that performs a workload is started to a client device via a network and, in parallel, an identity is continuously discovered of a set of dependent server virtual machine images corresponding to the server virtual machine image being migrated to the client device. In response to discovering the identity of the set of dependent server virtual machine images, a server migration pattern of the discovered set of dependent server virtual machine images is generated for the workload. A level of risk corresponding to migrating each dependent server virtual machine image of the discovered set of dependent server virtual machine images to the client device is calculated based on the server migration pattern of the discovered set of dependent server virtual machine images for the workload.
    Type: Application
    Filed: May 14, 2015
    Publication date: November 17, 2016
    Inventors: Nikolaos Anerousis, Kun Bai, Hubertus Franke, Jinho Hwang, Jose E. Moreira, Maja Vukovic
  • Publication number: 20160337317
    Abstract: A method, a computer program product, and a computer system for automatically migrating servers into an environment of multiple firewalls. A computer creates a graph representing the servers and connectivity, based on connectivity strengths and resource requirements. The computer groups the servers into multiple groups by using a graph based partitioning algorithm which considers the connectivity strengths and the resource requirements. The computer creates two adjacency matrices, one for local rules and the other for global rules. The computer adds endpoints to a local adjacency list, in response to determining that the endpoints are in a respective one of the multiple groups. The computer adds endpoints to a global adjacency list, in response to determining that the endpoints are not in respective one of the multiple groups. The computer converts the adjacency lists to firewall rules for the respective one of the multiple groups.
    Type: Application
    Filed: May 13, 2015
    Publication date: November 17, 2016
    Inventors: Jinho Hwang, Jill L. Jermyn, Harigovind V. Ramasamy, Maja Vukovic