Patents by Inventor Maja Vukovic

Maja Vukovic has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10216486
    Abstract: One or more processors receive information regarding a program module that includes a description of a function, license terms, and non-functional properties of the program module. The license terms, the description of function, and the non-functional properties of the program module are identified, based on an analysis of the information. An object of interest of each license term of the license terms is determined, such that the object of interest is directed to a condition influencing license term compliance. Rules corresponding to compliance of the one or more license terms of the program module are determined, and the analyzed information of the program module is stored in a meta-model format organized into categories including the description of function, the one or more license terms, and the non-functional properties of the program module, utilizing standardized syntax and semantics.
    Type: Grant
    Filed: August 24, 2016
    Date of Patent: February 26, 2019
    Assignee: International Business Machines Corporation
    Inventors: Nicholas C. M. Fuller, Jim A. Laredo, Hui Lei, Sriram K. Rajagopal, Maja Vukovic, Liangzhao Zeng
  • Patent number: 10207718
    Abstract: A method causes a self-driving vehicle (SDV) to warn passengers of an upcoming maneuver, and to explain why the SDV will be making the upcoming maneuver. One or more processors receive sensor readings that describe a condition of a roadway upon which a self-driving vehicle (SDV) is traveling, where the sensor readings are from roadway sensors that detect water on the roadway. The processor(s) reroute the SDV due to the water on the roadway, and provide an explanation to an occupant of the SDV that describes the water on the roadway as a reason for rerouting the SDV.
    Type: Grant
    Filed: June 12, 2018
    Date of Patent: February 19, 2019
    Assignee: International Business Machines Corporation
    Inventors: Michael S. Gordon, Clifford A. Pickover, Maja Vukovic
  • Publication number: 20190026474
    Abstract: Systems, computer-implemented methods and/or computer program products that facilitate compliance-aware runtime generation of containers are provided.
    Type: Application
    Filed: December 14, 2017
    Publication date: January 24, 2019
    Inventors: Constantin Mircea Adam, Nikolaos Anerousis, Jinho Hwang, Shripad Nadgowda, Maja Vukovic
  • Publication number: 20190026472
    Abstract: Systems, computer-implemented methods and/or computer program products that facilitate compliance-aware runtime generation of containers are provided.
    Type: Application
    Filed: July 19, 2017
    Publication date: January 24, 2019
    Inventors: Constantin Mircea Adam, Nikolaos Anerousis, Jinho Hwang, Shripad Nadgowda, Maja Vukovic
  • Publication number: 20190014097
    Abstract: An embodiment of the invention provides a system and method for risk-aware multiple factor authentication based on pattern recognition and calendar. Recent activity performed by the user can be obtained from data sources and stored in a user transaction database. An interface can receive a login name from a user; and, a processor can select one or more security questions regarding the recent activity performed by the user. The interface can receive an answer to the security question(s) from the user; and, the processor can determine whether the answer(s) matches data stored in the user transaction database and is associated with the login name of the user.
    Type: Application
    Filed: July 6, 2017
    Publication date: January 10, 2019
    Applicant: International Business Machines Corporation
    Inventors: Jinho Hwang, Clifford A. Pickover, Maja Vukovic, Frederick Y. Wu
  • Patent number: 10169988
    Abstract: A computer-implemented method causes an amelioration of an erratic manner in which a vehicle is being driven. One or more processors receive, from at least one sensor associated with a vehicle, sensor readings indicating that the vehicle is being operated by a driver in an erratic manner. Processor(s) compute a risk R associated with the driver operating the vehicle in the erratic manner, and determine whether the risk R is above a predefined threshold. In response to determining that the risk R is above the predefined threshold, processor(s) deploy an aerial drone to a current location of the vehicle, and transmit instructions to the aerial drone to perform an action that causes an amelioration of the erratic manner in which the vehicle is being driven.
    Type: Grant
    Filed: October 19, 2016
    Date of Patent: January 1, 2019
    Assignee: International Business Machines Corporation
    Inventors: James R. Kozloski, Clifford A. Pickover, Maja Vukovic
  • Patent number: 10171481
    Abstract: A security method that includes assigning a sensitivity value for a communication with a sensitivity determining module including at least one hardware processor. Following assignment of the sensitivity value to the communication, the communication is formatted for display. When sensitivity value exceeds a security threshold, the communication is parsed into a sequence of fragments. The communication is transmitted as the sequence of fragments when said sensitivity value exceeds the security threshold.
    Type: Grant
    Filed: March 24, 2015
    Date of Patent: January 1, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rhonda L. Childress, Itzhack Goldberg, James R. Kozloski, Clifford A. Pickover, Neil Sondhi, Maja Vukovic
  • Patent number: 10171310
    Abstract: A method, system, and/or computer program product ensures regulatory compliance during application migration to cloud-based containers. In response to receiving a message directing an application to be migrated to a container cloud, the application is matched to multiple containers described in a container registry, where each container is matched to a service that provides a server. A regulatory rule by which at least one of the server, the application, and requisite containers are governed is identified. In response to detecting a change to at least one of the server, the application, and the requisite containers so that there is noncompliance with a regulatory rule, a chain of compliance services is automatically recomposed using an artificial intelligence planning technology.
    Type: Grant
    Filed: June 17, 2015
    Date of Patent: January 1, 2019
    Assignee: International Business Machines Corporation
    Inventors: Milton H. Hernandez, Jill L. Jermyn, Clifford A. Pickover, Maja Vukovic
  • Patent number: 10168859
    Abstract: A method, computer program product, and system for contextual determination of emotion icons. The method includes, for a particular user, determining an emotion icon to automatically input into a message, based on a class of the user, a current mood of the user, and the recipient of the message. The determined emotion icon is then inserted into the message.
    Type: Grant
    Filed: April 26, 2016
    Date of Patent: January 1, 2019
    Assignee: International Business Machines Corporation
    Inventors: James R. Kozloski, Clifford A. Pickover, Maja Vukovic
  • Patent number: 10163042
    Abstract: An embodiment of the invention provides a method for finding missing persons by learning features for person attribute classification based on deep learning. A first component of a neural network identifies geographic locations of training images; and, a second component of the neural network identifies weather information for each of the identified geographic locations. A third component of the neural network generates image pairs from the training images. For each image pair of the image pairs, the third component of the neural network determines whether images of the image pair include the same person. The neural network generates neural network parameters with the identified geographic locations, the weather information for each of the identified geographic locations, and the determination of whether the images of the image pairs include the same person.
    Type: Grant
    Filed: August 2, 2016
    Date of Patent: December 25, 2018
    Assignee: International Business Machines Corporation
    Inventors: Yu Cheng, Rogerio S. Feris, Clifford A. Pickover, Maja Vukovic, Jing Wang
  • Publication number: 20180356839
    Abstract: A system for continued navigation of unmanned aerial vehicles beyond restricted boundaries. The system comprises a monitoring device to track a geolocation corresponding to an unmanned aerial vehicle and to compare the geolocation corresponding to the unmanned aerial vehicle with a geolocation corresponding to a restricted boundary to determine a location of the unmanned aerial vehicle with respect to a restricted environment, and a route generator to generate an alternative navigation method to navigate the restricted environment when the unmanned aerial vehicle is located within a predetermined distance of the restricted environment.
    Type: Application
    Filed: July 26, 2018
    Publication date: December 13, 2018
    Inventors: Thomas D. Erickson, Clifford A. Pickover, Maja Vukovic
  • Publication number: 20180349990
    Abstract: A terminal is configured to receive a transaction value from an operator, to connect with a mobile device of a user, and to receive, from the mobile device of the user, operating data of the mobile device of the user. The data processing device receives the operating data and uses it to calculate a level of credit to extend to the user. A messaging server identifies contacts of the user, determines which of the contacts are currently active, sends a message the active contacts including a request to guarantee at least a portion of a difference between the transaction value and the calculated level of credit to extend to the user, and transmits an authorization code to the terminal when an entirety of the difference is guaranteed. The terminal consummates a transaction in the amount of the received transaction value when the authorization code is received.
    Type: Application
    Filed: June 6, 2017
    Publication date: December 6, 2018
    Inventors: ABDIGANI M. DIRIYE, CLIFFORD A. PICKOVER, MAJA VUKOVIC, KOMMINIST WELDEMARIAM
  • Patent number: 10123674
    Abstract: A method, system and computer program product for modifying a cleaning routine of a mobile cleaner scans the surface to collect debris data, the debris data including an amount and location of debris on the surface. A profile of the surface is updated with the collected debris data. A profile of the surface is analyzed to identify a debris region on the surface, the debris region including an amount of debris differs from a high threshold. A cleaning routine of the mobile cleaner is modified based on the profile.
    Type: Grant
    Filed: September 9, 2016
    Date of Patent: November 13, 2018
    Assignee: International Business Machines Corporation
    Inventors: Michael S. Gordon, Clifford A. Pickover, Maja Vukovic
  • Publication number: 20180324215
    Abstract: A method and system of processing an information technology (IT) electronic request is provided. The electronic request is received in natural language from a user. Parameters of the electronic request are extracted. A risk of the electronic request is determined. A policy based on the parameters and the risk of the electronic request is determined and executed. A level of trust between the user and the computer device is calculated based on the determined risk and an outcome of the execution of the policy. A conversation pattern of the computer device toward the user is adjusted based on the calculated level of trust.
    Type: Application
    Filed: May 4, 2017
    Publication date: November 8, 2018
    Inventors: Anup K. Kalia, Maja Vukovic, Frederick Y. Wu, Jin Xiao
  • Patent number: 10116668
    Abstract: A security method that includes assigning a sensitivity value for a communication with a sensitivity determining module including at least one hardware processor. Following assignment of the sensitivity value to the communication, the communication is formatted for display. When sensitivity value exceeds a security threshold, the communication is parsed into a sequence of fragments. The communication is transmitted as the sequence of fragments when said sensitivity value exceeds the security threshold.
    Type: Grant
    Filed: June 20, 2017
    Date of Patent: October 30, 2018
    Assignee: International Business Machines Corporation
    Inventors: Rhonda L. Childress, Itzhack Goldberg, James R. Kozloski, Clifford A. Pickover, Neil Sondhi, Maja Vukovic
  • Publication number: 20180307893
    Abstract: A method includes acquiring a fingerprint of a person using a fingerprint scanner of a mobile device to power-off the mobile device, determining that the person is not authorized to use the mobile device based on their fingerprint, and maintaining the mobile device in a power-on state unbeknownst to the person.
    Type: Application
    Filed: April 19, 2017
    Publication date: October 25, 2018
    Inventors: Itzhack Goldberg, Jinho Hwang, Neil Sondhi, Maja Vukovic
  • Publication number: 20180308004
    Abstract: An embodiment includes a method for use in managing a system comprising one or more computers, each computer comprising at least one hardware processor coupled to at least one memory. The method comprises a computer-implemented manager: detecting that the system is in an unhealthy state; determining a set of one or more possible actions to remedy the unhealthy state of the system; selecting at least one action of the set of one or more possible actions; and constructing a service request implementing the selected at least one action; wherein at least one of the detecting, determining, selecting, and constructing is based at least in part on applying a reinforcement learning algorithm.
    Type: Application
    Filed: April 23, 2017
    Publication date: October 25, 2018
    Inventors: Anup Kalia, Jinho Hwang, Maja Vukovic, Frederick Y. Wu
  • Publication number: 20180308011
    Abstract: An embodiment includes a method for use in managing a system comprising one or more computers, each computer comprising at least one hardware processor coupled to at least one memory. The method comprises a computer-implemented manager: detecting that the system is in an unhealthy state; determining a set of one or more possible actions to remedy the unhealthy state of the system; selecting at least one action of the set of one or more possible actions; and constructing a service request implementing the selected at least one action; wherein at least one of the detecting, determining, selecting, and constructing is based at least in part on applying a reinforcement learning algorithm.
    Type: Application
    Filed: December 31, 2017
    Publication date: October 25, 2018
    Inventors: Anup Kalia, Jinho Hwang, Maja Vukovic, Frederick Y. Wu
  • Patent number: 10105617
    Abstract: A method and system for cognitively controlling a mobile having mobile elements controllable by a mobile stimulation pattern. Sensor data is captured from sensors detecting reactions of a baby in proximity to the mobile to a first mobile stimulation pattern and audio/video data is captured from a video camera recording reactions of the baby in proximity to the mobile. The sensor data and the audio/video data are analyzed to determine the behavior of the baby in response to the first mobile stimulation pattern and the determined behavior is compared with expected behaviors of the baby using a machine learning algorithm to learn the baby's reactions to the first mobile stimulation pattern. A second mobile stimulation pattern is selected based on the learning of the baby's reactions to the first mobile stimulation pattern and the mobile is controlled based on the second mobile stimulation pattern.
    Type: Grant
    Filed: September 20, 2016
    Date of Patent: October 23, 2018
    Assignee: International Business Machines Corporation
    Inventors: Roxana Monge Nunez, Clifford A. Pickover, Maja Vukovic, Edgar A. Zamora Duran
  • Publication number: 20180293683
    Abstract: A network is crawled using a trained learning model to identify a set of secondary-source documents related to an event. A hub page from the set of secondary-source documents is identified that includes a link predicted to link to a new relevant secondary-source document. The new document is added to the set of secondary-source documents. Information is extracted from the set of secondary-source documents. Feedback is received indicative of a relevancy level for the extracted information as applied to the event. Each document is classified into one or more categories related to the event, based on the extracted information and the received feedback information. A learning model is trained based on the received feedback.
    Type: Application
    Filed: April 11, 2017
    Publication date: October 11, 2018
    Inventors: Ioana M. Baldini Soares, Amit Dhurandhar, Abhishek Kumar, Aleksandra Mojsilovic, Kien T. Pham, Kush R. Varshney, Maja Vukovic