Patents by Inventor Mandis S. Beigi
Mandis S. Beigi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10121109Abstract: A domain description is received, by a processor, the domain description identifying a domain associated with a sensor input. The domain description is formatted according to a hierarchical naming structure. A training data set is selected from a plurality of training data sets based upon the received domain description and sensor input. A combination of a subset of classifiers for classifying the sensor input is selected from a set of classifiers based upon the selected training data set.Type: GrantFiled: April 7, 2017Date of Patent: November 6, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mandis S. Beigi, Seraphin B. Calo, Dinesh C. Verma, Shiqiang Wang, David A. Wood
-
Publication number: 20180293510Abstract: A domain description is received, by a processor, the domain description identifying a domain associated with a sensor input. The domain description is formatted according to a hierarchical naming structure. A training data set is selected from a plurality of training data sets based upon the received domain description and sensor input. A combination of a subset of classifiers for classifying the sensor input is selected from a set of classifiers based upon the selected training data set.Type: ApplicationFiled: April 7, 2017Publication date: October 11, 2018Applicant: International Business Machines CorporationInventors: Mandis S. Beigi, Seraphin B. Calo, Dinesh C. Verma, Shiqiang Wang, David A. Wood
-
Patent number: 8543699Abstract: In one embodiment, the invention is a method and apparatus for distributed policy evaluation. One embodiment of a method for evaluating a systems management policy, where the policy includes a condition and an action to be taken when the condition evaluates to TRUE, includes forwarding the policy, by a first autonomic manager, to a second autonomic manager and receiving at the first autonomic manager at least partial evaluation results for the condition from a third autonomic manager. The first autonomic manager, the second autonomic manager, and the third autonomic manager are arranged in a ring configuration such that the evaluating occurs in a cascading manner, and only the first autonomic manager has access to a policy storage from which the policy is retrieved.Type: GrantFiled: February 28, 2007Date of Patent: September 24, 2013Assignee: International Business Machines CorporationInventors: Mandis S. Beigi, Seraphin Calo, David A. George, Dinesh Verma
-
Patent number: 8429206Abstract: A logical expression of a policy is generated from another logical expression of a policy, for example, via a set of transformations, each of which comprises an input sub-expression and an output sub-expression. Any sub-expression of the input expression which matches an input sub-expression of a transformation rule is replaced with the output sub-expression of that transformation rule to form a sub-expression of the output expression.Type: GrantFiled: January 16, 2007Date of Patent: April 23, 2013Assignee: International Business Machines CorporationInventors: Mandis S. Beigi, Seraphin B. Calo, David A. George
-
Patent number: 8380861Abstract: Embodiments of the present invention address deficiencies of the art in respect to e2e SLA support in a network of both manageable and unmanageable portions and provide a method, system and computer program product for e2e SLA compliance across both managed and unmanaged network segments. In one embodiment of the invention, a method for e2e SLA compliance across both managed and unmanaged network segments can be provided. The method can include identifying both a managed segment and an unmanaged segment of an e2e network for a communications path implicated by an SLA, determining an observed delay for the unmanaged segment of the e2e network, computing from a desired delay for the communications path and the observed delay a differential delay, and constraining the managed segment to meet the differential delay in order to assure meeting the desired delay for the communications path implicated by the SLA.Type: GrantFiled: February 3, 2011Date of Patent: February 19, 2013Assignee: International Business Machines CorporationInventors: Michael E. Baskey, Mandis S. Beigi, Sivaram Gottimukkala, Lap T. Huynh, Dinakaran Joseph, Einar Lueck, Debanjan Saha, Sambit Sahu, Dinesh C. Verma
-
Patent number: 8290841Abstract: A system and method for determining policy coverage and generating a suggested policy for gaps in the policy coverage includes determining policy coverage for one or more policies in a policy coverage space and determining regions uncovered by the policy coverage in the policy coverage space. Suggested policies are generated to cover the regions uncovered by the policy coverage. The policy coverage is supplemented with the suggested polices to complete coverage of a policy set.Type: GrantFiled: August 21, 2008Date of Patent: October 16, 2012Assignee: International Business Machines CorporationInventors: Mandis S. Beigi, Carolyn Brodie, Seraphin Bernard Calo, David Alson George, Clare-Marie Karat
-
Patent number: 8280970Abstract: One embodiment of the present method and apparatus for improving data transfers in peer-to-peer networks includes receiving a search request message from a requesting node, where the search request message requests specific data. A responding node then sends a response message to the requesting node including a referral message comprising at least one referred node that is expected to have the requested data, based on knowledge of the referred node's previous incoming and outgoing data transfers. The responding node may also indicate that the responding node has the requested data. In addition to increasing the requesting node's view of the peer-to-peer network, this also enables the identification of nodes (e.g., referred nodes) with which the requesting node may wish to establish direct peer-to-peer connections, e.g., to build peer-to-peer communities of nodes having similar interests.Type: GrantFiled: May 3, 2011Date of Patent: October 2, 2012Assignee: International Business Machines CorporationInventors: Mandis S. Beigi, Raymond B. Jennings, III, Jason D. Lavoie
-
Publication number: 20110208823Abstract: One embodiment of the present method and apparatus for improving data transfers in peer-to-peer networks includes receiving a search request message from a requesting node, where the search request message requests specific data. A responding node then sends a response message to the requesting node including a referral message comprising at least one referred node that is expected to have the requested data, based on knowledge of the referred node's previous incoming and outgoing data transfers. The responding node may also indicate that the responding node has the requested data. In addition to increasing the requesting node's view of the peer-to-peer network, this also enables the identification of nodes (e.g., referred nodes) with which the requesting node may wish to establish direct peer-to-peer connections, e.g., to build peer-to-peer communities of nodes having similar interests.Type: ApplicationFiled: May 3, 2011Publication date: August 25, 2011Inventors: MANDIS S. BEIGI, Raymond B. Jennings, III, Jason D. Lavoie
-
Patent number: 7958195Abstract: One embodiment of the present method and apparatus for improving data transfers in peer-to-peer networks includes receiving a search request message from a requesting node, where the search request message requests specific data. A responding node then sends a response message to the requesting node including a referral message comprising at least one referred node that is expected to have the requested data, based on knowledge of the referred node's previous incoming and outgoing data transfers. The responding node may also indicate that the responding node has the requested data. In addition to increasing the requesting node's view of the peer-to-peer network, this also enables the identification of nodes (e.g., referred nodes) with which the requesting node may wish to establish direct peer-to-peer connections, e.g., to build peer-to-peer communities of nodes having similar interests.Type: GrantFiled: June 27, 2008Date of Patent: June 7, 2011Assignee: International Business Machines CorporationInventors: Mandis S. Beigi, Raymond B. Jennings, III, Jason D. Lavoie
-
Publication number: 20110125914Abstract: Embodiments of the present invention address deficiencies of the art in respect to e2e SLA support in a network of both manageable and unmanageable portions and provide a method, system and computer program product for e2e SLA compliance across both managed and unmanaged network segments. In one embodiment of the invention, a method for e2e SLA compliance across both managed and unmanaged network segments can be provided. The method can include identifying both a managed segment and an unmanaged segment of an e2e network for a communications path implicated by an SLA, determining an observed delay for the unmanaged segment of the e2e network, computing from a desired delay for the communications path and the observed delay a differential delay, and constraining the managed segment to meet the differential delay in order to assure meeting the desired delay for the communications path implicated by the SLA.Type: ApplicationFiled: February 3, 2011Publication date: May 26, 2011Applicant: International Business Machines CorporationInventors: Michael E. Baskey, Mandis S. Beigi, Sivaram Gottimukkala, Lap T. Huynh, Dinakaran Joseph, Einar Lueck, Debanjan Saha, Sambit Sahu, Dinesh C. Verma
-
Patent number: 7912968Abstract: Embodiments of the present invention address deficiencies of the art in respect to e2e SLA support in a network of both manageable and unmanageable portions and provide a method, system and computer program product for e2e SLA compliance across both managed and unmanaged network segments. In one embodiment of the invention, a method for e2e SLA compliance across both managed and unmanaged network segments can be provided. The method can include identifying both a managed segment and an unmanaged segment of an e2e network for a communications path implicated by an SLA, determining an observed delay for the unmanaged segment of the e2e network, computing from a desired delay for the communications path and the observed delay a differential delay, and constraining the managed segment to meet the differential delay in order to assure meeting the desired delay for the communications path implicated by the SLA.Type: GrantFiled: August 29, 2007Date of Patent: March 22, 2011Assignee: International Business Machines CorporationInventors: Michael E. Baskey, Mandis S. Beigi, Sivaram Gottimukkala, Lap T. Huynh, Dinakaran Joseph, Einar Lueck, Debanjan Saha, Sambit Sahu, Dinesh C. Verma
-
Publication number: 20100049558Abstract: A system and method for determining policy coverage and generating a suggested policy for gaps in the policy coverage includes determining policy coverage for one or more policies in a policy coverage space and determining regions uncovered by the policy coverage in the policy coverage space. Suggested policies are generated to cover the regions uncovered by the policy coverage. The policy coverage is supplemented with the suggested polices to complete coverage of a policy set.Type: ApplicationFiled: August 21, 2008Publication date: February 25, 2010Inventors: Mandis S. Beigi, Carolyn Brodie, Seraphin Bernard Calo, David Alson George, Clare-Marie Karat
-
Publication number: 20090063673Abstract: Embodiments of the present invention address deficiencies of the art in respect to e2e SLA support in a network of both manageable and unmanageable portions and provide a method, system and computer program product for e2e SLA compliance across both managed and unmanaged network segments. In one embodiment of the invention, a method for e2e SLA compliance across both managed and unmanaged network segments can be provided. The method can include identifying both a managed segment and an unmanaged segment of an e2e network for a communications path implicated by an SLA, determining an observed delay for the unmanaged segment of the e2e network, computing from a desired delay for the communications path and the observed delay a differential delay, and constraining the managed segment to meet the differential delay in order to assure meeting the desired delay for the communications path implicated by the SLA.Type: ApplicationFiled: August 29, 2007Publication date: March 5, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Michael E. Baskey, Mandis S. Beigi, Sivaram Gottimukkala, Lap T. Huynh, Dinakaran Joseph, Einar Lueck, Debanjan Saha, Sambit Sahu, Dinesh C. Verma
-
Publication number: 20090031302Abstract: Risks of change to a physical configuration are minimized. A request for a change to the physical system included in the physical configuration is detected, and all applications the physical systems that would be affected by the requested change are identified. All the applications and physical systems that would be affected by the requested change are replicated on a virtual system, including applications and the physical system to which the requested change is targeted and applications and physical systems that are dependent on the applications and the physical system to which the requested change is targeted. The requested change is applied to the virtual system. The virtual system is tested to determine whether the applied change produces desired results. If the applied change products the desired results, the requested change is applied to the physical system.Type: ApplicationFiled: July 24, 2007Publication date: January 29, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mandis S. Beigi, James E. Hanson, Parviz Kermani, Dinesh C. Verma
-
Publication number: 20080263166Abstract: One embodiment of the present method and apparatus for improving data transfers in peer-to-peer networks includes receiving a search request message from a requesting node, where the search request message requests specific data. A responding node then sends a response message to the requesting node including a referral message comprising at least one referred node that is expected to have the requested data, based on knowledge of the referred node's previous incoming and outgoing data transfers. The responding node may also indicate that the responding node has the requested data. In addition to increasing the requesting node's view of the peer-to-peer network, this also enables the identification of nodes (e.g., referred nodes) with which the requesting node may wish to establish direct peer-to-peer connections, e.g., to build peer-to-peer communities of nodes having similar interests.Type: ApplicationFiled: June 27, 2008Publication date: October 23, 2008Inventors: Mandis S. Beigi, Raymond B. Jennings, Jason D. Lavoie
-
Publication number: 20080209047Abstract: In one embodiment, the invention is a method and apparatus for distributed policy evaluation. One embodiment of a method for evaluating a systems management policy, where the policy includes a condition and an action to be taken when the condition evaluates to TRUE, includes forwarding the policy, by a first autonomic manager, to at least a second autonomic manager and receiving at least partial evaluation results for the policy from at least the second autonomic manager.Type: ApplicationFiled: February 28, 2007Publication date: August 28, 2008Inventors: Mandis S. Beigi, Seraphin Calo, David A. George, Dinesh Verma
-
Publication number: 20080172350Abstract: A logical expression of a policy is generated from another logical expression of a policy, for example, via a set of transformations, each of which comprises an input sub-expression and an output sub-expression. Any sub-expression of the input expression which matches an input sub-expression of a transformation rule is replaced with the output sub-expression of that transformation rule to form a sub-expression of the output expression.Type: ApplicationFiled: January 16, 2007Publication date: July 17, 2008Applicant: International Business Machines CorporationInventors: Mandis S. Beigi, Seraphin B. Calo, David A. George