Patents by Inventor Mathews Thomas
Mathews Thomas has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12387613Abstract: The present inventive concept provides for a method of unmanned machine synchronization using robotic sensing. The method includes generating at least one physical signal in the vicinity of at least one unmanned machine. The at least one generated physical signal is received by the at least one unmanned machine. At least one task is performed by the at least one unmanned machine based on the at least one received generated physical signal.Type: GrantFiled: June 1, 2023Date of Patent: August 12, 2025Assignee: International Business Machines CorporationInventors: Dinesh C. Verma, Utpal Mangla, Mathews Thomas, Gerald Coon, Mudhakar Srivatsa, Satishkumar Sadagopan
-
Patent number: 12381849Abstract: A method, computer system, and a computer program product is provided for establishing a dynamically adaptive network firewall. A firewall model is established that identifies resources that can be used and a plurality of nodes that connect to one another to form a network. A set of external rules and policies are provided to each resource. The firewall implemented using the firewall model upon receiving of incoming data and upon traffic flow. The firewall expands or contracts the network by adding or removing resources according to work that needs to be performed. The work includes both tasks to be completed and efforts that has to be taken by the firewall to ensure security by preventing unauthorized access into the network.Type: GrantFiled: October 28, 2022Date of Patent: August 5, 2025Assignee: International Business Machines CorporationInventors: Satishkumar Sadagopan, Mudhakar Srivatsa, Dinesh C. Verma, Mathews Thomas, Utpal Mangla, Gerald Coon
-
Patent number: 12340270Abstract: A computer-implemented method, according to one approach, includes: receiving, from a remote location, a request to generate a unique equipment code identifying a device. Identifying characteristics of the device are determined, and a unique equipment code is generated. The unique equipment code is generated by applying policy based rules summarized in one or more predetermined information dependency graphs while combining at least some of the determined identifying characteristics in a specific order. Moreover, the combined identifying characteristics are converted into a corresponding alphanumeric string. The unique equipment code is assigned to the device and the unique equipment code is also transmitted to the remote location.Type: GrantFiled: April 19, 2024Date of Patent: June 24, 2025Assignee: International Business Machines CorporationInventors: Satishkumar Sadagopan, Dinesh C. Verma, Gerald Coon, Mathews Thomas, Utpal Mangla, Pawan Raghunath Chowdhary
-
Publication number: 20250200735Abstract: Systems, apparatus, articles of manufacture, and methods to evaluate video quality based on trained neural networks are disclosed. An example apparatus disclosed herein obtains, using a trained neural network, target features corresponding to a target video, the target features based on one or more layers of the trained neural network. The example apparatus also obtains, using the trained neural network, reference features corresponding to a reference video, the reference features based on the one or more layers of the trained neural network, the reference video associated with the target video. The example apparatus further outputs a quality metric for the target video based on the target features, the reference features, and a set of weights. In some examples, the apparatus optionally outputs an error map for the target video.Type: ApplicationFiled: February 27, 2025Publication date: June 19, 2025Applicant: Intel CorporationInventors: Akshay Jindal, Nabil Sadaka, Manu Mathew Thomas, Anton Sochenov
-
Publication number: 20250179063Abstract: The present disclosure provides PROTAC compounds represented by Formula (A): D-L-DSM (A), or an enantiomer, a diastereoisomer, and/or a pharmaceutically acceptable salt of any one of the foregoing, wherein: DSM is a degradation signaling compound {e.g., an E3 ubiquitin ligase recruitment ligand, such as a CRBN ligand or a VHL ligand) covalently attached to a linker L; L is a linker that covalently attaches DSM to D; and D is a Bcl-xL inhibitor compound of Formula (I) or Formula (II) covalently attached to the linker L: (I); (II) wherein the definitions for the variables are described herein. Also provided are pharmaceutical compositions comprising the PROTAC compounds of the present disclosure and methods of use and methods of making thereof.Type: ApplicationFiled: February 1, 2022Publication date: June 5, 2025Applicants: Les Laboratoires Servier, Novartis AGInventors: András Herner, Piroska Markacz, Gang Liu, Katsumasa Nakajima, Tibor Novak, Georges-Alain Franzetti, Jérôme-Benoit Starck, Frédéric Colland, Patrice Desos, Attila Paczal, Bianka Szokol, Mátyás Pál Timari, Vilibald Kun, Matthew T. Burger, Joseph Anthony D'Alessio, Katherine Elizabeth Seiss, Ranny Mathew Thomas, Liang Zhao
-
Publication number: 20250096963Abstract: Provided are a computer program product, system, and method for managing radio-frequency spectrum in a network having a static cellular base station and a mobile cellular station servicing the radio-frequency spectrum. Information is maintained on physical resource blocks in the radio-frequency spectrum. Each physical resource block is defined for a frequency and timing advance from the static cellular base station. An assignment of the static cellular base station and the mobile cellular station are randomized, by timing advance and frequency, to provide cellular service to the physical resource blocks.Type: ApplicationFiled: September 18, 2023Publication date: March 20, 2025Inventors: Sagar Tayal, Saurabh Agrawal, Utpal Mangla, Dinesh C. Verma, Mathews Thomas
-
Patent number: 12231451Abstract: Embodiments related to using a foundational model for network packet traces. A technique includes receiving network traffic of a network and extracting features from the network traffic, the features having a function related to communications in the network. The technique includes generating tokens from the features, each of the features corresponding to a respective one of the tokens, training a machine learning model by inputting the tokens, the machine learning model being trained to output contextual embeddings for the tokens, and using the contextual embeddings to determine an anomaly in the network traffic.Type: GrantFiled: October 20, 2022Date of Patent: February 18, 2025Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mudhakar Srivatsa, Davis Wertheimer, Franck Vinh Le, Utpal Mangla, Satishkumar Sadagopan, Mathews Thomas, Dinesh C. Verma
-
Publication number: 20240403099Abstract: An embodiment for improved estimating of end-user performance of cloud-based services. The embodiment may collect, for a target cloud-based service, a first dataset including network level metrics, and a second dataset including end-user performance data from one or more monitoring services. The embodiment may combine the collected first dataset and second dataset to generate a curated training dataset. The embodiment may train a machine learning prediction model using the curated training dataset. The embodiment may predict and estimate, using the trained machine learning prediction model, the end-user performance of the target cloud-based service for any target end-user.Type: ApplicationFiled: May 31, 2023Publication date: December 5, 2024Inventors: Dinesh C. Verma, Mudhakar Srivatsa, Gerald Coon, SATISHKUMAR SADAGOPAN, Utpal Mangla, Mathews Thomas
-
Publication number: 20240404415Abstract: The present inventive concept provides for a method of unmanned machine synchronization using robotic sensing. The method includes generating at least one physical signal in the vicinity of at least one unmanned machine. The at least one generated physical signal is received by the at least one unmanned machine. At least one task is performed by the at least one unmanned machine based on the at least one received generated physical signal.Type: ApplicationFiled: June 1, 2023Publication date: December 5, 2024Inventors: Dinesh C. Verma, Utpal Mangla, Mathews Thomas, Gerald Coon, Mudhakar Srivatsa, Satishkumar Sadagopan
-
Publication number: 20240396798Abstract: A network usage plan is constructed using a network usage prediction model. The network usage plan comprises a first time and a first desired network configuration to be implemented at the first time. A network is configured according to the first desired network configuration for use at the first time. Responsive to determining, during a time period in which the network is configured according to the first network configuration, that a usage requirement has changed more than a threshold amount, the network is reconfigured according to a second network configuration meeting the changed usage requirement.Type: ApplicationFiled: September 23, 2022Publication date: November 28, 2024Applicant: International Business Machines CorporationInventors: Utpal Mangla, Shikhar Kwatra, Mathews Thomas, Juel Daniel Raju, Aaron K. Baughman
-
Patent number: 12120632Abstract: A computer-implemented method for grouping devices in a massive multiple-input and multiple-output (MIMO)-based cellular network, in accordance with one embodiment, includes determining movement states of end devices in a cell of the massive MIMO-based cellular network, estimating payload requirements of the end devices, and grouping the end devices in a group based on the determined movement states and the estimated payload requirements.Type: GrantFiled: October 18, 2022Date of Patent: October 15, 2024Assignee: International Business Machines CorporationInventors: Utpal Mangla, Saurabh Agrawal, Dinesh C. Verma, Mathews Thomas, Sagar Tayal
-
Publication number: 20240329726Abstract: A first computational device with a first visual display and a second computational device with a second visual display are maintained, wherein the first computational device is configured to read information displayed on the second visual display, and wherein the second computational device is configured to read information displayed on the first visual display. Byte streams are exchanged bidirectionally between the first computational device and the second computational device via the information displayed on the first visual display and the information displayed on the second visual display, wherein active radio transmission between the first computational device and the second computational device is avoided.Type: ApplicationFiled: March 29, 2023Publication date: October 3, 2024Inventors: Dinesh C. VERMA, MUDHAKAR SRIVATSA, Gerald COON, Utpal MANGLA, SATISHKUMAR SADAGOPAN, Mathews Thomas
-
Patent number: 12106082Abstract: A computer implemented method determines a placement of an application being added to a network. The method includes determining a logical-physical mapping for the application. Sub-graphs in the logical-physical mapping are identified. A stored application in a catalog of applications previously used in the network is located. The stored application includes one of the sub-graphs in the logical-physical mapping. An experiment is generated, performed by a computing device running a neural network model, using the sub-graphs. The experiment includes inducing a physical node mapping for the sub-graph. A cost function associated with a placement of the application being added to the network to one or more physical nodes in the induced physical node mapping is determined.Type: GrantFiled: May 20, 2021Date of Patent: October 1, 2024Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mudhakar Srivatsa, Dinesh C. Verma, Satish Sadagopan, Mathews Thomas, Utpal Mangla
-
Publication number: 20240320531Abstract: A computer-implemented method, according to one approach, includes receiving at least one set of qubits at a first client component, and using the at least one set of qubits to index a configuration dictionary to determine a first configuration. The configuration dictionary defines a plurality of different configurations. The method further includes causing the first client component to be configured according to the first configuration. A computer program product, according to another approach, includes a computer readable storage medium having program instructions embodied therewith. The program instructions are readable and/or executable by a first client component to cause the first client component to perform the foregoing method. A system, according to another approach, includes a processor, and logic integrated with the processor, executable by the processor, or integrated with and executable by the processor. The logic is configured to perform the foregoing method.Type: ApplicationFiled: March 24, 2023Publication date: September 26, 2024Inventors: Utpal Mangla, Paridhi Verma, Gerald Coon, Satishkumar Sadagopan, Mark B. Ritter, Mudhakar Srivatsa, Mathews Thomas, Dinesh C. Verma
-
Publication number: 20240323230Abstract: A method, computer program product and system are provided to provide control mechanisms in unidirectional data transfers. A processor connects to a secure device via a unidirectional connection. A processor sends a packet to the secure device via the unidirectional connection. A processor receives, from the secure device via a passive out-of-band channel, feedback regarding the transmission of the packet. A processor, in response to the feedback indicating that the packet was incorrectly received, resends the packet via the unidirectional connection with the secure device.Type: ApplicationFiled: March 24, 2023Publication date: September 26, 2024Inventors: Dinesh C. Verma, Mathews Thomas, SATISHKUMAR SADAGOPAN, Gerald Coon
-
Publication number: 20240322915Abstract: Embodiments are related to improving the bandwidth of classical networks using quantum networks. Sender equipment transfers quantum bits over a quantum communications network to receiver equipment, the quantum bits being used to obtain entry values in a shared dictionary. The sender equipment determines a solution for an optimization problem using the entry values, where data to be transferred over a telecommunications network is expressed by the optimization problem. The sender equipment transfers the solution over the telecommunications network to the receiver equipment, where an equivalence of the data is transferred to the receiver equipment in response to the receiver equipment using the solution, the optimization problem, and the entry values to obtain the data.Type: ApplicationFiled: March 20, 2023Publication date: September 26, 2024Inventors: Dinesh C. Verma, Gerald Coon, Satishkumar Sadagopan, Mudhakar Srivatsa, Mathews Thomas, Utpal Mangla, Paridhi Verma, Mark B. Ritter
-
Patent number: 12081385Abstract: A method for determining a correlation of one or more events occurring in a plurality of nodes of a network includes accessing, by a computing device, address information associated with each of the plurality of nodes on the network. The computing device can further access one or more event IDs associated with one or more events occurring on the plurality of nodes. The computing device can further create an association the one or more events occurring on the plurality of nodes with related events occurring on others of the plurality of nodes, the association including the address information.Type: GrantFiled: October 14, 2022Date of Patent: September 3, 2024Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mudhakar Srivatsa, Jonathan Ian Settle, Satishkumar Sadagopan, Mathews Thomas, Utpal Mangla
-
Publication number: 20240267388Abstract: A computer-implemented method, according to one embodiment, includes determining whether a predetermined sequence of knocks has been performed by a requesting node to other nodes of a network along existing paths between the requesting node and the other nodes. In response to a determination that the predetermined sequence of knocks has been performed, a connection is established between the requesting node and a first of the other nodes. A computer program product, according to another embodiment, includes a computer readable storage medium having program instructions embodied therewith. The program instructions are readable and/or executable by a computer to cause the computer to perform the foregoing method. A system, according to another embodiment, includes a processor, and logic integrated with the processor, executable by the processor, or integrated with and executable by the processor. The logic is configured to perform the foregoing method.Type: ApplicationFiled: February 2, 2023Publication date: August 8, 2024Inventors: Mudhakar Srivatsa, Satishkumar Sadagopan, Mathews Thomas, Utpal Mangla, Gerald Coon, Dinesh C. Verma
-
Publication number: 20240231954Abstract: An approach for managing workload deployment in a distributed network, including edge computing is provided. The approach includes deploying several modules, such as, EMM (energy management module), LDM (localized deployment manager) and EDM (edge deployment manager). These modules will be constantly monitoring and managing the energy consumption at the edge nodes under their purview and communicate with other modules to develop a holistic energy management system (e.g., energy policies, energy algorithms, energy plans, etc.) to ensure the most effective energy management of workload is implemented.Type: ApplicationFiled: October 20, 2022Publication date: July 11, 2024Inventors: Mathews Thomas, Utpal Mangla, Sai Srinivas Gorti, Sharath Prasad Krishna Prasad, Venkatesh Ashok Rao Rao, Praveen Jayachandran, Eric Lee Gose, Juel Daniel Raju, Amandeep Singh
-
Publication number: 20240236124Abstract: Embodiments related to using a foundational model for network packet traces. A technique includes receiving network traffic of a network and extracting features from the network traffic, the features having a function related to communications in the network. The technique includes generating tokens from the features, each of the features corresponding to a respective one of the tokens, training a machine learning model by inputting the tokens, the machine learning model being trained to output contextual embeddings for the tokens, and using the contextual embeddings to determine an anomaly in the network traffic.Type: ApplicationFiled: October 20, 2022Publication date: July 11, 2024Inventors: MUDHAKAR SRIVATSA, Davis Wertheimer, Franck Vinh Le, Utpal Mangla, SATISHKUMAR SADAGOPAN, Mathews Thomas, Dinesh C. Verma