Patents by Inventor Mathews Thomas

Mathews Thomas has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240403099
    Abstract: An embodiment for improved estimating of end-user performance of cloud-based services. The embodiment may collect, for a target cloud-based service, a first dataset including network level metrics, and a second dataset including end-user performance data from one or more monitoring services. The embodiment may combine the collected first dataset and second dataset to generate a curated training dataset. The embodiment may train a machine learning prediction model using the curated training dataset. The embodiment may predict and estimate, using the trained machine learning prediction model, the end-user performance of the target cloud-based service for any target end-user.
    Type: Application
    Filed: May 31, 2023
    Publication date: December 5, 2024
    Inventors: Dinesh C. Verma, Mudhakar Srivatsa, Gerald Coon, SATISHKUMAR SADAGOPAN, Utpal Mangla, Mathews Thomas
  • Publication number: 20240404415
    Abstract: The present inventive concept provides for a method of unmanned machine synchronization using robotic sensing. The method includes generating at least one physical signal in the vicinity of at least one unmanned machine. The at least one generated physical signal is received by the at least one unmanned machine. At least one task is performed by the at least one unmanned machine based on the at least one received generated physical signal.
    Type: Application
    Filed: June 1, 2023
    Publication date: December 5, 2024
    Inventors: Dinesh C. Verma, Utpal Mangla, Mathews Thomas, Gerald Coon, Mudhakar Srivatsa, Satishkumar Sadagopan
  • Publication number: 20240396798
    Abstract: A network usage plan is constructed using a network usage prediction model. The network usage plan comprises a first time and a first desired network configuration to be implemented at the first time. A network is configured according to the first desired network configuration for use at the first time. Responsive to determining, during a time period in which the network is configured according to the first network configuration, that a usage requirement has changed more than a threshold amount, the network is reconfigured according to a second network configuration meeting the changed usage requirement.
    Type: Application
    Filed: September 23, 2022
    Publication date: November 28, 2024
    Applicant: International Business Machines Corporation
    Inventors: Utpal Mangla, Shikhar Kwatra, Mathews Thomas, Juel Daniel Raju, Aaron K. Baughman
  • Patent number: 12120632
    Abstract: A computer-implemented method for grouping devices in a massive multiple-input and multiple-output (MIMO)-based cellular network, in accordance with one embodiment, includes determining movement states of end devices in a cell of the massive MIMO-based cellular network, estimating payload requirements of the end devices, and grouping the end devices in a group based on the determined movement states and the estimated payload requirements.
    Type: Grant
    Filed: October 18, 2022
    Date of Patent: October 15, 2024
    Assignee: International Business Machines Corporation
    Inventors: Utpal Mangla, Saurabh Agrawal, Dinesh C. Verma, Mathews Thomas, Sagar Tayal
  • Publication number: 20240329726
    Abstract: A first computational device with a first visual display and a second computational device with a second visual display are maintained, wherein the first computational device is configured to read information displayed on the second visual display, and wherein the second computational device is configured to read information displayed on the first visual display. Byte streams are exchanged bidirectionally between the first computational device and the second computational device via the information displayed on the first visual display and the information displayed on the second visual display, wherein active radio transmission between the first computational device and the second computational device is avoided.
    Type: Application
    Filed: March 29, 2023
    Publication date: October 3, 2024
    Inventors: Dinesh C. VERMA, MUDHAKAR SRIVATSA, Gerald COON, Utpal MANGLA, SATISHKUMAR SADAGOPAN, Mathews Thomas
  • Patent number: 12106082
    Abstract: A computer implemented method determines a placement of an application being added to a network. The method includes determining a logical-physical mapping for the application. Sub-graphs in the logical-physical mapping are identified. A stored application in a catalog of applications previously used in the network is located. The stored application includes one of the sub-graphs in the logical-physical mapping. An experiment is generated, performed by a computing device running a neural network model, using the sub-graphs. The experiment includes inducing a physical node mapping for the sub-graph. A cost function associated with a placement of the application being added to the network to one or more physical nodes in the induced physical node mapping is determined.
    Type: Grant
    Filed: May 20, 2021
    Date of Patent: October 1, 2024
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mudhakar Srivatsa, Dinesh C. Verma, Satish Sadagopan, Mathews Thomas, Utpal Mangla
  • Publication number: 20240322915
    Abstract: Embodiments are related to improving the bandwidth of classical networks using quantum networks. Sender equipment transfers quantum bits over a quantum communications network to receiver equipment, the quantum bits being used to obtain entry values in a shared dictionary. The sender equipment determines a solution for an optimization problem using the entry values, where data to be transferred over a telecommunications network is expressed by the optimization problem. The sender equipment transfers the solution over the telecommunications network to the receiver equipment, where an equivalence of the data is transferred to the receiver equipment in response to the receiver equipment using the solution, the optimization problem, and the entry values to obtain the data.
    Type: Application
    Filed: March 20, 2023
    Publication date: September 26, 2024
    Inventors: Dinesh C. Verma, Gerald Coon, Satishkumar Sadagopan, Mudhakar Srivatsa, Mathews Thomas, Utpal Mangla, Paridhi Verma, Mark B. Ritter
  • Publication number: 20240320531
    Abstract: A computer-implemented method, according to one approach, includes receiving at least one set of qubits at a first client component, and using the at least one set of qubits to index a configuration dictionary to determine a first configuration. The configuration dictionary defines a plurality of different configurations. The method further includes causing the first client component to be configured according to the first configuration. A computer program product, according to another approach, includes a computer readable storage medium having program instructions embodied therewith. The program instructions are readable and/or executable by a first client component to cause the first client component to perform the foregoing method. A system, according to another approach, includes a processor, and logic integrated with the processor, executable by the processor, or integrated with and executable by the processor. The logic is configured to perform the foregoing method.
    Type: Application
    Filed: March 24, 2023
    Publication date: September 26, 2024
    Inventors: Utpal Mangla, Paridhi Verma, Gerald Coon, Satishkumar Sadagopan, Mark B. Ritter, Mudhakar Srivatsa, Mathews Thomas, Dinesh C. Verma
  • Publication number: 20240323230
    Abstract: A method, computer program product and system are provided to provide control mechanisms in unidirectional data transfers. A processor connects to a secure device via a unidirectional connection. A processor sends a packet to the secure device via the unidirectional connection. A processor receives, from the secure device via a passive out-of-band channel, feedback regarding the transmission of the packet. A processor, in response to the feedback indicating that the packet was incorrectly received, resends the packet via the unidirectional connection with the secure device.
    Type: Application
    Filed: March 24, 2023
    Publication date: September 26, 2024
    Inventors: Dinesh C. Verma, Mathews Thomas, SATISHKUMAR SADAGOPAN, Gerald Coon
  • Patent number: 12081385
    Abstract: A method for determining a correlation of one or more events occurring in a plurality of nodes of a network includes accessing, by a computing device, address information associated with each of the plurality of nodes on the network. The computing device can further access one or more event IDs associated with one or more events occurring on the plurality of nodes. The computing device can further create an association the one or more events occurring on the plurality of nodes with related events occurring on others of the plurality of nodes, the association including the address information.
    Type: Grant
    Filed: October 14, 2022
    Date of Patent: September 3, 2024
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mudhakar Srivatsa, Jonathan Ian Settle, Satishkumar Sadagopan, Mathews Thomas, Utpal Mangla
  • Publication number: 20240267388
    Abstract: A computer-implemented method, according to one embodiment, includes determining whether a predetermined sequence of knocks has been performed by a requesting node to other nodes of a network along existing paths between the requesting node and the other nodes. In response to a determination that the predetermined sequence of knocks has been performed, a connection is established between the requesting node and a first of the other nodes. A computer program product, according to another embodiment, includes a computer readable storage medium having program instructions embodied therewith. The program instructions are readable and/or executable by a computer to cause the computer to perform the foregoing method. A system, according to another embodiment, includes a processor, and logic integrated with the processor, executable by the processor, or integrated with and executable by the processor. The logic is configured to perform the foregoing method.
    Type: Application
    Filed: February 2, 2023
    Publication date: August 8, 2024
    Inventors: Mudhakar Srivatsa, Satishkumar Sadagopan, Mathews Thomas, Utpal Mangla, Gerald Coon, Dinesh C. Verma
  • Publication number: 20240231954
    Abstract: An approach for managing workload deployment in a distributed network, including edge computing is provided. The approach includes deploying several modules, such as, EMM (energy management module), LDM (localized deployment manager) and EDM (edge deployment manager). These modules will be constantly monitoring and managing the energy consumption at the edge nodes under their purview and communicate with other modules to develop a holistic energy management system (e.g., energy policies, energy algorithms, energy plans, etc.) to ensure the most effective energy management of workload is implemented.
    Type: Application
    Filed: October 20, 2022
    Publication date: July 11, 2024
    Inventors: Mathews Thomas, Utpal Mangla, Sai Srinivas Gorti, Sharath Prasad Krishna Prasad, Venkatesh Ashok Rao Rao, Praveen Jayachandran, Eric Lee Gose, Juel Daniel Raju, Amandeep Singh
  • Publication number: 20240236124
    Abstract: Embodiments related to using a foundational model for network packet traces. A technique includes receiving network traffic of a network and extracting features from the network traffic, the features having a function related to communications in the network. The technique includes generating tokens from the features, each of the features corresponding to a respective one of the tokens, training a machine learning model by inputting the tokens, the machine learning model being trained to output contextual embeddings for the tokens, and using the contextual embeddings to determine an anomaly in the network traffic.
    Type: Application
    Filed: October 20, 2022
    Publication date: July 11, 2024
    Inventors: MUDHAKAR SRIVATSA, Davis Wertheimer, Franck Vinh Le, Utpal Mangla, SATISHKUMAR SADAGOPAN, Mathews Thomas, Dinesh C. Verma
  • Publication number: 20240216513
    Abstract: Described herein are fatty acid-bifunctional degrader compounds, their various targets, their preparation, pharmaceutical compositions comprising them, and their use in the treatment of conditions, diseases, and disorders mediated by various target proteins.
    Type: Application
    Filed: March 10, 2022
    Publication date: July 4, 2024
    Inventors: Claire Adcock, Valerie Broennimann, Jiashun Cheng, Rohit Kumar Duvadie, Tanzina Fazal, Jinhai Gao, Fengfeng Guo, Robert Martin Grotzfeld, Christina Hebach, Gregory John Hollingworth, Darryl Brynley Jones, Alexei Karpov, Jialiang Li, Julien Lorber, Chester A. Metcalf, III, Walter Michael, Mark Gabriel Palermo, Scott Vaughan Plummer, James Harold Roache, Martin Sendzik, Ranny Mathew Thomas, Aimee Richardson Usera, Anna Vulpetti, Frederic Zecri, Liang Zhao, Thomas Zoller
  • Patent number: 12022496
    Abstract: A base station may receive uplink data identifying uplink performance indicators associated with user equipment connected to the base station, and may receive tuning factors associated with shared channel traffic received by the user equipment and quality of service requirements of the user equipment. The base station may determine a total score associated with utilizing a long duration physical uplink control channel (PUCCH) format for uplink control information based on the uplink data and the tuning factors. The base station may determine that the total score satisfies a threshold score and may switch to the long duration PUCCH format for the uplink control information based on the total score satisfying the threshold score. The base station may perform one or more actions based on switching to the long duration PUCCH format for the uplink control information.
    Type: Grant
    Filed: January 4, 2023
    Date of Patent: June 25, 2024
    Assignee: Verizon Patent and Licensing Inc.
    Inventors: Mathew Thomas, Sachin Vargantwar, Maulik Shah
  • Publication number: 20240202552
    Abstract: A computer-implemented method, according to one embodiment, includes determining a plurality of downstream task models of a foundation model, and arranging the downstream task models into a logical tree structure. Each node of the logical tree structure represents a sequence of layers of an associated one of the downstream task models. In response to a determination that a request for inferencing on a target model has resulted in a cache miss occurring, the logical tree structure is used to identify an inferencing server that satisfies at least a first predetermined prerequisite for fulfilling the inferencing request. The method further includes causing the identified inferencing server to fulfill the inferencing request. A computer program product, according to one embodiment, includes a computer readable storage medium having program instructions embodied therewith. The program instructions are readable and/or executable by a computer to cause the computer to perform the foregoing method.
    Type: Application
    Filed: December 16, 2022
    Publication date: June 20, 2024
    Inventors: Mudhakar Srivatsa, Satishkumar Sadagopan, Utpal Mangla, Dinesh C. Verma, Gerald Coon, Mathews Thomas
  • Publication number: 20240196391
    Abstract: A network device may receive, from a first user device, a first request for receiving a first service from a network, and may receive the first service from a first network slice and with first service attributes. The network device may provide the first service to the first user device with the first service attributes managed via control channels, and may receive, from a second user device, a second request for receiving a second service from the network. The network device may receive the second service from a second network slice with second service attributes, and may provide the second service to the second user device with the second service attributes via the control channels. The network device may modify, based on the first service attributes failing to satisfy a service attributes threshold, parameters for the control channels to prioritize the first user device over the second user device.
    Type: Application
    Filed: December 13, 2022
    Publication date: June 13, 2024
    Applicant: Verizon Patent and Licensing Inc.
    Inventors: Mathew THOMAS, Sachin VARGANTWAR, Chin CHIU
  • Publication number: 20240182464
    Abstract: The present disclosure provides PROTAC compounds represented by Formula (A): D-L-DSM (A), or an enantiomer, a diastereoisomer, and/or a pharmaceutically acceptable salt of any one of the foregoing, wherein: DSM is a degradation signaling compound {e.g., an E3 ubiquitin ligase recruitment ligand, such as a CRBN ligand or a VHL ligand) covalently attached to a linker L; L is a linker that covalently attaches DSM to D; and D is a Bcl-xL inhibitor compound of Formula (I) or Formula (II) covalently attached to the linker L: (I); (II) wherein the definitions for the variables are described herein. Also provided are pharmaceutical compositions comprising the PROTAC compounds of the present disclosure and methods of use and methods of making thereof.
    Type: Application
    Filed: February 1, 2022
    Publication date: June 6, 2024
    Inventors: András Herner, Piroska Markacz, Gang Liu, Katsumasa Nakajima, Tibor Novak, Georges-Alain Franzetti, Jérôme-Benoît Starck, Frédéric Colland, Patrice Desos, Attila Paczal, Bianka Szokol, Mátyás Pál Timari, Vilibald Kun, Matthew T. Burger, Joseph Anthony D'Alessio, Katherine Elizabeth Seiss, Rany Mathew Thomas, Liang Zhao
  • Publication number: 20240160782
    Abstract: The present disclosure describes systems and methods for efficient reporting of data which includes personally identifiable information (PII) and which is collected and processed by a security awareness system. The data may be stored in a data storage system. The data may include a time stamp and queries of an historical nature may be supported.
    Type: Application
    Filed: November 14, 2023
    Publication date: May 16, 2024
    Applicant: KnowBe4, Inc.
    Inventors: Sunil Mathew THOMAS, Peter John HAYWARD, Phillip Samuel ROSOCHACKI, Raymond SKINNER, Mark William PATTON
  • Publication number: 20240146693
    Abstract: A method, computer system, and a computer program product is provided for establishing a dynamically adaptive network firewall. A firewall model is established that identifies resources that can be used and a plurality of nodes that connect to one another to form a network. A set of external rules and policies are provided to each resource. The firewall implemented using the firewall model upon receiving of incoming data and upon traffic flow. The firewall expands or contracts the network by adding or removing resources according to work that needs to be performed. The work includes both tasks to be completed and efforts that has to be taken by the firewall to ensure security by preventing unauthorized access into the network.
    Type: Application
    Filed: October 28, 2022
    Publication date: May 2, 2024
    Inventors: SATISHKUMAR SADAGOPAN, MUDHAKAR SRIVATSA, Dinesh C. Verma, Mathews Thomas, Utpal Mangla, Gerald Coon