Patents by Inventor Matteo ROGANTE
Matteo ROGANTE has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11734701Abstract: An approach is provided that transmit a first set survey questions to a user with each of the first set questions corresponding to a primary survey goal. Survey answers are then received from the user. A cognitive system is then used to determining an affinity level between the user and the primary survey goal. If the affinity level reaches a threshold, then a second set of questions is transmitted to the user with these questions also corresponding to the primary survey goal. However, if the first affinity level fails to reach the threshold, then the second set of questions are based on a secondary survey goal and these questions are transmitted to the user.Type: GrantFiled: September 11, 2019Date of Patent: August 22, 2023Assignee: International Business Machines CorporationInventors: Matteo Rogante, Andrea Tortosa, Stefania Brigazzi, Francesco Triti
-
Patent number: 11449516Abstract: A solution is proposed for ranking documents belonging to two different domains. A corresponding method comprises generating a descriptor for each of the documents; the descriptor comprises corresponding values and confidence indexes of multiple properties (of the corresponding document); the documents of a domain are ranked with respect to a document of another domain according to a comparison of their descriptors. A computer program product for performing the method are also proposed. Moreover, a computing system for implementing the method is proposed.Type: GrantFiled: November 4, 2020Date of Patent: September 20, 2022Assignee: International Business Machines CorporationInventors: Francesco Marinucci, Aldo Bucossi, Lucia Santucci, Matteo Rogante, Luigi Alessandro Savorana
-
Patent number: 11388596Abstract: Aspects of the present invention disclose a method for encoding and transmitting access codes of a network to a computing device that is attempting to access the network. The method includes one or more processors identifying an audio command received by a first computing device. The method further includes generating a sound waveform that includes an access code of an access point, by encoding the access code into the sound waveform. The method further includes defining a sound power level of the sound waveform. The method further includes transmitting the sound waveform. The method further includes determining whether a second computing device receives the access code that is encoded in the sound waveform.Type: GrantFiled: September 3, 2019Date of Patent: July 12, 2022Assignee: International Business Machines CorporationInventors: Roberto Ragusa, Gianluca Gargaro, Matteo Rogante, Paolo Ottaviano
-
Publication number: 20220138208Abstract: A solution is proposed for ranking documents belonging to two different domains. A corresponding method comprises generating a descriptor for each of the documents; the descriptor comprises corresponding values and confidence indexes of multiple properties (of the corresponding document); the documents of a domain are ranked with respect to a document of another domain according to a comparison of their descriptors. A computer program product for performing the method are also proposed. Moreover, a computing system for implementing the method is proposed.Type: ApplicationFiled: November 4, 2020Publication date: May 5, 2022Inventors: Francesco Marinucci, Aldo Bucossi, Lucia Santucci, Matteo Rogante, Luigi Alessandro Savorana
-
Patent number: 11323263Abstract: A solution is proposed for sharing secret information for accessing a wireless computing network. A corresponding method for distributing the secret information by a source (computing) device comprises receiving a public key of the a target (computing) device, transmitting a verification token to the target device, receiving an utterance of the verification token and transmitting the secret information encrypted with the public key in response to the utterance of the verification token. A corresponding method for obtaining the secret information by a target (computing) device comprises transmitting a public key of the target device, receiving a verification token, outputting the verification token and receiving the secret information encrypted with the public key in response to an utterance of the verification token. Corresponding computer programs and computer program products are also proposed. Moreover, a source computing device and a target computing device for implementing the methods are proposed.Type: GrantFiled: May 7, 2020Date of Patent: May 3, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gianluca Gargaro, Matteo Rogante, Paolo Ottaviano, Roberto Ragusa
-
Publication number: 20220097958Abstract: In an aspect for waste management based on context conditions are provided, a method comprises receiving an indication of a waste item to be disposed by a person from a position thereof. One or more waste containers being suggested for disposing the waste item are selected according to the waste item, the position, filling indicators of the waste containers, and context conditions relating to the waste containers. A computer program product and computer system for performing the method are also proposed.Type: ApplicationFiled: September 28, 2020Publication date: March 31, 2022Inventors: Gianluca Gargaro, MATTEO ROGANTE, Stefania Errore, Maria Carmela Alesina
-
Patent number: 11205439Abstract: A method includes obtaining first audio data corresponding to speech occurring within a communication area. The first audio data is obtained from one or more interior locations inside the communication area. The method includes obtaining second audio data corresponding to the speech. The second audio data is obtained from one or more exterior locations outside of the communication area. The method includes calculating a first intelligibility based on the first audio data and calculating a second intelligibility based on the second audio data. The method includes comparing the first intelligibility to the second intelligibility, and determining, based on the comparing, that the second intelligibility exceeds a threshold. The method includes generating a set of countermeasures in response to the determining. The set of countermeasures includes at least one modification to a parameter of the speech. The method includes providing at least one countermeasure of the set of countermeasures.Type: GrantFiled: November 22, 2019Date of Patent: December 21, 2021Assignee: International Business Machines CorporationInventors: Gianluca Gargaro, Matteo Rogante, Angela Ghidoni, Sara Moggi
-
Patent number: 11185781Abstract: Optimization of user experience in an interactive environment is disclosed. User experience input is generated by a user during a session of interaction. A user perception on an interaction is determined based on analyzing the user experience input by use of a cognitive model of user perception. For a negative user perception, one or more difficulty of respective items in the interaction is adjusted to match a skill level of the user.Type: GrantFiled: January 30, 2020Date of Patent: November 30, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Andrea Tortosa, Nicola Milanese, Matteo Rogante
-
Publication number: 20210351930Abstract: A solution is proposed for sharing secret information for accessing a wireless computing network. A corresponding method for distributing the secret information by a source (computing) device comprises receiving a public key of the a target (computing) device, transmitting a verification token to the target device, receiving an utterance of the verification token and transmitting the secret information encrypted with the public key in response to the utterance of the verification token. A corresponding method for obtaining the secret information by a target (computing) device comprises transmitting a public key of the target device, receiving a verification token, outputting the verification token and receiving the secret information encrypted with the public key in response to an utterance of the verification token. Corresponding computer programs and computer program products are also proposed. Moreover, a source computing device and a target computing device for implementing the methods are proposed.Type: ApplicationFiled: May 7, 2020Publication date: November 11, 2021Inventors: Gianluca Gargaro, MATTEO ROGANTE, Paolo Ottaviano, Roberto Ragusa
-
Publication number: 20210158829Abstract: A method includes obtaining first audio data corresponding to speech occurring within a communication area. The first audio data is obtained from one or more interior locations inside the communication area. The method includes obtaining second audio data corresponding to the speech. The second audio data is obtained from one or more exterior locations outside of the communication area. The method includes calculating a first intelligibility based on the first audio data and calculating a second intelligibility based on the second audio data. The method includes comparing the first intelligibility to the second intelligibility, and determining, based on the comparing, that the second intelligibility exceeds a threshold. The method includes generating a set of countermeasures in response to the determining. The set of countermeasures includes at least one modification to a parameter of the speech. The method includes providing at least one countermeasure of the set of countermeasures.Type: ApplicationFiled: November 22, 2019Publication date: May 27, 2021Inventors: Gianluca Gargaro, MATTEO ROGANTE, ANGELA GHIDONI, Sara Moggi
-
Publication number: 20210073835Abstract: An approach is provided that transmit a first set survey questions to a user with each of the first set questions corresponding to a primary survey goal. Survey answers are then received from the user. A cognitive system is then used to determining an affinity level between the user and the primary survey goal. If the affinity level reaches a threshold, then a second set of questions is transmitted to the user with these questions also corresponding to the primary survey goal. However, if the first affinity level fails to reach the threshold, then the second set of questions are based on a secondary survey goal and these questions are transmitted to the user.Type: ApplicationFiled: September 11, 2019Publication date: March 11, 2021Inventors: Matteo Rogante, Andrea Tortosa, Stefania Brigazzi, Francesco Triti
-
Publication number: 20210067968Abstract: Aspects of the present invention disclose a method for encoding and transmitting access codes of a network to a computing device that is attempting to access the network. The method includes one or more processors identifying an audio command received by a first computing device. The method further includes generating a sound waveform that includes an access code of an access point, by encoding the access code into the sound waveform. The method further includes defining a sound power level of the sound waveform. The method further includes transmitting the sound waveform. The method further includes determining whether a second computing device receives the access code that is encoded in the sound waveform.Type: ApplicationFiled: September 3, 2019Publication date: March 4, 2021Inventors: Roberto Ragusa, Gianluca Gargaro, Matteo Rogante, Paolo Ottaviano
-
Publication number: 20200164275Abstract: Optimization of user experience in an interactive environment is disclosed. User experience input is generated by a user during a session of interaction. A user perception on an interaction is determined based on analyzing the user experience input by use of a cognitive model of user perception. For a negative user perception, one or more difficulty of respective items in the interaction is adjusted to match a skill level of the user.Type: ApplicationFiled: January 30, 2020Publication date: May 28, 2020Inventors: Andrea TORTOSA, Nicola MILANESE, Matteo ROGANTE
-
Patent number: 10632387Abstract: Optimization of user experience in an interactive environment is disclosed. User experience input is generated by a user during a session of interaction. A user perception on an interaction is determined based on analyzing the user experience input by use of a cognitive model of user perception. For a negative user perception, one or more difficulty of respective items in the interaction is adjusted to match a skill level of the user.Type: GrantFiled: November 15, 2017Date of Patent: April 28, 2020Assignee: International Business Machines CorporationInventors: Andrea Tortosa, Nicola Milanese, Matteo Rogante
-
Publication number: 20190143216Abstract: Optimization of user experience in an interactive environment is disclosed. User experience input is generated by a user during a session of interaction. A user perception on an interaction is determined based on analyzing the user experience input by use of a cognitive model of user perception. For a negative user perception, one or more difficulty of respective items in the interaction is adjusted to match a skill level of the user.Type: ApplicationFiled: November 15, 2017Publication date: May 16, 2019Inventors: Andrea TORTOSA, Nicola MILANESE, Matteo ROGANTE