Patents by Inventor Petros Zerfos

Petros Zerfos has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8484246
    Abstract: A technique provides policy management within a policy-managed environment. A policy management agent retrieves a policy enforcement point (PEP) description from a PEP registry. The policy management agent utilizes the PEP description of the PEP to search a policy library to locate and determine matching (candidate) policies, and the matching policies match the policy description of the PEP. The managed environment, which incorporates policy evaluation, uses the equivalent policy matching criteria as the policy management agent.
    Type: Grant
    Filed: February 10, 2010
    Date of Patent: July 9, 2013
    Assignee: International Business Machines Corporation
    Inventors: Seraphin B. Calo, Xiping Wang, David A. Wood, III, Petros Zerfos
  • Patent number: 8423646
    Abstract: A method, information processing system, and computer program product manage virtual machine migration. A virtual machine is selected from a set of virtual machines. Each physical machine in a plurality of physical machines is analyzed with respect to a first set of migration constraints associated with the virtual machine that has been selected. A set of physical machines in the plurality of physical machines that satisfy the first set of migration constraints is identified. A migration impact factor is determined for each physical machine in the set of physical machines that has been identified based on a second set of migration constraints associated with the virtual machine that has been selected. A physical machine is selected from the set of physical machines with at least a lowest migration impact factor on which to migrate the virtual machine that has been selected in response to determining the migration impact factor.
    Type: Grant
    Filed: July 9, 2010
    Date of Patent: April 16, 2013
    Assignee: International Business Machines Corporation
    Inventors: Hani Jamjoom, Kang-Won Lee, Vlivek V. Shrivastava, Petros Zerfos
  • Publication number: 20130078961
    Abstract: A method and system for providing on-line services to a user from a services provider over a wireless cellular network. The cellular network is located between the user and the services provider, and a distributed computer system such as the Internet is located between the services provider and the cellular network for transmitting data between the services provide and the cellular network. In one embodiment, the services provider transmits software and operating characteristics over the distributed computer system to the cellular network, and the cellular network installs this software on one or more nodes of the network. When a user connects to the cellular network for services from the service provider, the network operates the software on the one or more nodes in accordance with the operating characteristics, to provide one or more services from this one or more nodes to the user from the service provider.
    Type: Application
    Filed: September 22, 2011
    Publication date: March 28, 2013
    Applicant: International Business Machines Corporation
    Inventors: Dakshi Agrawal, Chatschik Bisdikian, Dinesh C. Verma, Petros Zerfos
  • Publication number: 20130078965
    Abstract: A method and system for providing on-line services to a user from a services provider over a wireless cellular network. The cellular network is located between the user and the services provider, and a distributed computer system such as the Internet is located between the services provider and the cellular network for transmitting data between the services provide and the cellular network. In one embodiment, the services provider transmits software and operating characteristics over the distributed computer system to the cellular network, and the cellular network installs this software on one or more nodes of the network. When a user connects to the cellular network for services from the service provider, the network operates the software on the one or more nodes in accordance with the operating characteristics, to provide one or more services from this one or more nodes to the user from the service provider.
    Type: Application
    Filed: September 7, 2012
    Publication date: March 28, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dakshi Agrawal, Chatschik Bisdikian, Dinesh C. Verma, Petros Zerfos
  • Patent number: 8307414
    Abstract: A method for controlling Internet access of a mobile device by using a communication system having a number of access points includes the steps of performing a certificate-based authentication between an authentication access point and a mobile device seeking access to the Internet; transmitting a certificate from the mobile device to the authentication access point; verifying the certificate by the authentication access point; determining whether the authenticating mobile device's certificate has been revoked prior to the expiration of its lifetime; and granting the authenticating mobile device access to the Internet, if the certificate has been verified successfully and not revoked prior to the expiration of its lifetime.
    Type: Grant
    Filed: September 5, 2008
    Date of Patent: November 6, 2012
    Assignees: Deutsche Telekom AG, Board of Trustees of the University of Illinois
    Inventors: Petros Zerfos, Jatinder Pal Singh, Marcin Solarski, Pablo Vidales, Nathanael Thompson, Haiyun Luo
  • Publication number: 20120278476
    Abstract: Described herein are methods, systems, apparatuses and products for predictive placement of content through network analysis. An aspect provides for intercepting content upload data provided by one or more users indicating content at a network location; ascertaining one or more users predicted to access said content based on said one or more users providing said content upload data; and placing said content to one or more other network locations based on said one or more users predicted to access said content. Other embodiments are disclosed.
    Type: Application
    Filed: April 29, 2011
    Publication date: November 1, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dakshi Agrawal, Jorge Lobo, Vasileios Pappas, Petros Zerfos
  • Publication number: 20120246638
    Abstract: A mechanism is provided for reassigning virtual machines to resources in a computing environment. Monitoring data is collected about virtual machine request history and resource usage in a form of time series for measured indicators. Forecasted time series are computed for the measured indicators over a time window by utilizing time series forecasting. A new assignment is computed by executing a snapshot based assignment algorithm on the forecasted time series. The new assignment is used for reassignment of virtual machines on the resources in the computing environment.
    Type: Application
    Filed: March 22, 2011
    Publication date: September 27, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ting He, Kang-won Lee, Petros Zerfos
  • Publication number: 20120011254
    Abstract: A method, information processing system, and computer program product manage virtual machine migration. A virtual machine is selected from a set of virtual machines. Each physical machine in a plurality of physical machines is analyzed with respect to a first set of migration constraints associated with the virtual machine that has been selected. A set of physical machines in the plurality of physical machines that satisfy the first set of migration constraints is identified. A migration impact factor is determined for each physical machine in the set of physical machines that has been identified based on a second set of migration constraints associated with the virtual machine that has been selected. A physical machine is selected from the set of physical machines with at least a lowest migration impact factor on which to migrate the virtual machine that has been selected in response to determining the migration impact factor.
    Type: Application
    Filed: July 9, 2010
    Publication date: January 12, 2012
    Applicant: International Business Machines Corporation
    Inventors: Hani JAMJOOM, Kang-Won Lee, Vivek V. Shrivastava, Petros Zerfos
  • Publication number: 20110292834
    Abstract: A network-centric modeling mechanism is provided for updating network models in order to mitigate network issues. The network-centric modeling mechanism determines for each component in a plurality of components whether a system parameter in a set of parameters particular to the component has deviated from a predicted system parameter value in a set of predicted system parameter values past a predetermined threshold. Responsive to the system parameter deviating from the predicted system parameter value past the predetermined threshold, the network-centric modeling mechanism generates an event stream indicating a sufficient deviation. The network-centric modeling mechanism determines whether the event stream matches a previous pattern.
    Type: Application
    Filed: May 27, 2010
    Publication date: December 1, 2011
    Applicant: International Business Machines Corporation
    Inventors: Dakshi Agrawal, Matthew E. Duggan, Kang-Won Lee, Mudhakar Srivatsa, Kristian J. Stewart, Petros Zerfos
  • Publication number: 20110196885
    Abstract: A method, device, and system are provided for policy management within a policy-managed environment. A policy management agent retrieves a policy enforcement point (PEP) description from a PEP registry. The policy management agent utilizes the PEP description of the PEP to search a policy library to locate and determine matching (candidate) policies, and the matching policies match the policy description of the PEP. The managed environment, which incorporates policy evaluation, uses the equivalent policy matching criteria as the policy management agent.
    Type: Application
    Filed: February 10, 2010
    Publication date: August 11, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Seraphin B. Calo, Xiping Wang, David A. Wood, III, Petros Zerfos
  • Publication number: 20100332906
    Abstract: Methods and apparatus for managing quality of service of computing resources are presented. For example, a method implemented on a processor for managing quality of service of computing resources includes identifying, by the processor, one or more devices of a user on a network of the user; obtaining, by the processor, at least one management module for the identified one or more devices; installing the at least one management module in the processor; monitoring, by the processor, the one or more devices of the user for a problem; and determining, by the processor, a domain in which a root cause of the problem resides and, optionally, the root cause of the problem. The management module comprises information pertaining to a corresponding device. Further, the method may detect quality of service (QoS) problems and determine if the problems reside in a user domain or a service provider domain.
    Type: Application
    Filed: June 30, 2009
    Publication date: December 30, 2010
    Applicant: International Business Machines Corporation
    Inventors: Dakshi Agrawal, Joel Branch, Kang-won Lee, Petros Zerfos
  • Patent number: 7685112
    Abstract: A method and system for autonomously downloading and indexing Hidden Web pages from Websites includes the steps of selecting a query term and issuing a query to a site-specific search interface containing Hidden Web pages. A results index is then acquired and the Hidden Web pages are downloaded from the results index. A plurality of potential query terms are then identified from the downloaded Hidden Web pages. The efficiency of each potential query term is then estimated and a next query term is selected from the plurality of potential query terms, wherein the next selected query term has the greatest efficiency. The next selected query term is then issued to the site-specific search interface using the next query term. The process is repeated until all or most of the Hidden Web pages are discovered.
    Type: Grant
    Filed: May 27, 2005
    Date of Patent: March 23, 2010
    Assignee: The Regents of the University of California
    Inventors: Alexandros Ntoulas, Junghoo Cho, Petros Zerfos
  • Publication number: 20090187983
    Abstract: A method for controlling Internet access of a mobile device by using a communication system having a number of access points includes the steps of performing a certificate-based authentication between an authentication access point and a mobile device seeking access to the Internet; transmitting a certificate from the mobile device to the authentication access point; verifying the certificate by the authentication access point; determining whether the authenticating mobile device's certificate has been revoked prior to the expiration of its lifetime; and granting the authenticating mobile device access to the Internet, if the certificate has been verified successfully and not revoked prior to the expiration of its lifetime.
    Type: Application
    Filed: September 5, 2008
    Publication date: July 23, 2009
    Applicants: Board of Trustees of the University of Illinois, Technische Universitaet Berlin
    Inventors: Petros Zerfos, Jatinder Pal Singh, Marcin Solarski, Pablo Vidales, Nathanael Thompson, Haiyun Luo
  • Publication number: 20080097958
    Abstract: A method and system is provided for autonomously downloading and indexing Hidden Web pages from Websites having site-specific search interfaces. The method may be implemented using a crawler program or the like to autonomously cull Hidden Web content. The method includes the steps of selecting a query term and issuing a query to a site-specific search interface containing Hidden Web pages. A results index is then acquired and the Hidden Web pages are downloaded from the results index. A plurality of potential query terms are then identified from the downloaded Hidden Web pages. The efficiency of each potential query term is then estimated and a next query term is selected from the plurality of potential query terms, wherein the next selected query term has the greatest efficiency. The next selected query term is then issued to the site-specific search interface using the next query term. The process is repeated until all or most of the Hidden Web pages are discovered.
    Type: Application
    Filed: May 27, 2005
    Publication date: April 24, 2008
    Applicant: THE REGENTS OF THE UNIVERSITY OF CALIFORNIA
    Inventors: Alexandros Ntoulas, Junghoo Cho, Petros Zerfos
  • Publication number: 20070265803
    Abstract: A system and method for detecting a dishonest rater participating in a rating system is provided. Raters enter ratings regarding at least one entity which can be rated, and the ratings are stored. Individual values for the raters are calculated based on the ratings entered by the respective rater, and an indication value is determined based on the calculated individual values. The indication value is compared to a predetermined dishonesty threshold, and the rater is classified as dishonest based on the comparison result.
    Type: Application
    Filed: May 10, 2007
    Publication date: November 15, 2007
    Applicant: DEUTSCHE TELEKOM AG
    Inventors: Evangelos Kotsovinos, Petros Zerfos, Nischal Piratla
  • Publication number: 20050138077
    Abstract: A system of delivering personalized streaming content to a destination based on automatic detection of context. A thin stream gateway delivers content to all devices in range, where the range is intentionally limited. Bidirectional communication is established between a fixed and a mobile gateway. The mobile gateway deduces its location from the streams received by the fixed gateway. The mobile gateway provides personal information to the fixed gateway. Handoff between gateways is also supported. The gateways can also form a blanket, that can be used to support ad hoc communication.
    Type: Application
    Filed: July 1, 2004
    Publication date: June 23, 2005
    Inventors: Panayiotis Michael, Michalis Faloutsos, Benjamin Greenstein, Fotios Konstantinidis, Michail Romesis, Petros Zerfos