Patents by Inventor Petros Zerfos
Petros Zerfos has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8484246Abstract: A technique provides policy management within a policy-managed environment. A policy management agent retrieves a policy enforcement point (PEP) description from a PEP registry. The policy management agent utilizes the PEP description of the PEP to search a policy library to locate and determine matching (candidate) policies, and the matching policies match the policy description of the PEP. The managed environment, which incorporates policy evaluation, uses the equivalent policy matching criteria as the policy management agent.Type: GrantFiled: February 10, 2010Date of Patent: July 9, 2013Assignee: International Business Machines CorporationInventors: Seraphin B. Calo, Xiping Wang, David A. Wood, III, Petros Zerfos
-
Patent number: 8423646Abstract: A method, information processing system, and computer program product manage virtual machine migration. A virtual machine is selected from a set of virtual machines. Each physical machine in a plurality of physical machines is analyzed with respect to a first set of migration constraints associated with the virtual machine that has been selected. A set of physical machines in the plurality of physical machines that satisfy the first set of migration constraints is identified. A migration impact factor is determined for each physical machine in the set of physical machines that has been identified based on a second set of migration constraints associated with the virtual machine that has been selected. A physical machine is selected from the set of physical machines with at least a lowest migration impact factor on which to migrate the virtual machine that has been selected in response to determining the migration impact factor.Type: GrantFiled: July 9, 2010Date of Patent: April 16, 2013Assignee: International Business Machines CorporationInventors: Hani Jamjoom, Kang-Won Lee, Vlivek V. Shrivastava, Petros Zerfos
-
Publication number: 20130078961Abstract: A method and system for providing on-line services to a user from a services provider over a wireless cellular network. The cellular network is located between the user and the services provider, and a distributed computer system such as the Internet is located between the services provider and the cellular network for transmitting data between the services provide and the cellular network. In one embodiment, the services provider transmits software and operating characteristics over the distributed computer system to the cellular network, and the cellular network installs this software on one or more nodes of the network. When a user connects to the cellular network for services from the service provider, the network operates the software on the one or more nodes in accordance with the operating characteristics, to provide one or more services from this one or more nodes to the user from the service provider.Type: ApplicationFiled: September 22, 2011Publication date: March 28, 2013Applicant: International Business Machines CorporationInventors: Dakshi Agrawal, Chatschik Bisdikian, Dinesh C. Verma, Petros Zerfos
-
Publication number: 20130078965Abstract: A method and system for providing on-line services to a user from a services provider over a wireless cellular network. The cellular network is located between the user and the services provider, and a distributed computer system such as the Internet is located between the services provider and the cellular network for transmitting data between the services provide and the cellular network. In one embodiment, the services provider transmits software and operating characteristics over the distributed computer system to the cellular network, and the cellular network installs this software on one or more nodes of the network. When a user connects to the cellular network for services from the service provider, the network operates the software on the one or more nodes in accordance with the operating characteristics, to provide one or more services from this one or more nodes to the user from the service provider.Type: ApplicationFiled: September 7, 2012Publication date: March 28, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Dakshi Agrawal, Chatschik Bisdikian, Dinesh C. Verma, Petros Zerfos
-
Patent number: 8307414Abstract: A method for controlling Internet access of a mobile device by using a communication system having a number of access points includes the steps of performing a certificate-based authentication between an authentication access point and a mobile device seeking access to the Internet; transmitting a certificate from the mobile device to the authentication access point; verifying the certificate by the authentication access point; determining whether the authenticating mobile device's certificate has been revoked prior to the expiration of its lifetime; and granting the authenticating mobile device access to the Internet, if the certificate has been verified successfully and not revoked prior to the expiration of its lifetime.Type: GrantFiled: September 5, 2008Date of Patent: November 6, 2012Assignees: Deutsche Telekom AG, Board of Trustees of the University of IllinoisInventors: Petros Zerfos, Jatinder Pal Singh, Marcin Solarski, Pablo Vidales, Nathanael Thompson, Haiyun Luo
-
Publication number: 20120278476Abstract: Described herein are methods, systems, apparatuses and products for predictive placement of content through network analysis. An aspect provides for intercepting content upload data provided by one or more users indicating content at a network location; ascertaining one or more users predicted to access said content based on said one or more users providing said content upload data; and placing said content to one or more other network locations based on said one or more users predicted to access said content. Other embodiments are disclosed.Type: ApplicationFiled: April 29, 2011Publication date: November 1, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Dakshi Agrawal, Jorge Lobo, Vasileios Pappas, Petros Zerfos
-
Publication number: 20120246638Abstract: A mechanism is provided for reassigning virtual machines to resources in a computing environment. Monitoring data is collected about virtual machine request history and resource usage in a form of time series for measured indicators. Forecasted time series are computed for the measured indicators over a time window by utilizing time series forecasting. A new assignment is computed by executing a snapshot based assignment algorithm on the forecasted time series. The new assignment is used for reassignment of virtual machines on the resources in the computing environment.Type: ApplicationFiled: March 22, 2011Publication date: September 27, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ting He, Kang-won Lee, Petros Zerfos
-
Publication number: 20120011254Abstract: A method, information processing system, and computer program product manage virtual machine migration. A virtual machine is selected from a set of virtual machines. Each physical machine in a plurality of physical machines is analyzed with respect to a first set of migration constraints associated with the virtual machine that has been selected. A set of physical machines in the plurality of physical machines that satisfy the first set of migration constraints is identified. A migration impact factor is determined for each physical machine in the set of physical machines that has been identified based on a second set of migration constraints associated with the virtual machine that has been selected. A physical machine is selected from the set of physical machines with at least a lowest migration impact factor on which to migrate the virtual machine that has been selected in response to determining the migration impact factor.Type: ApplicationFiled: July 9, 2010Publication date: January 12, 2012Applicant: International Business Machines CorporationInventors: Hani JAMJOOM, Kang-Won Lee, Vivek V. Shrivastava, Petros Zerfos
-
Publication number: 20110292834Abstract: A network-centric modeling mechanism is provided for updating network models in order to mitigate network issues. The network-centric modeling mechanism determines for each component in a plurality of components whether a system parameter in a set of parameters particular to the component has deviated from a predicted system parameter value in a set of predicted system parameter values past a predetermined threshold. Responsive to the system parameter deviating from the predicted system parameter value past the predetermined threshold, the network-centric modeling mechanism generates an event stream indicating a sufficient deviation. The network-centric modeling mechanism determines whether the event stream matches a previous pattern.Type: ApplicationFiled: May 27, 2010Publication date: December 1, 2011Applicant: International Business Machines CorporationInventors: Dakshi Agrawal, Matthew E. Duggan, Kang-Won Lee, Mudhakar Srivatsa, Kristian J. Stewart, Petros Zerfos
-
Publication number: 20110196885Abstract: A method, device, and system are provided for policy management within a policy-managed environment. A policy management agent retrieves a policy enforcement point (PEP) description from a PEP registry. The policy management agent utilizes the PEP description of the PEP to search a policy library to locate and determine matching (candidate) policies, and the matching policies match the policy description of the PEP. The managed environment, which incorporates policy evaluation, uses the equivalent policy matching criteria as the policy management agent.Type: ApplicationFiled: February 10, 2010Publication date: August 11, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Seraphin B. Calo, Xiping Wang, David A. Wood, III, Petros Zerfos
-
Publication number: 20100332906Abstract: Methods and apparatus for managing quality of service of computing resources are presented. For example, a method implemented on a processor for managing quality of service of computing resources includes identifying, by the processor, one or more devices of a user on a network of the user; obtaining, by the processor, at least one management module for the identified one or more devices; installing the at least one management module in the processor; monitoring, by the processor, the one or more devices of the user for a problem; and determining, by the processor, a domain in which a root cause of the problem resides and, optionally, the root cause of the problem. The management module comprises information pertaining to a corresponding device. Further, the method may detect quality of service (QoS) problems and determine if the problems reside in a user domain or a service provider domain.Type: ApplicationFiled: June 30, 2009Publication date: December 30, 2010Applicant: International Business Machines CorporationInventors: Dakshi Agrawal, Joel Branch, Kang-won Lee, Petros Zerfos
-
Patent number: 7685112Abstract: A method and system for autonomously downloading and indexing Hidden Web pages from Websites includes the steps of selecting a query term and issuing a query to a site-specific search interface containing Hidden Web pages. A results index is then acquired and the Hidden Web pages are downloaded from the results index. A plurality of potential query terms are then identified from the downloaded Hidden Web pages. The efficiency of each potential query term is then estimated and a next query term is selected from the plurality of potential query terms, wherein the next selected query term has the greatest efficiency. The next selected query term is then issued to the site-specific search interface using the next query term. The process is repeated until all or most of the Hidden Web pages are discovered.Type: GrantFiled: May 27, 2005Date of Patent: March 23, 2010Assignee: The Regents of the University of CaliforniaInventors: Alexandros Ntoulas, Junghoo Cho, Petros Zerfos
-
Publication number: 20090187983Abstract: A method for controlling Internet access of a mobile device by using a communication system having a number of access points includes the steps of performing a certificate-based authentication between an authentication access point and a mobile device seeking access to the Internet; transmitting a certificate from the mobile device to the authentication access point; verifying the certificate by the authentication access point; determining whether the authenticating mobile device's certificate has been revoked prior to the expiration of its lifetime; and granting the authenticating mobile device access to the Internet, if the certificate has been verified successfully and not revoked prior to the expiration of its lifetime.Type: ApplicationFiled: September 5, 2008Publication date: July 23, 2009Applicants: Board of Trustees of the University of Illinois, Technische Universitaet BerlinInventors: Petros Zerfos, Jatinder Pal Singh, Marcin Solarski, Pablo Vidales, Nathanael Thompson, Haiyun Luo
-
Publication number: 20080097958Abstract: A method and system is provided for autonomously downloading and indexing Hidden Web pages from Websites having site-specific search interfaces. The method may be implemented using a crawler program or the like to autonomously cull Hidden Web content. The method includes the steps of selecting a query term and issuing a query to a site-specific search interface containing Hidden Web pages. A results index is then acquired and the Hidden Web pages are downloaded from the results index. A plurality of potential query terms are then identified from the downloaded Hidden Web pages. The efficiency of each potential query term is then estimated and a next query term is selected from the plurality of potential query terms, wherein the next selected query term has the greatest efficiency. The next selected query term is then issued to the site-specific search interface using the next query term. The process is repeated until all or most of the Hidden Web pages are discovered.Type: ApplicationFiled: May 27, 2005Publication date: April 24, 2008Applicant: THE REGENTS OF THE UNIVERSITY OF CALIFORNIAInventors: Alexandros Ntoulas, Junghoo Cho, Petros Zerfos
-
Publication number: 20070265803Abstract: A system and method for detecting a dishonest rater participating in a rating system is provided. Raters enter ratings regarding at least one entity which can be rated, and the ratings are stored. Individual values for the raters are calculated based on the ratings entered by the respective rater, and an indication value is determined based on the calculated individual values. The indication value is compared to a predetermined dishonesty threshold, and the rater is classified as dishonest based on the comparison result.Type: ApplicationFiled: May 10, 2007Publication date: November 15, 2007Applicant: DEUTSCHE TELEKOM AGInventors: Evangelos Kotsovinos, Petros Zerfos, Nischal Piratla
-
Publication number: 20050138077Abstract: A system of delivering personalized streaming content to a destination based on automatic detection of context. A thin stream gateway delivers content to all devices in range, where the range is intentionally limited. Bidirectional communication is established between a fixed and a mobile gateway. The mobile gateway deduces its location from the streams received by the fixed gateway. The mobile gateway provides personal information to the fixed gateway. Handoff between gateways is also supported. The gateways can also form a blanket, that can be used to support ad hoc communication.Type: ApplicationFiled: July 1, 2004Publication date: June 23, 2005Inventors: Panayiotis Michael, Michalis Faloutsos, Benjamin Greenstein, Fotios Konstantinidis, Michail Romesis, Petros Zerfos