Patents by Inventor Ramendra Sahoo

Ramendra Sahoo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8352414
    Abstract: A system for discovering business processes from noisy activities logs from various activities performed during the execution of the process. Activities are observed from the noisy activity logs that may include text from manually entered activity logs, chat scripts, emails, voice transcripts, desktop captures, and tool logs, wherein the noisy activity logs are received from multiple person/tool actors with each of the actors performing one or more activities related to one/more business tasks. Extracting information from the noisy activity logs to capture activity based information, and then analyzing similar activities and finding possible paths in the similar activities. The results are used to build a process graph based on the similar activities and the possible paths in the similar activities.
    Type: Grant
    Filed: October 7, 2009
    Date of Patent: January 8, 2013
    Assignee: International Business Machines Corporation
    Inventors: Anuradha Bhamidipaty, Krishna Kummamuru, Shailabh Nagar, Ramendra Sahoo, Virendra K. Varshneya, Karthik Visweswariah
  • Publication number: 20070277058
    Abstract: The notion of controlling, using and monitoring remote resources in a distributed data processing system through the use of proxy resource managers and agents is extended to provide failover capability so that resource coverage is preserved and maintained even in the event of either temporary or longer duration node failure. Mechanisms are provided for consistent determination of resource status. Mechanisms are also provided which facilitate the joining of nodes to a group of nodes while still preserving remote resource operations. Additional mechanisms are also provided for the return of remote resource management to the control of a previously failed, but now recovered node, even if the failure had resulted in a node reset.
    Type: Application
    Filed: August 8, 2007
    Publication date: November 29, 2007
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Myung Bae, Ramendra Sahoo
  • Publication number: 20060242454
    Abstract: The notion of controlling, using and monitoring remote resources in a distributed data processing system through the use of proxy resource managers and agents is extended to provide failover capability so that resource coverage is preserved and maintained even in the event of either temporary or longer duration node failure. Mechanisms are provided for consistent determination of resource status. Mechanisms are also provided which facilitate the joining of nodes to a group of nodes while still preserving remote resource operations. Additional mechanisms are also provided for the return of remote resource management to the control of a previously failed, but now recovered node, even if the failure had resulted in a node reset.
    Type: Application
    Filed: July 11, 2006
    Publication date: October 26, 2006
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Myung Bae, Ramendra Sahoo
  • Publication number: 20060184939
    Abstract: In a multi node information processing system, a method for scheduling jobs, includes steps of: determining node-related performance parameters for a plurality of nodes; determining a ranking for each node based on the node related performance parameters for each node; and ordering each nodes by its ranking for job scheduling.
    Type: Application
    Filed: February 15, 2005
    Publication date: August 17, 2006
    Inventors: Ramendra Sahoo, Adam Oliner
  • Publication number: 20060168473
    Abstract: Briefly, according to the invention in an information processing system including a plurality of information processing nodes, a request for checkpointing by an application includes node health criteria (or parameters). The system has the authority to grant or deny the checkpointing request depending on the system health or availability. This scheme significantly improves not only the system performance, but also the application running time as the system. By skipping a checkpoint the application can use the same time to run the application instead of spending extra time for checkpointing.
    Type: Application
    Filed: January 25, 2005
    Publication date: July 27, 2006
    Inventors: Ramendra Sahoo, Adam Oliner
  • Publication number: 20050144532
    Abstract: An improved method and apparatus for time stamping events occurring on a large scale distributed network uses a local counter associated with each processor of the distributed network. Each counter resets at the same time globally so that all events are recorded with respect to a particular time. The counter is stopped when a critical event is detected. The events are masked or filtered in an online or offline fashion to eliminate non-critical events from triggering a collection by the system monitor or service/host processor. The masking can be done dynamically through the use of an event history logger. The central system may poll the remote processor periodically to receive the accurate counter value from the local counter and device control register. Remedial action can be taken when conditional probability calculations performed on the historical information indicate that a critical event is about to occur.
    Type: Application
    Filed: December 12, 2003
    Publication date: June 30, 2005
    Inventors: Marc Dombrowa, Dirk Hoenicke, Ramendra Sahoo, Krishnan Sugavanam
  • Publication number: 20050114739
    Abstract: A hybrid method of predicting the occurrence of future critical events in a computer cluster having a series of nodes records system performance parameters and the occurrence of past critical events. A data filter filters the logged to data to eliminate redundancies and decrease the data storage requirements of the system. Time-series models and rule based classification schemes are used to associate various system parameters with the past occurrence of critical events and predict the occurrence of future critical events. Ongoing processing jobs are migrated to nodes for which no critical events are predicted and future jobs are routed to more robust nodes.
    Type: Application
    Filed: November 24, 2003
    Publication date: May 26, 2005
    Inventors: Manish Gupta, Jose Moreira, Adam Oliner, Ramendra Sahoo