Patents by Inventor Sahil Suneja
Sahil Suneja has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11947940Abstract: Techniques regarding augmenting one or more training datasets for training one or more AI models are provided. For example, one or more embodiments described herein can comprise a system, which can comprise a memory that can store computer executable components. The system can also comprise a processor, operably coupled to the memory, and that can execute the computer executable components stored in the memory. The computer executable components can comprise training augmentation component that can generate an augmented training dataset for training an artificial intelligence model by extracting a simplified source code sample from a source code sample comprised within a training dataset.Type: GrantFiled: October 11, 2021Date of Patent: April 2, 2024Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sahil Suneja, Yufan Zhuang, Yunhui Zheng, Alessandro Morari, Jim Alain Laredo
-
Patent number: 11659003Abstract: Systems, computer-implemented methods, and computer program products that facilitate container inspection components of a container-based virtualization environment are provided. According to an embodiment, a system can comprise a memory that stores computer executable components and a processor that executes the computer executable components stored in the memory. The computer executable components can comprise a container inspection control component that can define one or more constrained capabilities of a container inspection. The computer executable components can further comprise a container inspection component that can inspect a virtual container based on the one or more constrained capabilities.Type: GrantFiled: August 30, 2018Date of Patent: May 23, 2023Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sahil Suneja, Canturk Isci
-
Publication number: 20230130781Abstract: Techniques regarding AI model introspection are provided. For example, one or more embodiments described herein can comprise a system, which can comprise a memory that can store computer executable components. The system can also comprise a processor, operably coupled to the memory, and that can execute the computer executable components stored in the memory. The computer executable components can comprise model introspection component that can analyze artificial intelligence model learning behavior for a code understanding task by comparing an output of an artificial intelligence model with respect to a plurality of testing data subsets that have varying code complexity distributions.Type: ApplicationFiled: October 21, 2021Publication date: April 27, 2023Inventors: Sahil Suneja, Yufan Zhuang, Yunhui Zheng, Alessandro Morari, Jim Alain Laredo
-
Publication number: 20230115723Abstract: Techniques regarding training one or more AI models for a source code understanding task are provided. For example, one or more embodiments described herein can comprise a system, which can comprise a memory that can store computer executable components. The system can also comprise a processor, operably coupled to the memory, and that can execute the computer executable components stored in the memory. The computer executable components can comprise a training component that can train an artificial intelligence model on source code samples for a source code understanding task. The source code samples can be ranked based on code complexity.Type: ApplicationFiled: September 30, 2021Publication date: April 13, 2023Inventors: Sahil Suneja, Yufan Zhuang, Yunhui Zheng, Alessandro Morari, Jim Alain Laredo
-
Publication number: 20230113733Abstract: Techniques regarding augmenting one or more training datasets for training one or more AI models are provided. For example, one or more embodiments described herein can comprise a system, which can comprise a memory that can store computer executable components. The system can also comprise a processor, operably coupled to the memory, and that can execute the computer executable components stored in the memory. The computer executable components can comprise training augmentation component that can generate an augmented training dataset for training an artificial intelligence model by extracting a simplified source code sample from a source code sample comprised within a training dataset.Type: ApplicationFiled: October 11, 2021Publication date: April 13, 2023Inventors: Sahil Suneja, Yufan Zhuang, Yunhui Zheng, Alessandro Morari, Jim Alain Laredo
-
Publication number: 20220358400Abstract: A system, computer program product, and method are provided for probing model signal awareness. An iterative process is employed to systematically isolate one or more relevant tokens of an input sequence to generate a reduced input sequence. The reduced input sequence is validated and presented to a trained artificial intelligence (AI) model and prediction output is generated. The reduction process is continued while the prediction output stays the same as that of the input sequence, and until a minimal sub-sequence is identified. A signal existence in the minimal sub-sequence is verified and signal awareness of the trained AI model is evaluated. The evaluation includes measuring the verified signal existence against an original signal from the input sentence.Type: ApplicationFiled: May 10, 2021Publication date: November 10, 2022Applicant: International Business Machines CorporationInventors: Yunhui Zheng, Sahil Suneja, Yufan Zhuang, Alessandro Morari, Jim Alain Laredo
-
Patent number: 11409880Abstract: Techniques facilitating security hardening systems that host containers are provided. In one example, a system comprises: a memory that stores computer executable components; and a processor that executes computer executable components stored in the memory. The computer executable components comprise: a boot component performs a portion of a trusted boot sequence to securely boot the system to a defined secure state wherein one or more types of administrative access to a container memory are deactivated. The computer executable components also comprise: a core service component started as a part of the trusted boot sequence and that securely obtains one or more decryption keys for use with the container memory; and a runtime decryption component that uses the one or more decryption keys to perform runtime decryption of one or more files accessed by a container associated with the container memory.Type: GrantFiled: July 11, 2019Date of Patent: August 9, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Hai Huang, Jia Jun Brandon Lum, Sahil Suneja, Ricardo Andrei Koller Jemio, Malgorzata Steinder
-
Patent number: 11281767Abstract: A sandbox component, operatively coupled to a host and a guest container, the sandbox component securely extends systems data collection software with potentially untrusted third-party code. A secure environment is enabled where plugins will run inside a sidecar container that is separate from a guest container. A container consists of an entire runtime environment: an application, plus its dependencies, libraries and other binaries, and configuration files needed to run it, bundled into one package. A sidecar service is not necessarily part of the application but is connected to the guest container and follows the parent application. A sidecar is independent from its primary application in terms of runtime environment and programming language. The sidecar plugin will be given a sparse/limited set of privileges required to simply perform its intended function and the Linux kernel constructs will control data access and transfer.Type: GrantFiled: March 23, 2018Date of Patent: March 22, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sahil Suneja, Shripad Nadgowda, Canturk Isci
-
Publication number: 20210012011Abstract: Techniques facilitating security hardening systems that host containers are provided. In one example, a system comprises: a memory that stores computer executable components; and a processor that executes computer executable components stored in the memory. The computer executable components comprise: a boot component performs a portion of a trusted boot sequence to securely boot the system to a defined secure state wherein one or more types of administrative access to a container memory are deactivated. The computer executable components also comprise: a core service component started as a part of the trusted boot sequence and that securely obtains one or more decryption keys for use with the container memory; and a runtime decryption component that uses the one or more decryption keys to perform runtime decryption of one or more files accessed by a container associated with the container memory.Type: ApplicationFiled: July 11, 2019Publication date: January 14, 2021Inventors: Hai Huang, Jia Jun Brandon Lum, Sahil Suneja, Ricardo Andrei Koller Jemio, Malgorzata Steinder
-
Publication number: 20200076854Abstract: Systems, computer-implemented methods, and computer program products that facilitate container inspection components of a container-based virtualization environment are provided. According to an embodiment, a system can comprise a memory that stores computer executable components and a processor that executes the computer executable components stored in the memory. The computer executable components can comprise a container inspection control component that can define one or more constrained capabilities of a container inspection. The computer executable components can further comprise a container inspection component that can inspect a virtual container based on the one or more constrained capabilities.Type: ApplicationFiled: August 30, 2018Publication date: March 5, 2020Inventors: Sahil Suneja, Canturk Isci
-
Patent number: 10530837Abstract: A mechanism is provided in a data processing system for monitoring a virtual machine in a distributed computing system. An out-of-virtual machine monitor receives, via an out-of-band path, disk and memory state data of the virtual machine exposed in a hypervisor hosting the virtual machine. The out-of-virtual machine monitor interprets logical information from the virtual machine disk and memory state data. The out-of-virtual machine monitor parses the logical information to extract related system or log information for a monitoring endpoint. The out-of-virtual machine monitor translates the system or log information to a standard format expected by the monitoring endpoint. The out-of-virtual machine monitor forwards a monitoring data stream to the monitoring endpoint.Type: GrantFiled: April 10, 2014Date of Patent: January 7, 2020Assignee: International Business Machines CorporationInventors: Vasanth Bala, Canturk Isci, Todd W. Mummert, Sahil Suneja
-
Publication number: 20190294779Abstract: A sandbox component, operatively coupled to a host and a guest container, the sandbox component securely extends systems data collection software with potentially untrusted third-party code. A secure environment is enabled where plugins will run inside a sidecar container that is separate from a guest container. A container consists of an entire runtime environment: an application, plus its dependencies, libraries and other binaries, and configuration files needed to run it, bundled into one package. A sidecar service is not necessarily part of the application but is connected to the guest container and follows the parent application. A sidecar is independent from its primary application in terms of runtime environment and programming language. The sidecar plugin will be given a sparse/limited set of privileges required to simply perform its intended function and the Linux kernel constructs will control data access and transfer.Type: ApplicationFiled: March 23, 2018Publication date: September 26, 2019Inventors: Sahil Suneja, Shripad Nadgowda, Canturk Isci
-
Patent number: 10397370Abstract: In an approach for determining optimal performance-related configurations of applications by analyzing peer data, a processor monitors instances of an application, wherein the instances of the application are running on a plurality of devices. A processor receives data related to: configuration parameters of the application, system parameters of the plurality of devices, and performance metrics of the plurality of devices. A processor determines correlation and dependencies between the configuration parameters with associated system parameters, using: an all pair analysis and a Pearson product-moment correlation coefficient (PPMCC). A processor determines dependencies between the configuration parameters with performance metrics. A processor recommends to a user, configuration settings of the application, based on the analysis of the data.Type: GrantFiled: September 11, 2017Date of Patent: August 27, 2019Assignee: International Business Machines CorporationInventors: Byung Chul Tak, Salman A. Baset, Sahil Suneja, Canturk Isci
-
Publication number: 20190082033Abstract: In an approach for determining optimal performance-related configurations of applications by analyzing peer data, a processor monitors instances of an application, wherein the instances of the application are running on a plurality of devices. A processor receives data related to: configuration parameters of the application, system parameters of the plurality of devices, and performance metrics of the plurality of devices. A processor determines correlation and dependencies between the configuration parameters with associated system parameters, using: an all pair analysis and a Pearson product-moment correlation coefficient (PPMCC). A processor determines dependencies between the configuration parameters with performance metrics. A processor recommends to a user, configuration settings of the application, based on the analysis of the data.Type: ApplicationFiled: September 11, 2017Publication date: March 14, 2019Inventors: Byung Chul Tak, Salman A. Baset, Sahil Suneja, Canturk Isci
-
Publication number: 20150295800Abstract: A mechanism is provided in a data processing system for monitoring a virtual machine in a distributed computing system. An out-of-virtual machine monitor receives, via an out-of-band path, disk and memory state data of the virtual machine exposed in a hypervisor hosting the virtual machine. The out-of-virtual machine monitor interprets logical information from the virtual machine disk and memory state data. The out-of-virtual machine monitor parses the logical information to extract related system or log information for a monitoring endpoint. The out-of-virtual machine monitor translates the system or log information to a standard format expected by the monitoring endpoint. The out-of-virtual machine monitor forwards a monitoring data stream to the monitoring endpoint.Type: ApplicationFiled: April 10, 2014Publication date: October 15, 2015Applicant: International Business Machines CorporationInventors: Vasanth Bala, Canturk Isci, Todd W. Mummert, Sahil Suneja
-
Patent number: 8843169Abstract: Described herein are various technologies pertaining to scheduling data transfer between a mobile computing device and a base station in a cellular network. A signal quality value for a signal over which data is to be transferred is computed, and transfer of data is scheduled based upon the signal quality value. If the signal quality value is above a threshold, a wireless radio of the mobile computing device is caused to commence data transfer or continue data transfer. If the signal quality value is below the threshold, and the data need not be immediately transferred, then the wireless radio is caused to transition to an idle state or remain in an idle state.Type: GrantFiled: August 6, 2012Date of Patent: September 23, 2014Assignee: Microsoft CorporationInventors: Vishnu Navda, Ramachandran Ramjee, Sahil Suneja, Ananth Balashankar
-
Publication number: 20140038656Abstract: Described herein are various technologies pertaining to scheduling data transfer between a mobile computing device and a base station in a cellular network. A signal quality value for a signal over which data is to be transferred is computed, and transfer of data is scheduled based upon the signal quality value. If the signal quality value is above a threshold, a wireless radio of the mobile computing device is caused to commence data transfer or continue data transfer. If the signal quality value is below the threshold, and the data need not be immediately transferred, then the wireless radio is caused to transition to an idle state or remain in an idle state.Type: ApplicationFiled: August 6, 2012Publication date: February 6, 2014Applicant: Microsoft CorporationInventors: Vishnu Navda, Ramachandran Ramjee, Sahil Suneja, Ananth Balashankar