Patents by Inventor Sahil Suneja

Sahil Suneja has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11947940
    Abstract: Techniques regarding augmenting one or more training datasets for training one or more AI models are provided. For example, one or more embodiments described herein can comprise a system, which can comprise a memory that can store computer executable components. The system can also comprise a processor, operably coupled to the memory, and that can execute the computer executable components stored in the memory. The computer executable components can comprise training augmentation component that can generate an augmented training dataset for training an artificial intelligence model by extracting a simplified source code sample from a source code sample comprised within a training dataset.
    Type: Grant
    Filed: October 11, 2021
    Date of Patent: April 2, 2024
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sahil Suneja, Yufan Zhuang, Yunhui Zheng, Alessandro Morari, Jim Alain Laredo
  • Patent number: 11659003
    Abstract: Systems, computer-implemented methods, and computer program products that facilitate container inspection components of a container-based virtualization environment are provided. According to an embodiment, a system can comprise a memory that stores computer executable components and a processor that executes the computer executable components stored in the memory. The computer executable components can comprise a container inspection control component that can define one or more constrained capabilities of a container inspection. The computer executable components can further comprise a container inspection component that can inspect a virtual container based on the one or more constrained capabilities.
    Type: Grant
    Filed: August 30, 2018
    Date of Patent: May 23, 2023
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sahil Suneja, Canturk Isci
  • Publication number: 20230130781
    Abstract: Techniques regarding AI model introspection are provided. For example, one or more embodiments described herein can comprise a system, which can comprise a memory that can store computer executable components. The system can also comprise a processor, operably coupled to the memory, and that can execute the computer executable components stored in the memory. The computer executable components can comprise model introspection component that can analyze artificial intelligence model learning behavior for a code understanding task by comparing an output of an artificial intelligence model with respect to a plurality of testing data subsets that have varying code complexity distributions.
    Type: Application
    Filed: October 21, 2021
    Publication date: April 27, 2023
    Inventors: Sahil Suneja, Yufan Zhuang, Yunhui Zheng, Alessandro Morari, Jim Alain Laredo
  • Publication number: 20230115723
    Abstract: Techniques regarding training one or more AI models for a source code understanding task are provided. For example, one or more embodiments described herein can comprise a system, which can comprise a memory that can store computer executable components. The system can also comprise a processor, operably coupled to the memory, and that can execute the computer executable components stored in the memory. The computer executable components can comprise a training component that can train an artificial intelligence model on source code samples for a source code understanding task. The source code samples can be ranked based on code complexity.
    Type: Application
    Filed: September 30, 2021
    Publication date: April 13, 2023
    Inventors: Sahil Suneja, Yufan Zhuang, Yunhui Zheng, Alessandro Morari, Jim Alain Laredo
  • Publication number: 20230113733
    Abstract: Techniques regarding augmenting one or more training datasets for training one or more AI models are provided. For example, one or more embodiments described herein can comprise a system, which can comprise a memory that can store computer executable components. The system can also comprise a processor, operably coupled to the memory, and that can execute the computer executable components stored in the memory. The computer executable components can comprise training augmentation component that can generate an augmented training dataset for training an artificial intelligence model by extracting a simplified source code sample from a source code sample comprised within a training dataset.
    Type: Application
    Filed: October 11, 2021
    Publication date: April 13, 2023
    Inventors: Sahil Suneja, Yufan Zhuang, Yunhui Zheng, Alessandro Morari, Jim Alain Laredo
  • Publication number: 20220358400
    Abstract: A system, computer program product, and method are provided for probing model signal awareness. An iterative process is employed to systematically isolate one or more relevant tokens of an input sequence to generate a reduced input sequence. The reduced input sequence is validated and presented to a trained artificial intelligence (AI) model and prediction output is generated. The reduction process is continued while the prediction output stays the same as that of the input sequence, and until a minimal sub-sequence is identified. A signal existence in the minimal sub-sequence is verified and signal awareness of the trained AI model is evaluated. The evaluation includes measuring the verified signal existence against an original signal from the input sentence.
    Type: Application
    Filed: May 10, 2021
    Publication date: November 10, 2022
    Applicant: International Business Machines Corporation
    Inventors: Yunhui Zheng, Sahil Suneja, Yufan Zhuang, Alessandro Morari, Jim Alain Laredo
  • Patent number: 11409880
    Abstract: Techniques facilitating security hardening systems that host containers are provided. In one example, a system comprises: a memory that stores computer executable components; and a processor that executes computer executable components stored in the memory. The computer executable components comprise: a boot component performs a portion of a trusted boot sequence to securely boot the system to a defined secure state wherein one or more types of administrative access to a container memory are deactivated. The computer executable components also comprise: a core service component started as a part of the trusted boot sequence and that securely obtains one or more decryption keys for use with the container memory; and a runtime decryption component that uses the one or more decryption keys to perform runtime decryption of one or more files accessed by a container associated with the container memory.
    Type: Grant
    Filed: July 11, 2019
    Date of Patent: August 9, 2022
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Hai Huang, Jia Jun Brandon Lum, Sahil Suneja, Ricardo Andrei Koller Jemio, Malgorzata Steinder
  • Patent number: 11281767
    Abstract: A sandbox component, operatively coupled to a host and a guest container, the sandbox component securely extends systems data collection software with potentially untrusted third-party code. A secure environment is enabled where plugins will run inside a sidecar container that is separate from a guest container. A container consists of an entire runtime environment: an application, plus its dependencies, libraries and other binaries, and configuration files needed to run it, bundled into one package. A sidecar service is not necessarily part of the application but is connected to the guest container and follows the parent application. A sidecar is independent from its primary application in terms of runtime environment and programming language. The sidecar plugin will be given a sparse/limited set of privileges required to simply perform its intended function and the Linux kernel constructs will control data access and transfer.
    Type: Grant
    Filed: March 23, 2018
    Date of Patent: March 22, 2022
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sahil Suneja, Shripad Nadgowda, Canturk Isci
  • Publication number: 20210012011
    Abstract: Techniques facilitating security hardening systems that host containers are provided. In one example, a system comprises: a memory that stores computer executable components; and a processor that executes computer executable components stored in the memory. The computer executable components comprise: a boot component performs a portion of a trusted boot sequence to securely boot the system to a defined secure state wherein one or more types of administrative access to a container memory are deactivated. The computer executable components also comprise: a core service component started as a part of the trusted boot sequence and that securely obtains one or more decryption keys for use with the container memory; and a runtime decryption component that uses the one or more decryption keys to perform runtime decryption of one or more files accessed by a container associated with the container memory.
    Type: Application
    Filed: July 11, 2019
    Publication date: January 14, 2021
    Inventors: Hai Huang, Jia Jun Brandon Lum, Sahil Suneja, Ricardo Andrei Koller Jemio, Malgorzata Steinder
  • Publication number: 20200076854
    Abstract: Systems, computer-implemented methods, and computer program products that facilitate container inspection components of a container-based virtualization environment are provided. According to an embodiment, a system can comprise a memory that stores computer executable components and a processor that executes the computer executable components stored in the memory. The computer executable components can comprise a container inspection control component that can define one or more constrained capabilities of a container inspection. The computer executable components can further comprise a container inspection component that can inspect a virtual container based on the one or more constrained capabilities.
    Type: Application
    Filed: August 30, 2018
    Publication date: March 5, 2020
    Inventors: Sahil Suneja, Canturk Isci
  • Patent number: 10530837
    Abstract: A mechanism is provided in a data processing system for monitoring a virtual machine in a distributed computing system. An out-of-virtual machine monitor receives, via an out-of-band path, disk and memory state data of the virtual machine exposed in a hypervisor hosting the virtual machine. The out-of-virtual machine monitor interprets logical information from the virtual machine disk and memory state data. The out-of-virtual machine monitor parses the logical information to extract related system or log information for a monitoring endpoint. The out-of-virtual machine monitor translates the system or log information to a standard format expected by the monitoring endpoint. The out-of-virtual machine monitor forwards a monitoring data stream to the monitoring endpoint.
    Type: Grant
    Filed: April 10, 2014
    Date of Patent: January 7, 2020
    Assignee: International Business Machines Corporation
    Inventors: Vasanth Bala, Canturk Isci, Todd W. Mummert, Sahil Suneja
  • Publication number: 20190294779
    Abstract: A sandbox component, operatively coupled to a host and a guest container, the sandbox component securely extends systems data collection software with potentially untrusted third-party code. A secure environment is enabled where plugins will run inside a sidecar container that is separate from a guest container. A container consists of an entire runtime environment: an application, plus its dependencies, libraries and other binaries, and configuration files needed to run it, bundled into one package. A sidecar service is not necessarily part of the application but is connected to the guest container and follows the parent application. A sidecar is independent from its primary application in terms of runtime environment and programming language. The sidecar plugin will be given a sparse/limited set of privileges required to simply perform its intended function and the Linux kernel constructs will control data access and transfer.
    Type: Application
    Filed: March 23, 2018
    Publication date: September 26, 2019
    Inventors: Sahil Suneja, Shripad Nadgowda, Canturk Isci
  • Patent number: 10397370
    Abstract: In an approach for determining optimal performance-related configurations of applications by analyzing peer data, a processor monitors instances of an application, wherein the instances of the application are running on a plurality of devices. A processor receives data related to: configuration parameters of the application, system parameters of the plurality of devices, and performance metrics of the plurality of devices. A processor determines correlation and dependencies between the configuration parameters with associated system parameters, using: an all pair analysis and a Pearson product-moment correlation coefficient (PPMCC). A processor determines dependencies between the configuration parameters with performance metrics. A processor recommends to a user, configuration settings of the application, based on the analysis of the data.
    Type: Grant
    Filed: September 11, 2017
    Date of Patent: August 27, 2019
    Assignee: International Business Machines Corporation
    Inventors: Byung Chul Tak, Salman A. Baset, Sahil Suneja, Canturk Isci
  • Publication number: 20190082033
    Abstract: In an approach for determining optimal performance-related configurations of applications by analyzing peer data, a processor monitors instances of an application, wherein the instances of the application are running on a plurality of devices. A processor receives data related to: configuration parameters of the application, system parameters of the plurality of devices, and performance metrics of the plurality of devices. A processor determines correlation and dependencies between the configuration parameters with associated system parameters, using: an all pair analysis and a Pearson product-moment correlation coefficient (PPMCC). A processor determines dependencies between the configuration parameters with performance metrics. A processor recommends to a user, configuration settings of the application, based on the analysis of the data.
    Type: Application
    Filed: September 11, 2017
    Publication date: March 14, 2019
    Inventors: Byung Chul Tak, Salman A. Baset, Sahil Suneja, Canturk Isci
  • Publication number: 20150295800
    Abstract: A mechanism is provided in a data processing system for monitoring a virtual machine in a distributed computing system. An out-of-virtual machine monitor receives, via an out-of-band path, disk and memory state data of the virtual machine exposed in a hypervisor hosting the virtual machine. The out-of-virtual machine monitor interprets logical information from the virtual machine disk and memory state data. The out-of-virtual machine monitor parses the logical information to extract related system or log information for a monitoring endpoint. The out-of-virtual machine monitor translates the system or log information to a standard format expected by the monitoring endpoint. The out-of-virtual machine monitor forwards a monitoring data stream to the monitoring endpoint.
    Type: Application
    Filed: April 10, 2014
    Publication date: October 15, 2015
    Applicant: International Business Machines Corporation
    Inventors: Vasanth Bala, Canturk Isci, Todd W. Mummert, Sahil Suneja
  • Patent number: 8843169
    Abstract: Described herein are various technologies pertaining to scheduling data transfer between a mobile computing device and a base station in a cellular network. A signal quality value for a signal over which data is to be transferred is computed, and transfer of data is scheduled based upon the signal quality value. If the signal quality value is above a threshold, a wireless radio of the mobile computing device is caused to commence data transfer or continue data transfer. If the signal quality value is below the threshold, and the data need not be immediately transferred, then the wireless radio is caused to transition to an idle state or remain in an idle state.
    Type: Grant
    Filed: August 6, 2012
    Date of Patent: September 23, 2014
    Assignee: Microsoft Corporation
    Inventors: Vishnu Navda, Ramachandran Ramjee, Sahil Suneja, Ananth Balashankar
  • Publication number: 20140038656
    Abstract: Described herein are various technologies pertaining to scheduling data transfer between a mobile computing device and a base station in a cellular network. A signal quality value for a signal over which data is to be transferred is computed, and transfer of data is scheduled based upon the signal quality value. If the signal quality value is above a threshold, a wireless radio of the mobile computing device is caused to commence data transfer or continue data transfer. If the signal quality value is below the threshold, and the data need not be immediately transferred, then the wireless radio is caused to transition to an idle state or remain in an idle state.
    Type: Application
    Filed: August 6, 2012
    Publication date: February 6, 2014
    Applicant: Microsoft Corporation
    Inventors: Vishnu Navda, Ramachandran Ramjee, Sahil Suneja, Ananth Balashankar