Patents by Inventor Sameep Mehta

Sameep Mehta has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190188307
    Abstract: A method includes determining, by a controller, a portion of data that is selected by a user. The portion of data includes source data that is to be transformed by at least one shaping function. The method also includes generating, by the controller, a first output recommendation data that communicates at least one recommended shaping function to apply to the portion of data. The first output recommendation data is generated based on patterns of shaping functions that have been previously chosen. The patterns of shaping functions that have been previously chosen can be chosen by a plurality of system users. The method also includes determining whether to apply the at least one recommended shaping function to the portion of data. The method also includes applying the at least one recommended shaping function based on the determining.
    Type: Application
    Filed: December 15, 2017
    Publication date: June 20, 2019
    Inventors: Manish Bhide, Shabharesh Gudla, Sameep Mehta, Prishni Rateria, Samiulla Shaikh, Neelesh K. Shukla, Paul S. Taylor
  • Publication number: 20190190695
    Abstract: One embodiment provides a method, including: receiving, from a data owner, an input string of plaintext data comprising a plurality of characters for storage in a database of a third-party storage provider; arranging the plurality of characters of the input string as a half pyramid, wherein the half pyramid comprises a plurality of rows, each row comprising at least one more character than a preceding row; encrypting, using a secure encryption scheme and based upon a key, each row of the half pyramid independently from each other row of the half pyramid; and storing, in the database of the third-party storage provider, the encrypted rows of the half pyramid. Other aspects are claimed and described.
    Type: Application
    Filed: December 19, 2017
    Publication date: June 20, 2019
    Inventors: Akshar Kaul, Manish Kesarwani, Sameep Mehta, Prasad G. Naldurg, Gagandeep Singh
  • Publication number: 20190179689
    Abstract: Methods, systems and computer program products for root cause analysis using provenance data are provided herein. A computer-implemented method comprises computing a plurality of provenance paths for at least one of a plurality of data elements in a curation flow and a plurality of groups of data elements in the curation flow, analyzing the computed provenance paths to determine one or more errors in the curation flow, and outputting the one or more errors in the curation flow to at least one user. The analyzing comprises at least one of identifying which of the computed provenance paths are partial provenance paths, and identifying one or more output records associated with the curation flow, wherein the one or more output records comprise incorrectly curated data, and identifying the computed provenance paths that respectively correspond to the one or more output records comprising the incorrectly curated data.
    Type: Application
    Filed: December 12, 2017
    Publication date: June 13, 2019
    Inventors: Hima P. Karanan, Manish Kesarwani, Salil Joshi, Mohit Jain, Sameep Mehta
  • Publication number: 20190155956
    Abstract: Methods, systems and computer program products for association rule mining of an encrypted database are provided herein. A computer-implemented method includes receiving, at a first cloud computing environment, encrypted transaction data that are encrypted using an encryption scheme which provides additive homomorphism, wherein the transaction data comprise a plurality of combinations of two or more elements of a set of elements, receiving, at the first cloud computing environment, encrypted query data that are encrypted using the encryption scheme, wherein the query data comprise at least one of an element and a combination of two or more elements of the set of elements which are the subject of a query seeking a determination of whether at least one of the element and the combination of two or more elements is frequent, and computing addition of the encrypted query data with the encrypted transaction data.
    Type: Application
    Filed: November 21, 2017
    Publication date: May 23, 2019
    Inventors: Manish Kesarwani, Krishnasuri Narayanam, Sameep Mehta
  • Publication number: 20190155919
    Abstract: A processor-implemented method may generate one or more deduplication maps based on analyzing the data and one or more encryption keys. The method may perform deduplication of the data based on the one or more deduplication maps, where deduplication may convert the data into plain data blocks and deduplicated data blocks. The method may encrypt the plain data blocks and the deduplication data blocks and transfer the one or more deduplication maps, the encrypted plain data blocks, and the encrypted deduplicated data blocks to a server.
    Type: Application
    Filed: November 20, 2017
    Publication date: May 23, 2019
    Inventors: Akshar Kaul, Sameep Mehta, Krishnasuri Narayanam, Ramasuri Narayanam
  • Publication number: 20190158269
    Abstract: A processor may receive plaintext data. The plaintext data may correspond to a query. The processor may identify a granularity of the plaintext data. The processor may compress the plaintext data using a binary search tree. The binary search tree may compress the plaintext data based on the granularity of the plaintext data. The processor may encrypt the plaintext data by randomizing the order in which the binary search tree stores the compression of the plaintext data. The stored order of the binary search tree may act as a private key. The processor may process the query over an encrypted cumulative compressed database.
    Type: Application
    Filed: November 20, 2017
    Publication date: May 23, 2019
    Inventors: Manish Kesarwani, Akshar Kaul, Sameep Mehta, Hong Min
  • Publication number: 20190020475
    Abstract: Techniques facilitating autonomously rendering an encrypted data anonymous in a non-trusted environment are provided. In one example, a computer-implemented method can comprise generating, by a system operatively coupled to a processor, a plurality of clusters of encrypted data from an encrypted dataset using a machine learning algorithm. The computer-implemented method can also comprise modifying, by the system, the plurality of clusters based on a defined criterion that can facilitate anonymity of the encrypted data.
    Type: Application
    Filed: July 12, 2017
    Publication date: January 17, 2019
    Inventors: Spyridon Antonatos, Stefano Braghin, Akshar Kaul, Manish Kesarwani, Sameep Mehta
  • Publication number: 20190020477
    Abstract: Techniques facilitating autonomously rendering an encrypted data anonymous in a non-trusted environment are provided. In one example, a computer-implemented method can comprise generating, by a system operatively coupled to a processor, a plurality of clusters of encrypted data from an encrypted dataset using a machine learning algorithm. The computer-implemented method can also comprise modifying, by the system, the plurality of clusters based on a defined criterion that can facilitate anonymity of the encrypted data.
    Type: Application
    Filed: December 14, 2017
    Publication date: January 17, 2019
    Inventors: Spyridon Antonatos, Stefano Braghin, Akshar Kaul, Manish Kesarwani, Sameep Mehta
  • Patent number: 10176453
    Abstract: A method and associated systems for ensuring resilience of a business function manages resource availability for projects that perform mission-critical tasks for the business function. The method and systems create a model that reveals dependencies among types of resources needed by a project, such that the model describes how the unavailability of one instance of a resource propagates disruptions to other instances of the same type of resource. This model automatically identifies a resource type as being critical if a disruption of an instance of the resource type would render a project task infeasible, and if restoring that task would incur unacceptable cost. The model may also automatically identify a first resource type as being critical for a second resource type when disruption of the first resource type reduces the available capacity of the second resource type to an unacceptable level.
    Type: Grant
    Filed: January 3, 2018
    Date of Patent: January 8, 2019
    Assignee: International Business Machines Corporation
    Inventors: Sreyash D. Kenkre, Sameep Mehta, Krishnasuri Narayanam, Vinayaka D. Pandit
  • Patent number: 10168941
    Abstract: Methods, systems, and computer program products for historical state snapshot construction over temporally evolving data are provided herein. A computer-implemented method includes classifying each of multiple temporally evolving data entities into one of multiple categories based on one or more parameters; partitioning the multiple temporally evolving data entities into multiple partitions based at least on (i) said classifying and (ii) the update frequency of each of the multiple temporally evolving data entities; implementing multiple checkpoints at a distinct temporal interval for each of the multiple partitions; and creating a snapshot of the multiple temporally evolving data entities at a selected past point of time (i) based on said implementing and (ii) in response to a query pertaining to a historical state of one or more of the multiple temporally evolving data entities.
    Type: Grant
    Filed: February 19, 2016
    Date of Patent: January 1, 2019
    Assignee: International Business Machines Corporation
    Inventors: Srikanta B. Jagannath, Sriram Lakshminarasimhan, Sameep Mehta, Animesh Nandi, Narendran Sachindran
  • Patent number: 10171312
    Abstract: Embodiments of the invention provide systems, methods and computer program products for optimizing cloud service delivery within a cloud computing environment. A cloud service request (CSR) is received from a cloud customer in the cloud computing environment, the CSR comprising at least one parameter of one or more existing cloud services accessed by the cloud customer that are provided by one or more existing cloud service providers. At least one parameter of the CSR is monitored in a cloud service registry comprising a plurality of cloud services provided by a plurality of cloud service providers and one or more parameters corresponding to each cloud service of the plurality of cloud services. Based on the monitoring, a new cloud service provider is determined who may provide a better cloud service with respect to the at least one parameter in the CSR being monitored.
    Type: Grant
    Filed: December 24, 2014
    Date of Patent: January 1, 2019
    Assignee: International Business Machines Corporation
    Inventors: Kalapriya Kannan, Sameep Mehta
  • Publication number: 20180341516
    Abstract: One embodiment provides a method, comprising: receiving a plurality of jobs for processing, wherein each of the plurality of jobs comprises a plurality of tasks and wherein at least one of the plurality of jobs is dependent on another of the plurality of jobs; receiving task dependencies between tasks of the at least one of the plurality of jobs and tasks of the another of the plurality of jobs, wherein the task dependencies identify dependent tasks from the tasks of the at least one of the plurality of jobs and dependee tasks from the tasks of the another of the plurality of jobs; scheduling the processing of the dependent tasks as being based upon only the completed processing of the dependee tasks; and performing job processing of the dependent tasks after processing of the dependee tasks irrespective of the overall job processing status of the another of the plurality of jobs.
    Type: Application
    Filed: May 25, 2017
    Publication date: November 29, 2018
    Inventors: Himanshu Gupta, Nitin Gupta, Sameep Mehta
  • Publication number: 20180323978
    Abstract: Methods, systems, and computer program products for secure distance computations are provided herein.
    Type: Application
    Filed: May 8, 2017
    Publication date: November 8, 2018
    Inventors: Gagandeep Singh, Akshar Kaul, Manish Kesarwani, Prasad Naldurg, Sameep Mehta
  • Publication number: 20180129690
    Abstract: Methods, systems, and computer program products for schema-free in-graph indexing are provided herein. A computer-implemented method includes creating multiple indexes directed to data within a knowledge graph; correlating two or more of the created indexes, thereby generating one or more multi-dimensional indexes; determining, based on a received query, one or more traversal paths within the data of the knowledge graph and the generated multi-dimensional indexes, wherein the traversal paths facilitate processing of the query; and outputting a response to the query based on the determined traversal paths.
    Type: Application
    Filed: November 4, 2016
    Publication date: May 10, 2018
    Inventors: Srikanta B. Jagannath, Sriram Lakshminarasimhan, Sameep Mehta, Sumit Neelam
  • Publication number: 20180130014
    Abstract: A method and associated systems for ensuring resilience of a business function manages resource availability for projects that perform mission-critical tasks for the business function. The method and systems create a model that reveals dependencies among types of resources needed by a project, such that the model describes how the unavailability of one instance of a resource propagates disruptions to other instances of the same type of resource. This model automatically identifies a resource type as being critical if a disruption of an instance of the resource type would render a project task infeasible, and if restoring that task would incur unacceptable cost. The model may also automatically identify a first resource type as being critical for a second resource type when disruption of the first resource type reduces the available capacity of the second resource type to an unacceptable level.
    Type: Application
    Filed: January 3, 2018
    Publication date: May 10, 2018
    Inventors: Sreyash D. Kenkre, Sameep Mehta, Krishnasuri Narayanam, Vinayaka D. Pandit
  • Patent number: 9922305
    Abstract: A method and associated systems for automatically identifying critical resources in an organization. An organization creates a model of the dependencies between pairs of resource types, wherein that model describes how the organization's projects and services are affected when a resource type becomes unavailable. This model may include a system of directed graphs. This model may be used to automatically identify a resource type as critical if unacceptable cost is incurred by resuming projects and services rendered infeasible when the resource type is disrupted. The model may also be used to automatically identify a first resource type as critical for a second resource type when disruption of the first resource type forces the available capacity of the second resource type to fall below a threshold value.
    Type: Grant
    Filed: May 23, 2016
    Date of Patent: March 20, 2018
    Assignee: International Business Machines Corporation
    Inventors: Sreyash D. Kenkre, Sameep Mehta, Krishnasuri Narayanam, Vinayaka D. Pandit
  • Patent number: 9916296
    Abstract: Methods, systems, and computer program products for updating annotator collections using run traces are provided herein. A computer-implemented method includes generating one or more alternate versions of one or more document annotators selected from a set of multiple document annotators; executing, on one or more document data sets, (i) one or more document annotators from the set of multiple document annotators and (ii) the one or more alternate versions to generate log information for each document annotator in the set and each alternate version of the one or more alternate versions; and outputting an instruction to modify, based on the generated log information for each document annotator in the set and each alternate version, at least one document annotator from the set with at least one alternate version from the one or more alternate versions.
    Type: Grant
    Filed: September 24, 2015
    Date of Patent: March 13, 2018
    Assignee: International Business Machines Corporation
    Inventors: Sameep Mehta, Deepak S. Padmanabhan
  • Patent number: 9910921
    Abstract: Methods and arrangements for keyword refinement and enhancement. There is received an initial keyword list comprising one or more keywords. Information is harvested from one or more information feeds, and an item is ascertained from the harvested information. One or more keywords from the initial keyword list are associated with the item. One or more new keywords are developed based on the associating of one or more keywords from the initial keyword list with the item. Other variants and embodiments are broadly contemplated herein.
    Type: Grant
    Filed: February 28, 2013
    Date of Patent: March 6, 2018
    Assignee: International Business Machines Corporation
    Inventors: Raguhuram Krishnapuram, Sameep Mehta, Chawda Bhupesh Shyamsundar, L Venkata Subramaniam
  • Patent number: 9864634
    Abstract: A description of a resource associated with a service of an entity can be captured. The service can be associated with one or more resources, a constraint, and a demand. The resource can be associated with one or more characteristics including a utility, a limited availability, and a consumption rate. The entity can be an organization or a system. An initial allocation problem associated with the resource can be formulated as a two phase problem. The first phase can be an optimization problem and the second phase can be a restricted allocation problem. The initial allocation problem can be associated with reconfiguring a previously established allocation of a baseline scenario. The optimization problem can be solved optimally or approximately to establish a favorable allocation. The favorable allocation can minimizes the reconfiguration cost of the reconfiguring. The baseline scenario can be a normal operation of the service.
    Type: Grant
    Filed: February 6, 2012
    Date of Patent: January 9, 2018
    Assignee: International Business Machines Corporation
    Inventors: Sreyash D. Kenkre, Sameep Mehta, Krishnasuri Narayanam, Vinayaka D. Pandit, Soujanya Soni
  • Publication number: 20170293655
    Abstract: Methods, systems, and computer program products for assessing value of one or more data sets in the context of a set of applications are provided herein. A computer-implemented method includes selecting analytic applications of interest based on a characterization of data attributes of each of the available data sets; automatically determining an impact of each of the data attributes of each of the available data sets on an end value of each of the analytic applications of interest; automatically computing an amount of improvement to the end value of each of the analytic applications of interest based on inclusion of an additional data set; and automatically determining a value attributed to the additional data set based on a comparison of (i) the cost of adding the additional data set to the available data sets to (ii) the computed amount of improvement based on the inclusion of the additional data set.
    Type: Application
    Filed: April 11, 2016
    Publication date: October 12, 2017
    Inventors: Rema Ananthanarayanan, Kalapriya Kannan, Sameep Mehta