Patents by Inventor Samir NASSER

Samir NASSER has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9800476
    Abstract: In service level agreement enforcement, a segmentation module intercepts a request for a current runtime environment, extracts request data from the request, and passes request data to a risk assessment component. The risk assessment component finds a request history profile matching the request data, determines a request impact on runtime environment resources from the request history profile, and obtains the current state of the current runtime environment. The risk assessment module determines the risk to the service level agreement associated with the request or any other request currently executing if the request is serviced in the current runtime environment, based on the request impact and the current state of the current runtime environment, and outputs the risk assessment to the segmentation module. When the risk assessment indicates a risk, the segmentation module passes the request to an isolated runtime environment. Otherwise, the request is passed to the current runtime environment.
    Type: Grant
    Filed: February 9, 2015
    Date of Patent: October 24, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Peter C. Bahrs, Kyle G. Brown, Samir A. Nasser
  • Patent number: 9772926
    Abstract: A method and computer system for compiling, by a computing device, a list of hosting software classes included in the hosting software fix pack when a fix is available. An execution path of each application hosted on a hosting software may be recorded. The execution path may be stored in a data store for each application. It may be determined which operations of each application interact with the hosting software. The operations of each application used at runtime that interact with the hosting software may be stored, including storing invoked hosting software operations and classes used by the operations of each application. The invoked hosting software operations and classes may be compared with corresponding operations and classes provided in the list included in the hosting software fix pack. A list of each intersection of the comparison for each application impacted by the hosting software fix pack may be generated.
    Type: Grant
    Filed: August 20, 2015
    Date of Patent: September 26, 2017
    Assignee: International Business Machines Corporation
    Inventors: Kulvir S. Bhogal, Samir A. Nasser
  • Publication number: 20170147407
    Abstract: A method of predicting resource bottlenecks for an information technology system processing mixed workloads includes determining, through a processor, a probability that one or more of a plurality of requests will access one of a plurality of resources, determining, through the processor, a performance metric of the one of the plurality of requests, identifying, through the processor, a potential hot spot based on the performance metric, calculating, through the processor, a probability that each of the plurality of requests will concurrently execute on the one of the plurality of resources, and providing, through the processor, an alert predicting that a bottleneck could occur at the one of the plurality of resources.
    Type: Application
    Filed: November 24, 2015
    Publication date: May 25, 2017
    Inventor: Samir A. Nasser
  • Publication number: 20170149631
    Abstract: Disclosed herein is a method for predicting and avoiding request failures. The method includes receiving a request for access to at least one web service and analyzing the request to identify at least one probabilistic resource tree for handling the request. The method further includes detecting a problem preventing a usage of a resource in the at least one probabilistic resource tree. The problem causes the request to fail upon implementation of the request. Furthermore, the method includes performing an action to avoid the implementation of the request.
    Type: Application
    Filed: November 24, 2015
    Publication date: May 25, 2017
    Inventors: Kyle G. Brown, SAMIR A. NASSER
  • Publication number: 20170052875
    Abstract: A method, computer program product, and computer system for compiling, by a computing device, a list of hosting software classes included in the hosting software fix pack when a fix is available. An execution path of each application hosted on a hosting software may be recorded. The execution path may be stored in a data store for each application. It may be determined which operations of each application interact with the hosting software. The operations of each application used at runtime that interact with the hosting software may be stored, including storing invoked hosting software operations and classes used by the operations of each application. The invoked hosting software operations and classes used by the operations of each application may be compared with corresponding operations and classes provided in the list included in the hosting software fix pack. A list of each intersection of the comparison for each application impacted by the hosting software fix pack may be generated.
    Type: Application
    Filed: August 20, 2015
    Publication date: February 23, 2017
    Inventors: KULVIR S. BHOGAL, Samir A. Nasser
  • Publication number: 20160379130
    Abstract: In filtering requests to be forwarded to a runtime environment, a filtering apparatus intercepts a new runtime request for the runtime environment and determines execution paths that may be traversed by the runtime request when executed in the runtime environment. The filtering apparatus assigns a probability of traversal by the runtime request to each of the execution paths and identifies at least one given execution path that reference a stressed resource of the runtime environment. Based on the probabilities assigned to the at least one given execution path, the filtering apparatus determines whether or not to block the runtime request from being sent to the runtime environment. If the probability assigned to the at least one given execution path exceeds a configured threshold, the runtime request is blocked from being sent to the runtime environment. Otherwise, the runtime request is sent to the runtime environment.
    Type: Application
    Filed: June 29, 2015
    Publication date: December 29, 2016
    Inventors: Kyle G. BROWN, Samir A. NASSER
  • Publication number: 20160232193
    Abstract: In service level agreement enforcement, a segmentation module intercepts a request for a current runtime environment, extracts request data from the request, and passes request data to a risk assessment component. The risk assessment component finds a request history profile matching the request data, determines a request impact on runtime environment resources from the request history profile, and obtains the current state of the current runtime environment. The risk assessment module determines the risk to the service level agreement associated with the request or any other request currently executing if the request is serviced in the current runtime environment, based on the request impact and the current state of the current runtime environment, and outputs the risk assessment to the segmentation module. When the risk assessment indicates a risk, the segmentation module passes the request to an isolated runtime environment. Otherwise, the request is passed to the current runtime environment.
    Type: Application
    Filed: February 9, 2015
    Publication date: August 11, 2016
    Inventors: Peter C. BAHRS, Kyle G. BROWN, Samir A. NASSER
  • Patent number: 8411784
    Abstract: The multi-configuration adaptive layered steered space-time coded (LSSTC) wireless transmission system utilizes Layered Steered Space-Time Codes (LSSTC), a recently proposed multiple-input multiple-output (MIMO) system that combines the benefits of the vertical Bell Labs space-time (V-BLAST) scheme, space-time block codes (STBC) and beamforming. A multi-configuration transmission scheme based on LSSTC and V-BLAST systems uses threshold-based decision making to change the modulation type and the MIMO transmission scheme in order to optimize error performance.
    Type: Grant
    Filed: July 19, 2010
    Date of Patent: April 2, 2013
    Assignee: King Fahd University of Petroleum and Minerals
    Inventors: Ahmad Suhail Salim, Salam Adel Zummo, Samir Nasser Al-Ghadban
  • Patent number: 8219138
    Abstract: The optimal power allocation method for an LSSTC wireless transmission system utilizes Layered Steered Space-Time Codes (LSSTC), a recently proposed multiple-input multiple-output (MIMO) system that combines the benefits of vertical Bell Labs space-time (V-BLAST) scheme, space-time block codes (STBC), and beamforming. A new downlink scheme employs LSSTC with optimal power allocation based on the assumption that the user feeds the base station (BS) with the average signal-to-noise ratio (SNR) per V-BLAST layer through the uplink feedback channel. Such a system enhances the error performance by assigning power to the layers in an optimum manner.
    Type: Grant
    Filed: July 19, 2010
    Date of Patent: July 10, 2012
    Assignee: King Fahd University of Petroleum and Minerals
    Inventors: Salam Adel Zummo, Ahmad Suhail Salim, Samir Nasser Al-Ghadban
  • Publication number: 20120014418
    Abstract: The multi-configuration adaptive layered steered space-time coded (LSSTC) wireless transmission system utilizes Layered Steered Space-Time Codes (LSSTC), a recently proposed multiple-input multiple-output (MIMO) system that combines the benefits of the vertical Bell Labs space-time (V-BLAST) scheme, space-time block codes (STBC) and beamforming. A multi-configuration transmission scheme based on LSSTC and V-BLAST systems uses threshold-based decision making to change the modulation type and the MIMO transmission scheme in order to optimize error performance.
    Type: Application
    Filed: July 19, 2010
    Publication date: January 19, 2012
    Inventors: Ahmad Suhail Salim, Salam Adel Zummo, Samir Nasser Al-Ghadban
  • Publication number: 20120014462
    Abstract: The optimal power allocation method for an LSSTC wireless transmission system utilizes Layered Steered Space-Time Codes (LSSTC), a recently proposed multiple-input multiple-output (MIMO) system that combines the benefits of vertical Bell Labs space-time (V-BLAST) scheme, space-time block codes (STBC), and beamforming. A new downlink scheme employs LSSTC with optimal power allocation based on the assumption that the user feeds the base station (BS) with the average signal-to-noise ratio (SNR) per V-BLAST layer through the uplink feedback channel. Such a system enhances the error performance by assigning power to the layers in an optimum manner.
    Type: Application
    Filed: July 19, 2010
    Publication date: January 19, 2012
    Inventors: Salam Adel Zummo, Ahmad Suhail Salim, Samir Nasser Al-Ghadban