Patents by Inventor Seraphin B. Calo

Seraphin B. Calo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180359159
    Abstract: A computer-implemented method is provided for fault diagnostics and recovery of network service chains. The method includes discovering, by a processor, a network graph representative of components of the network service chains. The method further includes identifying, by the processor, intersecting ones of the components of the network service chains in the network graph. The method also includes repairing, by the processor, one or more of the components of at least one of the network service chains based on a component repair sequence that maintains service continuity of the network service chains and that is determined based on a commonality.
    Type: Application
    Filed: June 9, 2017
    Publication date: December 13, 2018
    Inventors: Seraphin B. Calo, Douglas M. Freimuth, Thai Franck Le, Christian Makaya, Erich Nahum
  • Patent number: 10121109
    Abstract: A domain description is received, by a processor, the domain description identifying a domain associated with a sensor input. The domain description is formatted according to a hierarchical naming structure. A training data set is selected from a plurality of training data sets based upon the received domain description and sensor input. A combination of a subset of classifiers for classifying the sensor input is selected from a set of classifiers based upon the selected training data set.
    Type: Grant
    Filed: April 7, 2017
    Date of Patent: November 6, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mandis S. Beigi, Seraphin B. Calo, Dinesh C. Verma, Shiqiang Wang, David A. Wood
  • Publication number: 20180293510
    Abstract: A domain description is received, by a processor, the domain description identifying a domain associated with a sensor input. The domain description is formatted according to a hierarchical naming structure. A training data set is selected from a plurality of training data sets based upon the received domain description and sensor input. A combination of a subset of classifiers for classifying the sensor input is selected from a set of classifiers based upon the selected training data set.
    Type: Application
    Filed: April 7, 2017
    Publication date: October 11, 2018
    Applicant: International Business Machines Corporation
    Inventors: Mandis S. Beigi, Seraphin B. Calo, Dinesh C. Verma, Shiqiang Wang, David A. Wood
  • Publication number: 20180241806
    Abstract: A method includes configuring worker services to operate in a stateless manner and providing support services that enable the worker services to operate in the stateless manner. The support services include (i) a management service for providing notifications of server removal and addition, (ii) a state maintenance service for maintaining state information in a central location, and (iii) a load balancer service for distributing requests among worker services. The method includes altering a number of servers allocated to at least one worker service, responsive to a notification from the management service. A private protocol is used between the worker services and toad balancer service (a) to send, from the worker services to the load balancer service, a respective pointer to the state information associated with the requests, and (b) to include the respective pointer in the requests when any of the requests are forwarded to any worker service.
    Type: Application
    Filed: February 22, 2017
    Publication date: August 23, 2018
    Inventors: Seraphin B. Calo, Douglas M. Freimuth, Franck V. Le, Erich M. Nahum, Maroun Touma, Dinesh C. Verma
  • Publication number: 20180241807
    Abstract: A method includes configuring worker services to operate in a stateless manner and providing support services that enable the worker services to operate in the stateless manner. The support services include (i) a management service for providing notifications of server removal and addition, (ii) a state maintenance service for maintaining state information in a central location, and (iii) a load balancer service for distributing requests among worker services. The method includes altering a number of servers allocated to at least one worker service, responsive to a notification from the management service. A private protocol is used between the worker services and load balancer service (a) to send, from the worker services to the load balancer service, a respective pointer to the state information associated with the requests, and (b) to include the respective pointer in the requests when any of the requests are forwarded to any worker service.
    Type: Application
    Filed: November 8, 2017
    Publication date: August 23, 2018
    Inventors: Seraphin B. Calo, Douglas M. Freimuth, Franck V. Le, Erich M. Nahum, Maroun Touma, Dinesh C. Verma
  • Publication number: 20180241803
    Abstract: A method is provided of using a set of servers to provide deferential services that have a pre-negotiated time for notice to release the servers. The method includes defining a virtual checkpoint frame interval that is constrained to a duration of up to half of the pre-negotiated time for notice to release the servers. The method includes collecting packets and transactions occurring during the interval that are processed by a current server. The method includes, responsive to an end of the interval, (i) writing, to a shared state database, a state of processing of the packets and transactions occurring during the interval, and (ii) releasing the packets and transactions occurring during the interval. The method includes copying the packets and transactions occurring during the interval, and the state, from the current server to another server for subsequent processing, responsive to an indication of an instance loss on the current server.
    Type: Application
    Filed: February 22, 2017
    Publication date: August 23, 2018
    Inventors: Seraphin B. Calo, Douglas M. Freimuth, Franck V. Le, Maroun Touma, Dinesh C. Verma
  • Publication number: 20180241804
    Abstract: A method is provided of using a set of servers to provide deferential services that have a pre-negotiated time for notice to release the servers. The method includes defining a virtual checkpoint frame interval that is constrained to a duration of up to half of the pre-negotiated time for notice to release the servers. The method includes collecting packets and transactions occurring during the interval that are processed by a current server. The method includes, responsive to an end of the interval, (i) writing, to a shared state database, a state of processing of the packets and transactions occurring during the interval, and (ii) releasing the packets and transactions occurring during the interval. The method includes copying the packets and transactions occurring during the interval, and the state, from the current server to another server for subsequent processing, responsive to an indication of an instance loss on the current server.
    Type: Application
    Filed: November 8, 2017
    Publication date: August 23, 2018
    Inventors: Seraphin B. Calo, Douglas M. Freimuth, Franck V. Le, Maroun Touma, Dinesh C. Verma
  • Publication number: 20180144151
    Abstract: Embodiments of the present invention may involve a method, system, and computer program product for controlling privacy in a face recognition application. A computer may receive an input including a face recognition query and a digital image of a face. The computer may identify a target user associated with a facial signature in a first database based at least in part on a statistical correlation between a detected facial signature and one or more facial signatures in the first database. The computer may extract a profile of the target user from a second database. The profile of the target user may include one or more privacy preferences. The computer may generate a customized profile of the target user. The customized profile may omit one or more elements of the profile of the target user based on the one or more privacy preferences and/or a current context.
    Type: Application
    Filed: January 22, 2018
    Publication date: May 24, 2018
    Inventors: SERAPHIN B. CALO, BONG JUN KO, KANG-WON LEE, THEODOROS SALONIDIS, DINESH C. VERMA
  • Patent number: 9934397
    Abstract: Embodiments of the present invention may involve a method, system, and computer program product for controlling privacy in a face recognition application. A computer may receive an input including a face recognition query and a digital image of a face. The computer may identify a target user associated with a facial signature in a first database based at least in part on a statistical correlation between a detected facial signature and one or more facial signatures in the first database. The computer may extract a profile of the target user from a second database. The profile of the target user may include one or more privacy preferences. The computer may generate a customized profile of the target user. The customized profile may omit one or more elements of the profile of the target user based on the one or more privacy preferences and/or a current context.
    Type: Grant
    Filed: December 15, 2015
    Date of Patent: April 3, 2018
    Assignee: International Business Machines Corporation
    Inventors: Seraphin B. Calo, Bong Jun Ko, Kang-Won Lee, Theodoros Salonidis, Dinesh C. Verma
  • Patent number: 9858404
    Abstract: Embodiments of the present invention may involve a method, system, and computer program product for controlling privacy in a face recognition application. A computer may receive an input including a face recognition query and a digital image of a face. The computer may identify a target user associated with a facial signature in a first database based at least in part on a statistical correlation between a detected facial signature and one or more facial signatures in the first database. The computer may extract a profile of the target user from a second database. The profile of the target user may include one or more privacy preferences. The computer may generate a customized profile of the target user. The customized profile may omit one or more elements of the profile of the target user based on the one or more privacy preferences and/or a current context.
    Type: Grant
    Filed: January 11, 2017
    Date of Patent: January 2, 2018
    Assignee: International Business Machines Corporation
    Inventors: Seraphin B. Calo, Bong Jun Ko, Kang-Won Lee, Theodoros Salonidis, Dinesh C. Verma
  • Publication number: 20170359406
    Abstract: Techniques for adaptive query targeting in a dynamic distributed computing environment are provided. In one aspect, a method for adaptive query targeting in a distributed computing system having two or more cooperating nodes is provided. The method includes the steps of: using a peer selection criteria to select one or more of the nodes as target peers for a query from a querying node; leasing the query to the target peers for a given length of time via a lease having a given lifetime; periodically refreshing the query during the lifetime of the lease by re-evaluating the peer selection criteria such that the query persists on one or more of the target peers for the lifetime of the lease; and having the query removed from the target peers when the lease expires.
    Type: Application
    Filed: June 8, 2016
    Publication date: December 14, 2017
    Inventors: Seraphin B. Calo, Geeth R. de Mel, Keith w. Grueneberg, Jorge J. Ortiz, Xiping Wang, David A. Wood, III
  • Patent number: 9813296
    Abstract: Methods and apparatus are provided for wireless network optimization. Wireless network traffic is optimized by receiving redirected traffic based on one or more configuration rules; and applying the redirected traffic to a protocol optimizer that optimizes the wireless network traffic based on one or more optimization rules. A management interface is optionally provided to manage the network optimization appliance. A process monitor is optionally provided to monitor one or more process threads to determine if the process threads have stalled. The process monitor can monitor other components and can be monitored by at least one other component.
    Type: Grant
    Filed: November 27, 2012
    Date of Patent: November 7, 2017
    Assignee: International Business Machines Corporation
    Inventors: Seraphin B. Calo, William Cornejo, Keith Grueneberg, Franck Le, Erich M. Nahum, Maroun Touma, Dinesh C. Verma, Ho Yin Starsky Wong
  • Patent number: 9813295
    Abstract: Methods and apparatus are provided for wireless network optimization. Wireless network traffic is optimized by receiving redirected traffic based on one or more configuration rules; and applying the redirected traffic to a protocol optimizer that optimizes the wireless network traffic based on one or more optimization rules. A management interface is optionally provided to manage the network optimization appliance. A process monitor is optionally provided to monitor one or more process threads to determine if the process threads have stalled. The process monitor can monitor other components and can be monitored by at least one other component.
    Type: Grant
    Filed: November 2, 2012
    Date of Patent: November 7, 2017
    Assignee: International Business Machines Corporation
    Inventors: Seraphin B. Calo, William Cornejo, Keith Grueneberg, Franck Le, Erich M. Nahum, Maroun Touma, Dinesh C. Verma, Ho Yin Starsky Wong
  • Patent number: 9806946
    Abstract: Traffic redirection methods include determining a quality-affective factor comprising a quality-affective factor in an existing connection between a client and a server in a network. The quality-affective factor is compared to a threshold to determine whether the connection would benefit from a network processing function. A router is reconfigured to exclude the middlebox from the connection, if the connection would not benefit from the network processing function and if the middlebox is already present in the connection, to cease operation of the middlebox on the connection. The router reconfiguration is delayed until the connection is idle.
    Type: Grant
    Filed: August 30, 2016
    Date of Patent: October 31, 2017
    Assignee: International Business Machines Corporation
    Inventors: Seraphin B. Calo, William Cornejo, Thai F. Le, Erich M. Nahum, Maroun Touma, Dinesh C. Verma
  • Patent number: 9781215
    Abstract: The present disclosure relates generally to the field of migration (e.g., seamless migration) of a network connection under mobility (e.g., host mobility). In various examples, migration (e.g., seamless migration) of a network connection under mobility (e.g., host mobility) may be implemented in the form of methods and/or algorithms.
    Type: Grant
    Filed: January 4, 2017
    Date of Patent: October 3, 2017
    Assignee: International Business Machines Corporation
    Inventors: Seraphin B. Calo, Raheleh B. Dilmaghani, Bong Jun Ko, Kang-Won Lee, Vasileios Pappas, Ramya Raghavendra, Yang Song, Dinesh C. Verma
  • Patent number: 9747430
    Abstract: Embodiments of the present invention may involve a method, system, and computer program product for controlling privacy in a face recognition application. A computer may receive an input including a face recognition query and a digital image of a face. The computer may identify a target user associated with a facial signature in a first database based at least in part on a statistical correlation between a detected facial signature and one or more facial signatures in the first database. The computer may extract a profile of the target user from a second database. The profile of the target user may include one or more privacy preferences. The computer may generate a customized profile of the target user. The customized profile may omit one or more elements of the profile of the target user based on the one or more privacy preferences and/or a current context.
    Type: Grant
    Filed: January 11, 2017
    Date of Patent: August 29, 2017
    Assignee: International Business Machines Corporation
    Inventors: Seraphin B. Calo, Bong Jun Ko, Kang-Won Lee, Theodoros Salonidis, Dinesh C. Verma
  • Patent number: 9705750
    Abstract: In one embodiment, a computer-implemented method includes receiving a network graph describing a network having two or more nodes. An application graph is received describing a data stream application. The application graph includes one or more vertices, each corresponding to an operator of the application and associated with a list of nodes. A first vertex of the application graph corresponds to a first operator and is associated with two or more nodes. The application graph is augmented, which includes replicating the first operator such that the augmented graph includes a copy of the first operator at each of the nodes associated with the first vertex. The application is deployed over the network based on the augmented graph, such that a copy of the first operator is deployed at each of the nodes associated with the first vertex. A route through the augmented graph is selected for a data stream.
    Type: Grant
    Filed: June 25, 2015
    Date of Patent: July 11, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Theodoros Salonidis, Abm Musa, Seraphin B. Calo, Murtaza Zafer
  • Patent number: 9705749
    Abstract: In one embodiment, a computer-implemented method includes receiving a network graph describing a network having two or more nodes. An application graph is received describing a data stream application. The application graph includes one or more vertices, each corresponding to an operator of the application and associated with a list of nodes. A first vertex of the application graph corresponds to a first operator and is associated with two or more nodes. The application graph is augmented, which includes replicating the first operator such that the augmented graph includes a copy of the first operator at each of the nodes associated with the first vertex. The application is deployed over the network based on the augmented graph, such that a copy of the first operator is deployed at each of the nodes associated with the first vertex. A route through the augmented graph is selected for a data stream.
    Type: Grant
    Filed: December 30, 2014
    Date of Patent: July 11, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Seraphin B. Calo, Abm Musa, Theodoros Salonidis, Murtaza Zafer
  • Publication number: 20170169205
    Abstract: Embodiments of the present invention may involve a method, system, and computer program product for controlling privacy in a face recognition application. A computer may receive an input including a face recognition query and a digital image of a face. The computer may identify a target user associated with a facial signature in a first database based at least in part on a statistical correlation between a detected facial signature and one or more facial signatures in the first database. The computer may extract a profile of the target user from a second database. The profile of the target user may include one or more privacy preferences. The computer may generate a customized profile of the target user. The customized profile may omit one or more elements of the profile of the target user based on the one or more privacy preferences and/or a current context.
    Type: Application
    Filed: January 11, 2017
    Publication date: June 15, 2017
    Inventors: SERAPHIN B. CALO, BONG JUN KO, KANG-WON LEE, THEODOROS SALONIDIS, DINESH C. VERMA
  • Publication number: 20170169237
    Abstract: Embodiments of the present invention may involve a method, system, and computer program product for controlling privacy in a face recognition application. A computer may receive an input including a face recognition query and a digital image of a face. The computer may identify a target user associated with a facial signature in a first database based at least in part on a statistical correlation between a detected facial signature and one or more facial signatures in the first database. The computer may extract a profile of the target user from a second database. The profile of the target user may include one or more privacy preferences. The computer may generate a customized profile of the target user. The customized profile may omit one or more elements of the profile of the target user based on the one or more privacy preferences and/or a current context.
    Type: Application
    Filed: December 15, 2015
    Publication date: June 15, 2017
    Inventors: SERAPHIN B. CALO, BONG JUN KO, KANG-WON LEE, THEODOROS SALONIDIS, DINESH C. VERMA