Patents by Inventor Seraphin B. Calo

Seraphin B. Calo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20170169206
    Abstract: Embodiments of the present invention may involve a method, system, and computer program product for controlling privacy in a face recognition application. A computer may receive an input including a face recognition query and a digital image of a face. The computer may identify a target user associated with a facial signature in a first database based at least in part on a statistical correlation between a detected facial signature and one or more facial signatures in the first database. The computer may extract a profile of the target user from a second database. The profile of the target user may include one or more privacy preferences. The computer may generate a customized profile of the target user. The customized profile may omit one or more elements of the profile of the target user based on the one or more privacy preferences and/or a current context.
    Type: Application
    Filed: January 11, 2017
    Publication date: June 15, 2017
    Inventors: SERAPHIN B. CALO, BONG JUN KO, KANG-WON LEE, THEODOROS SALONIDIS, DINESH C. VERMA
  • Patent number: 9667530
    Abstract: In at least one embodiment, a method and a system include a node potentially having information responsive to an information request distributed into, for example, a federated coalition network where the node receives at least one information request packet, conducts a search of information at the node to determine if requested information is present, when the requested information is present, then the node sends an acknowledgement to a requesting node, linear network codes the requested information into m packets where m is greater than or equal to k, which is the number of packets needed to be received by the requesting node to reconstruct the requested information, selects multiple paths between the node and the requesting node such that no third party will see more than k?1 different packets, and transmits the m packets distributed over the selected paths.
    Type: Grant
    Filed: May 6, 2013
    Date of Patent: May 30, 2017
    Assignee: International Business Machines Corporation
    Inventors: Thomas J. C. Berman, Seraphin B. Calo, Lu Su, David R. Vyvyan, Fan Ye
  • Publication number: 20170118296
    Abstract: The present disclosure relates generally to the field of migration (e.g., seamless migration) of a network connection under mobility (e.g., host mobility). In various examples, migration (e.g., seamless migration) of a network connection under mobility (e.g., host mobility) may be implemented in the form of methods and/or algorithms.
    Type: Application
    Filed: January 4, 2017
    Publication date: April 27, 2017
    Inventors: Seraphin B. Calo, Raheleh B. Dilmaghani, Bong Jun Ko, Kang-Won Lee, Vasileios Pappas, Ramya Raghavendra, Yang Song, Dinesh C. Verma
  • Patent number: 9614918
    Abstract: The present disclosure relates generally to the field of migration (e.g., seamless migration) of a network connection under mobility (e.g., host mobility). In various examples, migration (e.g., seamless migration) of a network connection under mobility (e.g., host mobility) may be implemented in the form of systems and/or algorithms.
    Type: Grant
    Filed: March 14, 2013
    Date of Patent: April 4, 2017
    Assignee: International Business Machines Corporation
    Inventors: Seraphin B. Calo, Raheleh B. Dilmaghani, Bong Jun Ko, Kang-Won Lee, Vasileios Pappas, Ramya Raghavendra, Yang Song, Dinesh C. Verma
  • Patent number: 9591085
    Abstract: The present disclosure relates generally to the field of migration (e.g., seamless migration) of a network connection under mobility (e.g., host mobility). In various examples, migration (e.g., seamless migration) of a network connection under mobility (e.g., host mobility) may be implemented in the form of methods and/or algorithms.
    Type: Grant
    Filed: August 22, 2013
    Date of Patent: March 7, 2017
    Assignee: International Business Machines Corporation
    Inventors: Seraphin B. Calo, Raheleh B. Dilmaghani, Bong Jun Ko, Kang-Won Lee, Vasileios Pappas, Ramya Raghavendra, Yang Song, Dinesh C. Verma
  • Patent number: 9560127
    Abstract: The present disclosure relates generally to the field of logical movement of data objects. In various examples, the logical movement of data objects may reduce or eliminate network hotspots (e.g., avoid formation of hotspots, remove existing hotspots and/or reduce the magnitude of hotspots). In various examples, the logical movement of data objects may be implemented in the form of systems, methods and/or algorithms.
    Type: Grant
    Filed: January 18, 2013
    Date of Patent: January 31, 2017
    Assignee: International Business Machines Corporation
    Inventors: Seraphin B. Calo, Raheleh B. Dilmaghani, Kang-Won Lee, Vasileios Pappas, Ramya Raghavendra, Dinesh C. Verma
  • Publication number: 20160373298
    Abstract: Traffic redirection methods include determining a quality-affective factor comprising a quality-affective factor in an existing connection between a client and a server in a network. The quality-affective factor is compared to a threshold to determine whether the connection would benefit from a network processing function. A router is reconfigured to exclude the middlebox from the connection, if the connection would not benefit from the network processing function and if the middlebox is already present in the connection, to cease operation of the middlebox on the connection. The router reconfiguration is delayed until the connection is idle.
    Type: Application
    Filed: August 30, 2016
    Publication date: December 22, 2016
    Inventors: SERAPHIN B. CALO, WILLIAM CORNEJO, THAI F. LE, ERICH M. NAHUM, MAROUN TOUMA, DINESH C. VERMA
  • Patent number: 9497202
    Abstract: Embodiments of the present invention may involve a method, system, and computer program product for controlling privacy in a face recognition application. A computer may receive an input including a face recognition query and a digital image of a face. The computer may identify a target user associated with a facial signature in a first database based at least in part on a statistical correlation between a detected facial signature and one or more facial signatures in the first database. The computer may extract a profile of the target user from a second database. The profile of the target user may include one or more privacy preferences. The computer may generate a customized profile of the target user. The customized profile may omit one or more elements of the profile of the target user based on the one or more privacy preferences and/or a current context.
    Type: Grant
    Filed: March 7, 2016
    Date of Patent: November 15, 2016
    Assignee: International Business Machines Corporation
    Inventors: Seraphin B. Calo, Bong Jun Ko, Kang-Won Lee, Theodoros Salonidis, Dinesh C. Verma
  • Publication number: 20160330087
    Abstract: A middlebox includes a network monitor module configured to determine a quality-affective factor in a connection between a client and a server in a network. A processor is configured to compare the quality-affective factor to a threshold to determine whether the connection would benefit from a network processing function. A network control module is configured to configure a router to exclude the middlebox from the connection if the connection would not benefit from the network processing function and if the middlebox is already present in the connection to cease operation of the middlebox on the connection. Router configuration is delayed until the connection is idle.
    Type: Application
    Filed: July 21, 2016
    Publication date: November 10, 2016
    Inventors: SERAPHIN B. CALO, WILLIAM CORNEJO, THAI F. LE, ERICH M. NAHUM, MAROUN TOUMA, DINESH C. VERMA
  • Patent number: 9450878
    Abstract: Traffic redirection methods include determining a quality-affective factor in a connection between a client and a server in a network; comparing the quality-affective factor to a threshold to determine whether the connection would benefit from a network processing function; reconfiguring the network to redirect the connection to or away from a middlebox that performs the network processing function in accordance with the determination of whether the connection would benefit from the network processing function.
    Type: Grant
    Filed: August 21, 2012
    Date of Patent: September 20, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Seraphin B. Calo, William Cornejo, Thai F. Le, Erich M. Nahum, Maroun Touma, Dinesh C. Verma
  • Patent number: 9426076
    Abstract: Dynamic middleboxes include a network monitor module configured to determine a quality-affective factor in a connection between a client and a server in a network; a processor configured to compare the quality-affective factor to a threshold to determine whether the connection would benefit from a network processing function; and a network control module configured to reconfigure the network to redirect the connection to a middlebox that performs the network processing function if the connection would benefit and further configured to reconfigure the network to exclude the middlebox from the connection if the connection would not benefit.
    Type: Grant
    Filed: September 11, 2012
    Date of Patent: August 23, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Seraphin B. Calo, William Cornejo, Thai F. Le, Erich M. Nahum, Maroun Touma, Dinesh C. Verma
  • Publication number: 20160234070
    Abstract: In one embodiment, a computer-implemented method includes receiving a network graph describing a network having two or more nodes. An application graph is received describing a data stream application. The application graph includes one or more vertices, each corresponding to an operator of the application and associated with a list of nodes. A first vertex of the application graph corresponds to a first operator and is associated with two or more nodes. The application graph is augmented, which includes replicating the first operator such that the augmented graph includes a copy of the first operator at each of the nodes associated with the first vertex. The application is deployed over the network based on the augmented graph, such that a copy of the first operator is deployed at each of the nodes associated with the first vertex. A route through the augmented graph is selected for a data stream.
    Type: Application
    Filed: December 30, 2014
    Publication date: August 11, 2016
    Inventors: Seraphin B. Calo, Abm Musa, Theodoros Salonidis, Murtaza Zafer
  • Patent number: 9374418
    Abstract: The present disclosure relates generally to the field of logical movement of data objects. In various examples, the logical movement of data objects may reduce or eliminate network hotspots (e.g., avoid formation of hotspots, remove existing hotspots and/or reduce the magnitude of hotspots). In various examples, the logical movement of data objects may be implemented in the form of systems, methods and/or algorithms.
    Type: Grant
    Filed: March 5, 2013
    Date of Patent: June 21, 2016
    Assignee: International Business Machines Corporation
    Inventors: Seraphin B. Calo, Raheleh B. Dilmaghani, Kang-Won Lee, Vasileios Pappas, Ramya Raghavendra, Dinesh C. Verma
  • Publication number: 20160156514
    Abstract: In one embodiment, a computer-implemented method includes receiving a network graph describing a network having two or more nodes. An application graph is received describing a data stream application. The application graph includes one or more vertices, each corresponding to an operator of the application and associated with a list of nodes. A first vertex of the application graph corresponds to a first operator and is associated with two or more nodes. The application graph is augmented, which includes replicating the first operator such that the augmented graph includes a copy of the first operator at each of the nodes associated with the first vertex. The application is deployed over the network based on the augmented graph, such that a copy of the first operator is deployed at each of the nodes associated with the first vertex. A route through the augmented graph is selected for a data stream.
    Type: Application
    Filed: June 25, 2015
    Publication date: June 2, 2016
    Inventors: Theodoros Salonidis, Abm Musa, Seraphin B. Calo, Murtaza Zafer
  • Publication number: 20160142917
    Abstract: The present disclosure relates generally to customer demographic information (e.g., monetizing customer demographic information). In various examples, obtaining, aggregating and/or providing customer demographic information may be implemented in the form of systems, methods and/or algorithms.
    Type: Application
    Filed: March 26, 2015
    Publication date: May 19, 2016
    Inventors: Seraphin B. Calo, Vasileios Pappas, Dinesh C. Verma, Petros Zerfos
  • Publication number: 20160140580
    Abstract: The present disclosure relates generally to customer demographic information (e.g., monetizing customer demographic information). In various examples, obtaining, aggregating and/or providing customer demographic information may be implemented in the form of systems, methods and/or algorithms.
    Type: Application
    Filed: November 4, 2015
    Publication date: May 19, 2016
    Inventors: Seraphin B. Calo, Vasileios Pappas, Dinesh C. Verma, Petros Zerfos
  • Patent number: 9262438
    Abstract: Mechanisms are described to extract location information from unstructured text, comprising: building a language model from geo-tagged text; building a classifier for differentiating referred and physical location; given unstructured text, identifying referred location using the language model (that is, the location to which the unstructured text refers); given the unstructured text, identifying if referred location is also the physical location using the classifier; and predicting (that is, performing calculation(s) and/or estimation(s) of degree of confidence) of referred and physical location.
    Type: Grant
    Filed: August 6, 2013
    Date of Patent: February 16, 2016
    Assignee: International Business Machines Corporation
    Inventors: Dakshi Agrawal, Seraphin B. Calo, Raghu K. Ganti, Kisung Lee, Mudhakar Srivatsa
  • Patent number: 9026554
    Abstract: The present disclosure relates generally to the field of proactive data object replication in named data networks. In various examples, proactive data object replication may be implemented in one or more named data networks in the form of systems, methods and/or algorithms.
    Type: Grant
    Filed: February 21, 2013
    Date of Patent: May 5, 2015
    Assignee: International Business Machines Corporation
    Inventors: Seraphin B. Calo, Raheleh B. Dilmaghani, Bong Jun Ko, Kang-Won Lee, Vasileios Pappas, Dinesh C. Verma
  • Patent number: 8965845
    Abstract: The present disclosure relates generally to the field of proactive data object replication in named data networks. In various examples, proactive data object replication may be implemented in one or more named data networks in the form of systems, methods and/or algorithms.
    Type: Grant
    Filed: December 7, 2012
    Date of Patent: February 24, 2015
    Assignee: International Business Machines Corporation
    Inventors: Seraphin B. Calo, Raheleh B. Dilmaghani, Bong Jun Ko, Kang-Won Lee, Vasileios Pappas, Dinesh C. Verma
  • Publication number: 20150046452
    Abstract: Mechanisms are described to extract location information from unstructured text, comprising: building a language model from geo-tagged text; building a classifier for differentiating referred and physical location; given unstructured text, identifying referred location using the language model (that is, the location to which the unstructured text refers); given the unstructured text, identifying if referred location is also the physical location using the classifier; and predicting (that is, performing calculation(s) and/or estimation(s) of degree of confidence) of referred and physical location.
    Type: Application
    Filed: August 6, 2013
    Publication date: February 12, 2015
    Applicant: International Business Machines Corporation
    Inventors: Dakshi Agrawal, Seraphin B. Calo, Raghu K. Ganti, Kisung Lee, Mudhakar Srivatsa