Patents by Inventor Seraphin B. Calo

Seraphin B. Calo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8135821
    Abstract: A method for validating that a networked system of modules conforms to at least one interoperability rule pertinent to interoperability of at least two of the modules includes the steps of obtaining the at least one interoperability rule, the at least one rule being encoded in computer-operable format; obtaining configuration information pertinent to at least one of the modules, the configuration information being encoded in computer-operable format; and comparing the at least one interoperability rule to the configuration information to validate whether the system conforms to the at least one interoperability rule
    Type: Grant
    Filed: January 16, 2007
    Date of Patent: March 13, 2012
    Assignee: International Business Machines Corporation
    Inventors: Dakshi Agrawal, Seraphin B. Calo, Murthy Devarakonda, David A. George, Sandeep K. Gopisetty, Kang-Won Lee, Konstantinos Magoutis, Ramani R. Routray, Joseph D. Ryan, Gauri Shah, Chung-hao Tan, Norbert G. Vogl, Kaladhar Voruganti
  • Patent number: 8006290
    Abstract: A system and method for ratifying policies are provided. A method for ratifying a policy in a policy-based decision system comprises: determining if a new policy interacts with an existing policy in the policy-based decision system; and ratifying the new policy to exist in the policy-based decision system.
    Type: Grant
    Filed: January 12, 2006
    Date of Patent: August 23, 2011
    Assignee: International Business Machines Corporation
    Inventors: Dakshi Agrawal, Seraphin B. Calo, James R. Giles, Kang-Won Lee, Mukesh K. Mohania, Dinesh Verma, Jorge Lobo
  • Publication number: 20110196885
    Abstract: A method, device, and system are provided for policy management within a policy-managed environment. A policy management agent retrieves a policy enforcement point (PEP) description from a PEP registry. The policy management agent utilizes the PEP description of the PEP to search a policy library to locate and determine matching (candidate) policies, and the matching policies match the policy description of the PEP. The managed environment, which incorporates policy evaluation, uses the equivalent policy matching criteria as the policy management agent.
    Type: Application
    Filed: February 10, 2010
    Publication date: August 11, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Seraphin B. Calo, Xiping Wang, David A. Wood, III, Petros Zerfos
  • Patent number: 7941478
    Abstract: This invention provides methods and apparatus for executing applications in a distributed manner employing one or more proxy servers and one origin server. The invention allows the applications to be executed primarily at the proxy servers rather than at the origin servers, thereby gaining in scalability and improved user response time. A redirection mechanism is used to direct requests to one of the proxy servers. The proxy server uses caching techniques to bring information records needed for application execution to the proxy servers. The code required for application execution is also obtained from the origin server. The invention discusses applying this technique to three Web-based applications, namely Web-based auctions, generating personalized content for Web-users, and creating advertisements for users accessing a Web page.
    Type: Grant
    Filed: October 29, 2008
    Date of Patent: May 10, 2011
    Assignee: International Business Machines Corporation
    Inventors: Seraphin B. Calo, Anees A. Shaikh, Renu Tewari, Dinesh C. Verma
  • Publication number: 20110078480
    Abstract: A heat potential value for each of a set of available server locations is calculated via a data center controller based upon at least one active server in a data center. A minimal calculated heat potential value for the set of available server locations is identified. An available server location associated with the identified minimal calculated heat potential value is selected from the set of available server locations.
    Type: Application
    Filed: September 25, 2009
    Publication date: March 31, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Seraphin B. Calo, David L. Kaminsky, Dinesh C. Verma, Xiping Wang
  • Publication number: 20110078290
    Abstract: At a data center controller, a first server location is determined from a set of available server locations at which to change a server active state for a data center. A time and configuration change for the data center are forecasted. A second server location is determined from the set of available server locations at which to change the server active state based upon the forecasted configuration change for the data center. An available server location is selected at which to change the server active state based upon the first server location, the second server location, and the forecasted time associated with the forecasted configuration change for the data center.
    Type: Application
    Filed: September 25, 2009
    Publication date: March 31, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Seraphin B. Calo, David L. Kaminsky, Dinesh C. Verma, Xiping Wang
  • Patent number: 7895653
    Abstract: Embodiments of the present invention provide a method, system and computer program product for bot detection for network distributable markup. In accordance with an embodiment of the present invention, a page request for distributed markup can be processed to incorporate embedded fragment within the requested page. For instance, the fragment can include a script enabled to detect human activity within the requested page such as a mouse movement. Alternatively, the fragment can include an extraneous markup artifact. The requested page subsequently can be returned to the requestor and the embedded fragment can be monitored to detect the presence of a bot depending upon the activation of the artifact. For example, where human activity can be detected within the page or where the extraneous markup artifact becomes activated despite the extraneous nature of the artifact, a human requestor can be concluded.
    Type: Grant
    Filed: May 31, 2007
    Date of Patent: February 22, 2011
    Assignee: International Business Machines Corporation
    Inventors: Seraphin B. Calo, Kang-Won Lee, Kyoungsoo Park
  • Publication number: 20090055274
    Abstract: This invention provides methods and apparatus for executing applications in a distributed manner employing one or more proxy servers and one origin server. The invention allows the applications to be executed primarily at the proxy servers rather than at the origin servers, thereby gaining in scalability and improved user response time. A redirection mechanism is used to direct requests to one of the proxy servers. The proxy server uses caching techniques to bring information records needed for application execution to the proxy servers. The code required for application execution is also obtained from the origin server. The invention discusses applying this technique to three Web-based applications, namely Web-based auctions, generating personalized content for Web-users, and creating advertisements for users accessing a Web page.
    Type: Application
    Filed: October 29, 2008
    Publication date: February 26, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Seraphin B. Calo, Anees A. Shaikh, Renu Tewari, Dinesh C. Verma
  • Publication number: 20080301808
    Abstract: Embodiments of the present invention provide a method, system and computer program product for bot detection for network distributable markup. In accordance with an embodiment of the present invention, a page request for distributed markup can be processed to incorporate embedded fragment within the requested page. For instance, the fragment can include a script enabled to detect human activity within the requested page such as a mouse movement. Alternatively, the fragment can include an extraneous markup artifact. The requested page subsequently can be returned to the requestor and the embedded fragment can be monitored to detect the presence of a bot depending upon the activation of the artifact. For example, where human activity can be detected within the page or where the extraneous markup artifact becomes activated despite the extraneous nature of the artifact, a human requestor can be concluded.
    Type: Application
    Filed: May 31, 2007
    Publication date: December 4, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Seraphin B. Calo, Kang-Won Lee, Kyoungsoo Park
  • Patent number: 7447731
    Abstract: This invention provides methods and apparatus for executing applications in a distributed manner employing one or more proxy servers and one origin server. The invention allows the applications to be executed primarily at the proxy servers rather than at the origin servers, thereby gaining in scalability and improved user response time. A redirection mechanism is used to direct requests to one of the proxy servers. The proxy server uses caching techniques to bring information records needed for application execution to the proxy servers. The code required for application execution is also obtained from the origin server. The invention discusses applying this technique to three Web-based applications, namely Web-based auctions, generating personalized content for Web-users, and creating advertisements for users accessing a Web page.
    Type: Grant
    Filed: December 17, 2002
    Date of Patent: November 4, 2008
    Assignee: International Business Machines Corporation
    Inventors: Seraphin B. Calo, Anees A. Shaikh, Renu Tewari, Dinesh C. Verma
  • Publication number: 20080172480
    Abstract: A method for validating that a networked system of modules conforms to at least one interoperability rule pertinent to interoperability of at least two of the modules includes the steps of obtaining the at least one interoperability rule, the at least one rule being encoded in computer-operable format; obtaining configuration information pertinent to at least one of the modules, the configuration information being encoded in computer-operable format; and comparing the at least one interoperability rule to the configuration information to validate whether the system conforms to the at least one interoperability rule
    Type: Application
    Filed: January 16, 2007
    Publication date: July 17, 2008
    Applicant: International Business Machines Corporation
    Inventors: Dakshi Agrawal, Seraphin B. Calo, Murthy Devarakonda, David A. George, Sandeep K. Gopisetty, Kang-Won Lee, Konstantinos Magoutis, Ramani R. Routray, Joseph D. Ryan, Gauri Shah, Chung-hao Tan, Norbert G. Vogl, Kaladhar Voruganti
  • Publication number: 20080172350
    Abstract: A logical expression of a policy is generated from another logical expression of a policy, for example, via a set of transformations, each of which comprises an input sub-expression and an output sub-expression. Any sub-expression of the input expression which matches an input sub-expression of a transformation rule is replaced with the output sub-expression of that transformation rule to form a sub-expression of the output expression.
    Type: Application
    Filed: January 16, 2007
    Publication date: July 17, 2008
    Applicant: International Business Machines Corporation
    Inventors: Mandis S. Beigi, Seraphin B. Calo, David A. George
  • Patent number: 5309448
    Abstract: An approach for modeling and solving the problem of fault localization and alarm correlation in large communication networks is presented. Specifically, a new alarm structure is presented along with a general model for representing a communications network. Several specific processing algorithms are provided for solving alarm correlation and fault localization problems in the presence of one or more faults. These algorithms differ in the degree of accuracy achieved in locating a fault, and in the degree of complexity required for implementation.
    Type: Grant
    Filed: January 3, 1992
    Date of Patent: May 3, 1994
    Assignee: International Business Machines Corporation
    Inventors: Anastasios T. Bouloutas, Seraphin B. Calo, Allan J. Finkel
  • Patent number: 4805134
    Abstract: An architecture for the implementation of an information utility for accessing information and executing transactions on an interactive basis between Videotex databases and individual end user terminals, some or all of which may be remotely located with respect to each other. The utility may be associated with a Videotex Application Network (VAN) and includes a combination of distributed, semiautonomous Operations Nodes (ONs), each characterized by (1) one or more affiliated users, (2) the inclusion of some form of database, and (3) one or more customized application programs, and each is also capable of "standalone" operation. Each database comprises pages of control information and displayable data. Each node comprises a directory of databases at other nodes.
    Type: Grant
    Filed: January 9, 1986
    Date of Patent: February 14, 1989
    Assignee: International Business Machines Corporation
    Inventors: Seraphin B. Calo, Krishnamurthi Kannan, Suk S. Soo, Thomas G. Burket, John W. Wiley, Jr.