Patents by Inventor Vasileios Pappas

Vasileios Pappas has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20140207903
    Abstract: The present disclosure relates generally to the field of logical movement of data objects. In various examples, the logical movement of data objects may reduce or eliminate network hotspots (e.g., avoid formation of hotspots, remove existing hotspots and/or reduce the magnitude of hotspots). In various examples, the logical movement of data objects may be implemented in the form of systems, methods and/or algorithms.
    Type: Application
    Filed: March 5, 2013
    Publication date: July 24, 2014
    Applicant: International Business Machines Corporation
    Inventors: Seraphin B. Calo, Raheleh B. Dilmaghani, Kang-Won Lee, Vasileios Pappas, Ramya Raghavendra, Dinesh C. Verma
  • Publication number: 20140207954
    Abstract: The present disclosure relates generally to the field of logical movement of data objects. In various examples, the logical movement of data objects may reduce or eliminate network hotspots (e.g., avoid formation of hotspots, remove existing hotspots and/or reduce the magnitude of hotspots). In various examples, the logical movement of data objects may be implemented in the form of systems, methods and/or algorithms.
    Type: Application
    Filed: January 18, 2013
    Publication date: July 24, 2014
    Applicant: International Business Machines Corporation
    Inventors: Seraphin B. Calo, Raheleh B. Dilmaghani, Kang-Won Lee, Vasileios Pappas, Ramya Raghavendra, Dinesh C. Verma
  • Publication number: 20140173074
    Abstract: The present disclosure relates generally to the field of efficient name management for named data networking in datacenter networks. In various examples, efficient name management for named data networking in datacenter networks may be implemented in the form of systems, methods and/or algorithms.
    Type: Application
    Filed: December 17, 2012
    Publication date: June 19, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Raheleh B. Dilmaghani, Bong Jun Ko, Kang-Won Lee, Vasileios Pappas, Ramya Raghavendra, Dinesh C. Verma
  • Publication number: 20140173080
    Abstract: The present disclosure relates generally to the field of efficient name management for named data networking in datacenter networks. In various examples, efficient name management for named data networking in datacenter networks may be implemented in the form of systems, methods and/or algorithms.
    Type: Application
    Filed: March 18, 2013
    Publication date: June 19, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Raheleh B. Dilmaghani, Bong Jun Ko, Kang-Won Lee, Vasileios Pappas, Ramya Raghavendra, Dinesh C. Verma
  • Publication number: 20140164643
    Abstract: Systems, methods and computer program products for aliasing of named data objects (in named data networks) and entities for named data networks (e.g., named graphs for named data networks). In various examples, aliasing of named data objects may be implemented in one or more named data networks in the form of systems, methods and/or algorithms. In other examples, named graphs may be implemented in one or more named data networks in the form of systems, methods and/or algorithms.
    Type: Application
    Filed: March 8, 2013
    Publication date: June 12, 2014
    Applicant: International Business Machines Corporation
    Inventors: Raheleh B. Dilmaghani, Bong Jun Ko, Kang-Won Lee, Vasileios Pappas, Ramya Raghavendra, Yang Song
  • Publication number: 20140164642
    Abstract: Systems, methods and computer program products for aliasing of named data objects (in named data networks) and entities for named data networks (e.g., named graphs for named data networks). In various examples, aliasing of named data objects may be implemented in one or more named data networks in the form of systems, methods and/or algorithms. In other examples, named graphs may be implemented in one or more named data networks in the form of systems, methods and/or algorithms.
    Type: Application
    Filed: December 6, 2012
    Publication date: June 12, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Raheleh B. Dilmaghani, Bong Jun Ko, Kang-Won Lee, Vasileios Pappas, Ramya Raghavendra, Yang Song
  • Publication number: 20140164328
    Abstract: The present disclosure relates generally to the field of proactive data object replication in named data networks. In various examples, proactive data object replication may be implemented in one or more named data networks in the form of systems, methods and/or algorithms.
    Type: Application
    Filed: February 21, 2013
    Publication date: June 12, 2014
    Applicant: International Business Machines Corporation
    Inventors: Seraphin B. Calo, Raheleh B. Dilmaghani, Bong Jun Ko, Kang-Won Lee, Vasileios Pappas, Dinesh C. Verma
  • Publication number: 20140164321
    Abstract: The present disclosure relates generally to the field of proactive data object replication in named data networks. In various examples, proactive data object replication may be implemented in one or more named data networks in the form of systems, methods and/or algorithms.
    Type: Application
    Filed: December 7, 2012
    Publication date: June 12, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Seraphin B. Calo, Raheleh B. Dilmaghani, Bong Jun Ko, Kang-Won Lee, Vasileios Pappas, Dinesh C. Verma
  • Publication number: 20140143444
    Abstract: A method, system and computer program product for transmitting content across a link in a communications network. In an embodiment, the method comprises examining traffic in the network at a sender end of the link to determine if the traffic is carrying compressed content; when the traffic is carrying compressed content, decompressing at least one portion of the compressed content; and checking a cache to determine if the cache has content matching the at least one decompressed portion of the content. In an embodiment, the method further comprises when the cache has content matching the at least one decompressed portion of the content, determining an identifier associated with the at least one decompressed portion of the content; and using the identifier to reconstruct, at a receiving end of the link, the at least one decompressed portion of the content.
    Type: Application
    Filed: November 16, 2012
    Publication date: May 22, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dakshi Agrawal, Vasileios Pappas, Ramya Raghavendra, Mudhakar Srivatsa, Dinesh C. Verma, Ho Y. Wong
  • Publication number: 20140122386
    Abstract: Disclosed is a novel passive fingerprinting technique based on DHCP messages to determine the device type and operating system. DHCP implementations are shown to vary among device types and have an effect on DHCP lease durations. To improve network address utilization, without introducing any protocol changes, the present invention provides a new leasing strategy which takes into account device types. This strategy, compared to current approaches, improves the address utilization sixfold without considerably increasing DHCP overhead.
    Type: Application
    Filed: February 4, 2013
    Publication date: May 1, 2014
    Applicant: International Business Machines Corporation
    Inventors: Erich N. NAHUM, Ioannis PAPAPANAGIOTOU, Vasileios PAPPAS
  • Publication number: 20140071833
    Abstract: Methods and apparatus are provided for recovering from packet loss in an end-to-end network connection having at least one wireless segment. A packet on a wireless segment of an end-to-end network connection is processed by determining whether the packet comprises one or more of a lost packet and a malformed packet; and generating a modified packet for an application associated with the packet to replace one or more of the lost packet and the malformed packet if the application is substantially tolerant to one or more of lost and malformed data. The modified packet comprises, for example, a non-original packet and/or a corrected packet. Link layer information or information from a deep packet inspection can be used to determine whether the packet comprises a lost packet or a malformed packet.
    Type: Application
    Filed: October 4, 2012
    Publication date: March 13, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dakshi Agrawal, Bruce O. Anthony, Franck Le, Robert B. Nicholson, Vasileios Pappas, Dinesh C. Verma
  • Publication number: 20140075013
    Abstract: A computer implemented method monitors resource usage of a virtual machine. When a virtual machine is instantiated, resource usage of the virtual machine is monitored to form monitoring data. The monitoring is performed externally from the virtual machine. When the virtual machine is later suspended, the monitoring data is stored as metadata associated with the virtual machine.
    Type: Application
    Filed: September 14, 2012
    Publication date: March 13, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dakshi Agrawal, Vasileios Pappas
  • Publication number: 20140071803
    Abstract: Methods and apparatus are provided for recovering from packet loss in an end-to-end network connection having at least one wireless segment. A packet on a wireless segment of an end-to-end network connection is processed by determining whether the packet comprises one or more of a lost packet and a malformed packet; and generating a modified packet for an application associated with the packet to replace one or more of the lost packet and the malformed packet if the application is substantially tolerant to one or more of lost and malformed data. The modified packet comprises, for example, a non-original packet and/or a corrected packet. Link layer information or information from a deep packet inspection can be used to determine whether the packet comprises a lost packet or a malformed packet.
    Type: Application
    Filed: September 13, 2012
    Publication date: March 13, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dakshi Agrawal, Bruce O. Anthony, JR., Franck Le, Robert B. Nicholson, Vasileios Pappas, Dinesh C. Verma
  • Publication number: 20140064141
    Abstract: Various embodiments detect wireless communication device mobility in a wireless communication network. In one embodiment, one or more Internet Protocol (IP) data packets associated with a wireless communication device are analyzed. The wireless communication device is coupled with the edge entity. A determination is made, based on the analyzing, that the wireless communication device is a newly coupled device at the edge entity. A central entity disposed within the wireless communication network is notified that the wireless communication device is currently coupled to the edge entity.
    Type: Application
    Filed: February 15, 2013
    Publication date: March 6, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dakshi AGRAWAL, Bongjun KO, Franck LE, Robert B. NICHOLSON, Vasileios PAPPAS, Dinesh VERMA
  • Publication number: 20140064182
    Abstract: Various embodiments detecting wireless communication device mobility in a wireless communication network. In one embodiment, one or more Internet Protocol (IP) data packets associated with a wireless communication device are analyzed. The wireless communication device is coupled with the edge entity. A determination is made, based on the analyzing, that the wireless communication device is a newly coupled device at the edge entity. A central entity disposed within the wireless communication network is notified that the wireless communication device is currently coupled to the edge entity.
    Type: Application
    Filed: August 31, 2012
    Publication date: March 6, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dakshi AGRAWAL, Bongjun KO, Franck LE, Robert B. NICHOLSON, Vasileios PAPPAS, Dinesh VERMA
  • Publication number: 20140064058
    Abstract: Various embodiments provide byte caching in wireless communication networks. In one embodiment, a plurality of data packets are received through an internet protocol (IP) data flow established between a wireless communication device and at least one server. Each of the plurality of data packets are combined into a packet bundle. A determination is made as to whether a second byte caching system is available. The packet bundle is transformed using one or more byte caching operations based on a second byte caching system being available. The transformed packet bundle is sent to the second byte caching system using an IP communication mechanism.
    Type: Application
    Filed: February 15, 2013
    Publication date: March 6, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dakshi AGRAWAL, Bongjun KO, Franck LE, Robert B. NICHOLSON, Vasileios PAPPAS, Dinesh VERMA
  • Publication number: 20140067987
    Abstract: Various embodiments provide byte caching in wireless communication networks. In one embodiment, a plurality of data packets are received through an internet protocol (IP) data flow established between a wireless communication device and at least one server. Each of the plurality of data packets are combined into a packet bundle. A determination is made as to whether a second byte caching system is available. The packet bundle is transformed using one or more byte caching operations based on a second byte caching system being available. The transformed packet bundle is sent to the second byte caching system using an IP communication mechanism.
    Type: Application
    Filed: August 31, 2012
    Publication date: March 6, 2014
    Applicant: International Business Machines Corporation
    Inventors: Dakshi AGRAWAL, Bongjun KO, Franck LE, Robert B. NICHOLSON, Vasileios PAPPAS, Dinesh VERMA
  • Publication number: 20140040457
    Abstract: Middlebox systems that can enter a connection include a monitoring module to monitor information in a connection between a client and a server, a processor to determine that the connection is idle, a table configured to create a first entry for the client and a second entry for the server, where the entries are initialized using information gathered by the monitoring module, and a control module to redirect the connection between the client and server to the middlebox. Middlebox systems that can exit a connection include a processor to determine a mismatch between sequence numbers in a first connection to a client device and in a second connection to a server device. A network control module delays acknowledgment signals from the middlebox on a connection to decrease the degree of mismatch and establishes a direct connection between the client device and the server device when mismatch is zero.
    Type: Application
    Filed: August 7, 2012
    Publication date: February 6, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: DAKSHI AGRAWAL, THAI V. LE, ERICH M. NAHUM, VASILEIOS PAPPAS
  • Publication number: 20140040451
    Abstract: Methods for inserting a middlebox into a network connection include monitoring network state information in a connection between a client and a server. When the connection is idle, a connection entry is created for each device and is initialized using state information gathered by monitoring the network connection. Redirection of the network connection is activated between the client and the server such that the middlebox mediates the connection. Methods for removing a middlebox from a network connection include determining a degree of mismatch between a sequence number in a first connection between the middlebox and a client and a sequence number in a second connection between the middlebox and a server, delaying acknowledgment signals from the middlebox on a connection to decrease the degree of mismatch, and establishing a direct connection between the client and the server without mediation by the middlebox when the degree of mismatch is zero.
    Type: Application
    Filed: July 31, 2012
    Publication date: February 6, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dakshi Agrawal, Thai V. Le, Erich M. Nahum, Vasileios Pappas
  • Publication number: 20140036674
    Abstract: Embodiments of the present invention provide a method, system and computer program product for split transport control protocol (TCP) flow control management in a cellular broadband network. In an embodiment of the invention, a method for split TCP flow control management in a cellular broadband network is provided. The method includes first determining a context for a packet received as part of a data flow in a base station of a cellular broadband network and then selecting either an end-to-end TCP connection or a split TCP connection to support the data flow. Thereafter, the data flow is routed using the selected connection.
    Type: Application
    Filed: July 31, 2012
    Publication date: February 6, 2014
    Applicant: International Business Machines Corporation
    Inventors: Dakshi Agrawal, Bruce O. Anthony, JR., Thai V. (Franck) Le, Robert B. Nicholson, Vasileios Pappas, Maroun Touma, Dinesh Verma