Patents by Inventor Vijay Dheap
Vijay Dheap has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20130336465Abstract: A method and system for enhancing problem resolution at a call center based on speech recognition of a caller includes, receiving an incoming call and generating call data based on speech recognition of the incoming call using a computer. The method generates and associates annotated metadata about the call data. A historical record is created which includes the call data and the annotated metadata. The historical record may be stored in a storage medium communicating with the computer. Context data is generated for the incoming call by analyzing the historical record to identify: a caller, a topic, a date and a stress level of the caller. The method compares the context data to historical records of previous calls. A topic probabilities analysis is conducted by comparing the context data to the historical records of previous calls, and a solution is determined for the topic based on the probabilities analysis.Type: ApplicationFiled: June 19, 2012Publication date: December 19, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Vijay Dheap, Nicholas E. Poore, Lee M. Surprenant, Michael D. Whitley
-
Publication number: 20130290272Abstract: Determining and storing at least one validated results set in a global ontology database for future use by an entity that subscribes to the global ontology database. If global ontology data is stored in a global ontology database, attempt to determine a mapping between first and second ontologies. If a mapping between the first and second ontologies can be determined from the global ontology data, the mapping is validated and the validated mapping is defined as a validated results set. If global ontology data is not stored in a global ontology database or a mapping between the first and second ontologies can not be determined from global ontology data stored in the global ontology database, the first and second ontologies are unified by determining a mapping between the first and second ontologies, the mapping is validated and the validated mapping is defined as a validated results set.Type: ApplicationFiled: June 19, 2013Publication date: October 31, 2013Inventors: Vijay Dheap, Baiju D. Mandalia
-
Publication number: 20130288219Abstract: A method, a system and a computer program product for selecting a further inquiry for a user to clarify a request for information from the user. One or more candidate answers to the request for information from the user are determined, and a score value is generated for each of one or more characteristics of each candidate answer, where at least one characteristic is associated with an inquiry for the user to clarify the request for information. A characteristic associated with an inquiry is determined that includes score values providing the greatest potential adjustment for the candidate answers in response to a clarification of the request for information, and the inquiry is selected that is associated with the determined characteristic for presentation to the user.Type: ApplicationFiled: April 30, 2012Publication date: October 31, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Vijay Dheap, Nicholas E. Poore, Lee M. Surprenant, Michael D. Whitley
-
Patent number: 8495004Abstract: Determining and storing at least one validated results set in a global ontology database for future use by an entity that subscribes to the global ontology database. If global ontology data is stored in a global ontology database, attempt to determine a mapping between first and second ontologies. If a mapping between the first and second ontologies can be determined from the global ontology data, the mapping is validated and the validated mapping is defined as a validated results set. If global ontology data is not stored in a global ontology database or a mapping between the first and second ontologies can not be determined from global ontology data stored in the global ontology database, the first and second ontologies are unified by determining a mapping between the first and second ontologies, the mapping is validated and the validated mapping is defined as a validated results set.Type: GrantFiled: March 27, 2006Date of Patent: July 23, 2013Assignee: International Business Machines CorporationInventors: Vijay Dheap, Baiju D. Mandalia
-
Patent number: 8458600Abstract: A mashup session manager maintains state of the mashup session to ensure presentation consistency/uniformity across the execution environments. The mashup session manager also tracks the participating execution environments associated with a mashup session (e.g., usernames, device identifiers, network addresses, etc.), and transmits data for presentation consistency to the participating execution environments. In some cases, a view of the mashup session at a participating execution environment may not be current (“stale mashup session view”). The mashup session manager can detect if a view at a participating execution environment is of a past mashup session state, and provide data for the stale mashup session view to become current. In addition, the mashup session manager can propagate design modifications to the participants of the mashup session.Type: GrantFiled: December 31, 2009Date of Patent: June 4, 2013Assignee: International Business Machines CorporationInventors: Vijay Dheap, Christopher Michael Gladd, Aaron Charles Lindsay, David Preston Sink
-
Publication number: 20120254947Abstract: Information about security events detected by a group of protected web-connected resources is centrally managed in order to detect distributed attacks and slow paced attacks by providing to a plurality of web-connected resources a deployment component which couples to a native authorization service of each web-connected resource; receiving a plurality of security event reports from one or more of the deployment components by a command and control center computer; based on collected information from the plurality of security event reports, determining a threat level indicator across the plurality of web-connected resources using one or more analyses and metrics; and transmitting the threat level indicator to each of the web-connected resources.Type: ApplicationFiled: March 31, 2011Publication date: October 4, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORP.Inventors: Vijay Dheap, Michael David Whitley
-
Publication number: 20120059937Abstract: Bandwidth allocation management includes determining current available bandwidth of a network within which a computer system is operating. The bandwidth allocation management also includes using the current available bandwidth and applied feature delivery settings to determine an adjustment in feature delivery to the computer system. At least a portion of the feature delivery settings is specified by an end user of the computer system.Type: ApplicationFiled: September 8, 2010Publication date: March 8, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Vijay Dheap, Suyash S. Jape, Abhinay R. Nagpal, Sandeep R. Patil
-
Publication number: 20120016708Abstract: A computer implemented method dynamically manages invitations to a meeting. A first tier of potential invitees to a meeting and a second tier of potential invitees to the meeting are defined. Members of the second tier of potential invitees have been predetermined to have a lower need to attend the meeting than members of the first tier of potential invitees. Invitations for the meeting are first transmitted to members of the first tier of potential invitees. Invitation acceptance responses are received, and if they fail to reach a predetermined level such that resources for the meeting will be underutilized, additional invitations for the meeting are transmitted to members of the second tier of potential invitees.Type: ApplicationFiled: July 14, 2010Publication date: January 19, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: VIJAY DHEAP, ABHINAY R. NAGPAL, SANDEEP R. PATIL, YAN W. STEIN
-
Publication number: 20110231889Abstract: A method, system, and computer usable program product for applying a security policy as a query predicate. A query is received. The query is a request for data directed to a data repository executing in a data processing system. The security policy is identified, the security policy being a security policy applicable to the query. A predicate that corresponds to the security policy is determined. The query is modified to include the predicate. The modified query is sent to the data repository.Type: ApplicationFiled: March 22, 2010Publication date: September 22, 2011Applicant: International Business Machines CorporationInventors: VIJAY DHEAP, Abhinaya Ravinder Nagpal, Sandeep R. Patil, Yan Stein
-
Patent number: 8001099Abstract: In some embodiments a method comprises detecting a request to copy and determining information related to the copied data from the document. The method can also comprise augmenting a copy history to include the data and the information related to the data, and storing this copy history. The method can also include detecting a request to access the copy history associated with the document, presenting the copy history including the data and the information related to the copied data, and copying the data from the copy history for further use. The method can also comprise blocking copying of data if the document's copy rules are violated.Type: GrantFiled: May 15, 2008Date of Patent: August 16, 2011Assignee: International Business Machines CorporationInventors: Belinda Y. Chang, Vijay Dheap, Christopher J. Hardee, Heather C. Miller
-
Publication number: 20110161833Abstract: A mashup session manager maintains state of the mashup session to ensure presentation consistency/uniformity across the execution environments. The mashup session manager also tracks the participating execution environments associated with a mashup session (e.g., usernames, device identifiers, network addresses, etc.), and transmits data for presentation consistency to the participating execution environments. In some cases, a view of the mashup session at a participating execution environment may not be current (“stale mashup session view”). The mashup session manager can detect if a view at a participating execution environment is of a past mashup session state, and provide data for the stale mashup session view to become current. In addition, the mashup session manager can propagate design modifications to the participants of the mashup session.Type: ApplicationFiled: December 31, 2009Publication date: June 30, 2011Applicant: International Business Machines CorporationInventors: Vijay Dheap, Christopher Michael Gladd, Aaron Charles Lindsay, David Preston Sink
-
Publication number: 20110154239Abstract: Systems, methods and articles of manufacture allow adjusting the relative weighting associated with evaluation criteria associated with a unified view of dissimilar data. The operation generally includes collecting data regarding attributes of a user interacting with an application, where the collected data has associated evaluation criteria. The data is collectively represented according to the evaluation criteria. The systems, methods and articles of manufacture then allow dynamically modifying the evaluation criteria before evaluating and collectively representing the data according to the adjusted criteria.Type: ApplicationFiled: December 23, 2009Publication date: June 23, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Vijay DHEAP, Jimmy Ming-Der HSU, Michael David WHITLEY
-
Patent number: 7877701Abstract: A computer-implementable method, system and computer-readable medium for providing in-context total document views for manipulating data are presented. In one embodiment, the method includes the steps of: displaying an active context of a software program on a User Interface (UI); receiving a copy command for a copied element from the active context; in response to a control signal, displaying an access view of one or more secondary contexts of the software program; temporarily activating a selected context from the secondary contexts shown in the access view while continuing to display the active context on the UI; and pasting the copied element into the selected context. Preferably, in response to the copied element being pasted into the selected secondary context, the access view is automatically removed from the UI.Type: GrantFiled: March 8, 2007Date of Patent: January 25, 2011Assignee: International Business Machines CorporationInventors: Gabriel A. Cohen, Vijay Dheap
-
Publication number: 20100037157Abstract: A method, information processing system, and computer program product manage information mashups. A first widget is selected from a plurality of widgets. A widget is an entity that at least one of consumes data and produces data. Metadata associated with the first widget is analyzed. The metadata at least includes compatible input type information, compatible output type information, previous usage information, and user feedback information. A second widget is selected from the plurality of widgets based on the metadata associated with the first widget and metadata associated with the second widget. The first widget and the second widget are coupled together.Type: ApplicationFiled: August 5, 2008Publication date: February 11, 2010Applicant: International Business Machines Corp.Inventors: BELINDA CHANG, Vijay Dheap, Christopher J. Hardee, Heather C. Miller
-
Publication number: 20090287634Abstract: In some embodiments a method comprises detecting a request to copy and determining information related to the copied data from the document. The method can also comprise augmenting a copy history to include the data and the information related to the data, and storing this copy history. The method can also include detecting a request to access the copy history associated with the document, presenting the copy history including the data and the information related to the copied data, and copying the data from the copy history for further use. The method can also comprise blocking copying of data if the document's copy rules are violated.Type: ApplicationFiled: May 15, 2008Publication date: November 19, 2009Applicant: International Business Machines CorporationInventors: Belinda Y. Chang, Vijay Dheap, Christopher J. Hardee, Heather C. Miller
-
Patent number: 7596583Abstract: Business processes are constructed and/or modified utilizing system knowledge including a folksonomy that stores information regarding a group of services usable by composition applications that collects system monitored services usage information and user inputs. In one aspect, candidate services are recommended and/or automatically updated/replaced, which can implement aspects of a business process from the group of services based upon information derived from the system knowledge. In another aspect, a composition design component interacts with a user to build and/or modify services based upon identified aspect of business processes to be implemented by services, wherein the component design component recommends candidate services that can implement the aspects of the business processes from the group of services based upon information derived from the system knowledge.Type: GrantFiled: March 29, 2007Date of Patent: September 29, 2009Assignee: International Business Machines CorporationInventors: Belinda Ying-Chieh Chang, Vijay Dheap, Christopher James Hardee, Heather Castelli Miller
-
Publication number: 20090118015Abstract: The present invention discloses a system for enhancing a user's experience in an electronic game by dynamically incorporating user-created tag data. Such a system can include an electronic game application running on a network-capable computing device, a game tag monitor, and a game tag information coordinator. The game tag monitor can be configured to accept and present user-created game tag data within the electronic game application. User created game tag data can also be received outside a gameplay situation using a suitable game tagging interface. The game tag data can be presented dynamically based on the current context of the game. The game tag information coordinator can be configured to provide the game tag monitor with game tag data and receive new game tag data from the game tag monitor.Type: ApplicationFiled: November 7, 2007Publication date: May 7, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: BELINDA YING-CHIEH CHANG, VIJAY DHEAP, CHRISTOPHER J. HARDEE, HEATHER C. MILLER
-
Patent number: 7529540Abstract: The present invention includes a method and system for invoking service offerings. The method can include the steps of initiating (320) a push-to-service request, enabling (304) a Voice Recognition Server (VRS), ranking (306) a list of supported service offerings, and presenting the list on a display for identifying at least one service offering that is available as a service to the user. The method and system can include speaking (308) a voice request for selecting at least one service presented on the display, and establishing (310) a communication dialogue with a service provider of the service for connecting the service provider for providing the service to the user. The push-to-service request can be invoked by a user depressing a service button (120) on the first communication unit (100) using a push-action. The VRS (220) can handle the voice request and generate a list of service offerings ranked by priority for presentation on the display.Type: GrantFiled: November 29, 2005Date of Patent: May 5, 2009Assignee: International Business Machines CorporationInventors: Douglas H. Cox, Vijay Dheap, Baiju D. Mandalia
-
Publication number: 20090095813Abstract: A method of providing a kitchen inventory based on expiration of goods. A spreadsheet displays a kitchen inventory that includes item names corresponding to multiple currently stored goods. The inventory also includes multiple quantities, expiration dates, remaining time values corresponding to a difference between the expiration dates and a current date, and status values corresponding to the remaining time values. If the currently stored goods change, the spreadsheet updates one or more quantities and expiration dates. If a user requests a recipe, the spreadsheet searches a recipe database for one or more suggested recipes that include one or more of the stored goods having expiration dates in proximity to the current date and outputs one or more suggested recipes. If a user requests a shopping list, the spreadsheet generates a list that includes needed quantities of one or more ingredients in relation to the currently stored goods.Type: ApplicationFiled: October 12, 2007Publication date: April 16, 2009Inventors: BELINDA Y. CHANG, Vijay Dheap, Christopher J. Hardee, Heather C. Miller
-
Publication number: 20090094584Abstract: The present invention discloses a solution for metering, monitoring, and monetizing software assets. The solution can include a step of registering a software asset with a monitoring service. A unique identifying key for the software asset can be generated during registration. The software asset can then be instrumented for the monitoring service. The instrumentation can reference the software asset by the unique key. Specifics of the set of metrics that are to be monitored by the monitoring service for the software asset can be runtime, development time, and/or deployment time configurable. The instrumented software asset can convey transaction data to the monitoring server when used by clients. Analyzed results produced by the monitoring service pertaining to the software assets based upon the transaction data can be provided to authorize users of vendors associated with the software asset.Type: ApplicationFiled: October 4, 2007Publication date: April 9, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: VIJAY DHEAP, BENJAMIN M. SCHELL, JASON WAGNER, MICHAEL D. WHITLEY