Patents by Inventor Yurdaer N. Doganata
Yurdaer N. Doganata has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10902198Abstract: Natural language text and annotated text can be received. The annotated text can specify at least one anchor and at least one trigger contained in the natural language text and indicate a correspondence between the anchor and the trigger. The natural language text, the annotated text and at least one parse tree generated from the natural language text can be processed. Based on the processing, at least one natural language processing rule can be generated and output. The natural language processing rule can be configured to be executed by a processor to process other natural language text.Type: GrantFiled: November 29, 2018Date of Patent: January 26, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Yurdaer N. Doganata, Roberto Delima, Aysu Ezen Can
-
Publication number: 20200175104Abstract: Natural language text and annotated text can be received. The annotated text can specify at least one anchor and at least one trigger contained in the natural language text and indicate a correspondence between the anchor and the trigger. The natural language text, the annotated text and at least one parse tree generated from the natural language text can be processed. Based on the processing, at least one natural language processing rule can be generated and output. The natural language processing rule can be configured to be executed by a processor to process other natural language text.Type: ApplicationFiled: November 29, 2018Publication date: June 4, 2020Inventors: Yurdaer N. Doganata, Roberto Delima, Aysu Ezen Can
-
Patent number: 10491538Abstract: Disclosed is a novel system and method for managing requests for an additional virtual machine. The method begins with operating at least one virtual machine accessing at least one computer resource associated with at least one physical machine within a computing cluster. One or more non-deterministic virtual machine requests for the computer resource are received. An over-utilization of the computer resource as a probability distribution function is modeled. In one example, the probability distribution function is a Beta distribution function to represent a one of a plurality of probability distribution functions. Next, an additional virtual machine on the physical machine associated with the computer resource is added in response to a probability of a utilization of the computer resource being greater than a probalistic bound on the over-utilization of the computer resource. Otherwise, the additional virtual machine is not added.Type: GrantFiled: December 4, 2017Date of Patent: November 26, 2019Assignee: International Business Machines CorporationInventors: Yurdaer N. Doganata, Malgorzata Steinder, Asser N. Tantawi, Merve Unuvar
-
Patent number: 10411895Abstract: A method, computing system and computer program product are provided. A first entity system that stores sensitive information associated with different entities applies a hash function a portion of the sensitive information to produce hash values. Transaction information pertaining to transactions performed on entity systems are stored within a blockchain database accessible to the entity systems. The transaction information includes hash values corresponding to associated entities from the entity systems. The hash values of the first entity system are compared to the hash values from others of the entity systems to determine entity systems containing information pertaining to same entities. The sensitive information for an entity of the first entity system is exchanged with the determined entity systems containing information for that entity.Type: GrantFiled: May 4, 2017Date of Patent: September 10, 2019Assignee: International Business Machines CorporationInventors: Francisco P. Curbera, Yurdaer N. Doganata, Maria Eleftheriou, Mark H. Overman
-
Publication number: 20180323975Abstract: A method, computing system and computer program product are provided. A first entity system that stores sensitive information associated with different entities applies a hash function a portion of the sensitive information to produce hash values. Transaction information pertaining to transactions performed on entity systems are stored within a blockchain database accessible to the entity systems. The transaction information includes hash values corresponding to associated entities from the entity systems. The hash values of the first entity system are compared to the hash values from others of the entity systems to determine entity systems containing information pertaining to same entities. The sensitive information for an entity of the first entity system is exchanged with the determined entity systems containing information for that entity.Type: ApplicationFiled: May 4, 2017Publication date: November 8, 2018Inventors: Francisco P. Curbera, Yurdaer N. Doganata, Maria Eleftheriou, Mark H. Overman
-
Publication number: 20180131631Abstract: Disclosed is a novel system and method for managing requests for an additional virtual machine. The method begins with operating at least one virtual machine accessing at least one computer resource associated with at least one physical machine within a computing cluster. One or more non-deterministic virtual machine requests for the computer resource are received. An over-utilization of the computer resource as a probability distribution function is modeled. In one example, the probability distribution function is a Beta distribution function to represent a one of a plurality of probability distribution functions. Next, an additional virtual machine on the physical machine associated with the computer resource is added in response to a probability of a utilization of the computer resource being greater than a probalistic bound on the over-utilization of the computer resource. Otherwise, the additional virtual machine is not added.Type: ApplicationFiled: December 4, 2017Publication date: May 10, 2018Inventors: Yurdaer N. DOGANATA, Malgorzata STEINDER, Asser N. TANTAWI, Merve UNUVAR
-
Patent number: 9860190Abstract: Disclosed is a novel system and method for managing requests for an additional virtual machine. The method begins with operating at least one virtual machine accessing at least one computer resource associated with at least one physical machine within a computing cluster. One or more non-deterministic virtual machine requests for the computer resource are received. An over-utilization of the computer resource as a probability distribution function is modeled. In one example, the probability distribution function is a Beta distribution function to represent a one of a plurality of probability distribution functions. Next, an additional virtual machine on the physical machine associated with the computer resource is added in response to a probability of a utilization of the computer resource being greater than a probalistic bound on the over-utilization of the computer resource. Otherwise, the additional virtual machine is not added.Type: GrantFiled: March 31, 2016Date of Patent: January 2, 2018Assignee: International Business Machines CorporationInventors: Yurdaer N. Doganata, Malgorzata Steinder, Asser N. Tantawi, Merve Unuvar
-
Patent number: 9762597Abstract: An information processing system, a computer readable storage medium, and a method to detect and block a robot data aggregator from accessing a website. A method includes defining a set of important features of business operations associated with users using a website. A feature value for each important feature is extracted from collected session data of a user session using the website. A user classifier classifies the user session as being with a human user or a robot user. Based on the classifying, access to the website by a robot user is blocked. Training user session data is also generated from the collected user session data thereby the user classifier learns and improves accuracy and reliability in detecting the type of user in a user session.Type: GrantFiled: August 26, 2015Date of Patent: September 12, 2017Assignee: International Business Machines CorporationInventors: Yurdaer N. Doganata, David Corbalan Luna, Jordi Cahue Mestre, Francisco Javier Noguera Pages
-
Patent number: 9740478Abstract: In one aspect, a method for identifying software development teams causing operation incidents when changing and deploying code is provided. The method includes the steps of: collecting data regarding i) a number of deployed change requests for each of the software development teams and ii) a total number of incident reports; generating a time series for the number of deployed change requests for each of the software development teams and a time series for the total number of incident reports created; performing causality testing between the time series for the number of deployed change requests for each of the software development teams and the time series for the total number of incident reports created; and determining whether the total number of incident reports created can be expressed in terms of the number of deployed change requests for any of the software teams.Type: GrantFiled: September 30, 2015Date of Patent: August 22, 2017Assignee: International Business Machines CorporationInventors: Yurdaer N. Doganata, James L. Jones, David L. Leigh
-
Patent number: 9710258Abstract: In one aspect, a method for identifying software development teams causing operation incidents when changing and deploying code is provided. The method includes the steps of: collecting data regarding i) a number of deployed change requests for each of the software development teams and ii) a total number of incident reports; generating a time series for the number of deployed change requests for each of the software development teams and a time series for the total number of incident reports created; performing causality testing between the time series for the number of deployed change requests for each of the software development teams and the time series for the total number of incident reports created; and determining whether the total number of incident reports created can be expressed in terms of the number of deployed change requests for any of the software teams.Type: GrantFiled: May 27, 2015Date of Patent: July 18, 2017Assignee: International Business Machines CorporationInventors: Yurdaer N. Doganata, James L. Jones, David L. Leigh
-
Patent number: 9697045Abstract: Techniques for workload management in cloud computing infrastructures are provided. In one aspect, a method for allocating computing resources in a datacenter cluster is provided. The method includes the steps of: creating multiple, parallel schedulers; and automatically selecting a resource allocation method for each of the schedulers based on one or more of a workload profile, user requirements, and a state of the datacenter cluster, wherein an optimistic resource allocation method is selected for at least a first one or more of the schedulers and a pessimistic resource allocation method is selected for at least a second one or more of the schedulers. Due to optimistic resource allocation conflicts may arise. Methods to resolve such conflicts are also provided.Type: GrantFiled: March 24, 2015Date of Patent: July 4, 2017Assignee: International Business Machines CorporationInventors: Marcelo Amaral, Yurdaer N. Doganata, Iqbal I. Mohomed, Asser N. Tantawi, Merve Unuvar
-
Publication number: 20170063881Abstract: An information processing system, a computer readable storage medium, and a method to detect and block a robot data aggregator from accessing a website. A method includes defining a set of important features of business operations associated with users using a website. A feature value for each important feature is extracted from collected session data of a user session using the website. A user classifier classifies the user session as being with a human user or a robot user. Based on the classifying, access to the website by a robot user is blocked. Training user session data is also generated from the collected user session data thereby the user classifier learns and improves accuracy and reliability in detecting the type of user in a user session.Type: ApplicationFiled: August 26, 2015Publication date: March 2, 2017Inventors: Yurdaer N. DOGANATA, David Corbalan LUNA, Jordi Cahue MESTRE, Francisco Javier NOGUERA PAGES
-
Patent number: 9575947Abstract: A document corpus is annotated by given annotators and aggregates of the given annotators to generate a corpus of pre-annotated documents with given annotations. The same document corpus is annotated by a subject annotator to have subject annotations. The subject annotations are decomposed into superpositions of the given annotations. The decomposed subject annotations are mapped to a most representative superposition of the given annotations. The subject annotator may be mapped to the aggregate of given annotators corresponding to the most representative superposition.Type: GrantFiled: November 5, 2012Date of Patent: February 21, 2017Assignee: International Business Machines CorporationInventors: Yurdaer N. Doganata, Genady Grabarnik, Lev Kozakov, Larisa Shwartz
-
Publication number: 20160350103Abstract: In one aspect, a method for identifying software development teams causing operation incidents when changing and deploying code is provided. The method includes the steps of: collecting data regarding i) a number of deployed change requests for each of the software development teams and ii) a total number of incident reports; generating a time series for the number of deployed change requests for each of the software development teams and a time series for the total number of incident reports created; performing causality testing between the time series for the number of deployed change requests for each of the software development teams and the time series for the total number of incident reports created; and determining whether the total number of incident reports created can be expressed in terms of the number of deployed change requests for any of the software teams.Type: ApplicationFiled: May 27, 2015Publication date: December 1, 2016Inventors: Yurdaer N. Doganata, James L. Jones, David L. Leigh
-
Publication number: 20160350692Abstract: In one aspect, a method for detecting changes in behavior of developers in a software development process is provided which includes the steps of: using a frequency of a number of daily software commits (Nc) and an average number of files submitted per software commit (Nf) to detect when given instances of (Nc, Nf) are below a first predetermined threshold, which is a first indicator of developer behavior under pressure; using, for comparison, an average number of messages exchanged daily by members of a plurality of software development teams to detect when a number of messages exchanged daily by members of a given software development team is below a second predetermined threshold, which is a second indicator of the developer behavior under pressure; and generating an alert if either the first indicator or the second indicator of the developer behavior under pressure occurs.Type: ApplicationFiled: May 27, 2015Publication date: December 1, 2016Inventors: Yurdaer N. Doganata, James L. Jones, David L. Leigh
-
Publication number: 20160350203Abstract: In one aspect, a method for identifying software development teams causing operation incidents when changing and deploying code is provided. The method includes the steps of: collecting data regarding i) a number of deployed change requests for each of the software development teams and ii) a total number of incident reports; generating a time series for the number of deployed change requests for each of the software development teams and a time series for the total number of incident reports created; performing causality testing between the time series for the number of deployed change requests for each of the software development teams and the time series for the total number of incident reports created; and determining whether the total number of incident reports created can be expressed in terms of the number of deployed change requests for any of the software teams.Type: ApplicationFiled: September 30, 2015Publication date: December 1, 2016Inventors: Yurdaer N. Doganata, James L. Jones, David L. Leigh
-
Publication number: 20160283270Abstract: Techniques for workload management in cloud computing infrastructures are provided. In one aspect, a method for allocating computing resources in a datacenter cluster is provided. The method includes the steps of: creating multiple, parallel schedulers; and automatically selecting a resource allocation method for each of the schedulers based on one or more of a workload profile, user requirements, and a state of the datacenter cluster, wherein an optimistic resource allocation method is selected for at least a first one or more of the schedulers and a pessimistic resource allocation method is selected for at least a second one or more of the schedulers. Due to optimistic resource allocation conflicts may arise. Methods to resolve such conflicts are also provided.Type: ApplicationFiled: March 24, 2015Publication date: September 29, 2016Inventors: Marcelo Amaral, Yurdaer N. Doganata, Iqbal I. Mohomed, Asser N. Tantawi, Merve Unuvar
-
Publication number: 20160212062Abstract: Disclosed is a novel system and method for managing requests for an additional virtual machine. The method begins with operating at least one virtual machine accessing at least one computer resource associated with at least one physical machine within a computing cluster. One or more non-deterministic virtual machine requests for the computer resource are received. An over-utilization of the computer resource as a probability distribution function is modeled. In one example, the probability distribution function is a Beta distribution function to represent a one of a plurality of probability distribution functions. Next, an additional virtual machine on the physical machine associated with the computer resource is added in response to a probability of a utilization of the computer resource being greater than a probalistic bound on the over-utilization of the computer resource. Otherwise, the additional virtual machine is not added.Type: ApplicationFiled: March 31, 2016Publication date: July 21, 2016Applicant: International Business Machines CorporationInventors: Yurdaer N. DOGANATA, Malgorzata STEINDER, Asser N. TANTAWI, Merve UNUVAR
-
Patent number: 9391919Abstract: Disclosed is a novel system and method for managing requests for an additional virtual machine. The method begins with operating at least one virtual machine accessing at least one computer resource associated with at least one physical machine within a computing cluster. One or more non-deterministic virtual machine requests for the computer resource are received. An over-utilization of the computer resource as a probability distribution function is modeled. In one example, the probability distribution function is a Beta distribution function to represent a one of a plurality of probability distribution functions. Next, an additional virtual machine on the physical machine associated with the computer resource is added in response to a probability of a utilization of the computer resource being greater than a probabilistic bound on the over-utilization of the computer resource. Otherwise, the additional virtual machine is not added.Type: GrantFiled: August 14, 2013Date of Patent: July 12, 2016Assignee: International Business Machines CorporationInventors: Yurdaer N. Doganata, Malgorzata Steinder, Asser N. Tantawi, Merve Unuvar
-
Patent number: 9372736Abstract: Systems and methods for determining a representation of an execution trace include identifying at least one execution trace of a business process model, the business process model including parallel paths where a path influences an outcome of a decision. Path information of the business process model is determined using a processor, the path information including at least one of task execution order for each parallel path, task execution order across parallel paths, and dependency between parallel paths. A path representation for the at least one execution trace is selected based upon the path information to determine a representation of the at least one execution trace.Type: GrantFiled: May 6, 2014Date of Patent: June 21, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Francisco Curbera, Yurdaer N. Doganata, Geetika T. Lakshmanan, Merve Unuvar