Performance Evaluation By Modeling Or Statistical Analysis (epo) Patents (Class 714/E11.197)
  • Patent number: 11676089
    Abstract: A data processing system for providing a black-box optimization exchange implements receiving a black-box optimization problem, presenting the problem on a user interface, receiving a candidate solution, inserting the candidate solution into a candidate solution queue, providing the candidate solution to a simulator service cause the simulator service to execute an objective function associated with the black-box optimization problem on the candidate solution, determining an improvement value provided by the candidate solution by analyzing one or more previously determined solutions to the first black-box optimization problem and the first objective value to determine an amount of improvement provided by the candidate solution, determining a reward by analyzing the improvement value using a reward function associated with the black-box optimization problem, and notifying the user that provided the candidate solution that the candidate solution has earned the user the reward.
    Type: Grant
    Filed: August 19, 2022
    Date of Patent: June 13, 2023
    Assignee: EXOPTIMUM LLC
    Inventor: Mohammadamin Khajehnejad
  • Patent number: 11675521
    Abstract: An inventory of computer resources requiring backup data protection including an estimate of future growth of storage resources along with a set of data retention policies, rules, and outcomes in conformance with business requirements, is created. An architecture for initial ingest of protected data and a backup execution approach is created, based on the resource inventory, a sizing and assumptions of resources and data, and the set of data retention policies, rules, and outcomes. An initial ingest copies the protected data to the backup storage. The initial ingest architecture is transformed to a steady-state ingest phase, by incrementally adjusting the resources based on progress of the initial ingest. Responsive to completing the initial ingest of protected data, a steady-state backup ingest is performed. A validity of the sizing and assumptions of architecture resources is determined and an adjustment to the resources is performed based on the validity determination.
    Type: Grant
    Filed: August 19, 2021
    Date of Patent: June 13, 2023
    Assignee: International Business Machines Corporation
    Inventors: James Patrick Smith, Austen M. Cook, Thomas Franklin Ramke, Jr., Jason Ferris Basler, David George Derk, Lisa Anne Huston, Edward M. Collins, Mark L. Yakushev
  • Patent number: 11579933
    Abstract: A method for establishing system resource prediction and resource management model through multi-layer correlations is provided. The method builds an estimation model by analyzing the relationship between a main application workload, resource usage of the main application, and resource usage of sub-application resources and prepares in advance the specific resources to meet future requirements. This multi-layer analysis, prediction, and management method is different from the prior arts, which only focus on single-level estimation and resource deployment. The present invention can utilize more interactive relationships at different layers to effectively perform predictions, thereby achieving the advantage of reducing hidden resource management costs when operating application services.
    Type: Grant
    Filed: April 21, 2020
    Date of Patent: February 14, 2023
    Assignee: ProphetStor Data Services, Inc.
    Inventors: Wen-Shyen Chen, Wan-Chi Chang
  • Patent number: 11489731
    Abstract: In a computing environment, a set of executing processes each having associated resources are provided. Aggregate resources for the computing environment include multiple different types of resources. A utilization level for each of the resources within the computing environment is evaluated to determine an unconsumed capacity for each of the resources below a utilization threshold. The utilization threshold is resource-dependent. An indication of at least a portion of unconsumed capacity for each of the resources below the utilization threshold is gathered. The unconsumed portion for each of the resources below the utilization threshold is exposed for consumption by other executing processes.
    Type: Grant
    Filed: September 30, 2016
    Date of Patent: November 1, 2022
    Assignee: salesforce.com, inc.
    Inventors: James E. Walsh, Sameer Tiwari
  • Patent number: 10466671
    Abstract: A system and method for optimized operation of real-time control applications.
    Type: Grant
    Filed: April 3, 2015
    Date of Patent: November 5, 2019
    Assignee: ABB AG
    Inventors: Stefan Stattelmann, Manuel Oriol
  • Patent number: 8903696
    Abstract: A method and system for controlling granularity of transaction recording and visualizing system performance and behavior in a discrete functional verification software simulation environment is disclosed. According to one embodiment, a simulation of a model is run in a discrete event simulation system for a period of time. During the simulation, statistical values of attribute for a plurality of transactions occurring during the period of time are monitored. Based on a granularity setting, a group of consecutive transactions is grouped into a super transaction, and the statistical values representing the super transaction are recorded to represent the group of transactions. The super transactions are visualized in a visualization tool for analyzing the performance of the model.
    Type: Grant
    Filed: July 15, 2011
    Date of Patent: December 2, 2014
    Assignee: Cadence Design Systems, Inc.
    Inventors: Vincent Motel, Neeti Bhatnagar, George F. Frazier, William W. LaRue, Jr.
  • Patent number: 8856048
    Abstract: An apparatus, system, and method are disclosed for defining normal usage of a computing system resource. A method for defining normal usage of a computing system resource includes receiving a repeating schedule that represents system usage of one or more computing resources and receiving one or more demand events that will affect the system usage of the one or more computer resources. The method also automatically creates a predictive temporal profile that represents the system usage of the one or more computer resources from information comprising the repeating schedule and the one or more demand events. The predictive temporal profile is displayed for the user to review.
    Type: Grant
    Filed: October 15, 2009
    Date of Patent: October 7, 2014
    Assignee: International Business Machines Corporation
    Inventors: Jeffrey A. Calcaterra, Andrew L. Hanson, Gregory R. Hintermeister, Govindaraj Sampathkumar
  • Publication number: 20140068326
    Abstract: Systems and methods are provided for detecting an anomaly in a computer that is part of a population of networked computers. Snapshots are received from a plurality of computers within the population of computers, where individual snapshots include a state of assets and runtime processes of a respective computer. An asset normalization model is generated from the snapshots and serves as a baseline model for detecting an anomaly in the state of assets and runtime processes of a respective computer. A snapshot from at least one of the computers is compared to the asset normalization model in order to determine whether an anomaly is present in a state of static assets and runtime processes of the at least one of the computers.
    Type: Application
    Filed: September 6, 2012
    Publication date: March 6, 2014
    Applicant: TRIUMFANT, INC.
    Inventor: Mitchell N. Quinn
  • Publication number: 20130031422
    Abstract: A tool for detecting potential impairment in an electronic device. The tool classifies the user input into various categories and determines some measurement, typically a rate of input per user or per time, for determining average use statistics of the electronic device. The tool then determines if a calculated measurement based on user inputs deviates from the average use statistics past some threshold level of deviation. In response to surpassing the threshold level of deviation, the tool identifies the electronic device as potentially impaired.
    Type: Application
    Filed: July 28, 2011
    Publication date: January 31, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Caroline Church, Mark P. Frost, Dominic J. Storey, John F. Wesley, Lakshman S. B. Yatawara
  • Publication number: 20120185736
    Abstract: A method of isolating relevant components associated with a performance problem. The method comprises creating a static model of a system under test, including determining relationships between components in a middleware system. The method also comprises creating a dynamic problem tree by applying the static model to the system at runtime. The method further comprises identifying a link probability for each relationship in the dynamic problem tree; and traversing the dynamic problem tree to detect redundant components. A component is redundant if it has a link probability with its downstream component greater than a pre-determined threshold value. The method also comprises removing redundant components from the dynamic problem tree; and returning a set of components which are potential components to be analyzed further to determine the root causes of the performance problem.
    Type: Application
    Filed: January 19, 2011
    Publication date: July 19, 2012
    Applicant: ORACLE INTERNATIONAL CORPORATION
    Inventors: Govinda Raj Sambamurthy, Raji Sankar, Rahul Goyal, Ashwin Kumar Karkala
  • Publication number: 20110320880
    Abstract: A test system uses an instrumented browser to identify events that were not successfully captured during a client web session. The identified events can be used to modify a capture system that captures the client web session. Alternatively, the test system may generate replay rules that are used by a replay system to infer the missed events while replaying of the previously captured client web session. The events can include changes to Document Object Models (DOMs) for web pages used during the web sessions. The DOMs can be used to identify significant web session events and force replay sessions into the correct states.
    Type: Application
    Filed: June 23, 2010
    Publication date: December 29, 2011
    Applicant: TeaLeaf Technology, Inc.
    Inventors: Robert I. Wenig, Manoj Punjabi, Geoff Townsend
  • Publication number: 20110246837
    Abstract: In a system operations management apparatus, a burden to a system administrator when providing a decision criterion in detection of a failure in the future is reduced. The system operations management apparatus 1 includes a performance information accumulation unit 12, a model generation unit 30 and an analysis unit 31. The performance information accumulation unit 12 stores performance information including a plurality of types of performance values in a system in time series. The model generation unit 30 generates a correlation model including one or more correlations between the different types of performance values stored in the performance information accumulation unit 12 for each of a plurality of periods having one of a plurality of attributes.
    Type: Application
    Filed: October 13, 2010
    Publication date: October 6, 2011
    Inventor: Kiyoshi Kato
  • Publication number: 20100325493
    Abstract: In the system management server, an information processing apparatus that is an event-information acquisition target is registered as a monitored apparatus in configuration information; event information that complies with a rule stored in advance is identified from among a plurality of pieces of event information stored in the system management server; a server apparatus for a network service related to the event information is identified; and a message is displayed which indicates that the cause of the event that occurred in a client information processing apparatus which has generated event information is an event related to the network service, which occurred in the server apparatus.
    Type: Application
    Filed: January 26, 2009
    Publication date: December 23, 2010
    Applicant: HITACHI, LTD.
    Inventors: Tomohiro Morimura, Takayuki Nagai, Kiminori Sugauchi, Takaki Kuroda, Yoshihiro Arato
  • Publication number: 20100318855
    Abstract: Techniques for performing diagnostics are described. In one embodiment, in response to an alert or a request to perform diagnostics, a topological relationship is generated comprising a set of applications and a set of systems determined based upon information in the alert or request. The topological relationship encapsulates relationships between the set of applications and the set of systems. In one embodiment, a set of causal network models to be used for performing the diagnostics is determined based upon the applications and systems in the topological relationship.
    Type: Application
    Filed: June 16, 2009
    Publication date: December 16, 2010
    Applicant: Oracle International Corporation
    Inventors: Mirza Mohsin Beg, Charles P. Sum
  • Publication number: 20100180158
    Abstract: The illustrative embodiments disclose a computer implemented method, apparatus, and computer program product for refining statistical profile data. In one embodiment, the process interrupts an execution of a software program in response to detecting a profiling event during the execution of the software program. The process then records an event sample associated with the profiling event. The event sample is recorded in a log file. The process also inserts a set of markers describing and associated with the event sample into the log file. The process then resumes the execution of the software program.
    Type: Application
    Filed: January 15, 2009
    Publication date: July 15, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Kevin Michael Corry, Mark Alan Peloquin, Steven Pratt, Karl Milton Rister, Andrew Matthew Theurer
  • Publication number: 20100107020
    Abstract: Provided is a calculating apparatus that calculates a characteristic of a target signal, comprising a designating section that receives a designation of either a bit error rate or a sampling timing; and a calculating section that calculates a range of sampling timings over which the bit error rate is less than a designated value or a bit error rate at a designated sampling timing by using a relational expression between the sampling timing and the bit error rate in a transmission model for transmitting a signal having jitter that includes a random component and a deterministic component having a prescribed probability density distribution, the relational expression achieved by substituting, as parameters, a standard deviation of a random component in jitter of the target signal and a peak-to-peak value of a deterministic component in the jitter of the target signal.
    Type: Application
    Filed: December 24, 2008
    Publication date: April 29, 2010
    Applicant: ADVANTEST CORPORATION
    Inventors: KIYOTAKA ICHIYAMA, MASAHIRO ISHIDA
  • Patent number: 7644192
    Abstract: In order to investigate the behavior of a data storage system, the time differences between commands from an analysis device and the completion of the operations defined by those commands are analyzed. The method may use a factorial parameter table definition representing common threads of I/O events in a patterned, cyclic nature, using a host computer as the host application emulator and data logger. The workload definition is provided either from hypothetical proposed thread parameters, or by statistical and common factorial analysis of real application I/O traffic analysis, or a combination of both. The generated workloads can be run while measuring the I/O event completion timings and event queuing characteristics, facilitating engineering interpretation of results for the purpose of analyzing the effects of workload and system architectural design factors, and optimization or evaluation of total system configurations.
    Type: Grant
    Filed: August 25, 2006
    Date of Patent: January 5, 2010
    Assignee: Hitachi Global Storage Technologies Netherlands B.V
    Inventors: Martin Clive Dudley, Nicholas John Granger-Brown, Matthew Philip Latter, Christopher Edward Robert Smart
  • Publication number: 20090292954
    Abstract: A system and method for prioritizing alerts includes extracting invariants to determine a stable set of models for determining relationships among monitored system data. Equivalent thresholds for a plurality of rules are computed using an invariant network developed by extracting the invariants. For a given time window, a set of alerts are received from a system being monitored. A measurement value of the alerts is compared with a vector of equivalent thresholds, and the set of alerts is ranked.
    Type: Application
    Filed: October 28, 2008
    Publication date: November 26, 2009
    Applicant: NEC LABORATORIES AMERICA, INC.
    Inventors: Guofei Jiang, Haifeng Chen, Kenji Yoshihira
  • Publication number: 20090183023
    Abstract: A method and apparatus for fault analysis and fault isolation in a system of networked processors by using a central event correlation function and logical fault signature to provide for fault isolation of failed processing elements is presented. This central event correlation method uses asynchronous events from multiple input sources of same and different technologies and time-based fault correlation and ageing to match unique fault signatures and determine levels of fault recovery escalation over time. This mechanism uses an event driven recovery table to recognize a unique fault signature, count and age faults, provide fault threshold based recovery and generate events as needed to drive recovery escalation.
    Type: Application
    Filed: January 11, 2008
    Publication date: July 16, 2009
    Inventors: Dale Rathunde, Deepak Elandassery, William E. Barker
  • Publication number: 20090183031
    Abstract: An engine for performing root cause analysis on a system comprising a plurality of elements in a modeled domain, the engine comprising a module loader and parser for loading modules of computer code containing computer language statements modeling elements of the system, including one or more of model type definitions, conditions, causal rules, and continuations; and for parsing the computer language statements; a storage for storing the parsed computer language statements; a receiver for receiving conditions representing state changes of system elements, accessing the storage, and determining one or more parsed computer language statements to apply to the received conditions; a hypothesis generator for instantiating one or more hypotheses of potential causes of each received condition consistent with the received conditions and the parsed computer language statements; a blackboard for receiving the instantiated hypotheses, and determining a root cause of the received conditions based on the hypotheses consis
    Type: Application
    Filed: September 27, 2008
    Publication date: July 16, 2009
    Inventors: Bob BETHKE, Srikanth NATARAJAN
  • Publication number: 20090132865
    Abstract: Systems and methods are disclosed that profile event sequences by creating a mixture model from the event sequences; estimating parameters for the mixture model; and applying the mixture model to profile the event sequences.
    Type: Application
    Filed: November 16, 2007
    Publication date: May 21, 2009
    Applicant: NEC LABORATORIES AMERICA, INC.
    Inventors: Xiaoqiao Meng, Guofei Jiang, Hui Zhang, Haifeng Chen, Kenji Yoshihira
  • Publication number: 20090089618
    Abstract: In accordance with a particular embodiment of the present invention, a method is offered that includes generating an automatic test case generation using model checking for web applications, the automatic test case generation including: developing a specification; verifying a property using model checking on the specification; obtaining a counterexample, whereby the counterexample is mapped to a web test case; and executing the web test case on an implementation. In more specific embodiments, the method includes generating counterexamples by negating a desirable property and then model checking the specification, whereby the counterexamples represent a set of witnesses that are mapped to the web test case; and executing the web test case on the implementation. In still other specific embodiments, the generating step and the executing step are repeated on available properties and on their available counterexamples. The witnesses can be mapped to the web test case through selected framework technology.
    Type: Application
    Filed: October 1, 2007
    Publication date: April 2, 2009
    Applicant: Fujitsu Limited
    Inventors: Sreeranga P. Rajan, Praveen Kumar Murthy
  • Publication number: 20090031176
    Abstract: A system such as a Web-based system in which a plurality of computers interact with each other is monitored to detect online an anomaly. Transactions of a service provided by each of a plurality of computers to another computer are collected, a matrix of correlations between nodes in the system is calculated from the transactions, and a feature vector representing anode activity balance is obtained from the matrix. The feature vector is monitored using a probability model to detect a transition to an anomalous state.
    Type: Application
    Filed: October 31, 2007
    Publication date: January 29, 2009
    Inventors: Tsuyoshi Ide, Kunikazu Yoda, Hisashi Kashima, Hiroaki Etoh, Ryo Hirade
  • Publication number: 20090006931
    Abstract: Techniques are provided that generate bit reliabilities for a detected sequence. A detector generates the detected sequence. According to one embodiment, a post-processor finds a first set of combinations of one or more error events in the detected sequence satisfying a complete set or a subset of error correction constraints corresponding to the first bit value, finds a second set of combinations of one or more error events in the detected sequence satisfying a complete set or a subset of error correction constraints corresponding to the second bit value, selects a first most likely combination of one or more events of the first set and a second most likely combination of one or more events of the second set, and generates a bit reliability based on the first and the second most likely values.
    Type: Application
    Filed: June 29, 2007
    Publication date: January 1, 2009
    Applicant: Hitachi Global Storage Technologies Netherlands, B.V.
    Inventors: Ivana Djurdjevic, Bruce Alexander Wilson, Mario Blaum, Richard Leo Galbraith, Ksenija Lakovic, Yuan Xing Lee, Zongwang Li, Travis Roger Oenning
  • Publication number: 20080133435
    Abstract: A system adapted for analyzing performance and scalability of at least one computer system is disclosed. The system include a monitoring module configured for capturing at least one metric of an application for analyzing performance and scalability and a performance knowledge repository created and represented by using the at least one metric captured by the monitoring module. The system further includes a diagnosis module adapted for mapping the at least one metric to the performance knowledge repository using a diagnosis module and an analysis module configured for conducting performance and scalability analysis based on the mapping of the at least one metric for detecting at least one undesirable condition.
    Type: Application
    Filed: December 5, 2006
    Publication date: June 5, 2008
    Inventors: Ramkumar N. Chintalapti, Rajeshwari Ganesan, Sachin Ashok Wagh
  • Publication number: 20070300103
    Abstract: A method and system for identifying a configuration parameter of a “sick” computer system that is at fault for causing an undesired behavior based on analysis of configuration parameters from other computer systems is provided. In one embodiment, a troubleshooting system collects “suspect” values for “suspect” configuration parameters used by a “sick” application when the undesired behavior was exhibited by the sick computer system. The troubleshooting system then compares the suspect values to sample values of the suspect configuration parameters retrieved from sample computer systems. The troubleshooting system uses that comparison to identify one or more suspect configuration parameters that are likely at fault for causing the application to exhibit the undesired behavior.
    Type: Application
    Filed: June 13, 2007
    Publication date: December 27, 2007
    Applicant: Microsoft Corporation
    Inventors: Chad Verbowski, Jiahe Wang, John Platt, Ruyun Zhang, Yu Chen