-
11.
公开(公告)号:US20190205435A1
公开(公告)日:2019-07-04
申请号:US15856511
申请日:2017-12-28
Applicant: International Business Machines Corporation
Inventor: Sujatha Kashyap , Anne E. Gattiker , Kaipeng Li , Samuel Thomas , Minh Ngoc Binh Nguyen , Thomas Hubregtsen
Abstract: Examples of techniques for constructing, evaluating, and improving a search string for retrieving images are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method includes constructing, by a processing device, a search string based at least in part on a tuple including an item class, an action, and an actor. The method further includes retrieving, by the processing device, a plurality of images based at least in part on the search string for an item. The method further includes evaluating, by the processing device, the retrieved plurality of images based on a similarity to determine whether the search string is effective at indicating a common item use. The method further includes, based at least in part on determining that the search string is ineffective at indicating the item use, generating, by the processing device, an alternative search string.
-
公开(公告)号:US10025676B2
公开(公告)日:2018-07-17
申请号:US14723797
申请日:2015-05-28
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Sujatha Kashyap , Lisa B. Maurice , Joseph H. Robichaux
Abstract: In a distributed file system with a number of replicas of a file set to two or more replicas, a computer sets a timer to track a time since a last access to the file, wherein the replicas of the file are distributed across two or more nodes within the distributed file system. Responsive to an access to the file prior to the timer reaching a first timer window threshold, the computer resets the timer. Responsive to the timer matching a first timer window threshold, the computer automatically reduces a number of replicas of the file within the distributed file system, wherein the probability that the file will be accessed prior to the first timer window threshold is greater than the probability that the file will be accessed after the first timer window threshold.
-
13.
公开(公告)号:US08990641B2
公开(公告)日:2015-03-24
申请号:US13679593
申请日:2012-11-16
Applicant: International Business Machines Corporation
Inventor: Marc A. Gollub , Benjiman L. Goodman , Sujatha Kashyap , Eric E. Retter , Yuen C. Tschang
IPC: G06F11/00
CPC classification number: G06F11/006 , G06F11/1004
Abstract: In a data processing system, a selection is made, based at least on addresses of previously detected errors in a memory subsystem, between at least a first timing and a second timing of data transmission with respect to completion of error detection processing on a target memory block of the memory access request. In response to receipt of the memory access request and selection of the first timing, data from the target memory block is transmitted to a requestor prior to completion of error detection processing on the target memory block. In response to receipt of the memory access request and selection of the second timing, data from the target memory block is transmitted to the requestor after and in response to completion of error detection processing on the target memory block.
Abstract translation: 在数据处理系统中,至少基于存储器子系统中的先前检测到的错误的地址,在关于目标存储器上的错误检测处理完成的数据传输的至少第一定时和第二定时之间进行选择 块的内存访问请求。 响应于存储器访问请求的接收和第一定时的选择,在对目标存储器块进行错误检测处理完成之前,来自目标存储器块的数据被发送到请求者。 响应于存储器访问请求的接收和第二定时的选择,来自目标存储器块的数据在对目标存储器块执行错误检测处理之后并且响应于完成对目标存储器块的错误检测处理而被发送到请求者。
-
14.
公开(公告)号:US11061943B2
公开(公告)日:2021-07-13
申请号:US15856499
申请日:2017-12-28
Applicant: International Business Machines Corporation
Inventor: Sujatha Kashyap , Anne E. Gattiker , Kaipeng Li , Samuel Thomas , Minh Ngoc Binh Nguyen , Thomas Hubregtsen
IPC: G06F16/00 , G06F16/33 , G06K9/62 , G06K9/00 , G06F16/58 , G06F16/2457 , G06F16/55 , G06F16/583
Abstract: Examples of techniques for constructing, evaluating, and improving a search string for retrieving images are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method includes receiving, by a processing device, a plurality of images returned as results to an executed search string in the form of a tuple including an item class, an action and an actor. The method further includes generating, by the processing device, a collection similarity score by comparing at least one of the plurality of images to at least one other of the plurality of images. The method further includes determining, by the processing device, whether the collection similarity score exceeds a collection threshold. The method further includes, based at least in part on determining that the similarity score does not exceed the collection threshold, indicating that the search string is ineffective at indicating the item use.
-
15.
公开(公告)号:US11055345B2
公开(公告)日:2021-07-06
申请号:US15856485
申请日:2017-12-28
Applicant: International Business Machines Corporation
Inventor: Anne E. Gattiker , Samuel Thomas , Minh Ngoc Binh Nguyen , Sujatha Kashyap , Thomas Hubregtsen
Abstract: Examples of techniques for constructing, evaluating, and improving a search string for retrieving images are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method includes receiving, by a processing device, an item identifier. The method further includes retrieving, by the processing device, an item description based at least in part on the item identifier. The method further includes identifying, by the processing device, a tuple indicating a common item use based at least in part on the item description. The method further includes constructing, by the processing device, a search string based at least in part on the tuple. The method further includes retrieving, by the processing device, at least one image based at least in part on the search string.
-
16.
公开(公告)号:US20190205434A1
公开(公告)日:2019-07-04
申请号:US15856485
申请日:2017-12-28
Applicant: International Business Machines Corporation
Inventor: Anne E. Gattiker , Samuel Thomas , Minh Ngoc Binh Nguyen , Sujatha Kashyap , Thomas Hubregtsen
CPC classification number: G06F16/5866 , G06F16/951 , G06K9/00342 , G06K9/6215 , G06K9/6276 , G06K2209/27 , G06N20/00
Abstract: Examples of techniques for constructing, evaluating, and improving a search string for retrieving images are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method includes receiving, by a processing device, an item identifier. The method further includes retrieving, by the processing device, an item description based at least in part on the item identifier. The method further includes identifying, by the processing device, a tuple indicating a common item use based at least in part on the item description. The method further includes constructing, by the processing device, a search string based at least in part on the tuple. The method further includes retrieving, by the processing device, at least one image based at least in part on the search string.
-
17.
公开(公告)号:US20190205432A1
公开(公告)日:2019-07-04
申请号:US15856499
申请日:2017-12-28
Applicant: International Business Machines Corporation
Inventor: Sujatha Kashyap , Anne E. Gattiker , Kaipeng Li , Samuel Thomas , Minh Ngoc Binh Nguyen , Thomas Hubregtsen
CPC classification number: G06F16/5838 , G06F16/24578 , G06F16/5866 , G06K9/00342 , G06K9/6215 , G06K9/6276 , G06K2209/27
Abstract: Examples of techniques for constructing, evaluating, and improving a search string for retrieving images are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method includes receiving, by a processing device, a plurality of images returned as results to an executed search string in the form of a tuple including an item class, an action and an actor. The method further includes generating, by the processing device, a collection similarity score by comparing at least one of the plurality of images to at least one other of the plurality of images. The method further includes determining, by the processing device, whether the collection similarity score exceeds a collection threshold. The method further includes, based at least in part on determining that the similarity score does not exceed the collection threshold, indicating that the search string is ineffective at indicating the item use.
-
公开(公告)号:US09509627B2
公开(公告)日:2016-11-29
申请号:US14501305
申请日:2014-09-30
Applicant: International Business Machines Corporation
Inventor: Casimer DeCusatis , Sujatha Kashyap , Rajaram B. Krishnamurthy
IPC: H04L12/911 , H04L12/26 , G06F17/30 , H04L12/801 , H04L12/835
CPC classification number: H04L47/70 , G06F17/30153 , H04L43/026 , H04L43/08 , H04L43/0805 , H04L43/0823 , H04L43/16 , H04L47/11 , H04L47/30
Abstract: Embodiments include a method, system, and computer program product for managing workloads in a network. A switch receives data associated with a workload. The received data is tagged with an identifier that associates the data with the workload. The received data is compressed based on determining that second data stored in a buffer of the switch exceeds a threshold. The switch stores the compressed data in the buffer. The compressed data is transmitted to a second network based on a determination that the switch is over-subscribed.
Abstract translation: 实施例包括用于管理网络中的工作负载的方法,系统和计算机程序产品。 交换机接收与工作负载相关联的数据。 接收到的数据被标记有将数据与工作负载相关联的标识符。 基于确定存储在交换机的缓冲器中的第二数据超过阈值来压缩所接收的数据。 交换机将压缩数据存储在缓冲区中。 基于交换机被超订购的确定,压缩数据被发送到第二网络。
-
公开(公告)号:US09473418B2
公开(公告)日:2016-10-18
申请号:US14104738
申请日:2013-12-12
Applicant: International Business Machines Corporation
Inventor: Casimer DeCusatis , Sujatha Kashyap , Rajaram B. Krishnamurthy
IPC: H04L12/911 , H04L12/26 , G06F17/30 , H04L12/801 , H04L12/835
CPC classification number: H04L47/70 , G06F17/30153 , H04L43/026 , H04L43/08 , H04L43/0805 , H04L43/0823 , H04L43/16 , H04L47/11 , H04L47/30
Abstract: Embodiments include a method, system, and computer program product for managing workloads in a network. A switch receives data associated with a workload. The received data is tagged with an identifier that associates the data with the workload. The received data is compressed based on determining that second data stored in a buffer of the switch exceeds a threshold. The switch stores the compressed data in the buffer. The compressed data is transmitted to a second network based on a determination that the switch is over-subscribed.
-
公开(公告)号:US09456036B2
公开(公告)日:2016-09-27
申请号:US14826259
申请日:2015-08-14
Applicant: International Business Machines Corporation
Inventor: Casimer DeCusatis , Sujatha Kashyap , Rajaram B. Krishnamurthy
IPC: G06F15/16 , H04L29/08 , G06F15/167
CPC classification number: H04L67/1097 , G06F15/167
Abstract: Embodiments include a method, system, and computer program product for allocating data to storage in a network. A data item accessed by a server in the network is identified. A controller classifies the identified data item based on at least one of: a frequency of access requests for the data item by the server and an access time associated with providing the data item to the server once the server requests the data item. A memory of a switch in the network is selected for storing the data item based on the classification of the data item. The controller causes the data item to be stored in the memory of the switch, from which the data item is accessed by the server upon request.
-
-
-
-
-
-
-
-
-