-
公开(公告)号:US20140337076A1
公开(公告)日:2014-11-13
申请号:US13890656
申请日:2013-05-09
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
IPC: G06Q10/06
CPC classification number: G06Q10/063114 , G06F16/951
Abstract: A method for resolving a query received by a support team comprising a plurality of members includes inferring current activities in which the plurality of members are involved and forwarding the query to a subset of the plurality of members based on how assignment of the query is expected to affect the current activities of the subset of the plurality of members.
Abstract translation: 解决由包括多个成员的支持小组接收到的查询的方法包括推断当前活动,在该活动中多个成员参与其中,并且基于查询的分配如何预期将该查询转发到多个成员的子集 影响多个成员的子集的当前活动。
-
公开(公告)号:US12101224B2
公开(公告)日:2024-09-24
申请号:US17807534
申请日:2022-06-17
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Priscilla Barreira Avegliano , Emilio Ashton Vital Brazil , Lucas Correia Villa Real , Marco Aurelio Stelmar Netto
IPC: H04L41/082 , H04L41/0859
CPC classification number: H04L41/082 , H04L41/0859
Abstract: According to one embodiment, a method, computer system, and computer program product for adaptive surrogate modeling is provided. The embodiment may include capturing a plurality of system information for a smart Internet of Things (IoT) device. The embodiment may also include calculating a lifespan value of the smart IoT device based on the plurality of captured system information. The embodiment may further include, in response to the calculated lifespan value being below a threshold and a surrogate model fitting one or more parameters of the smart IoT device not existing, creating the surrogate model for the smart IoT device. The embodiment may also include deploying the created surrogate model to the smart IoT device through an update transmission.
-
公开(公告)号:US12061310B2
公开(公告)日:2024-08-13
申请号:US17496430
申请日:2021-10-07
Applicant: International Business Machines Corporation
Inventor: Bruno Silva , Marco Aurelio Stelmar Netto , Priscilla Barreira Avegliano , Eduardo Rocha Rodrigues
Abstract: One or more processors may detect that an extreme event that occurred in a first region. One or more processors may determine that the extreme event creates a drift in a probability distribution that is an output of a model associated with the first region. One or more processors may retrain the model associated with the first region using data associated with the extreme event. One or more processors may identify a second region similar to the first region according to a defined correlation threshold. One or more processors may generate data representing potential extreme scenarios for the second region based on the detected extreme event in the first region. One or more processors may retrain a model associated with the second region based on the generated data representing potential extreme scenarios.
-
公开(公告)号:US20240053980A1
公开(公告)日:2024-02-15
申请号:US17819025
申请日:2022-08-11
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Marco Aurelio Stelmar Netto , Lucas Correia Villa Real , Bruno Silva , Renan Francisco Santos Souza
CPC classification number: G06F8/71 , G06F11/3688 , G06F11/3684
Abstract: A method, computer system, and a computer program product for generating instructions to highlight software change may be provided. In one embodiment, the technique comprises obtaining information about a requested modification to an original code of a software program and classifying it based on the type of change requested by the modification. The unit tests available are then identified. At least one of the identified unit tests are selected and customized based on classification of the type of code modification requested. Using the at least one selected and customized unit test, the differences between the original and modified code may be identified. One or more test execution stories are then generated related to the modification of the code, to highlight the changes. Test execution stories are further analyzed to provide any additional missing information.
-
公开(公告)号:US11714615B2
公开(公告)日:2023-08-01
申请号:US17024745
申请日:2020-09-18
Applicant: International Business Machines Corporation
Inventor: Bruno Silva , Marco Aurelio Stelmar Netto , Renato Luiz de Freitas Cunha , Nelson Mimura Gonzalez
CPC classification number: G06F8/433 , G06F9/45558 , G06F9/4856 , G06F2009/4557 , G06F2009/45595
Abstract: Described are techniques for application migration. The techniques include migrating an application to a target cloud infrastructure and generating a cost-aware code dependency graph during execution of the application on the target cloud infrastructure. The techniques further include modifying the application by removing source code corresponding to unused nodes according to the cost-aware code dependency graph and replacing identified source code of a high-cost subgraph of the cost-aware code dependency graph with calls to a generated microservice configured to provide functionality similar to the identified source code. The techniques further include implementing the modified application on one or more virtual machines of the target cloud infrastructure.
-
公开(公告)号:US20230161585A1
公开(公告)日:2023-05-25
申请号:US17533188
申请日:2021-11-23
Applicant: International Business Machines Corporation
Inventor: JULIANA MEDEIROS DESTRO , Flavio Gilberto De Souza , Diego Aparecido Wolfshorndl , Marco Aurelio Stelmar Netto
IPC: G06F8/73 , G06F21/60 , G06F40/242
CPC classification number: G06F8/73 , G06F21/60 , G06F40/242
Abstract: Aspects of the invention include correlating a context of a written data privacy requirement with a first code segment of a source code of a target computer system. A selection of a first candidate code segment is received to replace the first code segment. The selected first candidate code segment is determined to have replaced the first code segment and is integrated into the source code. A stimulation signal is transmitted to the target computer system, wherein the stimulation signal is directed toward the first candidate code segment integrated into the source code.
-
公开(公告)号:US20220283930A1
公开(公告)日:2022-09-08
申请号:US17194668
申请日:2021-03-08
Applicant: International Business Machines Corporation
Inventor: Vagner Figueredo de Santana , Sheldon Busby , Gray Franklin Cannon , Marco Aurelio Stelmar Netto , Patrick Veedock
Abstract: A computer-implemented method, system and computer program product for generating test cases for testing software. Log files are analyzed for indications of software defects resulting in software errors. For those log files that were found to indicate software errors, such log files are analyzed to determine if they contain personal data that needs to be anonymized based on an entropy score of the personal data. When the entropy score of the personal data is below a threshold value, anonymized variations of the personal data are generated. Trace logs are then created containing the anonymized variations of the personal data, which are returned to a software tester to create a test case for testing software using the created trace logs without having access to personal data. In this manner, the software tester may reproduce the software errors without having access to the personal data.
-
28.
公开(公告)号:US11132181B1
公开(公告)日:2021-09-28
申请号:US16942777
申请日:2020-07-30
Applicant: International Business Machines Corporation
Inventor: Marco Aurelio Stelmar Netto , Thiago Bianchi , Thiago Roberto Fontes Iunes , Ana Paula Brambila
IPC: G06F9/44 , G06F8/33 , G06F16/906 , G06F8/70
Abstract: A computer system for configuring an Integrated Development Environment display is provided. The computer system receives a list of system artifacts that is categorized by at least one artifact type and indexed by affected source code elements. In response to a user beginning an IDE session, the computer system assigning an impact relevance threshold to the user and, in response to the user selecting a source code element, the computer system identifies artifacts from the list of artifacts that affect the selected source code element. The computer system, in accordance with impact values assigned to the artifact types for the source code element, selects from the identified artifacts, a set of display artifacts having assigned impact values that meet or exceed the impact relevance threshold assigned to the user. The computer system the set of display artifacts on an IDE display element.
-
公开(公告)号:US11126524B2
公开(公告)日:2021-09-21
申请号:US16558400
申请日:2019-09-03
Applicant: International Business Machines Corporation
IPC: G06F3/02 , G06F11/30 , G06N20/00 , G06F9/4401
Abstract: A machine learning system for configuring input devices connected to a computer cluster is provided. A computing device analyzes one or more input devices connected to one or more computer device executing within a workstation. A computer device receives one or more signals from the one or more input devices connected to the one or more computer devices executing within the workstation. A computing device converts the one or more signals from the one or more input devices connected to the one or more computer devices executing within the workstation into one or more device data. A computing device analyzes the one or more device data from the one or more input devices connected to the one or more computer devices executing within the workstation. A computer device determines a detected pattern of device data, wherein a computer device generates a key-mapping command.
-
公开(公告)号:US20210243217A1
公开(公告)日:2021-08-05
申请号:US16777993
申请日:2020-01-31
Applicant: International Business Machines Corporation
Inventor: Marco Aurelio Stelmar Netto , Vagner Figueredo de Santana , Bruno Silva , Renato Luiz de Freitas Cunha , Fernando Luiz Koch
Abstract: Aspects of the invention include a computer-implemented method, including performing simulations of a form of cyber-attack based on different input parameters to determine a respective time to perform each cyber-attack on a plurality of features of a sensor-based device. Additionally, performing simulations of a plurality of mitigating processes for each cyber-attack based on different input parameters to determine a respective time to perform each mitigating process. An associated risk level of each cyber-attack is determined based at least in part on the simulations. A mitigation process is selected based at least in part on the associated risk levels.
-
-
-
-
-
-
-
-
-