-
公开(公告)号:US11928824B2
公开(公告)日:2024-03-12
申请号:US17472849
申请日:2021-09-13
Applicant: International Business Machines Corporation
Inventor: Xue Ping Liu , Dan Zhang , Yuan Yuan Ding , Chao Xin , Fan Li , Hong Bing Zhang , Xu Min
CPC classification number: G06T7/136 , G06F18/23 , G06T2200/04 , G06T2207/10028
Abstract: An approach is provided in which the approach receives an image that includes multiple image points and constructs a plane in the image based on a first subset of the plurality of image points. The approach identifies a second subset of the image points that belong to the plane and are not part of the first subset of image points, and removes the first subset of image points and the second subset of image points form the image points. The approach annotates the remaining subset of image points in the image.
-
公开(公告)号:US11922226B2
公开(公告)日:2024-03-05
申请号:US17362774
申请日:2021-06-29
Applicant: KYNDRYL, INC.
Inventor: Manish Gupta
CPC classification number: G06F9/5088 , G06F9/5038 , G06F9/505 , G06F11/0757
Abstract: Adaptive control of deadline-constrained workload migrations can include monitoring migrations of workloads forming a wave migrating from a source computing node to a target computing node. The monitoring can be performed in real time. The migrations can be performed by transferring image replications of each workload over a data communication network. Based on an expected bandwidth availability, a likelihood that a cutover deadline associated with the wave is exceeded prior to completing a migration of each of the wave's workloads can be predicted. Migration of one or more selected workloads can be suspended in response to determining that exceeding the cutover deadline prior to completing migration of each of the wave's workloads is likely.
-
公开(公告)号:US11811921B2
公开(公告)日:2023-11-07
申请号:US17460234
申请日:2021-08-29
Applicant: International Business Machines Corporation
Inventor: Aaron K. Baughman , Shikhar Kwatra , Iranna Dharmaraya Ankad , Craig M. Trim
IPC: H04L9/08 , H04L29/08 , H04L67/1097 , H04L67/06
CPC classification number: H04L9/0852 , H04L9/085 , H04L9/0825 , H04L67/06 , H04L67/1097
Abstract: An approach is provided in which the approach receives a request to upload a file at a server system that includes metadata encoded with a non-invertible key. The metadata includes contact information corresponding to an owner of the file. The approach establishes both a photon channel and a classical channel between the server system and a client system, which are both secured using one or more shared secret keys. The approach interfaces with the client system over the photon channel and the classical channel to decode the contact information at the server system, and sends an upload request from the server system to the owner of the file using the contact information. The approach authorizes the upload request at the server system in response to receiving an upload approval from the owner.
-
公开(公告)号:US11748352B2
公开(公告)日:2023-09-05
申请号:US17412389
申请日:2021-08-26
Applicant: International Business Machines Corporation
Inventor: Shuo Li , Xiaobo Wang , Meng Wan , Sheng Yan Sun
IPC: G06F16/00 , G06F16/2453 , G06F11/34 , G06F16/22 , G06N20/00 , G06F18/214 , G06F16/242 , G06F16/24
CPC classification number: G06F16/24549 , G06F11/3433 , G06F16/2228 , G06F16/24 , G06F16/2423 , G06F16/2445 , G06F18/214 , G06N20/00
Abstract: An approach is provided in which the approach segments each one of multiple components corresponding to multiple component levels in an SQL database system into multiple functions. The approach combines a first one of the multiple functions with a second one of the multiple functions into an image, and invokes the image to process an SQL query using the first function and the second function.
-
5.
公开(公告)号:US11681831B2
公开(公告)日:2023-06-20
申请号:US16380970
申请日:2019-04-10
Applicant: International Business Machines Corporation
CPC classification number: G06F21/75 , G06F1/28 , G06F21/554 , G06F21/577 , G06N20/00
Abstract: An approach is provided that receives a set of actual hardware power consumption details and a set of software activity details with all of the details pertaining to the use of a computer system at a first time. Based on the set of software activity details, the approach determines a set of expected hardware power consumption details. The set of actual hardware power consumption details are compared to the set of expected hardware power consumption details. If the comparison identifies variances between the actual and expected data, then a security threat is flagged and threat responses are performed.
-
公开(公告)号:US11233651B2
公开(公告)日:2022-01-25
申请号:US16821558
申请日:2020-03-17
Applicant: Lenovo (Singapore) Pte. Ltd.
Inventor: Igor Stolbikov , Veronika Stolbikova , Rod D. Waltermann , Joseph M. Pennisi
IPC: H04L9/32
Abstract: An approach is provided that uses multiple hashing algorithms to verify a password. The approach receives a password that corresponds to a user identifier. A set of hashing algorithms are retrieved with the retrieved set based on the received user identifier so that different user identifiers utilize different sets of hashing algorithms. Hashing the password using each of the hashing algorithms included in the set of algorithms with the hashing resulting in a hash result. An expected hash result that corresponds to the user identifier is retrieved and the approach then verifies the received password by comparing the hash result to the first expected hash result.
-
公开(公告)号:US11120802B2
公开(公告)日:2021-09-14
申请号:US15819127
申请日:2017-11-21
Applicant: International Business Machines Corporation
Inventor: Kenneth W. Church , Dimitrios B. Dimitriadis , Petr Fousek , Miroslav Novak , George A. Saon
Abstract: An approach is provided that receives an audio stream and utilizes a voice activation detection (VAD) process to create a digital audio stream of voices from at least two different speakers. An automatic speech recognition (ASR) process is applied to the digital stream with the ASR process resulting in the spoken words to which a speaker turn detection (STD) process is applied to identify a number of speaker segments with each speaker segment ending at a word boundary. A speaker clustering algorithm is then applied to the speaker segments to associate one of the speakers with each of the speaker segments.
-
公开(公告)号:US11061662B1
公开(公告)日:2021-07-13
申请号:US16732808
申请日:2020-01-02
Applicant: International Business Machines Corporation
Inventor: Pierre C. Berlandier , Swaminathan Balasubramanian , Sarbajit K. Rakshit , Ravi Prakash Bansal
Abstract: An approach is provided in which the approach analyzes a set of code artifact changes from historical updates of a software application. The approach determines that a first code artifact and a second code artifact change in tandem and generates a change template based on the set of code artifact changes. The approach uses the change template to update the software application in response to receiving a request to apply the change template to the software application.
-
公开(公告)号:US10706048B2
公开(公告)日:2020-07-07
申请号:US15430597
申请日:2017-02-13
Applicant: International Business Machines Corporation
Inventor: Kyle L. Croutwater , Vikrant Verma , Le Zhang , Zhe Zhang
IPC: G06F16/24 , G06F16/2452 , G06F16/242 , G06F16/2455 , G06F40/247 , G06F40/289
Abstract: An approach is provided that receives a question at a question answering (QA) system. The question includes a number of words. The approach operates by calculating weights that correspond to search terms included in the plurality of words. The search terms include the plurality of words and may include terms that are one or more sequences of adjacent words included in the question. Based on the calculated weights and the words in the question, the approach generates a query that is used to search a corpus that is managed by the QA system with the search resulting in one or more search results.
-
公开(公告)号:US10666065B2
公开(公告)日:2020-05-26
申请号:US15473191
申请日:2017-03-29
Applicant: Lenovo (Singapore) Pte. Ltd.
Inventor: John S. Crowe , Gary D. Cudak , Jennifer J. Lee-Baron , Nathan J. Peterson , Amy L. Rose , Bryan L. Young
IPC: H02J7/00 , H01M10/42 , H01M10/48 , H01M10/44 , H01M10/052
Abstract: An approach is provided that determines that power from at least one battery cell in a multi-battery cell configuration is not required to power the device based on a power requirement of the device. The approach then regulates voltages from the battery cells so that first set of the battery cells is shunted (0 v) and a second set of the battery cells is regulated with the voltage being set to one or more voltage levels to satisfy the power requirement.
-
-
-
-
-
-
-
-
-