Patent application number | Description | Published |
20080300851 | System and method for application migration in a grid computing environment - A system and method for assessing performance of a software application migrated to a grid infrastructure is provided. The system comprises a grid code analyzer for generating a directed acyclic graph (DAG) corresponding to the software application by performing static and dynamic analysis; a grid task generator for reducing the DAG generated by the grid code analyzer; and a grid simulator for simulating performance of the software application on one or more predetermined grid infrastructures. The grid simulator accepts the reduced DAG as input and produces performance data as output. | 12-04-2008 |
20090282418 | Method and system for integrated scheduling and replication in a grid computing system - A method for scheduling a plurality of computation jobs to a plurality of data processing units (DPUs) in a grid computing system | 11-12-2009 |
20120272206 | ANALYSIS SYSTEM FOR TEST ARTIFACT GENERATION - A requirements testing system facilitates the review and analysis of requirement statements for software applications. The requirements testing system generates test artifacts from the requirement statements. The test artifacts characterize the requirements statements to provide valuable analysis information that aids understanding whether the requirement statements are testable, what the intentions of the requirement statements are, and other useful analysis information. Because the system generates the analysis information from the requirement statements, the system provides benefits in terms of early feedback along the software application development timeline. | 10-25-2012 |
20130054536 | BACKUP OF DATA ACROSS NETWORK OF DEVICES - A distribution plan that indicates how to encode and distribute backup data across multiple data centres may be generated. The distribution plan may be generated such that one or more characteristics of the distribution plan, such as costs, are optimized while constraints on the plan, such as protection level, recovery point objective (RPO), and recovery time objective (RTO) are satisfied. The protection level may indicate the number of the data centres that are to remain available such that the backup data is recoverable from encoded fragments of the backup data stored in the data centres that remain available. | 02-28-2013 |
20130185056 | SYSTEM FOR GENERATING TEST SCENARIOS AND TEST CONDITIONS AND EXPECTED RESULTS - A requirements testing system facilitates the review and analysis of requirement statements for software applications. The requirements testing system automatically generates test artifacts from the requirement statements, including test scenarios, test conditions, test hints, and expected results. These test artifacts characterize the requirements statements to provide valuable analysis information that aids understanding what the intentions of the requirement statements are. The automation of the generation of these test artifacts produces numerous benefits, including fewer errors, objectivity, and no dependency on the skills and experience of a creator. | 07-18-2013 |
20130268916 | COMPONENT DISCOVERY FROM SOURCE CODE - A method for component discovery from source code may include receiving source code, and determining business classes by excluding packages and classes in the source code identified as belonging to a presentation layer, as belonging to a data access layer, as models and/or as utilities. The method may further include extracting multi-dimensional features from the business classes, estimating similarity for business class pairs based on the extracted multi-dimensional features, clustering the business classes based on the similarity and mapping functional concepts to the clusters. The clusters generated by the clustering may represent components of the source code. The method may also include determining interfaces for the components based on the clustering. | 10-10-2013 |
20140101111 | BACKUP OF DATA ACROSS NETWORK OF DEVICES - A distribution plan that indicates how to encode and distribute backup data across multiple data centres may be generated. The distribution plan may be generated such that one or more characteristics of the distribution plan, such as costs, are optimized while constraints on the plan, such as protection level, recovery point objective (RPO), and recovery time objective (RTO) are satisfied. The protection level may indicate the number of the data centres that are to remain available such that the backup data is recoverable from encoded fragments of the backup data stored in the data centres that remain available. | 04-10-2014 |
20140149485 | METHOD AND SYSTEM FOR MANAGING USER STATE FOR APPLICATIONS DEPLOYED ON PLATFORM AS A SERVICE (PAAS) CLOUDS - The REsilient LOosely Coupled (ReLoC) system and method implement a session-state management architecture for cloud computing that uses loosely-coupled services and platform agnostic scalable messaging technology to propagate and save session states. Maintaining the state of applications and user sessions is difficult in large scale web-based software systems, particularly in the context of cloud computing (e.g., platform as a service (PaaS) vendors, do not explicitly support state management infrastructure, such as clustering). In a PaaS environment, a user has little or no access and control over the server platform and session management layer. The platform tiers are generally loosely coupled and service-oriented, which make traditional session-state management techniques non-usable. The ReLoC system and method provides a high level of tolerance to failures of the platform tiers without corresponding disruptions in user sessions. In the context of PaaS Clouds, the ReLoC system provides greater scalability compared to traditional clustering environments. | 05-29-2014 |
20140163966 | IDENTIFYING GLOSSARY TERMS FROM NATURAL LANGUAGE TEXT DOCUMENTS - A device may obtain text to be analyzed to identify glossary terms. The device may analyze a linguistic unit to generate multiple linguistic units related to the linguistic unit. The device may analyze the multiple linguistic units to generate potential glossary terms. The device may perform a glossary term analysis on the potential glossary terms to generate glossary terms that include a subset of the potential glossary terms. The device may identify included terms that are included in the glossary terms. The device may identify excluded terms that are excluded from the glossary terms. The device may determine a semantic relatedness score between at least one excluded term and at least one included term. The device may selectively add the excluded linguistic term to the glossary terms to form a final set of glossary terms based on the semantic relatedness score, and may output the final set of glossary terms. | 06-12-2014 |
20140201541 | SECURE ONLINE DISTRIBUTED DATA STORAGE SERVICES - The data vaporizer provides secure online distributed data storage services that securely store and retrieve data in a public distributed storage substrate such as public cloud. The data vaporizer vaporizes (e.g., fragmented into tiny chunks of configurable sizes) data and distributes the fragments to multiple storage nodes so that the data is not vulnerable to local disk failures, secures data so that even if some of the storage nodes are compromised, the data is undecipherable to the attacker, stores data across multiple cloud storage providers and/or parties using keys (e.g., tokens) provided by multiple parties (including the owners of the data) and maintains data confidentiality and integrity even where one or more data storage provider is compromised. The data vaporizer is configurable for different domain requirements including data privacy and anonymization requirements, encryption mechanisms, regulatory compliance of storage locations, and backup and recovery constraints. | 07-17-2014 |
20140337820 | SOURCE CODE FLOW ANALYSIS USING INFORMATION RETRIEVAL - According to an example, source code flow analysis may include receiving source code for an application, and identifying virtual flow documents for the application from the source code. The virtual flow documents may represent ordered sequences of method calls for the application. The source code flow analysis may further include extracting features of the virtual flow documents, determining similarity between the virtual flow documents by estimating similarities for the extracted features to determine a flow-to-flow similarity, and clustering the virtual flow documents based on the flow-to-flow similarity. The flow-to-flow similarity may be further used, for example, to generate highest priority virtual flow documents and methods for the source code. The source code flow analysis may also include determination of flow-to-maintenance activity description (MAD) similarity, for example, to identify relevant virtual flow documents from the virtual flow documents based on the flow-to-MAD similarity to generate ordered relevant virtual flow documents. | 11-13-2014 |
20140359129 | Migration Assessment for Cloud Computing Platforms - Various embodiments provide an assessment tool that enables an automated functional assessment of applications for migration to target cloud computing platforms, such as a Platform as a Service (PaaS). The technical capabilities of various types of applications in a traditional non-platform deployment are studied and support for these technical capabilities is evaluated relative to the target platform. | 12-04-2014 |
20150020048 | COMPONENT DISCOVERY FROM SOURCE CODE - A method for component discovery from source code may include receiving source code, and determining business classes by excluding packages and classes in the source code identified as belonging to a presentation layer, as belonging to a data access layer, as models and/or as utilities. The method may further include extracting multi-dimensional features from the business classes, estimating similarity for business class pairs based on the extracted multi-dimensional features, clustering the business classes based on the similarity and mapping functional concepts to the clusters. The clusters generated by the clustering may represent components of the source code. The method may also include determining interfaces for the components based on the clustering. | 01-15-2015 |
20150058349 | IDENTIFYING AND CLASSIFYING NON-FUNCTIONAL REQUIREMENTS IN TEXT - A device may obtain text to be categorized, and may determine rules for categorizing portions of the text. A rule may specify text patterns to be used to categorize the portions of the text into a category, and may specify a relationship, between at least two text patterns, to be used to categorize the portions of the text into the category. The device may determine that the text patterns and the relationship between the at least two text patterns exist in a text portion. The device may categorize the text portion into the category based on determining that the text patterns and the relationship between the at least two text patterns exist in the text portion. The device may provide an indication of an association between the text portion and the category based on categorizing the text portion into the category. | 02-26-2015 |
20150066939 | GROUPING SEMANTICALLY RELATED NATURAL LANGUAGE SPECIFICATIONS OF SYSTEM REQUIREMENTS INTO CLUSTERS - A device may analyze text to identify a set of text portions of interest, and may analyze the text to identify a set of terms included in the set of text portions. The device may perform a similarity analysis to determine a similarity score. The similarity score may be determined between each term, included in the set of terms, and each text portion, included in the set of text portions, or the similarity score may be determined between each term and each other term included in the set of terms. The device may determine a set of dominant terms based on performing the similarity analysis. The set of dominant terms may include at least one term with a higher average degree of similarity than at least one other term. The device may provide information that identifies the set of dominant terms. | 03-05-2015 |
20150088910 | AUTOMATIC PRIORITIZATION OF NATURAL LANGUAGE TEXT INFORMATION - A device may receive text to be processed to prioritize text sections included in the text. The device may perform one or more prioritization techniques to prioritize the text sections. The one or more prioritization techniques may include at least one of: a semantic centrality analysis that indicates a degree to which a text section is semantically related to at least one other text section, an information content analysis that indicates a degree to which the text section includes information not included in the at least one other text section, or a combined analysis based on the semantic centrality analysis and the information content analysis. The device may prioritize the text sections, to form a set of prioritized text sections, based on performing the one or more prioritization techniques. The device may provide information that identifies the set of prioritized text sections. | 03-26-2015 |