Products

Solutions

Education & Training

Services & Support

Partners

Company

{{search ? 'Close':'Search'}}

Patents

Teams working together and getting results

Related Videos


Our team of distinguished researchers, engineers and staff behind CA Strategic Research aims to innovate and inspire with research on topics ranging from artificial intelligence to hierarchical clustering techniques.

2017


Multi-channel encryption for Mobile workers
Authors: Steven Greenspan, James Reno, Ralf Saborowski, Charley Chell

Trusted Hybrid and Public Infrastructure Grid Cloud for MSP
Authors: Ethan Hadar, Michael Kletskin, Nir Barak, Amir Jerbi, Yaakov Bezalel

Recommending alternatives for providing a service
Authors: Hadar, Eitan (Nesher, IL), Davis, Jason (Bristol, GB)

Entropy weighted message matching for opaque service virtualization
Authors: Versteeg, Steven Cornelis (Hawthorn, AU); Bird, John Sinclair (Ringwood North, AU); Hastings, Nathan Allin (Glen Iris, AU); Du, Miao (Mitcham, AU); Dahan; Jean-David (Cedar Park, TX)

Authentication of API-based endpoints
Authors: Greenspan; Steven L. (Scotch Plains, NY); Chell, Charley (San Jose, CA)

System and method for codification and representation of situational and complex application behavioral patterns
Authors: Hadar, Eitan (Nesher, IL); Hadar, Irit (Nesher, IL)

Pattern-based password with dynamic shape overlay
Authors: Potnuru, Gowtham Sen (Hyderabad, IN); Satyavarapu, Surya Kiran (Hyderabad, IN); Sen, Souptik (Hyderabad, IN); Versteeg, Steven Cornelis (Hawthorn, AU)

Help desk ticket tracking integration with root cause analysis
Authors: Gates, Carrie E. (New York, NY); Greenspan, Steven L. (Dallas, TX); Velez-Rojas, Maria C. (San Jose, CA); Mankovskii, Serguei (San Ramon, CA)

2016


Detecting divergence or convergence of related objects in motion and applying asymmetric rules
Authors: Greenspan, Steven L. (Scotch Plains, NJ); Lipton, Paul C. (Langhorne, PA); Harrison, Jr., John J. (New York, NY); Parikh, Prashant (Holtsville, NY); Mankovskii, Serguei (Morgan Hill, CA); Velez-Rojas; Maria C. (San Jose, CA)

Methods of tracking technologies and related systems and computer program products
Authors: Danielson, Debra J. (Skillman, NJ); Greenspan, Steven L. (Scotch Plains, NJ)

Intelligent pursuit detection
Authors: Mankovskii, Serguei (Morgan Hill, CA); Greenspan, Steven L. (Scotch Plains, NJ); Velez-Rojas; Maria C. (San Jose, CA)

Self-adaptive and proactive virtual machine images adjustment to environmental security risks in a cloud environment
Authors: Fadida; Itzhak (Silver, IL); Barak; Nir (Yosef, IL); Hadar; Eitan (Nesher, IL)

Identifying alarms for a root cause of a problem in a data processing system
Authors: Gates; Carrie E. (New York, NY); Greenspan, Steven L. (Dallas, TX); Velez-Rojas; Maria C. (San Jose, CA); Mankovskii, Serguei (San Ramon, CA)

Multi-hop root cause analysis
Authors: Gates; Carrie E. (New York, NY); Greenspan, Steven L. (Dallas, TX); Velez-Rojas; Maria C. (San Jose, CA); Mankovskii, Serguei (San Ramon, CA)

System and method for reconciling duplicate configuration items in a configuration management database
Authors: Waschke, Marvin (Bellingham, WA); Greenspan, Steven (Scotch Plains, NJ)

Alarm notification based on detecting anomalies in big data
Authors: Barak, Nir (Karmei Yosef, IL); Bezalel, Yaacov (Holon, IL); Mankovskii, Serge (San Ramon, CA)

Certification of correct behavior of cloud services using shadow rank
Authors: Mankovskii, Serguei (Morgan Hill, CA); Greenspan, Steven L. (Scotch Plains, NJ); Matthews, Peter Brian (Berkhamsted, GB)

Graphical model-driven system for knowledge management tools
Authors: Hadar, Ethan (Nesher, IL)

System and method for virtual image security in a cloud environment
Authors: Barak, Nir (Karmi Yosef, IL); Hadar, Eitan (Nesher, IL)

Holistic non-invasive evaluation of an asynchronous distributed software process
Authors: Gibson, Grant A (Clarksville, MD); Hadar, Eitan (Nesher, IL)

Solution modeling and analysis toolset for enterprise software architecture
Authors: Hadar, Eitan (Nesher, IL); Hadar, Irit (Nesher, IL); Davis, Jason (Bristol, GB)

System and method for enforcement of security controls on virtual machines throughout life cycle state changes
Authors: Barak, Nir (Karmi Yosef, IL); Jerbi, Amir (Givatayim, IL); Hadar, Eitan (Nesher, IL); Kletskin, Michael (Matan, IL)

Determining and using power utilization indexes for servers
Authors: Mankovskii, Serguei (Santa Clara, CA); Khatua, Subhasis (Hyderabad, IN); Neuse, Douglas M. (Austin, TX); Malisetti, Ramanjaneyulu (Hyderabad, IN); Gogula, Rajasekhar (Hyderabad, IN)

System and method for dynamic access control based on individual and community usage patterns
Authors: Gates, Carrie E. (Dublin, CA); Brown, Timothy Gorden (Fort Edward, NY); Somayaji, Anil (Ottawa, CA); Li, Yiru (Ithaca, NY)

Detecting, using, and sharing it design patterns and anti-patterns
Authors: Hadar, Eitan (Nesher, IL); Connelly, Kieron John James (Brighton, GB); Lagunova, Olga (Butler, PA); Lazzaro, Peter Anthony (Great River, NY)

System and method for assigning a business value rating to documents in an enterprise
Authors: Gates, Carrie E. (New York, NY)

Generating a proposal for selection of services from cloud service providers based on an application architecture description and priority parameters
Authors: Muntes, Victor (Barcelona, ES); Matthews, Peter Brian (Hertfordshire, GB); Dominiak, Jacek (Barcelona, ES)

Identifying objects in an image using coded reference identifiers
Authors: Mankovskii, Serguei (Santa Clara, CA); Velez-Rojas; Maria C. (San Jose, CA); Abrams, Howard (San Mateo, CA)

Methods providing configuration management for mobile devices based on location
Authors: Greenspan, Steven L. (Scotch Plains, NJ); Danielson, Debra J. (Skillman, NJ)

System and method for dissemination of relevant knowledge
Authors: Greenspan, Steven L. (Scotch Plains, NJ); Gates, Carrie E. (New York, NY)

System, apparatus, and method for identifying related content based on eye movements
Authors: Greenspan, Steven L. (Scotch Plains, NJ); Gates, Carrie E. (New York, NY)

System and method for visual role engineering
Authors: Versteeg, Steven C. (Hawthorn, AU); Rosenzweig; Avraham (Netanya, IL); Marom; Ron (Givataim, IL)

Role based translation of data
Authors: Gates, Carrie E. (New York, NY); Greenspan, Steven L. (Dallas, TX); Velez-Rojas; Maria C. (San Jose, CA); Mankovskii, Serguei (San Ramon, CA)

Method and system for capturing expertise of a knowledge worker in an integrated breadcrumb trail of data transactions and user interactions
Authors: Mankovskii, Serge (Santa Clara, CA); Velez-Rojas; Maria C. (Dublin, CA)

Visual based malicious activity detection
Authors: Gates, Carrie E. (New York, NY); Silberman, Gabriel M. (Hastings-on-Hudson, NY); Velez-Rojas; Maria C. (San Jose, CA); Mankovskii, Serguei (San Ramon, CA); Greenspan, Steven L. (Ewing, NJ)

Solution modeling and analysis toolset for enterprise software architecture and skeleton architecture
Authors: Hadar, Eitan (Nesher, IL); Hadar, Irit (Nesher, IL); Davis, Jason (Bristol, GB)

Information technology system collaboration
Authors: Mankovskii, Serge (Toronto, CA)

 

2015


Exponential histogram based database management for combining data values in memory buckets
Authors: Muntes, Victor (Barcelona, ES); Setianingsih, Sari (DI Yogyakarta, ID); Gomez, Sergio (Barcelona, ES)

Managing and predicting privacy preferences based on automated detection of physical reaction
Authors: Gates, Carrie E. (New York, NY); Silberman, Gabriel M. (Hastings-on-Hudson, NY); Velez-Rojas, Maria C. (San Jose, CA); Mankovskii, Serguei (San Ramon, CA); Greenspan; Steven L. (Dallas, TX)

Solution modeling and analysis toolset for enterprise software architecture and architecture roadmaps
Authors: Hadar, Eitan (Nesher, IL); Hadar, Irit (Nesher, IL); Davis, Jason (Bristol, GB)

System and method for a distributed graphical user interface
Authors: Greenspan; Steven L. (Scotch Plains, NJ); Abrams, Howard A. (San Mateo, CA); Mitranic, Stanislav (Calgary, CA); Silberman, Gabriel M. (Hastings-on-Hudson, NY)

Virtual stand-in computing service for production computing service
Authors: Ooi, Victor (Victoria, AU); Versteeg, Steven Cornelis (Hawthorn, AU); Williams, Robert (Howe, TX)

System and method for analysis of process data and discovery of situational and complex applications
Authors: Hadar, Eitan (Nesher, IL); Hadar, Irit (Nesher, IL)

Centralized, policy-driven maintenance of storage for virtual machine disks (VMDKS) and/or physical disks
Authors: Gross, Miron (Kfar Haoranim, IL); Hadar, Eitan (Nesher, IL); Barak, Nir (Karmi Yosef, IL)

Multi-person video conference with focus detection
Authors: Gates, Carrie E. (New York, NY); Silberman, Gabriel M. (Hastings-on-Hudson, NY); Velez-Rojas, Maria C. (San Jose, CA); Mankovskii, Serguei (San Ramon, CA); Greenspan; Steven L. (Dallas, TX)

Automated false statement alerts
Authors: Gates, Carrie E. (New York, NY); Silberman, Gabriel M. (Hastings-on-Hudson, NY); Velez-Rojas, Maria C. (San Jose, CA); Mankovskii, Serguei (San Ramon, CA); Greenspan; Steven L. (Dallas, TX)

Detecting false statement using multiple modalities
Authors: Gates, Carrie E. (New York, NY); Silberman, Gabriel M. (Hastings-on-Hudson, NY); Velez-Rojas, Maria C. (San Jose, CA); Mankovskii, Serguei (San Ramon, CA); Greenspan; Steven L. (Dallas, TX)

Automated attention detection
Authors: Gates, Carrie E. (New York, NY); Silberman, Gabriel M. (Hastings-on-Hudson, NY); Velez-Rojas, Maria C. (San Jose, CA); Mankovskii, Serguei (San Ramon, CA); Greenspan; Steven L. (Dallas, TX)

Management of package delivery
Authors: Greenspan; Steven L. (Scotch Plains, NJ); Ionescu, Stefan (Stony Brook, NY); Kane, John (Tafton, PA)

Secured deletion of information
Authors: Gross, Miron (Kfar Haoranim, IL); Hadar, Eitan (Nesher, IL); Navott, Boaz (Petach Tikva, IL); Fadida, Itzhak (Haifa, IL)

Managing security clusters in cloud computing environments using autonomous security risk negotiation agents
Authors: Fadida, Itzhak (Silver, IL); Barak, Nir (Yosef, IL); Hadar, Eitan (Nesher, IL)

Embedding performance monitoring into mashup application development
Authors: Hadar, Eitan (Nesher, IL)

Self-generation of virtual machine security clusters
Authors: Barak, Nir (Yosef, IL); Fadida, Itzhak (Silver, IL); Hadar, Eitan (Nesher, IL)

Brokering and payment optimization for cloud computing
Authors: Hadar, Eitan (Nesher, IL); Danielson, Debra Jean (Somerset, NJ)

Method and apparatus for layered overview in visualization of large enterprise it environment
Authors: Mankovskii, Serguei (Toronto, CA); Velez-Rojas, Maria (Dublin, CA); Roberts, Michael C. (McKinney, TX); Kiris, Esin (Holmdel, NJ)

2014


System and method for restricting access to requested data based on user location
Authors: Mandava, Srikanth (Andhra Pradesh, IN); Greenspan, Steven L. (Scotch Plains, NJ)

Emerging topic discovery
Authors: Marik, Radek (Rez, CZ)

Managing access to resources of computer systems using codified policies generated from policies
Authors: Hadar, Eitan (Nesher, IL)

Automated message transmission prevention based on a physical reaction
Authors: Gates, Carrie E. (New York, NY); Silberman, Gabriel M. (Hastings-on-Hudson, NY); Velez-Rojas, Maria C. (San Jose, CA); Mankovskii, Serguei (San Ramon, CA); Greenspan, Steven L. (Dallas, TX)

Agile re-engineering of information systems
Authors: Hadar, Eitan (Nesher, IL); Connelly, Kieron John James (Brighton, GB); Lagunova, Olga (Butler, PA); Engel, Mitchell Edward (Setauket, NY); Lazzaro, Peter Anthony (Great River, NY)

Effective visualization of an information technology environment through social scoring
Authors: Kiris, Esin (Holmdel, NJ); Mankovskii, Serge (Santa Clara, CA); Velez-Rojas, Maria (Dublin, CA)

Automated message transmission prevention based on environment
Authors: Gates, Carrie E. (New York, NY); Silberman, Gabriel M. (Hastings-on-Hudson, NY); Velez-Rojas, Maria C. (San Jose, CA); Mankovskii, Serguei (San Ramon, CA); Greenspan, Steven L. (Dallas, TX)

System and method for virtual image security in a cloud environment
Authors: Barak, Nir (Karmi Yosef, IL); Hadar, Eitan (Nesher, IL)

System and method for virtual machine data protection in a public cloud
Authors: Mankovski, Jr., Serge (Santa Clara, CA); Hadar, Eitan (Nesher, IL)

System and method for self-aware virtual machine image deployment enforcement
Authors: Jerbi, Amir (Givatayim, IL); Kletskin, Michael (Matan, IL); Hadar, Eitan (Nesher, IL)

Transaction-based intrusion detection
Authors: Natarajan, Ramesh (Northborough, MA); Brown, Timothy Gordon (Fort Edward, NY); Gates, Carrie Elaine (New York, NY)

System and method for evaluating and selecting software components and services
Authors: Hadar, Eitan (Nesher, IL); Shapiro, Yaakov Noson (New Hempstead, NY)

Method and system for providing low-complexity voice messaging
Authors: Stakutis, Christopher J. (Concord, MA), Boyle, Thomas M. (Norfolk, MA) Greenspan, Steven L. (Scotch Plains, NJ)

2013


Method and system for continuous notifications using subliminal and supraliminal cues
Authors: Greenspan, Steven (Scotch Plains, NJ); Silberman, Gabriel (Hastings on Hudson, NY)

Information technology system collaboration
Authors: Mankovski, Serge (Toronto, CA)

System, method, and software for enforcing access control policy rules on utility computing virtualization in cloud computing systems
Authors: Hadar, Ethan (Nesher, IL); Vax, Nimrod (Tel Aviv, IL); Jerbi, Amir (Givatayim, IL); Kletskin, Michael (Matan, IL)

Brokering and payment optimization for cloud computing
Authors: Hadar, Eitan (Nesher, IL); Danielson, Debra Jean (Somerset, NJ)

Using cloud brokering services for an opportunistic cloud offering
Authors: Greenspan, Steven L. (Scotch Plains, NJ); Hadar, Eitan (Nesher, IL)

2012


Certified IT services in-a-box
Authors: Danielson, Debra Jean (Somerset, NJ); Hadar, Eitan (Nesher, IL)

System and method for modifying execution of scripts for a job scheduler using deontic logic
Authors: Mankovskii, Serguei (Toronto, CA); Banger, Colin (Kingston, CA); Steele, Jody (Yarker, CA); Gray, Tomas (Fort Coulonge, CA)

2010


System and method for job scheduling and distributing job scheduling
Authors: Mankovski; Serguei (Markham, CA), Jacobsen; Hans-Arno (Toronto, CA), Fidler; Eli (Toronto, CA), Matheson; David (Toronto, CA), Wan; Pengcheng (Toronto, CA), Cheung; Alex (North York, CA), Li; Guoli (Toronto, CA)

Meet the CA Strategic Research team.

Get to know the distinguished researchers, engineers and staff behind CA Strategic Research and the Office of the CTO.

Explore our publications

Teams working together and getting results

Chat
What would you like to chat about?
Contact
Call us at +1-800-225-5224
Call us at +1-800-225-5224
Contact Us