72 patents
Utility
Shift Design and Assignment System
21 Dec 23
A system for shift design and assignment comprises an interface configured to receive scheduling input data which includes labor demand data, worker data, and scheduling configuration data, and a processor configured to generate a set of shift candidates, determine a set of decision variables, determine a cost function, determine a set of constraints, and determine simultaneously, using a SAT, a MP solver, or a MIP solver, a subset of the shift candidates selected in a final schedule and a set of shift assignments of which worker is assigned to which selected shift candidate of the subset of the shift candidates such that the hard constraints are fully respected, violations to the soft constraints are minimized, and the cost function is minimized.
Jin Yang
Filed: 5 Sep 23
Utility
Enabling Using External Tenant Master Keys
21 Dec 23
The present application discloses a method, system, and computer system for managing data using keys.
Miguel Leonardo Chinchilla Cartagena, Karina Si-Woon Chan, Aswani Kaushik Chimthapalli, Michael Clarke, Amol Anant Deshmukh, Subha Gopalakrishnan, Bjorn Brook Hamel, Louis James LaTouche, Atlee Glen Lyden, Marcus Anthony Sanchez, Jasmine Teresa Schladen, Devaki Ajinkya Tarkunde, Harrison Yu
Filed: 5 Sep 23
Utility
Automated Anomaly Detection Using a Hybrid Machine Learning System
12 Oct 23
In some aspects, the techniques described herein relate to a method including receiving, by a processor, raw data representing interactions; generating, by the processor, a feature set based on the raw data, a given feature in the feature set including at least a portion of the raw data and at least one engineered feature; generating, by the processor, a first score for the feature set using a machine learning (ML) model, the first score representing an anomaly score; generating, by the processor, one or more second scores, each score in the one or more second scores generated by performing a linear operation on one or more features in the feature set; aggregating, by the processor, the first score and the one or more second scores to generate a total score; and outputting, by the processor, the total score.
Rivaz KASMANI, Daniel ALVAREZ, Monika PANDEY
Filed: 28 Mar 22
Utility
Data Access Policies
12 Oct 23
To verify compliance with a data access policy, the system compares electronic data to an electronic data access policy identified by a database; determines whether a portion of the electronic data complies with the electronic data access policy; in response to the portion of the electronic data not complying with the electronic data access policy, indicates that an access to the electronic data by a communication device is not permissible; and declines the access to the portion of the electronic data to the communication device when the access to the electronic data is not permissible.
Evgene Vahlis, Paul Giura
Filed: 13 Jun 23
Utility
Computerized Systems and Methods for Semantic Searching
5 Oct 23
Disclosed are systems and methods for a semantic search framework that operates to provide a robust search feature of database hosted data.
Joseph CAINEY, Jyoti MISHRA, Jakob NIELSEN, Bjorn ARNHOLTZ, Gary ENGELBERT
Filed: 29 Mar 22
Utility
Correlating Request and Response Data Using Supervised Learning
21 Sep 23
The example embodiments relate to matching response data to request data. in an embodiment, a method includes retrieving a request and a plurality of responses; generating packed candidates based on the request and the plurality of responses, a given packed candidate in the packed candidates including the request and a subset of the plurality of responses; generating feature vectors corresponding to the packed candidates, a given feature vector in the feature vectors including at least one aggregated feature computed based on the request and one or more corresponding responses in a respective packed candidate; inputting the feature vectors into a machine learning (ML) model, the ML model configured to output predictions corresponding to the feature vectors; selecting a feature vector from the feature vectors based on the predictions; and storing responses associated with the optimal feature vector and the request in a data storage device.
Jeanette NGUYEN, Tim LEE, Hesam IZAKIAN, Dalmo CIRNE
Filed: 15 Mar 22
Utility
Anomaly Detection of Miscoded Tags In Data Fields
21 Sep 23
The techniques described herein relate to a method including: receiving, by a processor, a data record having a plurality of fields; generating, by the processor, a risk score for the data record using a predictive model; determining, by the processor, that the data record is a potential anomaly based on the risk score; identifying, by the processor, an anomalous field from the plurality of fields; generating, by the processor, a plurality of permutations of the data record, the plurality of permutations generated by changing a value of the anomalous field; and outputting, by the processor, a replacement record selected from the plurality of permutations, the replacement record having a field value for the anomalous field that generates a lowest risk score among the plurality of permutations.
Andy LEUNG, Mayur PANDYA, Jon NELSON, Dalmo CIRNE, Doron ZEHAVI
Filed: 18 Mar 22
Utility
Computerized Systems and Methods for Materialized View Matching
14 Sep 23
Disclosed are systems and methods for a materialized view matching framework that operates to improve the re-usability of materialized views within a database by, inter alia: i) enabling selection and aggregation of multiple materialized views; ii) generating and using validity filter predicates to exclude invalid data from materialized views; iii) generating and using change summaries to generate validity filter predicates; and iv) enabling on-demand transactional refresh operations.
Carl-Christian KANNE, Brian GUARRACI, Chris BRAND, Eric RANSTROM, Kevin BEYER
Filed: 14 Mar 22
Utility
Computerized Systems and Methods for Automated Performance of Growing Baseline Assessments
14 Sep 23
Disclosed are systems and methods for an assessment framework that operates to dynamically generate customized surveys for recipient-respondent pairs.
Henrik KAERSGAARD, Andreas LIND
Filed: 14 Mar 22
Utility
Tenant Security Control of Data for Application Services
10 Aug 23
A system includes an interface and a processor.
Emalee Ann Bottini, Barbara Marie Cosgrove, Mohan Rajagopalan, Andrew Timothy Cannon, Merethe Eidnes Hansen, Olivia Yu Gu
Filed: 14 Apr 23
Utility
Computerized Systems and Methods for Intelligent Listening and Survey Distribution
10 Aug 23
Disclosed are systems and methods for an intelligent listening framework that is configured to dynamically generate surveys based at least on predicted answers to questions that may potentially be included in a survey.
Klaudia AMBROZIAK, Joe CAINEY, Gary ENGELBERT
Filed: 4 Feb 22
Utility
Horizontal Scaling of Version Caches In a Distributed High-concurrency Multi-user Environment
3 Aug 23
Techniques for providing horizontally scaled caching of versioned data are provided.
Darren LEE, Christof BORNHOEVD
Filed: 28 Jan 22
Utility
Forecasting Time-series Data Using Ensemble Learning
27 Jul 23
The disclosure relates to predicting the future value of a time series.
Madhura RAUT, David BOSWORTH
Filed: 26 Jan 22
Utility
Predicting Future Demand Using Time-series Forecasts
27 Jul 23
The disclosure relates to predicting a demand based on a time-series prediction.
Madhura RAUT, David BOSWORTH
Filed: 26 Jan 22
Utility
Using Condensed Bitmap Representation for Filtering of Datasets
20 Jul 23
Disclosed are techniques for increasing the speed of pairwise comparison operations in a database system.
Andreas GARNAES
Filed: 19 Jan 22
Utility
Shift Design and Assignment System with Efficient Incremental Solution
20 Jul 23
A system for incremental solution of the shift design and assignment problem comprises an interface configured to receive an incremental change and an existing schedule.
Jin Yang
Filed: 24 Mar 23
Utility
Subject Logging
9 Mar 23
The present application discloses a method, system, and computer system for monitoring tasks with respect to information stored in a database system.
Katherine Sue Hansen, Suma Handalagere, Sanyukta Inamdar, Vamsi Thummala
Filed: 8 Sep 21
Utility
Shift Design and Assignment System
9 Mar 23
A system for shift design and assignment comprises an interface configured to receive scheduling input data which includes labor demand data, worker data, and scheduling configuration data, and a processor configured to generate a set of shift candidates, determine a set of decision variables, determine a cost function, determine a set of constraints, and determine simultaneously, using a SAT, a MP solver, or a MIP solver, a subset of the shift candidates selected in a final schedule and a set of shift assignments of which worker is assigned to which selected shift candidate of the subset of the shift candidates such that the hard constraints are fully respected, violations to the soft constraints are minimized, and the cost function is minimized.
Jin Yang
Filed: 14 Nov 22
Utility
Resource Selection Determination Using Natural Language Processing Based Tiered Clustering
19 Jan 23
A system comprises an interface configured to receive an identifier, a processor configured to determine a grouping associated with the identifier, wherein the grouping is determined using a first clustering, wherein the first clustering is based at least in part on a language processing system, determine a sub-grouping of the grouping associated with the identifier, wherein the sub-grouping is determined using a second clustering, determine a final identifier based at least in part on the identifier and the sub-grouping, determine a resource based at least in part on the final identifier, and store the final identifier associated with the resource, and a memory coupled to the processor and configured to provide the processor with instructions.
Montiago Xavier LaBute, Shane Clifford, Arina Bobrova, Chris Lee
Filed: 8 Aug 22
Utility
Rule Based Access to Voluntarily Provided Data Housed In a Protected Region of a Data Storage Device
12 Jan 23
Structured access to volunteered private data disclosed.
Sangar Dowlatkhah, Erie Lai Har Lau
Filed: 27 Jul 22