4328 patents
Page 3 of 217
Utility
Methods, Systems, and Computer Readable Media for Managing Network Function Request Messages at a Security Edge Protection Proxy
4 Jan 24
Methods, systems, and computer readable media for managing network function (NF) request messages at a security edge protection proxy (SEPP) are disclosed.
John Nirmal Mohan Raj, Yesh Goel
Filed: 1 Jul 22
Utility
Online Merging of Fragmented Computing Resources Across Storage Servers by Tenant In Cloud Environments
4 Jan 24
Client data corresponding to a single client can be stored.
Shushuai Zhu, Bo Zou, Yueying Yang, Nagarajan Muthupandian
Filed: 28 Sep 22
Utility
Methods, Systems, and Computer Readable Media for Managing Network Slice Selection Assistance Information (Nssai) Availability Information at Network Slice Election Function (NSSF)
4 Jan 24
A method for managing NSSAI availability information at an NSSF includes receiving and storing NSSAI availability information from NF service consumers.
Amarnath Jayaramachar, Sairam Sudhir Pokkunuri
Filed: 29 Jun 22
Utility
System And Method For Query Resource Caching
4 Jan 24
Operations include determining whether to cache resources accessed by a query based on the execution time of the query.
Oleksiy Ignatyev, Mihail Mihaylov
Filed: 19 Sep 23
Utility
Coordinated Garbage Collection In Distributed Systems
4 Jan 24
Fast modern interconnects may be exploited to control when garbage collection is performed on the nodes (e.g., virtual machines, such as JVMs) of a distributed system in which the individual processes communicate with each other and in which the heap memory is not shared.
Timothy L. Harris, Martin C. Maas
Filed: 18 Sep 23
Utility
Predicting Text and Data Variables Using Customer-specific Models
4 Jan 24
A text prediction system for providing personalized text suggestions for different customers is disclosed.
Arvind Srinivasamoorthy, Emma Jane Thomas, Maximilian Froeschl
Filed: 29 Jun 22
Utility
Generation of Inference Logic from Training-time Artifacts for Machine Learning Model Deployments
4 Jan 24
A system is disclosed that includes capabilities for generating a Machine Learning (ML) inference pipeline for deploying an ML model using artifacts received from one or more training stages in an ML training pipeline.
Kripa Kanchana Sivakumar, Andrew Ioannou, John James Backof, II, Tzvi Keisar
Filed: 29 Jun 22
Utility
Multi-step Forecasting Via Temporal Aggregation
4 Jan 24
Ankit Kumar Aggarwal, Lakshmi Sirisha Chodisetty, Samik Raychaudhuri
Filed: 30 Jun 22
Utility
Synthetic Document Generation Pipeline for Training Artificial Intelligence Models
4 Jan 24
Embodiments described herein are directed towards a synthetic document generation pipeline for training artificial intelligence models.
Amit Agarwal, Srikant Panda, Kulbhushan Pachauri
Filed: 28 Nov 22
Utility
Detecting security vulnerabilities in queries via an information flow graph
2 Jan 24
A method for detecting a security vulnerability in code may include obtaining (i) a permitted information flow graph for a permitted query and (ii) a target information flow graph for a target query in the code, determining, by traversing the permitted information flow graph, a permitted information flow including permitted disclosed columns, permitted accessed columns, and a permitted predicate, determining, by traversing the target information flow graph, a target information flow including target disclosed columns, target accessed columns, and a target predicate, comparing the permitted information flow and the target information flow to obtain a comparison result, and determining, based on the comparison result, that the target query includes the security vulnerability.
Kostyantyn Vorobyov, Padmanabhan Krishnan
Filed: 30 Nov 21
Utility
Predictive system remediation
2 Jan 24
Techniques for predictive system remediation are disclosed.
Eric Sutton, Dustin Garvey, Sampanna Shahaji Salunke, Uri Shaft
Filed: 28 Mar 22
Utility
Concurrent memory recycling for collection of servers
2 Jan 24
The present memory restoration system enables a collection of computing systems to prepare inactive rewritable memory for reserve and future replacement of other memory while the other memory is active and available for access by a user of the computing system.
Tyler Vrooman, Graham Schwinn, Greg Edvenson
Filed: 27 Jan 23
Utility
Clone-aware approach for space and time efficient replication
2 Jan 24
In an embodiment, a computer stores source files and source clone files in a source filesystem.
Teng Wang, Diane Lebel, David Akers, Frederick S. Glover
Filed: 15 Oct 21
Utility
Combined row and columnar storage for in-memory databases for OLTP and analytics workloads
2 Jan 24
Columns of a table are stored in either row-major format or column-major format in an in-memory DBMS.
Tirthankar Lahiri, Martin A. Reames, Kirk Edson, Neelam Goyal, Kao Makino, Anindya Patthak, Dina Thomas, Subhradyuti Sarkar, Chi-Kim Hoang, Qingchun Jiang
Filed: 27 Feb 19
Utility
Custom columns for static logical models
2 Jan 24
Systems, methods, and other embodiments associated with dynamic inclusion of custom columns into a logical model are described.
Michael Sassin
Filed: 27 Jun 22
Utility
Tuning external invocations utilizing weight-based parameter resampling
2 Jan 24
Techniques are disclosed for tuning external invocations utilizing weight-based parameter resampling.
Debajyoti Roy
Filed: 21 Nov 22
Utility
Maximizing the operational range for training parameters while selecting training vectors for a machine-learning model
2 Jan 24
A system is provided for training an inferential model based on selected training vectors.
Guang C. Wang, Kenny C. Gross, Zexi Chen
Filed: 5 Nov 20
Utility
Cloud based cross domain system—CDSaaS
2 Jan 24
In some aspects, a computing device of the virtual cloud network may select one or more filters from a plurality of filters for a data pipeline, the plurality of filters comprising at least one of: a malware filter; a content filter; a signature filter; a content analyzer; a machine learning filter; or an artificial intelligence filter.
Eden Grail Adogla, Thomas Werner Kuehnel
Filed: 23 Nov 21
Utility
Methods, systems, and computer readable media for automatic domain name system (DNS) configuration for 5G core (5GC) network functions (NFs) using NF repository function (NRF)
2 Jan 24
A method for automatic domain name system (DNS) configuration for 5G core (5GC) network functions (NFs) includes, at an NF repository function (NRF) including at least one processor, receiving a message concerning a 5GC network function.
Jay Rajput, Amarnath Jayaramachar, Virendra Singh
Filed: 24 Nov 21
Utility
Edge attestation for authorization of a computing node in a cloud infrastructure system
2 Jan 24
The present embodiments relate to edge attestation of a host node to access a cloud infrastructure environment.
Brian Spencer Payne
Filed: 10 Nov 21