4328 patents
Page 4 of 217
Utility
Enhanced processing of user profiles using data structures specialized for graphical processing units (GPUs)
2 Jan 24
Disclosed are techniques for processing user profiles using data structures that are specialized for processing by a GPU.
David Lawrence Rager, Andrew Edward Brownsword, Guy Lewis Steele, Jr.
Filed: 2 Jun 22
Utility
Methods, systems, and computer readable media for communicating delegated network function (NF) discovery results between service communication proxies (SCPs) and using the delegated NF discovery results for alternate routing
2 Jan 24
A method for communicating delegated NF discovery results between SCPs and using the delegated NF discovery results for alternate SBI service request routing includes receiving, at a first SCP and from a consumer NF instance, an SBI service request.
Ankit Srivastava, Sridhar Karuturi, Virendra Singh
Filed: 5 Jan 22
Utility
Memory device forensics and preparation
2 Jan 24
Example embodiments employ a selective memory swapping system for selectively placing non-volatile memory devices of a computer system offline, e.g., for background updating, and online, for use by a computer system, whereby the background updating process includes a mechanism for performing forensics analysis and updating of offline memory devices while an alternate memory device is usable by a user of the first computer system.
Tyler Vrooman, Greg Edvenson, Matthew King, Kumud Nepal
Filed: 6 Mar 23
Utility
Comprehensive contention-based thread allocation and placement
2 Jan 24
A system configured to implement Comprehensive Contention-Based Thread Allocation and Placement, may generate a description of a workload from multiple profiling runs and may combine this workload description with a description of the machine's hardware to model the workload's performance over alternative thread placements.
Timothy L. Harris, Daniel J. Goodman
Filed: 30 Aug 17
Utility
Chatbot conducting a virtual social dialogue
2 Jan 24
Improved techniques for dialogue management are disclosed.
Boris Galitsky, Andrey Ozerov
Filed: 28 Mar 22
Utility
Providing communication between a client system and a process-based software application
2 Jan 24
Resource-to-operation pairs are received at a user interface.
Fernando Alurralde Iturri, Qing Zhong, Ariel Cohen
Filed: 22 Oct 21
Utility
Techniques for providing cloud services on demand
2 Jan 24
Techniques are disclosed for deploying a computing resource (e.g., a service) in response to user input.
Eden Grail Adogla, Matthew Victor Rushton, Iliya Roitburg, Brijesh Singh
Filed: 5 Oct 21
Utility
Automated semantic tagging
2 Jan 24
Methods and systems are disclosed for automated semantic tagging that include detecting a particular thread executed by a processor and identifying a root process of the particular thread.
Balasubramanian Natarajan, Murali Gururajan, Priyamvadha Ragavan, Prashant Prakash
Filed: 3 Apr 23
Utility
Critical section speedup using help-enabled locks
2 Jan 24
A first data accessor acquires a lock associated with a critical section.
Yosef Lev, Victor M. Luchangco, David Dice, Alex Kogan, Timothy L. Harris, Pantea Zardoshti
Filed: 16 Jul 21
Utility
Expense report submission interface
2 Jan 24
Techniques for expense report submission are disclosed.
Winston Leonard Wang, Parker Ralph Kuncl, Kelly Bailey, Matthew Brigante
Filed: 17 Jan 23
Utility
Machine Learning-based DNS Request String Representation with Hash Replacement
28 Dec 23
Techniques are described herein for using machine learning to learn vector representations of DNS requests such that the resulting embeddings represent the semantics of the DNS requests as a whole.
Renata Khasanova, Felix Schmidt, Stuart Wray, Craig Schelp, Nipun Agarwal, Matteo Casserini
Filed: 24 Aug 23
Utility
Techniques for Persisting Data Across Instances of a Cloud Shell
28 Dec 23
Techniques for persisting user data across secure shell instances are provided.
Christopher S. Kasso, Peter Grant Gavares, Shih-Chang Chen, Devasena Kiruba Sagar, Michael William Gilbode
Filed: 8 Sep 23
Utility
Organization Based Access Control with Boundary Access Policies
28 Dec 23
An organization-based access control (OBAC) system defines resource access rights using graph-based team node trees, each comprising a plurality of hierarchically-connected team nodes.
Vaibhav Shrivastava, Natalie Shuchyng You, Somyajit Jena, Brajendra Bhujabal, Rajan Madhavan
Filed: 28 Jun 22
Utility
Smart Distributed Tracing Context Injection
28 Dec 23
Disclosed systems relate to propagating tracing across a distributed software application.
Kevin J. Cirone, Blake T. Sullivan, Dipankar Bajpai
Filed: 8 Sep 23
Utility
Qa Run Cycle and Report Generation System
28 Dec 23
Techniques for providing a QA run cycle and report generation system are provided.
Michael Brian Daunais, Srinivas Rao Vardhineni, Sivaji Nallagorla, Lakshmi Anurad Venkata Garimella, Santhosh Konduru, Dilli Babu Jonnagaddala, Anil Amunabolu
Filed: 23 Jun 22
Utility
Techniques for Two-stage Entity-aware Data Augmentation
28 Dec 23
Novel techniques are described for data augmentation using a two-stage entity-aware augmentation to improve model robustness to entity value changes for intent prediction.
Ahmed Ataallah Ataallah Abobakr, Shivashankar Subramanian, Ying Xu, Vladislav Blinov, Umanga Bista, Tuyen Quang Pham, Thanh Long Duong, Mark Edward Johnson, Elias Luqman Jalaluddin, Vanshika Sridharan, Xin Xu, Srinivasa Phani Kumar Gadde, Vishal Vishnoi
Filed: 1 Feb 23
Utility
System and Method for Capture of Change Data from Distributed Data Sources, for Use with Heterogeneous Targets
28 Dec 23
In accordance with an embodiment, described herein is a system and method for capture of change data from a distributed data source system, for example a distributed database or a distributed data stream, and preparation of a canonical format output, for use with one or more heterogeneous targets, for example a database or message queue.
Sanal Vasudevan, Lego Haryanto, Scott Roger Corbin
Filed: 13 Sep 23
Utility
Techniques for Positive Entity Aware Augmentation Using Two-stage Augmentation
28 Dec 23
Novel techniques are described for positive entity-aware augmentation using a two-stage augmentation to improve the stability of the model to entity value changes for intent prediction.
Ahmed Ataallah Ataallah Abobakr, Shivashankar Subramanian, Ying Xu, Vladislav Blinov, Umanga Bista, Tuyen Quang Pham, Thanh Long Duong, Mark Edward Johnson, Elias Luqman Jalaluddin, Vanshika Sridharan, Xin XU, Srinivasa Phani Kumar Gadde, Vishal Vishnoi
Filed: 1 Feb 23
Utility
Comprehensive Contention-based Thread Allocation and Placement
28 Dec 23
A system configured to implement Comprehensive Contention-Based Thread Allocation and Placement, may generate a description of a workload from multiple profiling runs and may combine this workload description with a description of the machine's hardware to model the workload's performance over alternative thread placements.
Timothy L. Harris, Daniel J. Goodman
Filed: 11 Sep 23
Utility
Techniques for Negative Entity Aware Augmentation
28 Dec 23
Novel techniques are described for negative entity-aware augmentation using a two-stage augmentation to improve the stability of the model to entity value changes for intent prediction.
Ahmed Ataallah Ataallah Abobakr, Shivashankar Subramanian, Ying Xu, Vladislav Blinov, Umanga Bista, Tuyen Quang Pham, Thanh Long Duong, Mark Edward Johnson, Elias Luqman Jalaluddin, Vanshika Sridharan, Xin Xu, Srinivasa Phani Kumar Gadde, Vishal Vishnoi
Filed: 1 Feb 23