|
陈立新 张琳 黄颖:中美欧日韩五局专利报告3589.docx
█武汉大学科教管理与评价研究中心 陈立新 张琳 黄颖
2022年,甲骨文国际公司获得美国发明专利640项,比上一年增长了21%,是获得美国专利数量第50多的机构。
相对来讲,甲骨文国际公司专利研发的优势领域是:数据库与信息检索、计算机核心部件、计算机应用与软件、数据交换网络、计算机一般部件。其在这5个技术领域上的专利份额相对较高,为2.1%至0.9%。
表18.50-1 2022年甲骨文国际公司主要技术领域的专利分布
技术领域 | 专利数量 | 占比(%) | |
1 | 数据库与信息检索 | 307 | 2.1% |
2 | 计算机核心部件 | 189 | 1.2% |
3 | 计算机应用与软件 | 147 | 1.1% |
4 | 数据交换网络 | 97 | 0.9% |
5 | 计算机一般部件 | 145 | 0.9% |
6 | 网络协议 | 187 | 0.8% |
7 | 人工智能 | 105 | 0.8% |
8 | 计算机安全 | 49 | 0.7% |
9 | 管理系统与电商 | 71 | 0.5% |
10 | 计算机接口 | 70 | 0.4% |
11 | 数据与图像识别 | 40 | 0.3% |
12 | 无线通信网络 | 35 | 0.2% |
13 | 显示展示与声学 | 14 | 0.1% |
14 | 数字信息传输 | 8 | 0.1% |
15 | 图像处理 | 10 | 0.1% |
16 | 光电测量与核物理 | 4 | 0.0% |
17 | 物理信号与控制 | 5 | 0.0% |
18 | 电气元件与电路 | 7 | 0.0% |
19 | 光学与摄影 | 4 | 0.0% |
20 | 物理测量 | 2 | 0.0% |
注:占比(%)指其在某领域上的专利数量占该领域的比例。
从绝对数量上来看,甲骨文国际公司的重点技术领域是:数据库与信息检索、计算机核心部件、网络协议、计算机应用与软件、计算机一般部件。其在这5个技术领域上的专利数量最多,为307至145项。
可见,甲骨文国际公司的专利技术研发重点主要集中在数据库与信息检索领域。
从发明人来看,2022年甲骨文国际公司的研发人员较多,达到1300人,人均发明专利2.11项。其中,Johnsen Bjørn Dag、Chafi Hassan、Fender Pit、Schlegel Benjamin、Gross Kenny C.、Agarwal Nipun、Brantner Matthias、Hong Sungpack、Galitsky Boris、Holen Line等人的专利数量较多,高达21至10项。
图18.50-1 2022年甲骨文国际公司在20个相对优势领域中的专利占比
感谢大连理工大学刘则渊教授、河南师范大学梁立明教授、科技部中国科学技术发展战略研究院武夷山研究员对本报告的支持与帮助。同时,向以不同形式对本报告提出意见和建议的专家学者们表示诚挚的感谢。
附表18.50-1 2022年甲骨文国际公司的美国局授权发明专利
Patent No. | Title | Inventors |
11216247 | Automatic asset anomaly detection in a multi-sensor network | Vaid Amit; Gvd Karthik; Krishnamurthy Vijayalakshmi |
11216256 | Determining based on static compiler analysis that execution of compiler code would result in unacceptable program behavior | Smiljanic John; Vinayaka Shailesh |
11216274 | Efficient lock-free multi-word compare-and-swap | Marathe Virendra J.; Kogan Alex; Zablotchi Mihail-Igor |
11216285 | Transaction state logger and retriever | Cheng Guofu; Liu Yingmei |
11216451 | Dynamic dashboard with guided discovery | Obeidat Muhannad Turki |
11216474 | Statistical processing of natural language queries of data sets | Pandey Prashant; Aggarwal Eakta; Liu Richard Yungning; Zwiebach Robert Cooke |
11216479 | Data element visualization interface | Mukherjee Prasun; John Jeevan Selvan Job; Bhagat Pravas Sudhakar Naik; Ramachandra Srilakshmi; Kumar Tarun; Duell Walter |
11216539 | Authorization proxy platform | Chang Tuck; Tirumalai Srikant Krishnapuram; Zhang Zhengming |
11218400 | System and method for optimized path record handling in homogeneous fabrics without host stack cooperation in a high performance computing environment | Johnsen Bjørn Dag; Holen Line; Moxnes Dag Georg |
11218498 | Context-aware feature embedding and anomaly detection of sequential log data using deep recurrent neural networks | Hajimirsadeghi Hossein; Zhou Guang-Tong; Brownsword Andrew; Agarwal Nipun; Chandrashekar Pavan; Rashedi Nia Karoon |
11218542 | Method and system for selecting a transport mechanism and a storage process | Dhamdhere Sachin N.; Gandhi Nirav; Panchal Drupad; Hamilton Alexander; Klein Jonathan; Arora Parmeet |
11221891 | Generic concurrency restriction | Dice David; Kogan Alex |
11222018 | Cache conscious techniques for generation of quasi-dense grouping codes of compressed columnar data in relational database systems | Chavan Shasank Kisan; Martinez Cortes William; Gong Weiwei |
11222028 | Report recommendation engine | Pandey Prashant; Aggarwal Eakta; Liu Richard Yungning |
11222070 | Vectorized hash tables | Schlegel Benjamin; Sevenich Martin; Fender Pit; Brantner Matthias; Chafi Hassan |
11222357 | Method and system for generating a schedule data structure for promotional display space | Wu Su-Ming; Ferguson Mark E.; Pak Olga; Perdikaki Olga |
11223558 | System and method for supporting inter-subnet control plane protocol for ensuring consistent path records in a high performance computing environment | Bogdanski Bartosz; Johnsen Bjørn Dag; Holen Line; Bhandary Ankita |
11224009 | Methods, systems, and computer readable media for enabling transport quality of service (QoS) in 5G networks | Krishan Rajiv; Karuturi Sridhar |
11226849 | System and method for promoting reader groups for lock cohorting | Dice David; Marathe Virendra J. |
11226940 | Adapting data for changes to data attributes | Ande Srikanth; Aggarwal Eakta; Liu Richard Yungning |
11226955 | Techniques for enabling and integrating in-memory semi-structured data and text document searches with in-memory columnar query processing | Liu Zhen Hua; Mishra Aurosish; Chavan Shasank K.; McMahon Douglas J.; Arora Vikas; Chang Hui Joe; Roy Shubhro Jyoti |
11226975 | Method and system for implementing machine learning classifications | Patthak Anindya Chandra; Ferrar Gregory Michael |
11226987 | System and method for in-place data writes to reduce fragmentation in a multidimensional database environment | Ramaiyer Kumar; Kim Young Joon; Gongalore Haritha; Ketkar Vilas; Gupta Shubhagam |
11231915 | AI-generated instant micro apps | Straub Christian; Price Jeff; Abu-Hadba Walid |
11231935 | Vectorized sorted-set intersection using conflict-detection SIMD instructions | Schlegel Benjamin; Fender Pit; Brantner Matthias; Chafi Hassan |
11232133 | System for detecting and characterizing seasons | Garvey Dustin; Shaft Uri; Wong Lik; Ganesh Amit |
11232217 | Managing a security policy for a device | Ponsini Nicolas |
11233698 | System and method for supporting subnet number aliasing in a high performance computing environment | Johnsen Bjørn Dag; Srinivasan Arvind; Muller Shimon |
11233726 | Methods, systems, and computer readable media for supporting multi-homed connections | Kashyap Harish Kumar |
11233845 | Centralized approach for managing cross-service data of cloud resources | Hassan Mohamed Saber Abdelfattah; Nadal Jonathan Jorge; Glass Nathaniel Martin; Wu Yu; Vogel Daniel M.; Hopcraft Geoff |
11233873 | Dynamic weighting for cloud-based provisioning systems | Liu Xiao; Gao Ying; Doering Jeffrey; Yang Hailun; Ding Shengda |
11237814 | System and method for supporting custom hooks during patching in an application server environment | Lindholm Jacob; Balasubramanyam Yamini Kalyandurga |
11237958 | Low overhead cardinality estimation for incoming references in regional garbage collection | Schatzl Thomas; Duveblad Erik |
11238035 | Personal information indexing for columnar data storage format | Ahmadi Hamed; Wen Jian; Hariharasubrahmanian Shrikumar; Jinturkar Sanjay; Agarwal Nipun |
11238039 | Materializing internal computations in-memory to improve query performance | Chavan Shasank K.; Mishra Aurosish; Ganesh Amit |
11238209 | Systems and methods for viewing and editing composite documents | Cochrane Neil; Yawn Michael; Bronkhorst Campegius |
11238223 | Systems and methods for intelligently predicting accurate combinations of values presentable in data fields | Nuolf Beat; Rezaeian Amir Hossein; Munday Terence Joseph; Albowicz Joseph Michael; MacDonald Brian David |
11238377 | Techniques for integrating segments of code into machine-learning model | Polleri Alberto; Lopez Sergio Aldea; Bron Marc Michiel; Golding Dan David; Ioannides Alexander; Mestre Maria del Rosario; Monteiro Hugo Alexandre Pereira; Shevelev Oleg Gennadievich; Suzuki Larissa Cristina Dos Santos Romualdo; Zhao Xiaoxue; Rowe Matthew Charles |
11238392 | Estimating compensation | Naganathan Ganesh; Walker-Cleary Pamela; Shetty Rohan R.; Radhakrishnan Jayakrishnan |
11238409 | Techniques for extraction and valuation of proficiencies for gap detection and remediation | Gupta Manisha; Venkata Ananth; Agrawal Vikas |
11240152 | Exposing a subset of hosts on an overlay network to components external to the overlay network without exposing another subset of hosts on the overlay network | Hill Peter John; McArthur David Allen; Brar Jagwinder Singh; Bhanu Vivek; Higgins Chris |
11240179 | Internet cloud-hosted natural language interactive messaging system with virtual database | Mishra Shailendra; Srinivasan Anand; Viswanathan Sangameswaran |
11243601 | Managing server performance and reliability during reductions in a number of power supply units | Hartwell David Warren |
11243876 | Techniques for accessing off-heap memory | Cimadamore Maurizio; Laskey James Malcolm; Vernee Jorn Bender |
11243935 | Content management system | Prasad Shyam Babu; Arasachetty Bhageerath; Jayaram Praveen Kumar |
11243964 | Query decomposition for scalability of continuous query processing | Deshmukh Unmesh Anil; Park Hoyong; Bishnoi Sandeep; Thukkaram Prabhu |
11243981 | Database replication based on data access scores | O'Shaughnessy Thomas Mark |
11244061 | Data encryption service | Agarwal Amit; Tirumalai Srikant Krishnapuram; Sriramadhesikan Krishnakumar |
11245682 | Adaptive authorization using access token | Kukreja Chuni Lal; Balakrishnan Aarathi; Ramakrishnan Deepak |
11245719 | Systems and methods for enhanced host classification | Reverte Carlos; Fichter Daniel; Abrams Matthew Perry; Thupil Aparajeeth; LaBarca Richard Scott |
11246025 | Methods, systems, and computer readable media for supporting a migration of user profile and policy information | Mohan Raj John Nirmal; Doddi Srikar |
11249758 | Conditional branch frame barrier | Österlund Erik |
11250059 | Optimizing graph queries by performing early pruning | Delamare Arnaud; Trigonakis Vasileios; Lozi Jean-Pierre; Haprian Vlad Ioan; Koupy Petr; Chafi Hassan; Hong Sungpack |
11250139 | Greybox fuzzing for web applications | Gauthier François; Hassanshahi Behnaz; Selwyn-Smith Benjamin |
11250367 | Supply chain financial orchestration system | Santhanam Shyam Sundar; Dande Kalyana Chakravarthy; Duvaragamani Balaji; Khanna Siddharth; Gogna Jatinder; Reddy Sunil Sama; Kayitha Srinath Reddy; Natarajan Karthik; Manda Kalyani; Seshadri Prabha; Dave Nitish; Jha Girish; Kumar Amit Ranjan; Chinthala Chandu; Yadav Raveesh |
11252023 | System and method for application of virtual host channel adapter configuration policies in a high-performance computing environment | Johnsen Bjørn Dag; Høeg Harald; Holen Line |
11252093 | Methods, systems, and computer readable media for policing access point name-aggregate maximum bit rate (APN-AMBR) across packet data network gateway data plane (P-GW DP) worker instances | Goel Yesh |
11252199 | Redirecting packets in an autonomous system | Cohn Dan |
11255894 | High sensitivity detection and identification of counterfeit components in utility power systems via EMI frequency kiviat tubes | Wetherbee Edward R.; Zhong Rui; Gross Kenny C.; Wang Guang C. |
11256480 | Deserialization of stream objects using constant-foldable method handles | Hegarty Chris; Buckley Alexander R.; Boes Julia Katharina |
11256523 | Modular co-versioning in a dynamically linked runtime environment | Goetz Brian; Sandoz Paul D. |
11256578 | Determining a replication path for resources of different failure domains | Sebbah Samir; Bagley Claire M. |
11256627 | Directly mapped buffer cache on non-volatile memory | Loaiza Juan R.; Lee J. William; Hu Wei-Ming; Umamageswaran Kothanda; MacNaughton Neil J. S.; Lee Adam Y. |
11256655 | System and method for providing bandwidth congestion control in a private fabric in a high performance computing environment | Johnsen Bjørn Dag; Siddabathuni Ajoy; Pant Avneesh; Jolad Amarnath |
11256671 | Integrated transition control center | Buehne Stephan; Spiegelberg Elmar |
11256698 | Automated provisioning for database performance | Idicula Sam; Karnagel Tomas; Wen Jian; Sundara Seema; Agarwal Nipun; Bency Mayur |
11256721 | System and method for sandboxing support in a multidimensional database environment | Belyaev Victor |
11256746 | Hash-based efficient secondary indexing for graph data stored in non-relational data stores | Wu Zhe; Moreno Gabriela Montiel; Tao Jiao; Banerjee Jayanta |
11256750 | Fast graph query engine optimized for typical real-world graph instances whose small portion of vertices have extremely large degree | Van Rest Oskar; Kim Jinha; Meng Xuming; Hong Sungpack; Chafi Hassan |
11257081 | Integrating a blockchain ledger with an application external to the blockchain ledger | Haimes David Joseph; Little Todd Jeffery |
11258604 | Rewiring cryptographic key management system service instances | Vats Kanika; Subramanian Elangovan; Manjunath Madhu |
11258775 | Local write for a multi-tenant identity cloud service | Lander Vadim; Balu Balakumar; Medam Venkateswara Reddy; Shih Kuang-Yu; Gupta Lokesh; Asokkumar Vasukiammaiyar; Wilson Gregg |
11258786 | Generating derived credentials for a multi-tenant identity cloud service | Bansal Ajeet; Lander Vadim; Wilson Gregg |
11258797 | Data management for a multi-tenant identity cloud service | Wilson Gregg; Medam Venkateswara Reddy |
11258827 | Autonomous monitoring of applications in a cloud environment | Biswas Kamalendu; Rao Swati Satish |
11262824 | System and method for coordinated link up handling following switch reset in a high performance computing network | Johnsen Bjørn Dag; Moxnes Dag Georg; Holen Line |
11263012 | Method for migrating CPU state from an inoperable core to a spare core | Lewis James; Jordan Paul; Onufer Gregory; Vahidsafa Ali |
11263241 | Systems and methods for predicting actionable tasks using contextual models | Rezaeian Amir Hossein; Polleri Alberto; Parkinson Stacy Paige; Roberts Tara U. |
11263247 | Regular expression generation using longest common subsequence algorithm on spans | Malak Michael; Rivas Luis E.; Kreider Mark L. |
11263401 | Method and system for securely storing private data in a semantic analysis system | Setayesh Mehrshad; Studinger Marta Lynn |
11263541 | Ensembled decision systems using feature hashing models | Tristan Jean-Baptiste; Pocock Adam; Wick Michael; Steele Guy |
11263566 | Seasonality validation and determination of patterns | Maheshwari Arvind Kumar; Ravichandran Raghav; Volchegursky Vladimir; Huang Tse-Han |
11265329 | Mechanisms for anomaly detection and access management | Koottayi Vipin; Chathoth Vikas Pooven; Balakrishnan Aarathi; Martin Madhu; Ramakrishanan Deepak |
11269616 | Impact driven continuous deployment system | Schumaker Robert Thomas |
11269692 | Efficient sequencer for multiple concurrently-executing threads of execution | Otenko Oleksandr |
11269821 | Method and system for generating schemas | Capillo Carril Esteban Alejandro |
11269829 | Row level locking for columnar data | Marwah Vineet; Lee Teck Hua; Ganesh Amit |
11269839 | Authenticated key-value stores supporting partial state | Miraldo Victor Cacciari; Carr Harold; Herlihy Maurice P.; Kogan Alex; Moir Mark Sean |
11269874 | Two-valued logic primitives for SQL query processing | Fender Pit; Schlegel Benjamin; Ulrich Alexander |
11269934 | Regular expression generation using combinatoric longest common subsequence algorithms | Malak Michael; Rivas Luis E.; Kreider Mark L. |
11270320 | Method and system for implementing author profiling | Setayesh Mehrshad; Mccandless Timothy P. |
11270326 | Price optimization system | Wu Su-Ming; Vakhutinsky Andrew; Boroujeni Setareh Borjian; Reddy Santosh Bai; Panchamgam Kiran V.; Vijayan Sajith; Zhang Mengzhenyu |
11270345 | Identifying and targeting users based on energy usage and profile | Lin Jessica; Kabaca Sanem Bengi; Frades Matt; Ware David |
11270358 | Dual-purpose user-interface control for data submission and capturing feedback expressions | Rampoldi-Hnilo Lynn Ann; Cooperman Hillel Noah; Houk Mahlon Connor |
11271751 | Distributed data records | de Matos Lucio D'orazio Pedro |
11271846 | Methods, systems, and computer readable media for locality-based selection and routing of traffic to producer network functions (NFs) | Krishan Rajiv |
11271870 | System and method for supporting scalable bit map based P_Key table in a high performance computing environment | Johnsen Bjørn Dag; Srinivasan Arvind; Holen Line |
11271969 | Rest-based declarative policy management | Pitre Ashutosh; Wilson Gregg; Srinivasan Prashant |
11275144 | Automated calibration of EMI fingerprint scanning instrumentation for utility power system counterfeit detection | Wetherbee Edward R.; Lewis Andrew; Dayringer Michael; Wang Guang C.; Gross Kenny C. |
11275493 | Semantic detail selection for object resizing | Darmour Jennifer; Murugan Arunachalam; Espinosa Roberto |
11275593 | Leveraging microservice containers to provide tenant isolation in a multi-tenant API gateway | Fichtenholtz Greg; Suravarapu Shashi Prasad |
11275730 | Automated data analysis using combined queries | Hsiao Eric; Dang James; Toillion Jeffrey; Herwadkar Rahul V.; Zeng Leon; Zhou Xiaochao |
11275795 | System and method for in-place record content management | Jayaram Praveen Kumar; Prasad Shyam Babu; Arasachetty Bhageerath |
11276117 | Generating payables and receivables netting proposals based on historical information | Haimes David Joseph |
11277435 | Reducing network attack surface area for a database using deep input validation | Itikarlapalli Krishna Mohan; Datta Santanu; Krishnaswamy Srinath; Chidambaran Lakshminarayanan; Kumar Rajesh; Sahu Sumit; Pingte Rajendra |
11281670 | High-performance implementation of sharing of read-only data in a multi-tenant environment | Baby Thomas; Ravipati Giridhar |
11281751 | Digital asset traceability and assurance using a distributed ledger | Salomon Roberto |
11283599 | Reusable key generated ciphertext decryption | Ganesan Dharmalingam; Clifton David M. |
11283737 | Application initiated conversations for chatbots | Parekh Manish; Lee King-Hwa |
11283789 | Single sign-on techniques using client side encryption and decryption | Pattar Nagaraj; Ramesh Kumar Pruthvithej |
11283793 | Securing user sessions | Khanna Ranjan; Chitturi Sreenivasa R. |
11283883 | Methods, systems, and computer readable media for providing optimized binding support function (BSF) packet data unit (PDU) session binding discovery responses | Krishan Rajiv; Thakur Raghuvamshi vasudev Singh |
11287995 | Heap, garbage collection, and empty-sensitive object pools | Reynolds Nathan Luther |
11288045 | Object creation from structured data using indirect constructor invocation | Hegarty Chris; Buckley Alexander R.; Boes Julia Katharina |
11288108 | Automatic out-of-bound access prevention in GPU kernels executed in a managed environment | Parravicini Alberto; Bartolini Davide; Stadler Lukas; Delamare Arnaud |
11288111 | Entropy-based classification of human and digital entities | Xu Brian H.; Ries Christopher James; Feng Chao |
11288117 | Predictive system remediation | Sutton Eric; Garvey Dustin; Salunke Sampanna Shahaji; Shaft Uri |
11288165 | Rule-based continuous diagnosing and alerting from application logs | Chatterjee Raja; Weaver James Elder |
11288262 | Methods, systems, and computer readable media for recycling order identifiers | Dueck Brian James |
11288275 | Technique for fast join processing of dictionary encoded key columns in relational database systems | Krishnappa Chinmayi; Kearney Jim; Gong Weiwei; Chavan Shasank Kisan |
11288277 | Operator sharing for continuous queries over archived relations | Deshmukh Unmesh Anil; Srinivasan Anand; Shukla Vikram |
11288297 | Explicit semantic analysis-based large-scale classification | Milenova Boriana; Sakharov Alexander |
11288380 | Securely sharing selected fields in a blockchain with runtime access determination | Kumar Dinesh; Haimes David Joseph; Little Todd Jeffery |
11288390 | Language-localized policy statements | Bhuiyan Helali; Vogel Daniel M. |
11288442 | Managing extended schemas | Herreria Jorge; Hora Thomas |
11288598 | Third-party analytics service with virtual assistant interface | Tiruveedhula Pratyusha |
11290332 | System and method for modelling cloud networks for automation | Mutnuru Rishi Kaundinya; Cadd Iain Roger |
11290341 | Dynamic resiliency framework | Le Mouel Philippe |
11290390 | Methods, systems, and computer readable media for lockless communications network resource quota sharing | Dey Debdulal |
11290438 | Managing session access across multiple data centers | Mathew Stephen; Koottayi Vipin |
11290491 | Methods, systems, and computer readable media for utilizing a security service engine to assess security vulnerabilities on a security gateway element | Liu Cheng; Guo Ge |
11290540 | System and method for use of server-side connection pool tagging in a multi-tenant environment | De Lavarene Jean; Hegde Vidya; Verma Saurabh; Mahidhara Chandra Sekhar Krishna; Namachivayam Aramvalarthanathan |
11290549 | Methods, systems, and computer readable media for optimized network function (NF) discovery and routing using service communications proxy (SCP) and NF repository function (NRF) | Krishan Rajiv |
11294546 | Automated process discovery and facilitation within a cloud business application | Ignatyev Oleksiy; Wiessinger Gary Alan |
11294644 | Inversion of control framework for multiple behaviors on top of a process | Alabes Tomas; Alurralde Iturri Fernando; Laplume Nicolas |
11294799 | Plugin for multi-module code coverage in web applications | Alabes Tomas; Laplume Nicolas |
11294806 | Feedback-based selection of regions for abortable garbage collection | Schatzl Thomas; Gerdin Nils Mikael; Helin Erik Gustav |
11294816 | Evaluating SQL expressions on dictionary encoded vectors | Chavan Shasank K.; Thomas Dina; Mylavarapu Ajit; Gaharwar Prashant; Lui Dennis; Lewis Sheldon A. K. |
11294876 | System and method for generating a multi dimensional data cube for analytics using a map-reduce program | Srinivasulu Midda Dharmika; Saxena Ambuj; Patil Amrita |
11294894 | Dynamic resolution of dependencies for database guest languages | Fender Pit; Kasture Harshad; Ulrich Alexander; Schlegel Benjamin; Brantner Matthias; Chafi Hassan |
11294899 | Defining subgraphs declaratively with vertex and edge filters | Weld Alexander; Schmid Korbinian; Hong Sungpack; Chafi Hassan; Shin Hyungyu |
11294904 | Method and system for defining an object-agnostic offlinable synchronization model | Balasubrahmanian Kaarthik; Humes Donald Creig; Bahadori Hamid; Tadepalli Sridhar |
11294908 | Smart search and navigate | Pepakayala Subhash Chandra; Mishra Amrit; Beg Manan Saleem; Piparia Shraddha; Shailesh Shah Rushabh |
11295012 | Characterizing and mitigating spillover false alarms in inferential models for machine-learning prognostics | Gross Kenny C.; George Ashin |
11295085 | Navigating electronic documents using domain discourse trees | Galitsky Boris |
11297131 | Method and apparatus for multi-vendor GTM fabric | Mutnuru Rishi |
11301468 | Efficient execution of a sequence of SQL operations using runtime partition injection and iterative execution | Bellamkonda Srikanth |
11301896 | Integrating third-party analytics with virtual-assistant enabled applications | Tiruveedhula Pratyusha |
11301945 | Recruiting and admission system | Terra Egidio Loch; McKendree James Thomas; Wong Vivian Wei; Kuo Catherine H. M.; Centeno Paz; Oupaxay Boonchanh; Allen Gary Paul; Ng Rondy C.; Beidler Susan Jane; Madril David Anthony; Krenek Richard Lee |
11303627 | Single Sign-On enabled OAuth token | Maria Mayank; Balakrishnan Aarathi; Singh Dharmvir; Martin Madhu; Chathoth Vikas Pooven; Motukuru Vamsi |
11303646 | Dynamic membership assignment to users using dynamic rules | Chawla Isha; Bhargava Ashish |
11307568 | Estimating the remaining useful life for cooling fans based on a wear-out index analysis | Gross Kenny C.; Bougaev Anton A.; Urmanov Aleksey M.; McElfresh David K. |
11307569 | Adaptive sequential probability ratio test to facilitate a robust remaining useful life estimation for critical assets | Gross Kenny C.; George Ashin; Li DeJun |
11307784 | Method and apparatus for storing memory attributes | Weaver David L.; Rose John R. |
11307850 | Efficient change analysis in poly-lingual corpus hierarchies | Murray Ryan D. |
11307953 | Block-based anomaly detection in computing environments | Wang Fa; Ordona Raymond Michael Ofiaza; Yuan Mei; He Xintao; Webb Campbell |
11307967 | Test orchestration platform | Zhang Yingfei; Chen Gavin; He Eileen; Cao Eric |
11307984 | Optimized sorting of variable-length records | Mittal Ashish; Fernandez Steve Simon Joseph; Eng Kenneth Khiaw Hong |
11308031 | Resolving in-memory foreign keys in transmitted data packets from single-parent hierarchies | Mehta Dhaval Manharlal; Huang Jianying |
11308033 | File system hierarchy mirroring across cloud data stores | Maybee Mark; Kremer James; Ledru Pascal; Gibson Gavin |
11308049 | Method and system for adaptively removing outliers from data used in training of predictive models | Suleiman Yaser I.; Zoll Michael; Basu Subhransu; Pruscino Angelo; Lohwasser Wolfgang; Miyoshi Wataru; Breidt Thomas; Herter Thomas; Thielen Klaus; Kumar Sahil |
11308132 | Reference attributes for related stored objects in a multi-tenant cloud service | Srinivasan Sudhir Kumar; Chikkanna Shruthi; Vaishnavi Nikhil Yograj; Xu Xiaoxiao; Wilson Gregg; Medam Venkateswara Reddy |
11308221 | Testing cloud application integrations, data, and protocols | Biswas Kamalendu; Bhatia Gaurav; Prasad Shachi; Doddi Kiran Shriniwas |
11308404 | Synthesizing high-fidelity signals with spikes for prognostic-surveillance applications | Wang Guang C.; Gross Kenny C. |
11308563 | Energy program communication control system and method based on load shape analysis | Benjamin Oren; Packer Ben; Kunz Justine; Shilts Erik |
11310548 | Modifying event playlists | Chow Simon; Siddirampura Mahesh; Gupta Suman |
11310571 | Optically switched network topology | Krishnamoorthy Ashok V.; Muller Shimon; Zheng Xuezhe |
11314490 | Special calling sequence for caller-sensitive methods | Rose John Robert |
11314527 | System and method for managing reference-counted lifecycles of contexts and dependency injection (CDI) components | Nelson Laird |
11314562 | Systems and methods for performing concurrency restriction and throttling over contended locks | Dice David |
11314574 | Techniques for managing and analyzing log data | Handa Nitin; Soni Rohit |
11314611 | Universal identity management or governance over applications | Peddibhotla Sudhakar Suryanarayana; Venkatakrishnan Sridhar; Bereza Pavlo; Dugan Michael Patrick |
11314720 | Global consistency with recency in distributed database management systems | Bastawala Mehul; Raja Vivekanandhan |
11314736 | Group-by efficiency though functional dependencies and non-blocking aggregation functions | Fender Pit; Schlegel Benjamin; Brantner Matthias |
11314760 | Uploading external files and associating them with existing data models | Venkata Ananth; Mittal Ashish; Surendran Venugopal; Surve Nikhil |
11314928 | System and method for configuring related information links and controlling a display | Thomas Tony P. |
11316689 | Trusted token relay infrastructure | Srinivasan Venkataraman Uppili; Correa Neto Andre Luiz Moreira; Coller Lee David |
11321117 | Persistent multi-word compare-and-swap | Marathe Virendra J.; Pavlovic Matej; Kogan Alex; Harris Timorthy L. |
11321135 | Rate limiting compliance assessments with multi-layer fair share scheduling | Chiplunkar Amol Achyut; Ravuri Prasad; Dias Karl; Tripathi Gayatri; Krishnan Shriram; Jayaram Chaitra |
11321137 | Environment agnostic configuration with a declarative infrastructure provisioner | Barsalou Eric Tyler; Glass Nathaniel Martin |
11321138 | Techniques for preventing concurrent execution of declarative infrastructure provisioners | Glass Nathaniel Martin |
11321187 | Assured lazy rollback for a multi-tenant identity cloud service | Neelakanteshwar Manohari; Kandasamy Karthik; Chaturvedi Prabhat; Subramanian Elangovan |
11321317 | Leveraging query-specific statistics in non-equivalent queries | Su Hong; Chakkappen Sunil P.; Zait Mohamed |
11321343 | Tenant replication bootstrap for a multi-tenant identity cloud service | Srinivasan Sudhir Kumar; Balu Balakumar; Medam Venkateswara Reddy; Shih Kuang-Yu; Ho Fannie |
11321350 | Managing identifiers for multinodal master systems of unknown or changing size | Schrum Allan George |
11321368 | Regular expression generation using longest common subsequence algorithm on combinations of regular expression codes | Malak Michael; Rivas Luis E.; Kreider Mark L. |
11321536 | Chatbot conducting a virtual social dialogue | Galitsky Boris; Ozerov Andrey |
11321614 | Directed trajectories through communication decision tree using iterative artificial intelligence | Roberts Tara U.; Polleri Alberto; Kumar Rajiv; Chacko Ranjit Joseph; Stanesby Jonathan; Yordy Kevin |
11321669 | Creating a customized email that includes an action link generated based on form data | Ganta Suman; Sabharwal Nikhil |
11321722 | Assortment optimization using incremental swapping with demand transference | Wu Su-Ming; Yagnavajhala Saraswati |
11323413 | Methods, systems, and computer readable media for actively discovering and tracking addresses associated with 4G service endpoints | Goel Yesh |
11327673 | Techniques for persisting data across instances of a cloud shell | Kasso Christopher S.; Gavares Peter Grant; Chen Shih-Chang; Sagar Devasena Kiruba; Gilbode Michael William |
11327795 | Efficient worker utilization | Mundra Tanvir Singh; Newcombe Christopher Richard; Glass Nathaniel Martin |
11327797 | Memory usage determination techniques | Chan Eric S. |
11327846 | System and method for backup and recovery of services in a cloud computing environment | Kumar Amod; Shishir Prashant; Lake Tim; Vatkina Marina; Guo Daniel |
11327887 | Server-side extension of client-side caches | Shi Jia; Zhang Wei; Umamageswaran Kothanda; MacNaughton Neil J. S.; Nagarajan Vijayakrishnan |
11327932 | Autonomous multitenant database cloud service framework | Hung Hochak; Rajamani Kumar; Jain Sanket; Ravipati Giridhar; Lee Jaebock; Chen Alexander; Huang Jen-Cheng |
11327969 | Term vector modeling of database workloads | Beresniewicz John Mark |
11328016 | Constructing imaginary discourse trees to improve answering convergent questions | Galitsky Boris |
11330027 | Methods, systems, and computer readable media for hypertext transfer protocol (HTTP) stream tuning for load and overload | Khandekar Tukaram Maruti; Krishan Rajiv |
11330053 | Making eventual consistency cache updates deterministic | Van Den Dungen Martinus Petrus Lambertus; Salmon James William |
11334262 | On-chip atomic transaction engine | Jain Rishabh; Schlanger Erik M. |
11334445 | Using non-volatile memory to improve the availability of an in-memory database | Lahiri Tirthankar; Reames Martin; Makino Kao; Raghavan Ananth; Wang Chih-Ping; Kogawa Mutsumi; Garcia Jorge Luis Issa |
11334453 | System and method for providing fault tolerance and resiliency in a cloud network | Mutnuru Rishi |
11334474 | Fast change impact analysis tool for large-scale software systems | Meibusch David John-Bruce; Zhao Yang |
11334528 | ZFS block-level deduplication and duplication at cloud scale | Maybee Mark; Kremer James; Gibson Gavin |
11334530 | Network partition tolerance in a high available centralized VCS implementation | Lopez Jonathan Lopez; Vimberg Juan Ignacio |
11334534 | System and method for providing a correlated content organizing technique in an enterprise content management system | Arasachetty Bhageerath; Jayaram Praveen Kumar; Prasad Shyam Babu |
11334567 | Efficient SQL-based graph random walk | Ziauddin Mohamed; Wu Zhe; Witkowski Andrew |
11334583 | Techniques for semantic searching | Venkata Ananth; Gopalakrishna Satish; Vigeant Jacques |
11334601 | Unified data model | Kolli Ashish; Bollu Ramakrishna; Subramanian Elangovan |
11334638 | Methods and systems for updating a search index | Tripathi Aditya Mani; Tosun Hasari; Arnone Anthony; Strasser Shane; Nagarajan Karthikeyan |
11336615 | Global load balancing achieved by using distributed DNS reflection | Mutnuru Rishi |
11336680 | Tailored security configuration of least-privilege applications | Guiroux Hugo; Ferreira Christopher; Neugschwandtner Matthias; Bradescu Roxana |
11336716 | System and method for supporting heterogeneous and asymmetric dual rail fabric configurations in a high performance computing environment | Johnsen Bjørn Dag; Hodoba Predrag; Holen Line; Tjemsland Kurt |
11341022 | Runtime performance introspection | Pandey Pradip Kumar |
11341082 | System and method for supporting target groups for congestion control in a private fabric in a high performance computing environment | Johnsen Bjørn Dag; Siddabathuni Ajoy; Pant Avneesh; Jolad Amarnath |
11341168 | System and method for controlling and determining quality of activity duration keys | Nair Prasad; Turchyn Oleksiy; Wierzbowski Michael; Buldakov Dmytro; Gladkykh Tetiana |
11341199 | System and method for delivery of content based on matching of user profiles with content metadata | Bellare Kiran; Kadlabalu Hareesh S.; Kapur Kamal; Jones David; Kamholz David |
11341317 | Supporting piecewise update of JSON document efficiently | Liu Zhen Hua; Hammerschmidt Beda Christoph; Mcmahon Douglas James; Spiegel Joshua Jeffrey |
11341588 | Using an irrelevance filter to facilitate efficient RUL analyses for utility system assets | Wetherbee Edward R.; Gross Kenny C. |
11343200 | System and method for supporting multi-tenancy in an application server, cloud, or other environment | Mordani Rajiv; Islam Nazrul; Kumar Abhijit; Quinn Timothy; Bower Peter; Feigen Lawrence; DiPol Joseph |
11347482 | System and method for dynamic lineage tracking, reconstruction, and lifecycle management | Seetharaman Ganesh; Stojanovic Alexander Sasha; Namarvar Hassan Heidari; Allan David |
11347487 | Confining reflective access based on module boundaries | Chung Lai Hung Mandy; Rose John Robert; Bateman Alan |
11347489 | Accessing a migrated member in an updated type | Goetz Brian; Rose John R.; Bierman Gavin Mark |
11347617 | Optimized recompilation using hardware tracing | Kocberber Ilknur Cansu Kaynak; Wolczko Mario; Wuerthinger Thomas |
11347661 | Transitioning between thread-confined memory segment views and shared memory segment views | Cimadamore Maurizio; Laskey James Malcolm; Vernee Jorn Bender |
11347678 | One-sided reliable remote direct memory operations | Lahiri Tirthankar; Loaiza Juan R.; Swart Garret F.; Kamp Jesse; Pant Avneesh; Kimura Hideaki |
11347696 | System for transition from a hierarchical file system to an object store | Tomar Samarjeet; Roy Amit; Manchanda Saurabh; Bagal Prasad V. |
11347779 | User interface for regular expression generation | Malak Michael; Rivas Luis E.; Kreider Mark L. |
11347783 | Implementing a software action based on machine interpretation of a language input | Kraus William; Ashley Jeremy; Thaker Jatin |
11347935 | Expended data grid components | Rullan Chris; van den Broek Hendrik; Sullivan Blake; Starets Max; Chow Chadwick |
11347946 | Utilizing discourse structure of noisy user-generated content for chatbot learning | Galitsky Boris |
11348317 | Interactive data explorer and 3-D dashboard environment | Moroze Benjamin L.; Glazer Brendon Charles; Katongo Kapaya; Hanson Kris L.; van den Broek Hendrik |
11348597 | Intent-based network validation | Hill Peter J.; Brar Jagwinder; Sreenivasan Yogesh |
11349655 | System and method for a distributed keystore | He Chen; Panchumarthy Satish; Stewart Geoffrey |
11349710 | Composable edge device platforms | Nelson Jonathon David; Becker David Dale; Romanenko Maxim Anatolyevich |
11354117 | Adaptable patching mechanism for mixed memory systems | Okamoto Kari Diane |
11354219 | Machine defect prediction based on a signature | Mathen Manoj; Vijendran Raghothama |
11354221 | Contextual drill back to source code and other resources from log data | Rodgers Michael Patrick; Oruganti Satish Chandra; Ravindranath Shreyas |
11354252 | On-demand cache management of derived cache | Lakshmanan Hariharan; Shah Dhruvil; Gaharwar Prashant; Chavan Shasank K.; Lahiri Tirthankar; Narayan Saraswathy |
11354280 | Virtual configuration systems and methods | West Christopher; Deshpande Kaustubh; Schmitt Terry |
11354305 | User interface commands for regular expression generation | Malak Michael; Rivas Luis E.; Kreider Mark L. |
11354310 | Dual purpose zone maps | Ziauddin Mohamed |
11354493 | Table cell editing in a spreadsheet constrained to unbounded and searchable lists of values from web service | Von Tish Kelsey; Davis Edmund A.; Logan Shaun |
11354611 | Minimizing unmet demands due to short supply | Smith Randall B. |
11354686 | Short life cycle sales curve estimation | Lei Ming; Popescu Catalin |
11354836 | Systems and methods for displaying representative samples of tabular data | Kumaresan Dhileeban; Reyes Rodrigo; Das Sreeji; Wong Adrienne |
11354865 | Funnel visualization with data point animations and pathways | Moroze Benjamin L.; Glazer Brendon Charles; Katongo Kapaya; Hanson Kris L.; van den Broek Hendrik |
11356327 | System and method for a single logical IP subnet across multiple independent layer 2 (L2) subnets in a high performance computing environment | Johnsen Bjørn Dag; Siddabathuni Ajoy; Hodoba Predrag |
11356370 | System and method for efficient network isolation and load balancing in a multi-tenant cluster environment | Zahid Feroz; Gran Ernst Gunnar; Bogdanski Bartosz; Johnsen Bjørn Dag |
11356454 | Service discovery for a multi-tenant identity and data security management cloud service | Gupta Lokesh; Lander Vadim |
11356486 | Dynamic code injection by policy enforcement point | Khanna Ranjan; Kukreja Chuni Lal; Chitturi Sreenivasa |
11356813 | Internet of things fleet item monitoring | S. Bharath T.; Paul Rahul; Roy Sourath |
11360764 | Adversarial language analysis for code scanning | Murray Ryan |
11360778 | Dynamic insights extraction and trend prediction | Upadhyaya Anadi |
11360781 | Declarative attribute security using custom properties | Munday Terence; Sanghal Nischal |
11360802 | Dropping an index without blocking locks | Kumar Ramesh; Raghavan Ananth; Eadon George |
11360807 | Cloning a computing environment through node reconfiguration and with node modification | Azhakesan Sujatha Aneesh; Narayanan Biju; Gopinathan Nair Indira Devi Hari; Thomas Jibu Thomas; Shankar Ravi |
11360976 | Deployment of javascript and typescript stored procedures and user-defined functions into database management systems | Brantner Matthias; Daynes Laurent; Fender Pit; Schlegel Benjamin; Kiran Kandukuri Anantha; Chafi Hassan; Sedlar Eric; Christ Juergen; Braun Lucas; Hossbach Bastian; Ulrich Alexander; Kasture Harshad |
11361510 | Optimizing virtual data views using voice commands and defined perspectives | Moroze Benjamin L.; Glazer Brendon Charles; Katongo Kapaya; Hanson Kris L.; van den Broek Hendrik |
11362893 | Method and apparatus for configuring a cloud storage software appliance | Sondur Sanjeev R.; Mills Mark Evan; Byers Brandon Patrick; Dash Prasanta Ranjan; Gross Kenny Clayton |
11362989 | Rapid duplicate IP address detection for floating IP address crossing multiple cluster broadcast domains | Zhu Ming |
11363093 | Multi-stage pipelining for distributed graph processing | Lee Jinsu; Manhardt Thomas; Hong Sungpack; Koupy Petr; Chafi Hassan; Trigonakis Vasileios |
11366643 | Generating dynamic modular proxies | Buckley Alexander R.; Chung Mandy; Bateman Alan |
11366657 | Inferring code deprecation from module deprecation | Hegarty Chris; Buckley Alexander R.; Marks Stuart Warren |
11366676 | Embedded user assistance for software applications | Stephenson Jeffrey; Kaval Maria Elisabeth; Shadian Ritchard; Cooper Matthew Clifton; Crawford Gabrielle; O'Bryan Scott Michael; Baggett, III Harry William; Sullivan Blake |
11366684 | Import mechanism for hardware intrinsics | Rose John Robert; Ivanov Vladimir |
11366796 | Systems and methods for compressing keys in hierarchical data structures | Valaguru Sridhar |
11366830 | Techniques for live repartitioning of cross-service database shards | Hassan Mohamed Saber Abdelfattah |
11367018 | Autonomous cloud-node scoping framework for big-data machine learning use cases | Wetherbee Edward R.; Gross Kenny C.; Wang Guang C.; Gerdes Matthew T. |
11367034 | Techniques for data-driven correlation of metrics | Chintalapati Renu; Gupta Manisha; Bajpai Ashlesh; Granholm David; Schmitz Stefan; Chawla Naren; Bedin Matthew; Vigeant Jacques; Venkata Ananth; Balu Rajesh; Agrawal Vikas |
11367042 | Computerized inventory redistribution control system | Wu Su-Ming; Panchamgam Kiran; Griffiths Bernard |
11368306 | Techniques for using signed nonces to secure cloud shells | Kasso Christopher S.; Gavares Peter Grant; Schneider Linda K.; Kang Amy H.; Snyder Joseph John |
11368481 | Techniques for discovering and managing security of applications | Kirti Ganesh; Biswas Kamalendu; Perera Sumedha Nalin; Simu Adina Florina |
11371850 | Shortest path engine for warehouse management | Patel Bimal |
11372809 | System and method for providing correlated content organization in an enterprise content management system based on a training set | Kadlabalu Hareesh S; Arasachetty Bhageerath; Jayaram Praveen Kumar; Prasad Shyam Babu |
11372826 | Dynamic inclusion of custom columns into a logical model | Sassin Michael |
11372840 | Validation of data values contained in responses from server systems | Johry Rohit; Gudiputi Somashekar; Gangavathi Allamaprabhu; Chandrasekaran Kokilavani |
11372843 | Function-based indexes in database systems | Raman Sridevi |
11372858 | Estimated query performance | Ignatyev Oleksiy; Bohaciak Ondrej |
11372868 | Parsing of unstructured log data into structured data and creation of schema | Reddekopp Rod; Brownsword Andrew; Gomez Manel Fernandez; Peinador Juan Fernandez |
11372947 | System and method for automatic selection for dynamic site compilation within a cloud-based content hub environment | Fisher Robin; Peterson David; Kadlabalu Hareesh S. |
11373105 | Autonomous artificially intelligent system to predict pipe leaks | Abbas Hussain |
11373632 | Using communicative discourse trees to create a virtual persuasive dialogue | Galitsky Boris |
11374749 | Key encryption key (KEK) rotation for multi-tenant (MT) system | Agarwal Amit; Koul Rohit; Tirumalai Srikant Krishnapuram; Wang Jie; Wang Xinnong |
11374792 | Techniques for utilizing multiple network interfaces for a cloud shell | Kasso Christopher S.; Gavares Peter Grant; Wells John; Kang Amy H.; Snyder Joseph J. |
11374833 | System and method for providing a service management engine for use with a cloud computing environment | Mordani Rajiv; Kumar Abhijit; Sapaliga Bhavanishankara; Thyagarajan Sivakumar; Islam Nazrul |
11375040 | Enhanced processing of user profiles using data structures specialized for graphical processing units (GPUs) | Rager David Lawrence; Brownsword Andrew Edward; Steele, Jr. Guy Lewis |
11379200 | Method for applying graph-specific compiler optimizations to graph analysis programs | Dwars Martijn; Sevenich Martin; Hong Sungpack; Chafi Hassan; Wachsmuth Guido |
11379232 | Method for generic vectorized d-heaps | Schlegel Benjamin; Kasture Harshard; Fender Pit; Brantner Matthias; Chafi Hassan |
11379260 | Automated semantic tagging | Natarajan Balasubramanian; Gururajan Murali; Ragavan Priyamvadha; Prakash Prashant |
11379324 | Persistent memory transactions with undo logging | Marathe Virendra J.; Seltzer Margo I.; Byan Steve |
11379403 | One-sided reliable remote direct memory operations | Lahiri Tirthankar; Loaiza Juan R.; Swart Garret F.; Kamp Jesse; Pant Avneesh; Kimura Hideaki |
11379410 | Automated information lifecycle management of indexes | Shergill Kamaljit; Lakshmanan Hariharan; Shah Viral; Chavan Shasank Kisan |
11379415 | Executing a conditional command on an object stored in a storage system | Sawhney Aditya |
11379438 | Database migration between computing platforms using virtual backups | Nayak Chandramohan Maira; Sathyamurthy Arun |
11379450 | Relational method for transforming unsorted sparse dictionary encodings into unsorted-dense or sorted-dense dictionary encodings | Fender Pit; Schmidt Felix; Schlegel Benjamin |
11379456 | Efficient adjustment of spin-locking parameter values | Kocberber Onur; Bency Mayur; Jolles Marc; Sundara Seema; Agarwal Nipun |
11379470 | Techniques for concurrent data value commits | Ricketts Daniel; Dangi Mahendra Pratap Singh; Loncaric Calvin Alexander |
11379476 | Bitmap-based count distinct query rewrite in a relational SQL algebra | Petride Sabina; Ziauddin Mohamed; Kumar Praveen T. J.; Li Huagang; Witkowski Andrew; Subramanian Sankar |
11379496 | System and method for universal format driven data transformation and key flex fields in a analytic applications environment | Chowdhury Saugata; Chand Jagdish; Nautiyal Ispati; Mohapatra Saurav; Satyendranath Akshay |
11379506 | Techniques for similarity analysis and data enrichment using knowledge sources | Stojanovic Alexander Sasha; Kreider Mark; Malak Michael; Murray Glenn Allen |
11379909 | Computerized item rental using beacons | Dcosta Noel Henry Edward; Sundar Sushmitha; Somani Manish |
11381520 | System and method for supporting node role attributes in a high performance computing environment | Johnsen Bjørn Dag; Bogdański Bartosz; Holen Line |
11381537 | Message transfer agent architecture for email delivery systems | Freed Edwin Earl |
11381638 | System and method for parallel execution of activites in an integration flow | Devta Prakash Kumar |
11381955 | Methods, systems, and computer readable media for monitoring machine type communications (MTC) device related information | Aravind Srividya; Mahalank Shashikiran Bhalachandra |
11383612 | Detection of electric vehicle charging at premise | Lu Vivian Chun-hua; Leow Woei Ling; Iyengar Rajagopal |
11385868 | Orthogonal path renderer for natural looking sequence flows | Laplume Nicolas; Espeche Javier; Schmid Pablo |
11385872 | Extending a virtual machine instruction set architecture | Haupt Michael; Cimadamore Maurizio; Goetz Brian |
11385889 | Inferring intra package and module dependencies | Fender Pit; Schlegel Benjamin; Brantner Matthias; Kasture Harshad; Chafi Hassan |
11386007 | Methods and systems for fast allocation of fragmented caches | Bourbonnais Roch |
11386045 | Executing a conditional command on an object stored in a storage system | Sawhney Aditya |
11386058 | Rule-based autonomous database cloud service framework | Hung Hochak; Rajamani Kumar; Lee Jaebock; Jain Sanket; Ravipati Giridhar; McHugh John; Lee Churn Don; Chen Alexander; Huang Jen-Cheng |
11386088 | Expression pushdown optimization for querying in federated database system | Halterman Jordan Christopher; Slepicka Jason Anthony; Schmidt Colin James |
11386094 | Techniques for in-memory stitching | Hsiao Eric; Toillion Jeffrey; Yang Amy; Shang Bingqing; Chin Dennis M.; Carina Robert; Geib Simone; Kumar Santosh |
11386176 | Inferring logical clauses for answering complex multi-hop open domain questions | Galitsky Boris |
11386221 | Fine-grained access control for data manipulation language (DML) operations on relational data | Ahmed Tanvir; Ru Yi; Liang Chao; Pesati Vikram Reddy |
11386274 | Using communicative discourse trees to detect distributed incompetence | Galitsky Boris |
11386366 | Method and system for cold start candidate recommendation | Inamdar Sonali Vijay; Chow Simon; Hernández Rincón Carlos E. |
11388082 | Methods, systems, and computer readable media for diameter routing using software defined network (SDN) functionality | McMurry Sam Eric; Deo Ajay Padmakar; Bantukul Apirux |
11392350 | Parallel generation of pseudorandom number sequences using multiple generators with brined initial states | Steele, Jr. Guy L. |
11392356 | Online machine learning based compilation | Leopoldseder David; Mosaner Raphael; Stadler Lukas |
11392558 | System and method for extracting a star schema from tabular data for use in a multidimensional database environment | Shaked Guy |
11392560 | Consolidating and transforming metadata changes | Chandukutty Rajesh; Seshadri Raghu Kotikannikadanam; Elamathi Siddharthan; Ganguly Pratish; Satpathy Samir |
11392561 | Data migration using source classification and mapping | Earnesty, Jr. James C.; Tahim Inderpal S.; Melgaard Mary Allgood; Muzykin Roman |
11392562 | Hybrid client transaction mode for key value store | Fan Ming; Ricketts Daniel; Tobler Benjamin |
11392566 | Rowid decoding: an alternative to dictionary decoding | Fender Pit; Schlegel Benjamin; Brantner Matthias |
11392588 | Active queries filter extraction | Ganesh Amit; Sinha Bipul; Vemuri Srinivas |
11392616 | System and method for rapid fault detection and repair in a shared nothing distributed database | Bridge, Jr. William H.; Brower David; Hsu Meichun; Klots Boris; Macnaughton Neil J S; Mylavarapu Ajit; Panchaksharaiah Umesh; Swart Garret F.; Lahiri Tirthankar; Loaiza Juan R. |
11392623 | Hybrid in-memory BFS-DFS approach for computing graph queries against heterogeneous graphs inside relational database systems | Haprian Vlad; Daynes Laurent; Chavan Shasank K.; Lozi Jean-Pierre; Trigonakis Vasileios; Hong Sungpack; Arnaboldi Marco; Baetu Ciprian |
11392624 | Hybrid in-memory BFS-DFS approach for computing graph queries against homogeneous graphs inside relational database systems | Haprian Vlad; Daynes Laurent; Chavan Shasank K.; Lozi Jean-Pierre; Trigonakis Vasileios; Hong Sungpack; Arnaboldi Marco; Baetu Ciprian |
11392629 | Term selection from a document to find similar content | Agarwal Pranav Kumar |
11392697 | Detection of malware in documents | Gauthier François; Gaetjen Scott; Blair Michael |
11392786 | Automated analytic resampling process for optimally synchronizing time-series signals | Gross Kenny C.; Wang Guang C. |
11392850 | Synthesizing high-fidelity time-series sensor signals to facilitate machine-learning innovations | Gross Kenny C.; Li Mengying; Wood Alan Paul; Jeffreys Steven T.; Misra Avishkar; Fumagalli, Jr. Lawrence L. |
11392894 | Systems and methods for intelligent field matching and anomaly detection | Tatituri Venkat Sai; Rezaeian Amir Hossein; Razdan Ram; Nuolf Beat; Okuda Shintaro; Bridges James Edward; Albowicz Joseph Michael |
11394645 | System and method for supporting inter subnet partitions in a high performance computing environment | Johnsen Bjørn Dag; Bogdanski Bartosz; Holen Line |
11394657 | System and method for resource isolation and consumption in a multitenant application server environment | Thyagarajan Sivakumar; Ramu Jagadish; Saxena Kshitiz; Srivastava Rahul; Feigen Lawrence; Mehta Naman; Subramanian Prasad |
11394769 | Framework for the deployment of event-based applications | Park Hoyong; Geiszter Gyorgy; Strizhikozin Dmitrii Andreevich; Gordos Péter; Thukkaram Prabhu; Bychkov Vitaly; Markovskii Dmitrii |
11394794 | Fast ingestion of records in a database using data locality and queuing | De Lavarene Jean; Mahidhara Chandra Sekhar Krishna; Silberkasten Pablo; McMahon Michael; Garish Ilesh; Namachivayam Aramvalarthanathan; Verma Saurabh Kumar; Taranov Ilya |
11397614 | Enhanced processing for communication workflows using machine-learning techniques | Kalluri Sudhakar; Duvvuri Venkata Chandrashekar |
11397619 | Techniques for detecting drift in a deployment orchestrator | Barsalou Eric Tyler; Glass Nathaniel Martin |
11397621 | System and method for service limit increase for a multi-tenant cloud infrastructure environment | Newman Philip; Goyal Alok; Basa Rajesh; Czajka Marek |
11397634 | Detecting datacenter mass outage with near real-time/offline using ML models | Monga Amarpal Singh; Chen Bin; Hamilton Alex Edward |
11397722 | Applications of automated discovery of template patterns based on received requests | Morfonios Konstantinos; Galanis Leonidas; Poduri Kusumaharanadh; Yoon Jae Young; Cai Zhongtang; Dias Karl |
11397732 | Hybrid in-memory BFS-DFS approach for computing graph queries involving complex path patterns including trees and cycles inside relational database systems | Haprian Vlad; Daynes Laurent; Chavan Shasank K.; Lozi Jean-Pierre; Trigonakis Vasileios; Hong Sungpack; Arnaboldi Marco; Baetu Ciprian |
11397768 | Handling semi-structured and unstructured data in a sharded database environment | Liu Zhen Hua; Hammerschmidt Beda C.; Krishnamurthy Sriram; Lu Ying; McMahon Douglas J.; Tata Srividya; Arora Vikas |
11397849 | REST transformation | Straub Christian |
11397873 | Enhanced processing for communication workflows using machine-learning techniques | Kalluri Sudhakar; Duvvuri Venkata Chandrashekar |
11398900 | Cloud based key management | Vepa Sirish V.; Mishra Prateek; Katti Sreedhar; Ravi Varanasi Kumar; Lockhart Harold William; Keshava Rakesh |
11403093 | Application modification with proxy service process | Gandhi Nirav; Kulkarni Chaitanya Umesh; Panchal Drupad Mahendra; Soule Jonathan Fredericks; Klein Jonathan David |
11403295 | Creating hybrid and top-frequency histograms | Chakkappen Sunil P.; Zait Mohamed; Lee Allison W.; Cakmak Ali |
11403321 | System and method for improved performance in a multidimensional database environment | Walker Cloud; Menon Vinod Padinjat; Ramaiyer Kumar |
11403367 | Techniques for solving the spherical point-in-polygon problem | Martinez Cortes William; Chavan Shasank Kisan; Ravada Siva; Hu Ying |
11403462 | Streamlining dialog processing using integrated shared resources | Johnson Mark Edward |
11403464 | Method and system for implementing semantic technology | Setayesh Mehrshad; Studinger Marta Lynn |
11403571 | Team-based approach to skills-based agent assignment | Chan Victor Chung-Wai; Seebauer W. Scott; Barnes Timothy; Allison Dana |
11405229 | System and method to provide explicit multicast local identifier assignment for per-partition default multicast local identifiers defined as subnet manager policy input in a high performance computing environment | Johnsen Bjørn Dag; Holen Line; Moxnes Dag Georg |
11405931 | Methods, systems, and computer readable media for providing for network slice management using feedback mechanism | Gupta Nitin; Jha Avinash; Aravamudhan Venkatesh |
11409456 | Methods to reduce storage capacity | Jeyaram Prabahar; Ding Yimin; Latushkin Victor; Poduska, Jr. John William |
11409563 | Allocation of cloud-based resources for backup/recovery services | Rajadurai Angelo; Muthukumar Deepika; Nagaraja Rao Sriram V. R |
11409721 | System and method for providing access to a sharded database using a cache and a shard technology | Hegde Vidya; de Lavarene Jean; Surber Douglas; Dilman Mark; Novak Leonid; Hu Wei Ming; Shivarudraiah Ashok; Zhou Tong; Taranov Ilya |
11409733 | Automatic reclamation of storage space for database systems | Lee Teck Hua; Lahiri Tirthankar; Li Yunrui |
11409741 | Enabling data format specific database functionalities over existing data types by marking operand values | Hammerschmidt Beda Christoph; Liu Zhen Hua; Arora Vikas; Thiagarajan Prakashkumar; McMahon Douglas James |
11409770 | Multi-distance similarity analysis with tri-point arbitration | Urmanov Aleksey M.; Wood Alan Paul; Bougaev Anton A. |
11410117 | System and method for controlling inventory depletion by offering different prices to different customers | Wu Su-Ming; Vakhutinsky Andrew |
11411860 | System and method for on-demand unicast forwarding in a high performance computing environment | Johnsen Bjørn Dag; Siddabathuni Ajoy; Brean David |
11411890 | System and method for supporting efficient load-balancing in a high performance computing (HPC) environment | Zahid Feroz; Gran Ernst Gunnar; Bogdanski Bartosz; Johnsen Bjørn Dag |
11411925 | Methods, systems, and computer readable media for implementing indirect general packet radio service (GPRS) tunneling protocol (GTP) firewall filtering using diameter agent and signal transfer point (STP) | Kumar Vipin; Mahalank Shashikiran Bhalachandra; Rao Raghavendra Gopala |
11411944 | Session synchronization across multiple devices in an identity cloud service | Abdul Mohamad Raja Gani Mohamad; Tippanna Kavita |
11412043 | System and method for automatic block storage volume tier tuning | Portz Travis; Larsen Jeppe; Nanjundappa Bharath Mysore; Verun Max; Tayah Mario |
11412343 | Geo-hashing for proximity computation in a stream of a distributed system | Kumar Santosh; Singh Santosh Kumar; Singh Prithviraj; Gupta Rahul; Gatty Yathish; Govindappa Hanumesh Thippanna |
11412387 | Camouflaging EMI fingerprints in enterprise computer systems to enhance system security | Gross Kenny C.; George Ashin; Wang Guang C. |
11416125 | Runtime-generated dashboard for ordered set of heterogenous experiences | Wayne Allison Marie; Mead Sherry; Silveira Lancy Jude; Cooperman Hillel Noah; Candland Kathleen Maguire; D'Arlach Carmen Ximena |
11416145 | Efficient space management for high performance writable snapshots | Valaguru Sridhar |
11416235 | System and method for managed server independence for deployment of software applications and libraries | Feigen Lawrence; Eberhard Ryan; Bajaj Aseem |
11416324 | Techniques for accurately estimating the reliability of storage systems | Rashidinejad Paria; Jamadagni Navaneeth; Raghavan Arun; Schelp Craig; Gordon Charles |
11416473 | Using path encoding method and relational set operations for search and comparison of hierarchial structures | Perkov Evgueni |
11416489 | Early grouping optimization for SQL statements by normalizing arithmetic expressions in aggregates | Pasupuleti Krishna Kantikiran |
11416495 | Near-zero downtime relocation of a pluggable database across container databases | Lee Jaebock; Rajamani Kumar; Jain Sanket; Ravipati Giridhar |
11416500 | Control system for learning to rank fairness | Tristan Jean-Baptiste Frederic George; Wick Michael Louis; Panda Swetasudha |
11416577 | Managing compound XML documents in a repository | Murthy Ravi |
11416777 | Utterance quality estimation | Singaraju Gautam; Ding Jiarui; Vishnoi Vishal; Sugg Mark Joseph; Wong Edward E. |
11416952 | Bill comparison apparatus and method | Kasaraneni Jagadeesh; Stepanenko Maksym |
11417131 | Techniques for sentiment analysis of data using a convolutional neural network and a co-occurrence network | Malak Michael; Kreider Mark L. |
11418343 | Access control for long-lived resource principals | Elmenshawy Ayman Mohammed Aly Hassan; Nagaraja Girish; Vogel Daniel M. |
11418479 | Methods, systems, and computer readable media for creating internet protocol (IP) address pools from dynamic host configuration protocol (DHCP) servers to asynchronously serve IP address allocation requests by session management functions (SMFs) | Goel Yesh |
11422783 | Auto-deployment of applications | Straub Christian |
11422881 | System and method for automatic root cause analysis and automatic generation of key metrics in a multidimensional database environment | Ramaiyer Kumar |
11422974 | Hybrid cloud mirroring to facilitate performance, migration, and availability | Maybee Mark; Kremer James; Ledru Pascal; Dunlop Kenneth |
11423001 | Technique of efficiently, comprehensively and autonomously support native JSON datatype in RDBMS for both OLTP and OLAP | Liu Zhen Hua; Krishnamurthy Sriram; Hammerschmidt Beda C.; McMahon Douglas J.; Chang Hui Joe; Lu Ying; Spiegel Joshua; Suresh Srikrishnan; Arora Vikas; Arora Geeta; Abraham Sundeep; Zhang Hui; Sosa Alfonso Colunga |
11423020 | Efficient extraction of large data sets from a database | Scott Adrian Graham |
11423022 | Hybrid declarative query compiler and optimizer framework | Wen Jian; Idicula Sam; Kunal Nitin; Tauheed Farhan; Sundara Seema; Agarwal Nipun; Bhagat Indu |
11423026 | Method and system for defining an object-agnostic offlinable data storage model | Balasubrahmanian Kaarthik; Humes Donald Creig; Bahadori Hamid; Tadepalli Sridhar |
11423032 | Real-time business event analysis and monitoring | Park Hoyong; Srinivasan Anand; Bolsius Roger; Hsiao Eric; Toillion Jeffrey; Shukla Vikram |
11423060 | Storing and versioning hierarchical data in a binary format | Smiley Jack Randall; McKenzie Byron Kevin; Garg Anurag; Haben Randy Lee |
11423111 | Client API for rest based endpoints for a multi-tenant identify cloud service | Vaishnavi Nikhil Yograj |
11423327 | Out of band server utilization estimation and server workload characterization for datacenter resource optimization and forecasting | Kocberber Onur; Schmidt Felix; Schelp Craig; Brownsword Andrew; Agarwal Nipun |
11423344 | Computerized promotion and markdown price scheduling | Kannan Aswin; Panchamgam Kiran; Wu Su-Ming |
11423501 | Machine learning for optimal student guidance | Refila John Edward; Thompson Christopher Stanwood; Dreszer Desiree Carvalho; Osibin Nyeri Leah; Lauria Michael Rene; Thompson Alexander Winfield |
11425147 | In-service data plane encryption verification | Raj Kannan; Brar Jagwinder Singh; Sadasivarao Abhinava; Valiveti Radhakrishna; Syed Sharfuddin; Paraschis Loukas |
11425598 | Methods, systems, and computer readable media for rules-based overload control for 5G servicing | Krishan Rajiv; Yadav Rajdeep |
11429376 | Run-time modification of an application definition schema that controls the behavior of a software application | Doddadalivatta Venkatesh Prasad Srikanth; Balasubrahmanian Kaarthik; Humes Donald Creig; Tadepalli Sridhar; Anandan Saravanan |
11429397 | Cluster bootstrapping for distributed computing systems | Deokule Sameer Suhas; Malkhed Aneesh; Chakraborty Sounak; Kavali Devarajulu; Das Devaraj |
11429404 | Framework for linearizing interviews while permitting user backtracking and provisionally storing answers for repopulating responses | Van Der Vlist Kristy Ann; Barry Andrew James; French Stephen Nicholas; Fifield Davin James; Guy Fiona Carolyn |
11429471 | Enhanced identification of computer performance anomalies based on computer performance logs | Wang Fa; Morariu Octavian Gheorghe; Ordona Raymond Michael Ofiaza; He Xintao; Yuan Mei; Webb Victor Campbell |
11429509 | Smart span prioritization based on ingestion service backpressure | Cirone Kevin J.; Sullivan Blake T.; Bajpai Dipankar |
11429604 | Techniques of heterogeneous hardware execution for SQL analytic queries for high volume data processing | Chavan Shasank Kisan; Swart Garret F.; Gong Weiwei |
11429606 | Densification of expression value domain for efficient bitmap-based count(distinct) in SQL | Petride Sabina; Ziauddin Mohamed; Kumar Praveen T.J. |
11429677 | Sharing common metadata in multi-tenant environment | Nagaraj Girish; McKinney Denny; Hsu Harry |
11429895 | Predicting machine learning or deep learning model training time | Yakovlev Anatoly; Varadarajan Venkatanathan; Agrawal Sandeep; Moghadam Hesam Fathi; Idicula Sam; Agarwal Nipun |
11430006 | Determining a target group based on product-specific affinity attributes and corresponding weights | Duvvuri Venkata Chandrashekar; Stern Jeffrey Alan |
11430163 | Displaying a chart without rendering entirely obscured markers | Ho Pangus; Zhang Hugh; Singh Prashant |
11436000 | Prioritized non-active memory device update | Vrooman Tyler; Schwinn Graham; Edvenson Greg |
11436066 | System for offline object based storage and mocking of rest responses | Sullivan Blake; Kinebuchi Kentaro; Wu Jing; Lu Min; Schwartz Andrew; Starets Max |
11436126 | Customizable enterprise automation test framework | Mitra Saurabh |
11436195 | Guaranteed file system hierarchy data integrity in cloud object stores | Maybee Mark; Kremer James; Latushkin Victor; Gureja Ankit; Dunlop Kenneth |
11436221 | Autonomous testing of logical model inconsistencies | Sassin Michael |
11436259 | System and method for SaaS/PaaS resource usage and allocation in an analytic applications environment | Chawla Naren; Venkata Ananth |
11436323 | Detecting anomalies in software service usage activity | Urmanov Aleksey M.; Wood Alan Paul |
11436764 | Dynamic generation and delivery of scalable graphic images in web applications | Rodgers Michael Patrick |
11438166 | System and method for use of a suffix tree to control blocking of blacklisted encrypted domains | Mutnuru Rishi |
11438828 | Methods, systems, and computer readable media for providing network function discovery service enhancements | Sapra Kawal; Aravamudhan Venkatesh; Thakur Raghuvamshi vasudev Singh |
11442730 | Ticket locks with enhanced waiting | Dice David; Kogan Alex |
11442859 | Multiple cache framework for managing data for scenario planning | Arunapuram Sundararajan; Ramachandran Ramkumar; Mahabhashyam Sai Rajesh; Varma Shallav |
11442871 | Supporting concurrent remove operations and add-to-front operations on a Least Recently Used (LRU) queue | Lev Yosef; Dice David; Jordan Daniel McNaught |
11442898 | File system hierarchies and functionality with cloud object storage | Kremer James; Maybee Mark; Ross Natalie; Ledru Pascal; Latushkin Victor; Gureja Ankit; Morneau Kimberly; Zhang Jingfei; Gibson Gavin |
11442904 | Systems and methods for tuning a storage system | Baranowsky Michael J. |
11442933 | Function semantic based partition-wise SQL execution and partition pruning | Bellamkonda Srikanth; Witkowski Andrew; Singh Manish Pratap; Kandepi Madhuri |
11442954 | Techniques for accessing on-premise data sources from public cloud for designing data processing pipelines | Roy Debajyoti |
11443109 | Interactive data entry validation and problem correction in a table component in a spreadsheet driven by a web service | Davis Edmund A.; Logan Shaun; Rowles Brian |
11443110 | Editable table in a spreadsheet integrated with a web service | Davis Edmund A.; Rowles Brian; Logan Shaun; Von Tish Kelsey |
11443166 | Datacenter level utilization prediction without operating system involvement | Shinde Pravin; Schmidt Felix; Kocberber Onur |
11443225 | Systems and methods for intelligently providing supporting information using machine-learning | Li Li; Peng Xiaoyu; Pan Kehua |
11443240 | Privacy preserving collaborative learning with domain adaptation | Peterson Daniel; Kanani Pallika Haridas; Marathe Virendra J. |
11444762 | Attested end-to-end encryption for transporting sensitive data | Payne Brian Spencer; Chakrabarti Saikat; Dohare Pratibha Anjali; Iftikhar Rehan Loring |
11444804 | System and method for preventing switch loops in layer-2 networks | Rozenboim Leonid |
11444837 | Techniques for verifying network policies in container frameworks | Pieczul Olgierd Stanislaw; Ueno Subaru Arthur; Clark Robert Graham |
11444838 | Techniques for network policies analysis in container frameworks | Pieczul Olgierd Stanislaw; Clark Robert Graham |
11444881 | System and method for supporting use of forward and backward congestion notifications in a private fabric in a high performance computing environment | Johnsen Bjørn Dag; Siddabathuni Ajoy; Pant Avneesh; Jolad Amarnath |
11449330 | System and method for supporting patching in a multitenant application server environment | Islam Nazrul; Lindholm Jacob; Dorr Josh; Kasso Christopher; Balasubramanyam Yamini K.; Liu Steven; Mordani Rajiv; Kumar Abhijit |
11449348 | Pre/post deployment customization | Cohen Ariel; Espeche Javier; Lopez Lopez Jonathan; Tiwari Rajesh |
11449395 | Backup and restore of distributed environments | Narayanan Biju; Subramanian Harish; Thomas Jibu Thomas |
11449458 | One-sided reliable remote direct memory operations | Lahiri Tirthankar; Loaiza Juan R.; Swart Garret F.; Kamp Jesse; Pant Avneesh; Kimura Hideaki |
11449474 | Change request visualization in hierarchical systems | Cosby Douglas R.; McKenzie Byron Kevin |
11449517 | Kernel subsampling for an accelerated tree similarity computation | Schneuwly Arno; Milojkovic Nikola; Schmidt Felix; Agarwal Nipun |
11449682 | Adjusting chatbot conversation to user personality and mood | Galitsky Boris |
11449773 | Enhanced similarity detection between data sets with unknown prior features using machine-learning | Duvvuri Venkata Chandrashekar; Njie Samba Reyes |
11449952 | Efficiently modeling database scenarios for later use on live data | Yeung Chi Ken; Shankar Ravi; Sondhi; Morcos Amira; Kifri Eva; Altendorf Dave; Du Qing; Mou Hsiaowen; Bell David |
11451434 | System and method for correlating fabric-level group membership with subnet-level partition membership in a high-performance computing environment | Johnsen Bjørn Dag; Høeg Harald; Holen Line |
11451565 | Malicious activity detection by cross-trace analysis and deep learning | Zhou Guang-Tong; Hajimirsadeghi Hossein; Brownsword Andrew; Wray Stuart; Schelp Craig; Reddekopp Rod; Schmidt Felix |
11451670 | Anomaly detection in SS7 control network using reconstructive neural networks | Ahmadi Hamed; Moharrer Ali; Varadarajan Venkatanathan; Akram Vaseem; Rai Nishesh; Hingorani Reema; Jinturkar Sanjay; Agarwal Nipun |
11455219 | High availability and automated recovery in scale-out distributed database system | Pasupuleti Krishna Kantikiran; Klots Boris; Nagarajan Vijayakrishnan; Kandukuri Anantha Kiran; Agarwal Nipun |
11455284 | Method and system for adaptively imputing sparse and missing data for predictive models | Zoll Michael; Suleiman Yaser I.; Basu Subhransu; Pruscino Angelo; Lohwasser Wolfgang; Miyoshi Wataru; Breidt Thomas; Herter Thomas; Thielen Klaus; Kumar Sahil |
11455303 | Driving massive scale out through rewrites of analytical functions | Fender Pit; Schlegel Benjamin; Brantner Matthias |
11455306 | Query classification and processing using neural network based machine learning | Maheshwari Arvind Kumar; Pasham Vamshidhar Reddy; Mahajan Shantanu; Kundu Debottam |
11455494 | Automated building of expanded datasets for training of autonomous agents | Galitsky Boris |
11456946 | Regular path queries (RPQS) for distributed graphs | Tonkovic Petar; Trigonakis Vasileios; Faltin Tomas; Hong Sungpack; Chafi Hassan |
11457092 | Techniques for managing distributed computing components | Vinayakumar Shreyas; Veerad Banashankar; Seovic Aleks; Joshi Kanishka Sharad; Agarwal Saurabh; Choi Jinsu; Gosalia Meghal Bharat |
11460500 | Counterfeit device detection using EMI fingerprints | Wetherbee Edward R.; Wang Guang C.; Gross Kenny C.; Dayringer Michael; Lewis Andrew; Gerdes Matthew T. |
11461091 | System and method for creating or updating tenant artifacts by a multi-tenant cloud service | Iqbal Arif; Madan Lokesh; Mueller Ralf |
11461130 | Methodology for fast and seamless task cancelation and error handling in distributed processing of large graph data | Koupy Petr; Trigonakis Vasileios; Psaroudakis Iraklis; Lee Jinsoo; Hong Sungpack; Chafi Hassan |
11461217 | Transferring data from a source complex variable to a target complex variable | Herreria Jorge; Mohanram Venkatesh |
11461311 | Bot extensibility infrastructure | Rodrigues Eduardo Ribeiro |
11461314 | Techniques for generating a boolean switch interface for logical search queries | Mitra Debajyoti |
11461324 | First futamura projection in the context of SQL expression evaluation | Fender Pit; Ulrich Alexander; Daynes Laurent; Brantner Matthias; Hossbach Bastian; Schlegel Benjamin; Chafi Hassan |
11461328 | Method for using a sematic model to transform SQL against a relational table to enable performance improvements | Hartsing James; Venkatasubramanian Raghuram; Murphy Anne; Feinstein Scott; Yu Bei; Mesropian Steven |
11461486 | Partial page approval model | Holmes Madeleine Dawn; Nukala Surendra Nath V. N. R. K; Molakalapalli Chaitanyasri; Kunduru Anveshan Reddy |
11461542 | Providing asynchronous general user interface (GUI) input | Waldman Jeanne |
11461979 | Animation between visualization objects in a virtual dashboard | Moroze Benjamin L.; Glazer Brendon Charles; Katongo Kapaya; Hanson Kris L.; van den Broek Hendrik |
11462208 | Implementing a correction model to reduce propagation of automatic speech recognition errors | Duong Thanh Long; Johnson Mark Edward |
11463276 | System and method for providing a multi-dimensional ring-lattice network topology | Rozenboim Leonid |
11463303 | Determining the health of other nodes in a same cluster based on physical link information | Zhu Ming; Gusev Andrey |
11463314 | Automatically inferring software-defined network policies from the observed workload in a computing environment | Pieczul Olgierd Stanislaw; Clark Robert; Jami Nitin Srinivasa Rao |
11463484 | Methods, systems, and computer readable media for routing of packets for lawful interception | Grover Lalit; Shrimali Jayesh; Tewari Vimal Chandra |
11463488 | Dynamic client registration for an identity cloud service | Mohamad Abdul Mohamad Raja Gani; Lander Vadim |
11467803 | Identifying regulator and driver signals in data systems | Agrawal Vikas; Gupta Manisha; Venkata Ananth; Chaudhari Malhar |
11467879 | Techniques for implementing rollback of infrastructure changes in a cloud infrastructure orchestration service | Jablonski Greg Mark; Glass Nathaniel Martin; Barsalou Eric Tyler |
11468060 | Automatic query offloading to a standby database | Sonawane Sachin; Girkar Mahesh |
11468064 | Methods for substituting a semi-join operator with alternative execution strategies and selection methods to choose the most efficient solution under different plans | Fender Pit; Schlegel Benjamin; Brantner Matthias; Balkesen Cagri; Agarwal Nipun |
11468073 | Techniques for maintaining statistics in a database system | Zait Mohamed; Zhang Yuying; Su Hong; Li Jiakun |
11468098 | Knowledge-intensive data processing system | Chan Eric S.; Gawlick Dieter; Ghoneimy Adel; Liu Zhen Hua |
11468099 | Automatic creation and maintenance of zone maps | Ziauddin Mohamed; Kim You Jung; Sakamuri Venkatesh; Subramanian Sankar |
11468379 | Automated evaluation of project acceleration | Bailey Alasdair; Agarwal Meghann; Meinczinger Tibor; Barnes Janet |
11469944 | Techniques for migrating worker nodes to a new manager instance | Lindholm Jacob M.; Bajaj Aseem; Pryde Andrew James; Horwitz Joshua Aaron; Nahm David Sang-Chul |
11470013 | Instant notification of load balance and resource scheduling based on resource capacities and event recognition | Garcia Roger; Hanamoto Mitsumasa Sam; Bui Neil H.; Hang Quang; Ma Jun |
11470040 | Cloud infrastructure resource information scanning | Snehashis Soumya; Tanveer Ghousia |
11470112 | Detection and mitigation of denial of service attacks in distributed networking environments | Gingold Jesse; Patel Jaiminkumar Kantilal; Brumund Karl Georg |
11470544 | Methods, systems, and computer readable media for optimized routing of messages relating to existing network function (NF) subscriptions using an intermediate forwarding NF repository function (NRF) | Singh Virendra; Rajput Jay; Patro Doki Satish Kumar; Sapra Kawal |
11474832 | Intelligently determining a virtual machine configuration during runtime based on garbage collection characteristics | Parhar Poonam; Hunt Charles Joseph |
11474860 | Branch prediction for user interfaces in workflows | Moltzan Terrence A.; Connelly Zachary M.; Lundell Jens O.; Schubert Aaron M. |
11474872 | Techniques for managing long-running tasks with a declarative provisioner | Vassenkov Phillip; Glass Nathaniel Martin; Barsalou Eric Tyler; Dockter Caleb |
11474925 | Overlapping-in-time execution of load tests on applications in a centralized system | Vedurumudi Prasad V V; Morusupalli Praveen; Kota Nirguna; Beerakayala Vinay; Balakrishna Arun |
11475006 | Query and change propagation scheduling for heterogeneous database systems | Guirguis Shenoda; Petride Sabina |
11475007 | Dynamic self-reconfiguration of nodes in a processing pipeline | Mittal Ashish; Fernandez Steve Simon Joseph; Eng Kenneth Khiaw Hong |
11475214 | Systems and methods for auto-completing fields on digital forms | Chacko Ranjit Joseph; Monteiro Hugo Alexandre Pereira; Nuolf Beat; Polleri Alberto; Shevelev Oleg Gennadievich |
11475221 | Techniques for selecting content to include in user communications | Kalluri Sudhakar; Njie Samba Reyes |
11475364 | Systems and methods for analyzing a list of items using machine learning models | Kalluri Sudhakar |
11475374 | Techniques for automated self-adjusting corporation-wide feature discovery and integration | Polleri Alberto; Suzuki Larissa Cristina Dos Santos Romualdo; Lopez Sergio Aldea; Bron Marc Michiel; Golding Dan David; Ioannides Alexander; Mestre Maria del Rosario; Monteiro Hugo Alexandre Pereira; Shevelev Oleg Gennadievich; Zhao Xiaoxue; Rowe Matthew Charles |
11475686 | Extracting data from tables detected in electronic documents | Erdemir Erhan; Peterka Kenneth James |
11477258 | Serialization of objects using multiple serialization algorithms | Hegarty Chris; Buckley Alexander R. |
11477278 | System and method for supporting partitions in a multitenant application server environment | Mordani Rajiv; Islam Nazrul; Dipol Joseph; Bower Peter; Quinn Timothy; Feigen Lawrence; Kumar Abhijit |
11477298 | Offline client replay and sync | Sullivan Blake; Kinebuchi Kentaro; Wu Jing; Lu Min; Schwartz Andrew; Starets Max |
11481228 | Self-service orchestration platform | Rangasamy Venkatachalam; Jeyapaul Jaganathan; Sundaram Krithika Bharathi; Unnikrishnan Parvathy; Pratik Kumar; Selvam Narayanan; Hiremath Jayadev |
11481230 | Techniques for modifying a compute instance | Lindholm Jacob M.; Pryde Andrew James; Horwitz Josh Aaron |
11481367 | Redo mining during rolling upgrade | Krishnamurthy Saikrishnan |
11481439 | Evaluating XML full text search | Liu Zhen Hua; Lu Ying; Chang Hui Joe |
11481467 | System and method for management and delivery of shoppable content data | Kadlabalu Hareesh S. |
11481554 | Systems and methods for training and evaluating machine learning models using generalized vocabulary tokens for document processing | Kalluri Sudhakar |
11481640 | Directed trajectories through communication decision tree using iterative artificial intelligence | Roberts Tara U.; Stanesby Jonathan; Pearmain Michael; Yordy Kevin; Sutthakorn Karen |
11481641 | Methods and systems for configuring communication decision trees based on connected positionable elements on canvas | Roberts Tara U.; Stanesby Jonathan; Pearmain Michael; Yordy Kevin; Sutthakorn Karen |
11481734 | Machine learning model for predicting litigation risk on construction and engineering projects | Venkatasubramanian Karthik; Widanapathirana Chathuranga; Nag Ria; Nambiar Padmakumar A. |
11483265 | Systems and methods for associating social media systems and web pages | Strutton Michael J. |
11483270 | Email filtering system for email, delivery systems | Freed Edwin Earl |
11483328 | Techniques for monitoring privileged users and detecting anomalous activities in a computing environment | Kirti Ganesh; Biswas Kamalendu; Perera Merenne Sumedha Nalin |
11483400 | Highly available virtual internet protocol addresses as a configurable service in a cluster | Zhu Ming; Kancharthi Harsha |
11483694 | Methods, systems, and computer readable media for service communications proxy (SCP)-specific prioritized network function (NF) discovery and routing | Krishan Rajiv |
11487427 | Fine-grained hardware transactional lock elision | Kogan Alex; Dice David; Marathe Virendra J. |
11487514 | State management persistence | Straub Christian |
11487640 | Replacing stair-stepped values in time-series sensor signals with inferential values to facilitate prognostic-surveillance operations | Gross Kenny C.; Wang Guang C. |
11487716 | Application materialization in hierarchical systems | McKenzie Byron Kevin; Woodard Jeffrey Leon; Cosby Douglas R.; Wilson Charles Randall |
11487789 | Generating multidimensional database queries | Pandey Prashant; Aggarwal Eakta; Liu Richard Yungning |
11488579 | Evaluating language models using negative data | Wick Michael Louis; Tristan Jean-Baptiste Frederic George; Peck Jason |
11489827 | Dedicated network authentication and allocation for dedicated virtual machine host clusters | Knotwell Bradley P.; Brar Jagwinder S.; Becker David D.; Durgin Cyrus J.; Ryanczak Matthew G. |
11494226 | Task management interface | Bhandari Sanjay Kumar; Anur Satya; Wang Tianyi; Manguluru Vijay; Watanabe Andrew; Akel Laura |
11494242 | Compact NUMA-aware locks | Kogan Alex; Dice David |
11494287 | Scalable execution tracing for large program codebases | Hoermann Christian Rudolf |
11494347 | Efficient update-anywhere replication of queue operations on a replicated message queue | Stamos James W. |
11494366 | Change data capture on no-master data stores | Bhose Rajarshi; Bhattacharjee Dwijen |
11494373 | Nested query modification tool | Singh Prashant; Kaura Rasika Vaidya; Ammer Henrik Michael |
11494489 | Synthesis of deserialization filters from positive and negative examples | Vorobyov Kostyantyn; Gauthier François; Bae Sora; Krishnan Padmanabhan |
11494559 | Hybrid in-domain and out-of-domain document processing for non-vocabulary tokens of electronic documents | Kalluri Sudhakar |
11494688 | Learning ETL rules by example | Sassin Michael |
11496402 | System and method for supporting aggressive credit waiting in a high performance computing environment | Johnsen Bjørn Dag; Srinivasan Arvind; Muller Shimon |
11496482 | Methods and systems for memory tracing in asset management systems | Dohare Pratibha Anjali; Rangel Martinez Jaime Ismael; Hodgson Kessle Martin |
11496599 | Efficient flow management utilizing control packets | Singh Brijesh |
11496954 | Methods, systems, and computer readable media for supporting multiple preferred localities for network function (NF) discovery and selection procedures | Gupta Nitin; Shivarajapura Anup; Thakur Raghuvamshi vasudev Singh; Aravamudhan Venkatesh |
11500365 | Anomaly detection using MSET with random projections | Yarmus Joe; Milenova Boriana |
11500411 | Formulizing time-series sensor data to facilitate compact storage and eliminate personally identifiable information | Gross Kenny C.; Wang Guang C.; Jeffreys Steven T.; Wood Alan Paul; MacMillan Coleen L. |
11500618 | Software library differential identification and automated uplift | Rodgers Michael Patrick; Oruganti Satish Chandra; Ravindranath Shreyas; Gupta Ganesh Kumar |
11500856 | RDMA-enabled key-value store | Khatami Zahra; Pant Avneesh; Jampani Namrata |
11500860 | Method and system for defining an adaptive polymorphic data model | Balasubrahmanian Kaarthik; Humes Donald Creig; Bahadori Hamid; Tadepalli Sridhar |
11500868 | Efficient identification of vertices and edges for graph indexes in an RDBMS | Segalini Andrea; Lozi Jean-Pierre; Daynes Laurent; Arnaboldi Marco; Haprian Vlad Ioan; Kapp Hugo; Chavan Shasank Kisan; Liu Zhen Hua; Porobic Danica |
11500880 | Adaptive recommendations | Murray Glenn Allen; Rivas Luis E.; Kreider Mark L. |
11501065 | Semantic parser including a coarse semantic parser and a fine semantic parser | Duong Thanh Long; Johnson Mark Edward |
11501085 | Employing abstract meaning representation to lay the last mile towards reading comprehension | Galitsky Boris |
11501340 | Enriching taxonomy for audience targeting and active modelling | Haldar Tushar; Protsyk Valeriy |
11501763 | Machine learning tool for navigating a dialogue flow | Panchamgam Kiran V.; Lonial Sandhya; Vijayan Sajith |
11502921 | System and method for providing a cloud computing environment | Revanuru Naresh |
11502971 | Using multi-phase constraint programming to assign resource guarantees of consumers to hosts | Griffin Joshua Deen; Miyoshi Wataru |
11503107 | Integrating logic in micro batch based event processing systems | Park Hoyong; Geiszter Gyorgy; Strizhikozin Dmitrii Andreevich; Gordos Péter; Thukkaram Prabhu; Bychkov Vitaly; Markovskii Dmitrii |
11503128 | Cloud operation reservation system | Kuchibhotla Balasubrahmanyam; Khanuja Kamaldeep Singh; Paliwal Bharat S.; Kurian Thomas; Saricos Jimmy |
11507395 | Generating plug-in application recipe extensions | Sutton Eric L.; Chang Tuck |
11507454 | Identifying non-correctable errors using error pattern analysis | Fuller Benjamin John |
11507503 | Write barrier for remembered set maintenance in generational Z garbage collector | Österlund Erik; Liden Per; Karlsson Stefan Mats Rikard |
11507579 | Efficient compilation of graph queries involving long graph query patterns on top of SQL based relational engine | Haprian Vlad; Daynes Laurent; Liu Zhen Hua; Sheng Lei; Kapp Hugo; Arnaboldi Marco; Lozi Jean-Pierre; Witkowski Andrew; Chafi Hassan; Hong Sungpack |
11507583 | Tuple extraction using dynamically generated extractor classes | Park Hoyong; Thukkaram Prabhu |
11507584 | Logical partitions via header-based partition filtering | Roux Benjamin; Harkness Jonathan Campbell |
11507585 | Heartbeat propagation in a distributed stream processing system | Bishnoi Sandeep; Park Hoyong; Choudhury Subhrajyoti; Gatty Yathish; Jain Devendra; Kumar Santosh; Thukkaram Prabhu |
11507590 | Techniques for in-memory spatial object filtering | Ravada Siva; Hu Ying; Liu Zhen Hua; Chavan Shasank Kisan; Mishra Aurosish; Arora Vikas |
11507620 | Self-transforming content objects | Rodgers Michael P. |
11507696 | Restricting plug-in application recipes | Diekmann Tim; Chang Tuck |
11507747 | Hybrid in-domain and out-of-domain document processing for non-vocabulary tokens of electronic documents | Kalluri Sudhakar |
11508359 | Using backpropagation to train a dialog system | Duong Thanh Long; Johnson Mark Edward |
11513779 | Modeling foreign functions using executable references | Cimadamore Maurizio; Laskey James Malcolm; Vernee Jorn Bender; Ivanov Vladimir Vitalyevich |
11513806 | Method for vectorizing heapsort using horizontal aggregation SIMD instructions | Schlegel Benjamin; Fender Pit; Kasture Harshad; Brantner Matthias; Chafi Hassan |
11513954 | Consolidated and concurrent remapping and identification for colorless roots | Österlund Erik; Liden Per; Karlsson Stefan Mats Rikard |
11514029 | System and method for high performance multi-statement interactive transactions with snapshot isolation in a scale-out database | Krishnaswamy Vasudha; Pendse Sukhada; Kolahi Solmaz; Kumar Ankita; Mylavarapu Ajit; Swart Garret F.; Lahiri Tirthankar; Loaiza Juan R. |
11514041 | Estimating materialized view refresh duration | Thiyagarajan Murali; Kumar Praveen T. J. |
11514055 | Querying on hybrid formats and storages | Lee Teck Hua; Chavan Shasank; Lewis Sheldon |
11514240 | Techniques for document marker tracking | Diamond David; Gianatassio Michael; Janosik John; Rubino Michael |
11514374 | Method, system, and non-transitory computer readable medium for an artificial intelligence based room assignment optimization system | Vakhutinsky Andrew; Boroujeni Setareh Borjian; Yagnavajhala Saraswati; Perez Jorge Luis Rivero; Agarwal Dhruv; Chatterjee Akash |
11514380 | Continuing interaction with ongoing transactions in ERP systems | Thomas Tony P |
11514697 | Probabilistic text index for semi-structured data in columnar analytics storage formats | Wen Jian; Ahmadi Hamed; Jinturkar Sanjay; Agarwal Nipun; Wan Lijian; Hariharasubrahmanian Shrikumar |
11514911 | Reduced training for dialog systems using a database | Johnson Mark Edward; Kennewick Michael Rye |
11516126 | Techniques for high performant virtual routing capabilities | Tracy Leonard Thomas; Kreger-Stickles Lucas Michael; Yurovsky Andrey; Ramsey Philip James; Baker Shane |
11516185 | Methods, systems, and computer readable media for enabling cloud-based management services using an on-sii e management cloud engine | Scali James Lawrence; Lorkiewicz Gary Michael; Holt Robert Hugh; Deubler Gregory Thomas |
11516255 | Dynamic policy injection and access visualization for threat detection | Joseph Aji; Raote Paresh; Hariharan Lakshmi; Mahajan Kanishk; Kolli Ashish; Banerjee Moushmi; Weiser Yitzchak; Xie Weifang; Cui Jingyu |
11516277 | Script-based techniques for coordinating content selection across devices | Whitcher Kevin Matthew; Mitchell David Michael; Opie Robin Layne; Waits Thomas Joseph; Xia Rong |
11516671 | Methods, systems, and computer readable media for mitigating location tracking and denial of service (DoS) attacks that utilize access and mobility management function (AMF) location service | Rajput Jay; Mahalank Shashikiran Bhalachandra; Grandhi Venkata Srivatsa; Wadhwa Prateek |
11520635 | Techniques for resolving application updates | Barsalou Eric Tyler |
11520743 | Storing compression units in relational tables | Kapoor Vikram; Ganesh Amit; Kamp Jesse; Kulkarni Sachin; Marwah Vineet; Shergill Kam; Macnicol Roger; Bhattacharyya Manosiz |
11520760 | System and method for providing bottom-up aggregation in a multidimensional database environment | Roytman Alexey; Reichman Natasha; Belyaev Victor |
11520782 | Techniques for utilizing patterns and logical entities | Seetharaman Ganesh; Velisar Robert; Watters Geoffrey William; Dai Yuda |
11520825 | Method and system for converting one type of data schema to another type of data schema | Capillo Carril Esteban Alejandro |
11520834 | Chaining bloom filters to estimate the number of keys with low frequencies in a dataset | Karnagel Tomas; Budalakoti Suratna; Kocberber Onur; Agarwal Nipun; Wood Alan |
11521069 | When output units must obey hard constraints | Wick Michael; Tristan Jean-Baptiste; Lee Jay Yoon |
11521247 | Determining a criticality of an invoice, and presenting information related thereto on a graphical user interface | Deshmukh Madhulika; Palukuri Narayana Rao; Parikh Milan Bharat |
11522851 | Secured rest execution inside headless web application | Thakkar Dhiraj D. |
11522855 | Tunnel connections established using secure protocol | Mathur Bhaskar; Khan Feroz Alam; Dadhich Abhishek; Patel Kant C. |
11522955 | Transferring state information of resources | Efimov Andrey; Ricketts Daniel |
11526338 | System and method for inferencing of data transformations through pattern decomposition | Seetharaman Ganesh; Stojanovic Alexander Sasha; Namarvar Hassan Heidari; Allan David |
11526345 | Production compute deployment and governance | Satheesh Shilpa; Kant Tara; Vadapandeshwara Rajaram Narasimha |
11526346 | Zero downtime application package deployment | McGarity Brett W.; Rans Janet A.; Fillipi Steven M.; Seeley Clayton; Smith Susan A.; Bilthuis David |
11526386 | System and method for automatically scaling a cluster based on metrics being monitored | Srivastava Rahul; Subramanian Prasad; Kannan Ashokkumar |
11526462 | One-sided reliable remote direct memory operations | Lahiri Tirthankar; Loaiza Juan R.; Swart Garret F.; Kamp Jesse; Pant Avneesh; Kimura Hideaki |
11526620 | Impersonation for a federated user | Kukehalli Subramanya Ramya |
11526673 | Named entity disambiguation using entity distance in a knowledge graph | Patra Rhicheek; Bartolini Davide; Hong Sungpack; Chafi Hassan; Parravicini Alberto |
11526790 | Univariate anomaly detection in a sensor network | Gvd Karthik; Desai Utkarsh Milind; Krishnamurthy Vijayalakshmi |
11526895 | Method and system for implementing a CRM quote and order capture context service | Lewis Mark David; Tai Jianfeng; Wang David; Wang Ying; Lai Re |
11528238 | System and method for providing a dynamic cloud with subnet administration (SA) query caching | Tasoulas Evangelos; Johnsen Bjørn Dag; Gran Ernst Gunnar |
11528251 | Methods, systems, and computer readable media for ingress message rate limiting | Rajput Jay; Mahalank Shashikiran Bhalachandra; Jain Amit |
11528262 | Cross-region trust for a multi-tenant identity cloud service | Carru Damien; Asokkumar Vasukiammaiyar; Lander Vadim |
11528293 | Routing based on a vulnerability in a processing node | Joy Ajai; Aramandla Sarat |
11528334 | Methods, systems, and computer readable media for preferred network function (NF) location routing using service communications proxy (SCP) | Krishan Rajiv |
11528338 | Methods, systems, and computer readable media for providing for reliable service based interface (SBI) message transport using zero event notification messages | Rajput Jay; Singh Virendra; Pokkunuri Sairam Sudhir |
11531617 | Allocating and accessing memory pages with near and far memory blocks from heterogenous memories | John Lizy; Ryoo Jee Ho; Hsu Hung-Ming; Ganesan Karthik |
11531652 | Database modularization of pluggable guest languages | Fender Pit; Kasture Harshad; Ulrich Alexander; Schlegel Benjamin; Brantner Matthias; Chafi Hassan |
11531662 | System and method for use of a dynamic flow in a multidimensional database environment | Reichman Natasha; Riaboi Sergei; Roytman Alexey; Belyaev Victor; Ramaiyer Kumar |
11531674 | System and method for supporting rollback of changes made to target systems via an integration platform | Devta Prakash Kumar; Kaushal Anuj |
11531675 | Techniques for linking data to provide improved searching capabilities | Raghavan Gopal Srinivasa; Gujjewar Abhiram Madhukar; Seetharaman Ganesh; Motwani Jai; Dutta Sayon; Mahajan Rajat; Sharma Manasjyoti |
11531704 | Autonomously partitioning database tables | Eadon George; Kumar Ramesh; Raghavan Ananth |
11531725 | System and method for providing custom component compilation within a cloud-based con tent hub environment | Fisher Robin; Peterson David; Kadlabalu Hareesh S. |
11531906 | Machine-learning-based processing of de-obfuscated data for data enrichment | Roberts Tara U.; Stanesby Jonathan; Pearmain Michael; Yordy Kevin; Sutthakorn Karen |
11531915 | Method for generating rulesets using tree-based models for black-box machine learning explainability | Hetherington Tayler; Zohrevand Zahra; Kocberber Onur; Nia Karoon Rashedi; Idicula Sam; Agarwal Nipun |
11531947 | System and method for software development including column-based process editor | Damonte Nicolas; Alabes Tomas; Allo Ron Juan Manuel; Iturri Fernando Alturralde |
11533247 | Methods, systems, and computer readable media for autonomous network test case generation | Saxena Varun; Aravamudhan Venkatesh; Sapra Kawal |
11533278 | Conditional automatic social posts | Ioannou Andrew; Trent, II Eugene W.; Sutton Eric L. |
11533326 | Systems and methods for multivariate anomaly detection in software monitoring | Salunke Sampanna Shahaji; Bahena Tapia Dario; Garvey Dustin; Gopalakrishnan Sumathi; Goodman Neil |
11533363 | System and method for efficient virtualization in lossless interconnection networks | Tasoulas Evangelos; Zahid Feroz; Johnsen Bjørn Dag; Gran Ernst Gunnar |
11537369 | System and method for dynamic, incremental recommendations within real-time visual simulation | Allan David; Stojanovic Alexander Sasha; Namarvar Hassan Heidari; Seetharaman Ganesh |
11537370 | System and method for ontology induction through statistical profiling and reference schema matching | Stojanovic Alexander Sasha; Namarvar Hassan Heidari; Allan David; Seetharaman Ganesh |
11537371 | System and method for metadata-driven external interface generation of application programming interfaces | Seetharaman Ganesh; Stojanovic Alexander Sasha; Namarvar Hassan Heidari; Allan David |
11537374 | System and method for hot method call graph analysis | Bennani Mohamed Noureddine; Reynolds Nathan; Maulding Brian |
11537387 | Lock database code for online patching | Raman Sridevi |
11537579 | Fast in-memory technique to build a reverse CSR graph index in an RDBMS | Lozi Jean-Pierre; Arnaboldi Marco; Daynes Laurent Phillipe; Haprian Vlad Ioan; Kapp Hugo |
11537594 | Approximate estimation of number of distinct keys in a multiset using a sample | Budalakoti Suratna |
11537609 | Transforming a function-step-based graph query to another graph query language | Dwars Martijn; Sevenich Martin; Hong Sungpack; Wachsmuth Guido; Chafi Hassan |
11537611 | Generating filtered data sets for efficient query execution | Ajanahalli Pradeep Krishnappa; Pusegaonkar Sanjay Anant; Majumdar Atanu; Raghavan Kartik |
11537633 | Asynchronous cross-region block volume replication | Mallipeddi Venkata Harish; Portz Travis John; Larsen Jeppe Oskar Meyer; Tayah Mario |
11537645 | Building dialogue structure by using communicative discourse trees | Galitsky Boris |
11537909 | Monitoring database processes to generate machine learning predictions | Arthanat Sudhir; Prakash Prashant |
11537940 | Systems and methods for unsupervised anomaly detection using non-parametric tolerance intervals over a sliding window of t-digests | BahenaTapia Dario; Salunke Sampanna Shahaji; Garvey Dustin; Gopalakrishnan Sumathi |
11538003 | Sharded permissioned distributed ledgers | Moir Mark S.; Carr Harold; Herlihy Maurice P.; Sheff Isaac |
11538457 | Noise data augmentation for natural language processing | Jalaluddin Elias Luqman; Vishnoi Vishal; Johnson Mark Edward; Duong Thanh Long; Hong Yu-Heng; Vinnakota Balakota Srinivas |
11538468 | Using semantic frames for intent classification | Teserra Saba Amsalu |
11539635 | Using constraint programming to set resource allocation limitations for allocating resources to consumers | Colena Michael Patrick; Griffin Joshua Deen; Chen Gao |
11539754 | Techniques for generating network security policies for application components deployed in a computing environment | Pieczul Olgierd Stanislaw; Clark Robert Graham; Jami Nitin Srinivasa Rao |
Archiver|手机版|科学网 ( 京ICP备07017567号-12 )
GMT+8, 2024-11-1 21:20
Powered by ScienceNet.cn
Copyright © 2007- 中国科学报社