7579 patents
Page 3 of 379
Utility
Battery mitigated datacenter power usage
9 Jan 24
Methods for providing power to electronic components (e.g., servers in a datacenter, or other devices) can include providing AC power received from an external source to the devices.
Ligong Wang, Darin Lee Frink
Filed: 3 Feb 20
Utility
Dynamically assigning queries to secondary query processing resources
9 Jan 24
A primary query engine may receive a query and determine whether the query is eligible for performance at a secondary query engine.
Gaurav Saxena, Ippokratis Pandis, Mengchu Cai, Mingda Li, Mohammad Rezaur Rahman, Naresh Chainani
Filed: 15 Apr 22
Utility
Automated hierarchy detection for cloud-based analytics
9 Jan 24
A platform for data analytics may be provided in a hosted environment on a multi-tenant system.
Santosh Kalki, Swaminathan Sivasubramanian, Srinivasan Sundar Raghavan, Timothy Andrew Rath, Amol Devgan, Mukul Vijay Karnik
Filed: 30 Sep 14
Utility
Systems and methods for large-scale content exploration
9 Jan 24
Systems and methods are disclosed for hierarchical categorical and sub-categorical topic modeling allowing, in response to a query in natural language, a set of results to be determined which are both semantically relevant to the user and diverse, by containing information complementary or adjacent to that of the query.
Christina Pavlopoulou, Manish Gupta, Russ Thompson
Filed: 7 Aug 19
Utility
Rewriting queries to compensate for stale materialized views
9 Jan 24
Queries that reference materialized views may be rewritten to compensate for stale materialized views.
Yannis Papakonstantinou, Balakrishnan Narayanaswamy, Christos Faloutsos, Vuk Ercegovac
Filed: 27 Nov 19
Utility
Particle encoding for automatic sample processing
9 Jan 24
A method of particle-based threat scanning may include obtaining a sample from a sample source, generating a plurality of particles from the sample, wherein each particle from the plurality of particles is an array of unique bytes generated based on one or more particle properties, and determining whether the sample is associated with a known threat by comparing the plurality of particles to particle threat signatures in a threat database.
Mircea Ciubotariu
Filed: 27 Jan 21
Utility
Artificial intelligence system for efficient interactive training of machine learning models
9 Jan 24
At an artificial intelligence system, one or more classifier training iterations are performed until a training completion criterion is met.
Sedat Gokalp, Abhishek Dan
Filed: 14 Jun 18
Utility
System for training neural network using ordered classes
9 Jan 24
A neural network is trained to process input data and generate a classification value that characterizes the input with respect to an ordered continuum of classes.
Rajeev Ranjan, Prithviraj Banerjee, Manoj Aggarwal, Gerard Guy Medioni, Dilip Kumar
Filed: 12 May 21
Utility
Shared dedicated host resource groups in a provider network
9 Jan 24
Techniques for host resource group sharing in a provider network are described.
Murtaza Muidul Huda Chowdhury, Ankit Jain, Ramapulla Reddy Chennuru, Niti S. Khadapkar, Yashi Kamboj, Xiangyu Ren, Anupama Anand
Filed: 22 Jun 20
Utility
Synchronization of access management tags between databases
9 Jan 24
A method to synchronize tags between two databases comprises receiving a first command to add a tag to a resource in a first database, the tag comprising a key value pair that defines an access privilege associated with the resource.
Jing Zhuang, Uzma Arjuman, Travis William Hickey, Jasmeet Chhabra
Filed: 26 Nov 18
Utility
Virtualizing non-volatile storage at a peripheral device
9 Jan 24
A peripheral device may implement storage virtualization for non-volatile storage devices connected to the peripheral device.
Raviprasad Venkatesha Murthy Mummidi, Matthew Shawn Wilson, Anthony Nicholas Liguori, Nafea Bshara, Saar Gross, Jaspal Kohli
Filed: 11 Feb 22
Utility
Multi-domain skills
9 Jan 24
Techniques for providing and implementing a single skill associated with custom functionality and system-provided functionality are described.
Jeffery Alan Meissner, Ernesto Gonzalez, Nikhil Mehta, Anemona Oana Hagea, John Montague Howard
Filed: 12 Dec 18
Utility
Introspection of machine learning estimations
9 Jan 24
A machine learning algorithm, such as a random forest regressor, can be trained using a set of annotated data objects to estimate the risk or business value for an object.
Alexander Watson
Filed: 4 May 17
Utility
Dynamic processing element array expansion
9 Jan 24
A computer-implemented method includes receiving a neural network model that includes a tensor operation, dividing the tensor operation into a set of sub-operations, and generating instructions for performing a plurality of sub-operations of the set of sub-operations on respective computing engines of a plurality of computing engines on a same integrated circuit device or on different integrated circuit devices.
Randy Renfu Huang, Ron Diamant, Richard John Heaton
Filed: 13 Jan 23
Utility
Sensor-based door lock confidence
9 Jan 24
A method of implementing a network-enabled secure door lock, comprising obtaining measurements of an environment associated with a door from a variety of sensor types; generating, based at least in part on the measurements, a set of inputs to a machine-learning model; inputting the set of inputs into the machine learning model to determine a status of the door; generating a message that indicates the status of the door; and transmitting the message to a user device.
Priti Marappan, Darren Ernest Canavor, Daniel Wade Hitchcock, Bharath Kumar Bhimanaik, Andrew Jay Roths
Filed: 21 Mar 18
Utility
Virtual fulfillment centers for item delivery
9 Jan 24
Devices and methods are provided for using virtual fulfillment center locations to facilitate delivery of items.
Jayanta Mandal, Debasish Das
Filed: 5 Nov 18
Utility
Session-based analysis of events
9 Jan 24
Systems and techniques for detecting events involving a user that occurred during a session in a facility, and performing a holistic, session-based analysis of the events to determine items taken by the user from the facility.
Michael Dillon, Charles Winn Degranville, Paul Aksenti Savastinuk, Amit Dekate, Michael L Sandige, Scott Brown, Paul Eugene Munger, Matthew Scott Wilding
Filed: 27 Jun 19
Utility
Detecting real-time clock loss
9 Jan 24
An application (or process) may have an amount of steady state work to perform per unit time, as well as one or more mechanisms for doing a lower quality job of that work in the event the application falls behind.
Erik Jason Johnson, Ryan Hegar
Filed: 6 Oct 22
Utility
Quantum computing simulation using comparative rejection sampling
9 Jan 24
A comparative rejection sampling technique selects a bound set of possible execution run results for a process to be simulated, such as a quantum circuit, for each possible execution run result a modeled probability of a state associated with the possible execution run result is determined.
Dylan Thomas Shields
Filed: 23 Jun 20
Utility
Direct memory access operation for neural network accelerator
9 Jan 24
In one example, an apparatus comprises: a direct memory access (DMA) descriptor queue that stores DMA descriptors, each DMA descriptor including an indirect address; an address translation table that stores an address mapping between indirect addresses and physical addresses; and a DMA engine configured to: fetch a DMA descriptor from the DMA descriptor queue to the address translation table to translate a first indirect address of the DMA descriptor to a first physical address based on the address mapping, and perform a DMA operation based on executing the DMA descriptor to transfer data to or from the first physical address.
Ilya Minkin, Ron Diamant, Kun Xu
Filed: 31 Mar 20