2270 patents
Page 29 of 114
Utility
Detecting second-order security vulnerabilities in libraries
21 Feb 23
A method for executing a second-order taint analysis on library code may include generating, by executing a first-order taint analysis on the library code starting at a sink, a first execution path from a load instruction to the sink.
Raghavendra Ramesh, Nicholas John Allen, Yang Zhao
Filed: 29 Jan 21
Utility
Estimating the remaining useful life for cooling fans based on a wear-out index analysis
21 Feb 23
The disclosed embodiments provide a system that estimates a remaining useful life (RUL) for a fan.
Kenny C. Gross, Anton A. Bougaev, Aleksey M. Urmanov, David K. McElfresh
Filed: 7 Mar 22
Utility
Managing server performance and reliability during reductions in a number of power supply units
21 Feb 23
Techniques are disclosed regulating an amount of power consumed by a server from a set of power supplies in which at least one power supply of the set is inactive.
David Warren Hartwell
Filed: 14 Jan 22
Utility
Methods, systems, and computer readable media for selecting multiple network function types using a single discovery request
21 Feb 23
A method for selecting multiple network function (NF) types using a single discovery request includes receiving, by a NF repository function (NRF) from a consumer NF, a single discovery request message that requests discovery of a plurality of producer NF types in a fifth generation (5G) core network and includes an indication of multiple NF discovery requests, obtaining, by the NRF, NF profile objects corresponding to each of the plurality of producer NF types included in the single discovery request message, and providing, to the consumer NF via a single discovery response message generated by the NRF, NF profile objects that correspond to one or more of the plurality of producer NF types.
Kawal Sapra, Venkatesh Aravamudhan, Doki Satish Kumar Patro
Filed: 5 Mar 21
Utility
Disk drive failure prediction with neural networks
14 Feb 23
Techniques are described herein for predicting disk drive failure using a machine learning model.
Onur Kocberber, Felix Schmidt, Arun Raghavan, Nipun Agarwal, Sam Idicula, Guang-Tong Zhou, Nitin Kunal
Filed: 27 Sep 18
Utility
Search indexing using discourse trees
14 Feb 23
Systems, devices, and methods of the present invention create a searchable index that includes informative portions of text.
Boris Galitsky
Filed: 18 Oct 21
Utility
Regular expression generation using span highlighting alignment
14 Feb 23
Techniques for generated regular expressions are disclosed.
Michael Malak, Luis E. Rivas, Mark L. Kreider
Filed: 17 Jun 20
Utility
Cache conscious techniques for generation of quasi-dense grouping codes of compressed columnar data in relational database systems
14 Feb 23
Herein are techniques for dynamic aggregation of results of a database request, including concurrent grouping of result items in memory based on quasi-dense keys.
Shasank Kisan Chavan, William Martinez Cortes, Weiwei Gong
Filed: 30 Nov 21
Utility
Coverage of web application analysis
14 Feb 23
A method for detecting a defect may include extracting, from application code and using a framework support specification corresponding to a framework, a framework interaction between the application code and the framework.
Anastasios Antoniadis, Raghavendra Ramesh, Padmanabhan Krishnan, Nicholas John Allen
Filed: 22 Nov 19
Utility
Detecting hypocrisy in text
14 Feb 23
Techniques are disclosed for identifying hypocrisy in text.
Boris Galitsky
Filed: 29 Oct 20
Utility
Artificial intelligence based fraud detection system
14 Feb 23
Embodiments detect fraud of risk targets that include both customer accounts and cashiers.
William M. Warrick, II, Su-Ming Wu, Stephen Clegg, Randall Fernandes
Filed: 13 Nov 19
Utility
Secure distribution of entropy
14 Feb 23
Techniques are disclosed for securely distributing entropy in a distributed environment.
Danne Lauren Stayskal
Filed: 25 Feb 21
Utility
System, method and computer readable medium for determining an event generator type
14 Feb 23
Human interaction with a webpage may be determined by processing an event stream generated by the client device during the webpage interaction.
Robert R. Hauser
Filed: 10 Sep 14
Utility
Methods, systems, and computer readable media for mitigating denial of service (DoS) attacks at network functions (NFs)
14 Feb 23
A method for DoS attacks at an NF includes maintaining, at a first NF, an NF subscription database containing rules that specify maximum numbers of allowed subscriptions and corresponding rule criteria.
Jay Rajput, Virendra Singh, Amarnath Jayaramachar
Filed: 4 Feb 21
Utility
PMEM cache RDMA security
7 Feb 23
Techniques are described for providing one or more clients with direct access to cached data blocks within a persistent memory cache on a storage server.
Wei Zhang, Jia Shi, Zuoyu Tao, Kothanda Umamageswaran
Filed: 26 Mar 20
Utility
Tracking garbage collection states of references
7 Feb 23
Garbage collection (GC) states are stored within references stored on a heap memory to track a progress of GC operations with respect to the references.
Erik Ă–sterlund, Per Liden, Stefan Mats Rikard Karlsson
Filed: 29 Oct 20
Utility
Data partitioning and parallelism in a distributed event processing system
7 Feb 23
An event processing system for processing events in an event stream is disclosed.
Herbert Stiel, Hoyong Park, Sandeep Bishnoi, Prabhu Thukkaram
Filed: 11 Sep 17
Utility
Lazy push strategies for vectorized D-Heaps
7 Feb 23
Techniques are provided for lazy push optimization, allowing for constant time push operations.
Harshad Kasture, Matthias Brantner, Hassan Chafi, Benjamin Schlegel, Pit Fender
Filed: 18 Mar 20
Utility
Implementing state-based frame barriers to process colorless roots during concurrent execution
7 Feb 23
An application thread executes concurrently with a garbage collection (GC) thread traversing a call stack of the application thread.
Erik Ă–sterlund, Per Liden, Stefan Mats Rikard Karlsson
Filed: 25 Mar 21
Utility
Generating a next best action recommendation using a machine learning process
7 Feb 23
Techniques for determining a Next Best Action (NBA) are disclosed, with the determination being based on a position within an application, past actions by a user when experiencing a similar application context, and/or tasks in queue for the user to execute from current state of the application.
Abhishek Verma, Michael Richard Palmeter, Simon Chow, Satheesh Kumar Reddy Challaveera, Trevor Mathers
Filed: 13 Jan 20