2270 patents
Page 35 of 114
Utility
Lock database code for online patching
27 Dec 22
Systems, methods, and other embodiments associated with patching database objects while a database system is online are described.
Sridevi Raman
Filed: 12 Aug 21
Utility
Fast in-memory technique to build a reverse CSR graph index in an RDBMS
27 Dec 22
In an embodiment, a computer obtains a mapping of a relational schema of a database to a graph data model.
Jean-Pierre Lozi, Marco Arnaboldi, Laurent Phillipe Daynes, Vlad Ioan Haprian, Hugo Kapp
Filed: 12 Mar 20
Utility
Approximate estimation of number of distinct keys in a multiset using a sample
27 Dec 22
Herein are quantitative analytics to increase the accuracy of cardinality estimation without increasing sample size.
Suratna Budalakoti
Filed: 5 Feb 21
Utility
Transforming a function-step-based graph query to another graph query language
27 Dec 22
To execute function-step-based graph queries on a graph engine that has its own graph query language, rather than re-implementing an existing infrastructure to support function-step-based graph protocols, function-step-based graph queries are transformed to the graph query language that is understood by the graph engine.
Martijn Dwars, Martin Sevenich, Sungpack Hong, Guido Wachsmuth, Hassan Chafi
Filed: 30 Jun 20
Utility
Generating filtered data sets for efficient query execution
27 Dec 22
A system filters a data set for the efficient execution of queries by removing at least some irrelevant records to generate a reduced data set.
Pradeep Krishnappa Ajanahalli, Sanjay Anant Pusegaonkar, Atanu Majumdar, Kartik Raghavan
Filed: 22 Dec 20
Utility
Asynchronous cross-region block volume replication
27 Dec 22
Techniques are provided for cross-region replication of block volume data.
Venkata Harish Mallipeddi, Travis John Portz, Jeppe Oskar Meyer Larsen, Mario Tayah
Filed: 6 Nov 20
Utility
Building dialogue structure by using communicative discourse trees
27 Dec 22
Systems, devices, and methods of the present invention detect rhetoric agreement between texts.
Boris Galitsky
Filed: 4 Jan 19
Utility
Monitoring database processes to generate machine learning predictions
27 Dec 22
Methods and system are presented for monitoring database processes to generate machine learning predictions.
Sudhir Arthanat, Prashant Prakash
Filed: 30 Dec 19
Utility
Systems and methods for unsupervised anomaly detection using non-parametric tolerance intervals over a sliding window of t-digests
27 Dec 22
Systems and methods for unsupervised training and evaluation of anomaly detection models are described.
Dario BahenaTapia, Sampanna Shahaji Salunke, Dustin Garvey, Sumathi Gopalakrishnan
Filed: 13 May 19
Utility
Sharded permissioned distributed ledgers
27 Dec 22
A sharded, permissioned, distributed ledger may reduce the amount of work and communication required by each participant, thus possibly avoiding scalability bottlenecks that may be inherent in previous distributed ledger implementations and possibly enabling the use of additional resources to translate to increased throughput.
Mark S. Moir, Harold Carr, Maurice P. Herlihy, Isaac Sheff
Filed: 7 Aug 20
Utility
Noise data augmentation for natural language processing
27 Dec 22
Techniques for noise data augmentation for training chatbot systems in natural language processing.
Elias Luqman Jalaluddin, Vishal Vishnoi, Mark Edward Johnson, Thanh Long Duong, Yu-Heng Hong, Balakota Srinivas Vinnakota
Filed: 9 Sep 20
Utility
Using semantic frames for intent classification
27 Dec 22
The present disclosure relates to chatbot systems, and more particularly, to techniques for identifying an intent for an utterance based on semantic framing.
Saba Amsalu Teserra
Filed: 9 Sep 20
Utility
Using constraint programming to set resource allocation limitations for allocating resources to consumers
27 Dec 22
Resource allocation limitations include resource limits and resource guarantees.
Michael Patrick Colena, Joshua Deen Griffin, Gao Chen
Filed: 10 May 21
Utility
Techniques for generating network security policies for application components deployed in a computing environment
27 Dec 22
Techniques are disclosed for generating network security policies for different versions of a component of an application deployed in a computing environment where the different versions have potentially different network requirements and the different versions operate together at the same time in the computing environment.
Olgierd Stanislaw Pieczul, Robert Graham Clark, Nitin Srinivasa Rao Jami
Filed: 16 Dec 20
Utility
Allocating and accessing memory pages with near and far memory blocks from heterogenous memories
20 Dec 22
A heterogeneous memory system is implemented using a low-latency near memory (NM) and a high-latency far memory (FM).
Lizy John, Jee Ho Ryoo, Hung-Ming Hsu, Karthik Ganesan
Filed: 22 Jan 21
Utility
Database modularization of pluggable guest languages
20 Dec 22
Herein are techniques that extend a software system to embed new guest programing languages (GPLs) that interoperate in a transparent, modular, and configurable way.
Pit Fender, Harshad Kasture, Alexander Ulrich, Benjamin Schlegel, Matthias Brantner, Hassan Chafi
Filed: 30 Aug 19
Utility
System and method for use of a dynamic flow in a multidimensional database environment
20 Dec 22
In accordance with an embodiment, described herein is a system and method for use of a dynamic flow process (referred to herein in some examples as Query Processing Dynamic Flow (QPDF)) in a multidimensional database computing environment.
Natasha Reichman, Sergei Riaboi, Alexey Roytman, Victor Belyaev, Kumar Ramaiyer
Filed: 6 Jan 20
Utility
System and method for supporting rollback of changes made to target systems via an integration platform
20 Dec 22
Systems and methods for supporting rollback of changes made to target systems via an integration platform.
Prakash Kumar Devta, Anuj Kaushal
Filed: 22 Jan 21
Utility
Techniques for linking data to provide improved searching capabilities
20 Dec 22
A machine-learning model may be previously trained with a supervised learning algorithm to identify whether a pair of labels provided as input are similar.
Gopal Srinivasa Raghavan, Abhiram Madhukar Gujjewar, Ganesh Seetharaman, Jai Motwani, Sayon Dutta, Rajat Mahajan, Manasjyoti Sharma
Filed: 19 Jul 21
Utility
Autonomously partitioning database tables
20 Dec 22
What is disclosed is an improved approach to perform automatic partitioning, without requiring any expertise on the part of the user.
George Eadon, Ramesh Kumar, Ananth Raghavan
Filed: 11 Sep 20