2270 patents
Page 44 of 114
Utility
Implementing a correction model to reduce propagation of automatic speech recognition errors
4 Oct 22
Some techniques described herein determine a correction model for a dialog system, such that the correction model corrects output from an automatic speech recognition (ASR) subsystem in the dialog system.
Thanh Long Duong, Mark Edward Johnson
Filed: 13 Aug 20
Utility
High availability and automated recovery in scale-out distributed database system
27 Sep 22
Herein are acceleration techniques for resuming offloaded execution by replacing a failed computer with a hot spare computer.
Krishna Kantikiran Pasupuleti, Boris Klots, Vijayakrishnan Nagarajan, Anantha Kiran Kandukuri, Nipun Agarwal
Filed: 22 Oct 20
Utility
Driving massive scale out through rewrites of analytical functions
27 Sep 22
According to an embodiment, a method includes rewriting a particular query to generate a rewritten query.
Pit Fender, Benjamin Schlegel, Matthias Brantner
Filed: 19 Jul 19
Utility
Method and system for adaptively imputing sparse and missing data for predictive models
27 Sep 22
Described is an approach that provides an adaptive solution to missing data for machine learning systems.
Michael Zoll, Yaser I. Suleiman, Subhransu Basu, Angelo Pruscino, Wolfgang Lohwasser, Wataru Miyoshi, Thomas Breidt, Thomas Herter, Klaus Thielen, Sahil Kumar
Filed: 9 Sep 19
Utility
Query classification and processing using neural network based machine learning
27 Sep 22
Techniques are described herein for leveraging recurrent neural networks for query processing.
Arvind Kumar Maheshwari, Vamshidhar Reddy Pasham, Shantanu Mahajan, Debottam Kundu
Filed: 21 Jan 20
Utility
Automated building of expanded datasets for training of autonomous agents
27 Sep 22
Improved systems and methods for generating training data for classification models are disclosed.
Boris Galitsky
Filed: 30 May 19
Utility
Regular path queries (RPQS) for distributed graphs
27 Sep 22
A pattern matching engine interprets a query into a data structure resembling a finite state machine.
Petar Tonkovic, Vasileios Trigonakis, Tomas Faltin, Sungpack Hong, Hassan Chafi
Filed: 11 Jun 20
Utility
Techniques for managing distributed computing components
27 Sep 22
Techniques discussed herein are directed to identifying health assessment data of a set of computing instances of a distributed computing system.
Shreyas Vinayakumar, Banashankar Veerad, Aleks Seovic, Kanishka Sharad Joshi, Saurabh Agarwal, Jinsu Choi, Meghal Bharat Gosalia
Filed: 21 Jul 21
Utility
System and method for supporting patching in a multitenant application server environment
20 Sep 22
In accordance with an embodiment, described herein is a system and method for supporting patching in a multi-tenant application server environment.
Nazrul Islam, Jacob Lindholm, Josh Dorr, Christopher Kasso, Yamini K. Balasubramanyam, Steven Liu, Rajiv Mordani, Abhijit Kumar
Filed: 30 Nov 20
Utility
Pre/post deployment customization
20 Sep 22
An example system and method facilitates customization of and configuration of a software connector, such as a connector to an Application Programming Interface (API) or web service, in various types of computing environments, including both pre-deployment and post-deployment computing environments.
Ariel Cohen, Javier Espeche, Jonathan Lopez Lopez, Rajesh Tiwari
Filed: 31 Oct 19
Utility
Backup and restore of distributed environments
20 Sep 22
A cloud manager restores a backup of a distributed environment by comparing a stack of a current distributed environment to a backup stack of the backup of the distributed environment.
Biju Narayanan, Harish Subramanian, Jibu Thomas Thomas
Filed: 15 Jan 21
Utility
One-sided reliable remote direct memory operations
20 Sep 22
Techniques are provided to allow more sophisticated operations to be performed remotely by machines that are not fully functional.
Tirthankar Lahiri, Juan R. Loaiza, Garret F. Swart, Jesse Kamp, Avneesh Pant, Hideaki Kimura
Filed: 15 Oct 20
Utility
Change request visualization in hierarchical systems
20 Sep 22
Various techniques are disclosed herein for storing and managing master data in hierarchical data systems.
Douglas R. Cosby, Byron Kevin McKenzie
Filed: 12 Jul 17
Utility
Kernel subsampling for an accelerated tree similarity computation
20 Sep 22
Approaches herein relate to machine learning for detection of anomalous logic syntax.
Arno Schneuwly, Nikola Milojkovic, Felix Schmidt, Nipun Agarwal
Filed: 22 Dec 20
Utility
Adjusting chatbot conversation to user personality and mood
20 Sep 22
Systems, devices, and methods provide improved autonomous agents that are configured to respond to a user's query based on an emotion with which the query was expressed and a personality trait of the user.
Boris Galitsky
Filed: 7 May 20
Utility
Enhanced similarity detection between data sets with unknown prior features using machine-learning
20 Sep 22
The present disclosure relates to systems and methods for using machine-learning techniques to detect similar features between data sets.
Venkata Chandrashekar Duvvuri, Samba Reyes Njie
Filed: 25 Nov 19
Utility
Efficiently modeling database scenarios for later use on live data
20 Sep 22
A method of modeling a scenario for use with live data in a production database may include selecting the scenario.
Chi Ken Yeung, Ravi Shankar, Sondhi, Amira Morcos, Eva Kifri, Dave Altendorf, Qing Du, Hsiaowen Mou, David Bell
Filed: 1 Oct 12
Utility
System and method for correlating fabric-level group membership with subnet-level partition membership in a high-performance computing environment
20 Sep 22
System and method for correlating fabric-level group membership with subnet-level partition membership in a high performance computing environment.
Bjørn Dag Johnsen, Harald Høeg, Line Holen
Filed: 17 Dec 19
Utility
Malicious activity detection by cross-trace analysis and deep learning
20 Sep 22
Techniques are provided herein for contextual embedding of features of operational logs or network traffic for anomaly detection based on sequence prediction.
Guang-Tong Zhou, Hossein Hajimirsadeghi, Andrew Brownsword, Stuart Wray, Craig Schelp, Rod Reddekopp, Felix Schmidt
Filed: 5 Sep 18
Utility
Anomaly detection in SS7 control network using reconstructive neural networks
20 Sep 22
Herein are machine learning (ML) techniques for unsupervised training with a corpus of signaling system 7 (SS7) messages having a diversity of called and calling parties, operation codes (opcodes) and transaction types, numbering plans and nature of address indicators, and mobile country codes and network codes.
Hamed Ahmadi, Ali Moharrer, Venkatanathan Varadarajan, Vaseem Akram, Nishesh Rai, Reema Hingorani, Sanjay Jinturkar, Nipun Agarwal
Filed: 16 Dec 20