47788 patents
Page 24 of 2390
Utility
Method and system for supporting inductive reasoning queries over multi-modal data from relational databases
19 Dec 23
A system, apparatus, and a method for training with multi-modal data in a relational database, including generating a first database including a multi-view of the multi-modal data, retrieving a second set of data from an external source via a network, and training a first model according the first database and the second set of data.
Rajesh Bordawekar, Bortik Bandyopadhyay
Filed: 21 Jun 21
Utility
Performance of SQL execution sequence in production database instance
19 Dec 23
A method, computer program product, and computer system for improving performance of a SQL execution sequence of SQL statements.
Shuo Li, Xiaobo Wang, Min Li, Sheng Yan Sun
Filed: 3 Dec 21
Utility
Compound predicate query statement transformation
19 Dec 23
Methods, computer program products, and systems are presented.
Daniele Costante Zilio, Muhammad Esaad Afaque, Darren Andrew Pepper, Xi Sun, Kostas Rakopoulos
Filed: 27 Aug 21
Utility
Unique SQL query transfer for anomaly detection
19 Dec 23
An example operation may include one or more of receiving a set of structured query language (SQL) queries from one or more software applications, generating a set of SQL syntax trees that correspond to the set of SQL queries, identifying a unique subset of SQL syntax trees among the generated set of SQL syntax trees based on previously obtained SQL syntax trees, and transmitting the unique subset of SQL syntax trees to a computing system.
Cheng-Ta Lee, Chun-Shuo Lin, Galia Diamant, Richard Ory Jerrell, Leonid Rodniansky
Filed: 1 Apr 22
Utility
Visualization and exploration of probabilistic models
19 Dec 23
Embodiments facilitating data exploration in a computing environment by a processor.
Pierpaolo Tommasi, Alessandra Pascale, Stephane Deparis
Filed: 3 Sep 19
Utility
Consolidating video search for an event
19 Dec 23
A method of searching for videos includes receiving, by a computer device, a search query from a user computer device.
James E. Bostick, John M. Ganci, Jr., Sarbajit K. Rakshit, Craig M. Trim
Filed: 11 May 20
Utility
Facilitating blockchain transactions with an Internet of Things (IoT) device
19 Dec 23
A system and method for facilitation transactions between an Internet of Things (IoT) system and a blockchain peer without the use of a smart phone are disclosed.
Marci Ramona Wojcik
Filed: 20 Aug 19
Utility
Verifiable training of model in untrusted environment
19 Dec 23
An example operation may include one or more of receiving, from a plurality of providers by a secure enclave, a plurality of training data sets and a plurality of salts paired with the plurality of training data sets, respectively, hashing, via the secure enclave, pairs of training data sets and salts to generate a plurality of salted hashes, and combining the plurality of salted hashes to generate a digest, training, via the secure enclave, a model based on the plurality of training data sets to generate a trained model, and providing the trained model and the digest to a plurality of data providers of the plurality of training data sets and the plurality of salts.
Yacov Manevich, Marcus Brandenburger, Elli Androulaki
Filed: 12 Mar 21
Utility
Automatic generation of ground rule verification macros
19 Dec 23
Ground rule verification (“GRV”) design layouts may be automatically generated based on one or more design macros.
Jingyu Lian, Shruthi Venkateshan, Tenko Yamashita, Jinning Liu
Filed: 21 May 21
Utility
Automatic container specification file generation for a codebase
19 Dec 23
Embodiments for providing an enhanced codebase in a computing environment by a processor.
Gabriele Picco, Natalia Mulligan, Inge Lise Vejsbjerg, Thanh Lam Hoang
Filed: 3 Mar 22
Utility
Fast search for search string instructions
19 Dec 23
One or more computer processors receive a pattern string comprising a pointer to a pattern search point and a string comprising a pointer to a search point; determine a plausible search point within the string for the pattern character; execute a search string (SRST) instruction with the determined search point and the pattern character; compute a pattern offset comprising a difference between a first occurrence of the determined pattern character located within the pattern string but not in the correct position and a current pattern character position; execute a subsequent SRST instruction with the current pattern character position and the computed offset set as a new search point; and responsive to identifying all pattern characters in the correct position within the string based on the executed subsequent SRST instruction, transmit memory address associated with a substring comprised of the string and corresponding pattern characters in the correct position.
Allan H. Kielstra, Ying Chau Raymond Mak, Ka Yin Lam, John Michael Chase
Filed: 24 Jun 21
Utility
Feedback-directed pass pipeline optimization in static compilation
19 Dec 23
Feedback-directed pass pipeline optimization in static compilation includes receiving a set of source input of source code by a static compiler.
Wai Hung Tsang, Jinsong Ji
Filed: 20 Dec 21
Utility
Constraints-based refactoring of monolith applications through attributed graph embeddings
19 Dec 23
Methods, systems, and computer program products for constraints-based refactoring of monolith applications through attributed graph embeddings are provided herein.
Srikanth Govindaraj Tamilselvam, Utkarsh Milind Desai, Sambaran Bandyopadhyay
Filed: 7 Sep 21
Utility
Detecting business code areas in a mainframe application
19 Dec 23
A computer-implemented method for detecting code regions related to specific processes in an application is provided including obtaining a call-graph of an application, each node of the call-graph representing a program in the application and each edge of the call-graph representing a call between programs, detecting merge points in the call-graph where paths from different entry points are merged, dividing the call-graph into sub-call-graphs at the merge points to create a macro-call-graph, each node of the macro-call-graph representing each of the sub-call-graphs, detecting code regions related to specific processes in each program in the application based on variable names corresponding to the specific processes, setting an initial state to each entry point of the sub-call-graphs, and identifying sub-call-graphs related to each specific process by using dataflow analysis with the initial states and the code regions based on entry states of the sub-call-graphs.
Toshiaki Yasue, Nobuhiro Hosokawa, Hiroaki Nakamura, Kohichi Ono, Yukiko Hara
Filed: 7 Dec 21
Utility
Thread priorities using misprediction rate and speculative depth
19 Dec 23
Methods and systems for determining a priority of a threads is described.
Richard J. Eickemeyer, Ehsan Fatehi, John B. Griswell, Jr., Naga P. Gorti
Filed: 2 Jul 21
Utility
Secure virtual machine software management
19 Dec 23
One or more computer processors responsive to a hypervisor data request, generate an encrypted set of hypervisor data indicating hypervisor hardware details using a plurality of respective asymmetric encryption keys to tag the generated set of encrypted hypervisor data with a timestamp at a time of encryption.
Szymon Kowalczyk, Andrzej Pietrzak, Michal Paluch, Tomasz Hanusiak, Piotr P. Godowski
Filed: 3 Dec 20
Utility
Deploy build blocks and analyze build bottleneck
19 Dec 23
An approach is provided in which the approach trains a first machine learning model using a set of features corresponding to a set of build blocks.
Ning Zhang, Yi Shao, Jing Xu, Xue Ying Zhang, Na Zhao
Filed: 8 Jul 21
Utility
Preventing data leakage in automated machine learning
19 Dec 23
A mechanism is provided in a data processing system for preventing data leakage in automated machine learning.
Kunal Sawarkar
Filed: 21 Jul 20
Utility
Automatic data preprocessing
19 Dec 23
Embodiments for automatic data preprocessing for a machine learning operation by a processor.
Ngoc Minh Tran, Mathieu Sinn, Thanh Lam Hoang, Martin Wistuba
Filed: 17 May 18
Utility
Feature engineering in neural networks optimization
19 Dec 23
A transitive closure data structure is constructed for a pair of features represented in a vector space corresponding to an input dataset.
Craig M. Trim, Mary E. Rudden, Aaron K. Baughman, Stefan A. G. Van Der Stockt, Bernard Freund, Augustina Monica Ragwitz
Filed: 16 Sep 22