19792 patents
Page 13 of 990
Utility
Constructing Answers to Queries Through Use of a Deep Model
25 Apr 24
Various technologies relating to constructing an answer to a query are described herein, wherein the answer is in list form.
Xiaojian WU, Doran CHAKRABORTY, Hyun-Ju SEO, Sina LIN, Gangadharan VENKATASUBRAMANIAN
Filed: 22 Oct 23
Utility
Interactive Concept Editing In Computer-human Interactive Learning
25 Apr 24
A collection of data that is extremely large can be difficult to search and/or analyze.
Patrice Y. SIMARD, David G. GRANGIER, Leon BOTTOU, Saleema A. AMERSHI
Filed: 1 Dec 23
Utility
Measuring Probability of Influence Using Multi-dimensional Statistics on Deep Learning Embeddings
25 Apr 24
The disclosure herein describes a system for measuring probability of influence in digital communications to determine if communication content originated in a person's own prior knowledge or new information more recently obtained from interaction with communications of others.
Amund TVEIT, Kateryna SOLONKO, Zoran HRANJ, Aleksander Werpachowski, Roman WERPACHOWSKI, Mohammadreza BONYADI, Arun Shankar IYER
Filed: 24 Oct 22
Utility
Model Capability Extraction
25 Apr 24
The indirect querying of models to determine capabilities possessed by the model.
Benjamin Goth ZORN, Carina Suzana NEGREANU, Neil Blunt TORONTO, Brian Paul SLININGER, Andrew Donald GORDON, Advait SARKAR, Elnaz NOURI, Vu Minh LE, Christian Leopold Bejamin POELITZ, Shraddha Govind BARKE, Sruti Srinivasa RAGAVAN
Filed: 19 Oct 22
Utility
Entity Selection and Ranking Using Distribution Sampling
25 Apr 24
Embodiments of the disclosed technologies include generating a reward score for an entity.
Yafei Wei, Andrew O. Hatch, Keqing Liang, Liyan Fang, Ankan Saha
Filed: 19 Oct 22
Utility
Ticket Troubleshooting Support System
25 Apr 24
Systems and methods for providing ticket support using a machine learning model trained using clusters of support tickets that are clustered based on similarity of resolution commands are provided.
Udayan KUMAR, Rakesh Jayadev NAMINENI
Filed: 21 Feb 22
Utility
Three-Dimensional Object Detection
25 Apr 24
According to implementations of the subject matter described herein, a solution is proposed for three-dimensional (3D) object detection.
Zheng Zhang, Han Hu, Yue Cao, Xin TONG, Ze Liu
Filed: 8 Feb 22
Utility
Temporal and Spatial Coherence In Ray Tracing
25 Apr 24
A ray trace operation includes tracing a ray from an origin point in accordance with a ray path into a virtual environment (where the virtual environment comprises one or more virtual objects defined by one or more object components) and determining an intersected object component of the one or more object components that the ray intersects with.
Martin Jon Irwin FULLER
Filed: 16 Dec 22
Utility
Fast and Efficient Text Only Adaptation for Factorized Neural Transducer
25 Apr 24
Systems and methods are provided for accessing a factorized neural transducer comprising a first set of layers for predicting blank tokens and a second set of layers for predicting vocabulary tokens, the second set of layers comprising a language model that includes a vocabulary predictor which is a separate predictor from the blank predictor, wherein a vocabulary predictor output from the vocabulary predictor and the encoder output are used for predicting a vocabulary token.
Rui ZHAO, Jian XUE, Sarangarajan PARTHASARATHY, Jinyu LI
Filed: 9 Nov 22
Utility
Detecting and Mitigating Side Channel Attacks with Razor-flops
25 Apr 24
The techniques disclosed herein are directed to devices, circuits, systems, and techniques to mitigate the impact of side-channel attacks on a cryptography function in a target system.
Bharat S. PILLILLI, Bryan David KELLY, Vishal SONI
Filed: 24 Oct 22
Utility
Transport Layer Security Computer Devices and Methods
25 Apr 24
A computer device instantiates a first Transport Layer Security (TLS) endpoint having access to a trusted execution environment (TEE) of the processor; generates in the TEE in an endpoint-specific public-private key pair bound to the first TLS endpoint; generates of attestation data verifying that the endpoint-specific public-private key pair was generated in the TEE and is bound to the first TLS endpoint; and signs the attestation data in the TEE using a TEE private key securely embedded in the processor.
Kapil VASWANI, Siddharth JAYASHANKAR, Antoine DELIGNAT-LAVAUD, Cedric Alain Marie Christophe FOURNET
Filed: 15 Dec 22
Utility
Simplified Masking for Signed Cryptography Operations
25 Apr 24
Generally discussed herein are devices, systems, and methods for secure cryptographic masking.
Emre KARABULUT, Bharat S. PILLILLI, Mojtaba BISHEH NIASAR
Filed: 13 Feb 23
Utility
Distributed Workload Reassignment Following Communication Failure
25 Apr 24
A generation identifier is employed with various systems and methods in order to identify situations where a workload has been reassigned to a new node and where a workload is still being processed by an old node during a failure between nodes.
David KRUSE, Qibo ZHU, David DION, Vladimir PETTER, Lokesh Srinivas KOPPOLU
Filed: 2 Jan 24
Utility
Metadata Enhancement for Packet Capture Using Vxlan Encapsulation
25 Apr 24
Techniques are disclosed for capturing network traffic in a computing environment comprising a plurality of computing devices.
Darshil Jashvant KHETANI, Hassan Ali Hussein BARAKAT, Salem Amin AL-DAMLUJI
Filed: 19 Oct 22
Utility
Systems and Methods for Routing Data Packet In a Unified Wide Area Network
25 Apr 24
A method and a network for routing data packet in a unified wide area network (WAN) is provided.
Paul David MATTES, Umesh KRISHNASWAMY, John Michael ABELN, Sonal KOTHARI, Paul-Andre C. BISSONNETTE, Pappula Prabhakar REDDY, Himanshu RAJ
Filed: 25 Jan 23
Utility
Autonomous Operation of Edge-based Deployments
25 Apr 24
Computing resources are managed in a computing network comprising a computing service provider and an edge computing network.
Rahul BOSE, Mark Gordon LIBBY, Anand MUTHURAJAN, Ronald Mark PARKER, Michael Anthony BROWN, Leland Douglas BENSON
Filed: 2 Jan 24
Utility
Mobile VPN Autostart Through App-only Management
25 Apr 24
Techniques for auto-starting a VPN in a MAM environment are disclosed.
James Matthew Hamilton OAKLEY, Neil Adam JACOBSON
Filed: 3 Jan 24
Utility
Detecting Suspicious Data Access by a Rogue Cloud Resource
25 Apr 24
The techniques disclosed herein prevent a rogue resource from being created within a cloud computing environment.
Evgeny BOGOKOVSKY, Ram Haim PLISKIN, Andrey KARPOVSKY
Filed: 27 Dec 22
Utility
Superposition-based Content Serving
25 Apr 24
Embodiments of the disclosed technologies receive a request including a user identifier and metadata associated with a slot available at a user system, remove the user identifier from the request to produce anonymized request data, receive, from a machine learning model, superposition data that correlates with the anonymized request data, send the superposition data for the anonymized request data to a real-time content-to-request matching process, receive, from the real-time content-to-request matching process, an identifier that identifies a content distribution selected based on the superposition data, and initiate the selected content distribution through the network to the slot in response to the request.
Tao Cai, Albert Hwang, Jianlong Zhang, Muhammad Hassan Khan
Filed: 23 Oct 22
Utility
Generating and Processing Charging Data Records Based on Predicted Record Length
25 Apr 24
The present disclosure generally relates to systems, methods, and computer-readable media for managing the generation and processing of charging data records (CDRs) in a telecommunication environment (e.g., a fourth generation (4G) a fifth generation (5G), or future generation mobile network).
Devesh VERMA, Krishnakumar VIJAYAN, Kumar ARAKERE BASAVARAJ, Girish R. NAIR, Arthur J. BARABELL, Venki Reddy PULICHERLA, Abhishek Kumar SINHA, Basant KUMAR, Pikan GHOSH
Filed: 23 Apr 23