589 patents
Page 4 of 30
Utility
Efficient Use of Computing Resources for Optimization of Non-convex Functions
20 Jul 23
Aspects of the present disclosure provide techniques for efficiently utilizing physical computing resources for non-convex function approximation.
Xue HAN, Zhicheng XUE, Wei WANG, Nazanin Zaker HABIBABADI, Yue YU
Filed: 14 Jan 22
Utility
Methods and Systems for Training and Using Predictive Risk Models In Software Applications
20 Jul 23
Certain aspects of the present disclosure provide techniques for training predictive risk models based on user transaction history.
Nazanin Zaker HABIBABADI, Wei WANG, Xue HAN, Zhicheng XUE, Yue YU
Filed: 19 Jan 22
Utility
Systems and Methods for Workflow Based Application Testing In Cloud Computing Environments
13 Jul 23
A testing system and method for testing application code against various failure scenarios.
Saravanan BALASUBRAMANIAN, Navin Kumar JAMMULA, Sumit NAGAL, Vijay THOMAS
Filed: 7 Mar 23
Utility
Embedding Performance Optimization Through Use of a Summary Model
13 Jul 23
Aspects of the present disclosure provide techniques for improved text classification.
Krysten Nicole DELL, Jason HECKENDORN, Lin TAO, Yingxin WANG
Filed: 11 Jan 22
Utility
Methods and Systems for Generating Problem Description
13 Jul 23
A computing system identifies an incoming voice call from a user device to an agent device associated with the computing system.
Rami COHEN, Noa HAAS, Oren Sar SHALOM, Alexander ZHICHAREVICH
Filed: 7 Mar 23
Utility
Machine Learning for Improving Mined Data Quality Using Integrated Data Sources
13 Jul 23
A processor may receive user interaction data of a user for a plurality of electronically-presented offers.
Vijay Manikandan JANAKIRAMAN, Kevin Michael Furbish, Nirmala Ranganathan, Kymm K. Kause
Filed: 7 Mar 23
Utility
Phishing Detection and Mitigation
13 Jul 23
Described herein are example implementations for handling of phishing attempts.
Yair HORESH, Aviv Ben Arie
Filed: 11 Jan 22
Utility
Automatic Detection of Personal Identifiable Information
6 Jul 23
Described herein are example implementations for the automatic detection and handling of personal identifiable information (PII) in electronic records.
Daphna LITVIN, Elad Shmidov, Margarita Vald
Filed: 5 Jan 22
Utility
Method and System of Automatically Predicting Anomalies In Online Forms
29 Jun 23
A computer-implemented system and method for predicting and flagging an anomaly entered in a digital form.
Janani KALYANAM, Zhewen FAN, Byungkyu KANG, Kate Elizabeth SWIFT-SPONG, Shivakumara NARAYANASWAMY
Filed: 6 Mar 23
Utility
Metamodeling for Confidence Prediction In Machine Learning Based Document Extraction
29 Jun 23
A document extraction system executed by a processor, may process documents using manual and automated systems.
Terrence J. TORRES, Venkatesh Coimbatore Ravichandran, Karen Kraemer Lowe
Filed: 1 Mar 23
Utility
Multi-channel Hybrid Models for Efficient Routing
29 Jun 23
Systems and methods are used to generate contact type predictions that route user customer service requests within a support platform.
Prarit LAMBA, Clifford GREEN
Filed: 3 Mar 23
Utility
Method and System for Traversing an Object Graph Using Traversal Context Objects
25 May 23
Certain aspects of the present disclosure provide techniques for enumerating relationships in an object graph using traversal context objects that are decoupled from the implementation details of an object graph and the objects stored therein.
Aleksandr MATIUSHKIN, Ajay GUPTA, Grigoriy KESLER
Filed: 20 Jan 23
Utility
Automatic Customer Feedback System
18 May 23
A computing system monitors interaction of a user with a dialog in an application executing on a user device associated with the user.
Vishnu Priya T.G.
Filed: 12 Nov 21
Utility
Machine Learning Pipeline for Document Image Quality Detection and Correction
11 May 23
A computing system receives, from a client device, an image of a content item uploaded by a user of the client devices.
Saisri Padmaja Jonnalagedda, Xiao Xiao
Filed: 28 Dec 22
Utility
System and Method for Determining a Structured Representation of a Form Document Utilizing Multiple Machine Learning Models
11 May 23
Systems and methods may be used to generate and use a structured form representation and structured metadata.
Stephanie BROYLES, Andrew Van CAO, Stephen A. EUBANKS, William R. GEORGEN, Karpaga Ganesh PATCHIRAJAN
Filed: 28 Dec 22
Utility
Minimizing Risks Posed to Online Services
4 May 23
A system receives a request for payment of a transaction between a vendor and a consumer, and sends a first request to a database associated with the online service for historical transactions and personal attributes of the vendor concurrently with sending a second request to a number of third-party services for credit information and personal attributes of the consumer.
Nghiem LE, Leandro ALVES, Nikolas TERANI, Eugene BENDERSKY, Taylor CRESSY
Filed: 29 Oct 21
Utility
Gradient Based Anomaly Detection System for Time Series Features
4 May 23
Systems and methods for identifying suspected anomalies in time series data are disclosed.
Aviv BEN ARIE, Or BASSON, Nitzan BAVLY, Yair HORESH
Filed: 28 Oct 21
Utility
Heterogeneous Graph Embedding
4 May 23
A computer-implemented system and method for generating heterogeneous graph feature embeddings for feature learning and prediction.
Runhua ZHAO
Filed: 29 Dec 22
Utility
Metrics-based On-demand Anomaly Detection
4 May 23
A method for metrics-based anomaly detection involves receiving an anomaly analysis request for an asset and obtaining metrics associated with the asset.
Amit Shriram Kalamkar, Vigith Maurice, Avik Basu
Filed: 29 Oct 21
Utility
Multiple Input Machine Learning Framework for Anomaly Detection
4 May 23
A method that includes extracting image features of a document image, executing an optical character recognition (OCR) engine on the document image to obtain OCR output, and extracting OCR features from the OCR output.
Fadoua Khmaissia, Efraim David Feinstein, Preeti Duraipandian
Filed: 29 Oct 21