G06F7/00

Intelligent management of a synchronization interval for data of an application or service

The present disclosure relates to processing operations configured for intelligent management of a synchronization interval usable to synchronize data for an application/service between local data storage and distributed data storage. A classification prediction for a synchronization interval may be generated that is used as prediction for modifying the synchronization interval when a plurality of computing devices, linked to one or more user accounts, are used to access content. For instance, a suggestion is made as to whether a synchronization interval should be made faster, slower or even remain unchanged when a user account is accessing content. This may occur based on analysis of contextual factors described herein, thereby enabling a synchronization prediction component to make a best possible prediction for setting a synchronization interval. Artificial intelligence processing may be trained to generate the classification prediction for a synchronization interval. The classification prediction is utilized to manage modification of synchronization interval.

System to label K-means clusters with human understandable labels

Disclosed herein are system, method, and apparatus for generating labels for k-means clusters. The method includes accessing a plurality of data records from a database repository, and storing the plurality of data records into at least one of primary or secondary memory associated with at least one computer processor performing the method, along with a cluster number for each data record. All data records having a same cluster number form a cluster, and each record has been categorized or designated a cluster number out of a total K number of clusters. The method includes for each of a plurality of classification features, performing cluster-based analysis for a first cluster with respect to a single feature to generate a single feature overlap score. The method includes sorting, grouping, and generating a naming label for the first cluster based on the predetermined number of features having the lowest overlap scores.

Label propagation in a distributed system

Data are maintained in a distributed computing system that describe a graph. The graph represents relationships among items. The graph has a plurality of vertices that represent the items and a plurality of edges connecting the plurality of vertices. At least one vertex of the plurality of vertices includes a set of label values indicating the at least one vertex's strength of association with a label from a set of labels. The set of labels describe possible characteristics of an item represented by the at least one vertex. At least one edge of the plurality of edges includes a set of label weights for influencing label values that traverse the at least one edge. A label propagation algorithm is executed for a plurality of the vertices in the graph in parallel for a series of synchronized iterations to propagate labels through the graph.

Control of harmful organisms on the basis of the prediction of infestation risks

The present invention relates to the control of harmful organisms which may appear during the cultivation of crop plants. The control is effected on the basis of the prediction of subarea-specific infestation risks.

Query restartability
11698905 · 2023-07-11 · ·

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for restarting a query using a token. One of the methods includes receiving, by a computer from a requesting device, a query; determining, using a data storage system, a current result responsive to the query; generating, using the current result, a restart token that represents operations performed to determine a plurality of results responsive to the query including the current result responsive to the query and that can be used to determine a new result responsive to the query that was not included in the plurality of results responsive to the query; and providing, to the requesting device, a message that includes a) first data for the restart token that represents operations performed to determine the plurality of results responsive to the query and b) second data for the current result responsive to the query.

System, device and method for providing passenger or user information

A computer processing device for determining whether to allow or deny access to a database associated with the device is provided. The device is configured to determine the origin of data signed with a first key by comparing the key to one or more keys stored in a further database to identify the source of the data; search the database to determine one or more access rules associated with the source of the data, wherein the access rules define whether write access to the database is allowed or denied for the data; and allow or deny write access to the database based on the determined rule or rules.

Offload of data lookup operations

A central processing unit can offload table lookup or tree traversal to an offload engine. The offload engine can provide hardware accelerated operations such as instruction queueing, bit masking, hashing functions, data comparisons, a results queue, and a progress tracking. The offload engine can be associated with a last level cache. In the case of a hash table lookup, the offload engine can apply a hashing function to a key to generate a signature, apply a comparator to compare signatures against the generated signature, retrieve a key associated with the signature, and apply the comparator to compare the key against the retrieved key. Accordingly, a data pointer associated with the key can be provided in the result queue. Acceleration of operations in tree traversal and tuple search can also occur.

Method and systems for providing personalized supplemental audio streams
11698925 · 2023-07-11 · ·

The application aids users by providing supplemental audio content. For example, the application determines a subject of content provided to user equipment during a first time period of the content. The application retrieves a profile associated with the user equipment and retrieves supplemental audio related to the profile and related to the subject of the content. The application detects a supplementation point in the content corresponding with audio content similar to a supplementation signature and transmits the supplemental audio to the user equipment for output at the supplementation point.

Query rewrite for low performing queries based on customer behavior

A method includes receiving a plurality of product query arrays each including a plurality of individual product queries received during a single user search session. The method further includes inputting the plurality of product query arrays into the query rewrite model. Text of each of the plurality of individual product queries in each product query array is treated as a whole token. The method further includes receiving a product query from a user electronic device. The method further includes determining a query rewrite for the product query using the query rewrite model and determining search results for the product query using the query rewrite. The method further includes sending information for presenting the search results on a display of the user electronic device responsive to the product query.

Saving files from third-party systems directly to a cloud storage system

A method for saving a file stored on a third-party system to a cloud storage system includes receiving, at a cloud storage server of the cloud storage system, a save request from the third party system. The save request is generated in response to a user selecting, via a user interface presented on a client computer, the file from a plurality of files stored on the third-party system, the file to be saved to the cloud storage server. The save request comprises a file identifier of the file and information identifying the user. The information identifying the user allows access to a user account of the user on the cloud storage system without use of the client computer as intermediary service, and the third-party system stores the file associated with the file identifier. The method further includes authenticating the save request, based at least in part on the information identifying the user, creating a copy of the file at the cloud storage server, and associating the copy of the file with the user.