G06F16/23

Preventing DBMS deadlock by eliminating shared locking

A DBMS receives a database-access request that includes an instruction to non-destructively read a database table row. The DBMS assigns the request a TSN identifier and creates a TSN image that identifies all TSNs assigned to transactions that are not yet committed. The DBMS traverses a linked list of log entries that identifies a chronological history of transactions performed on the same row. The DBMS infers that the table row currently contains data stored by the most recently logged transaction that is not contained in the TSN image and that has thus been committed. The DBMS then continues to process statements of the transaction based on the assumption that the row contains the inferred value. The DBMS performs this procedure without acquiring a shared lock on the data page or on the index leaf page that points to the table row.

Preventing DBMS deadlock by eliminating shared locking

A DBMS receives a database-access request that includes an instruction to non-destructively read a database table row. The DBMS assigns the request a TSN identifier and creates a TSN image that identifies all TSNs assigned to transactions that are not yet committed. The DBMS traverses a linked list of log entries that identifies a chronological history of transactions performed on the same row. The DBMS infers that the table row currently contains data stored by the most recently logged transaction that is not contained in the TSN image and that has thus been committed. The DBMS then continues to process statements of the transaction based on the assumption that the row contains the inferred value. The DBMS performs this procedure without acquiring a shared lock on the data page or on the index leaf page that points to the table row.

Driving mode assessment

An example operation includes one or more of receiving, by a server, data related to an environment associated with a target transport, analyzing, by the server, the data to determine if at least one adverse condition related to the environment exists, and responsive to existence of the at least one adverse condition, sending, by the server, a recommendation related to operation of the target transport in a safe mode to overcome the at least one adverse condition to the target transport.

Community data aggregation with automated followup
11580090 · 2023-02-14 · ·

A system and method are disclosed for the collection and aggregation of data from contributing members of a community, such as health-related, personal, genomic, medical, and other data of interest for individuals and populations. Contributors become members of a community upon creation of an account and providing of data or files. The data is received and processed, such as to analyze, structure, perform quality control, and curate the data. Value or shares in one or more community databases are computed and attributed to each contributing member. The data is controlled to avoid identification or personalization. Steps are taken to determine incompleteness and incorrectness of the data, and the data may be improved or completed automatically, based upon interaction with members, additional contributions of data, and so forth.

Distributed database stored at an edge application

Systems and methods for reducing latency in transactions are described herein. In an embodiment, an application edge acts as a system of record for an application. When a client computing device sends a request to perform a transaction to the application, the application edge receives the request and, without forwarding the request to a backend computing network, searches a transaction datastore stored at the application edge for the account balance and responds to the client computing device with the account balance. The client computing device then determines that a transaction can be performed and sends a request to perform the transaction to the application. The application edge passes this request to the backend computing network which performs the requested transaction. The application edge then uses a webhook infrastructure to update each transaction datastore stored at the application edge.

Computing networks and systems for updating data

Systems and methods are provided for updating data in a computer network. An exemplary method includes: receiving a first data from one or more data servers; determining a second data for which a first update information is used to update at least one element of the second data; generating a second update information associated with the second data; generating a third update information by executing an operation that compares the first update information and the second update information; generating a third data by applying the third update information to the second data; allowing a user to select via a display device which of the different update elements to update the second data; generating a fourth update information by determining the selected different update elements to update the second data; and updating the second data using the fourth update information.

Electrical panel for training a mathematical model for a device using a smart plug

An electrical panel or an electrical meter may provide improved functionality by interacting with a smart plug. A smart plug may provide a smart-plug power monitoring signal that includes information about power consumption of devices connected to the smart plug. The smart-plug power monitoring signal may be used in conjunction with power monitoring signals from the electrical mains of the building for providing information about the operation of devices in the building. For example, the power monitoring signals may be used to (i) determine the main of the house that provides power to the smart plug, (ii) identify devices receiving power from the smart plug, (iii) improve the accuracy of identifying device state changes, and (iv) train mathematical models for identifying devices and device state changes.

Efficient deniable commitment of data and unlinkable proof of commitment for securing user privacy in a digital identity system
11580256 · 2023-02-14 · ·

A method of generating a deniable commitment of personal data of a user with an unlinkable proof of the commitment of the personal data for securing user privacy in a digital identity system includes receiving the personal data of the user and receiving the commitment of the personal data according to a commitment scheme. An interactive zero-knowledge proof is engaged in with the user so as to verify that the commitment of the personal data opens to the personal data of the user.

Electrical meter for training a mathematical model for a device using a smart plug

An electrical panel or an electrical meter may provide improved functionality by interacting with a smart plug. A smart plug may provide a smart-plug power monitoring signal that includes information about power consumption of devices connected to the smart plug. The smart-plug power monitoring signal may be used in conjunction with power monitoring signals from the electrical mains of the building for providing information about the operation of devices in the building. For example, the power monitoring signals may be used to (i) determine the main of the house that provides power to the smart plug, (ii) identify devices receiving power from the smart plug, (iii) improve the accuracy of identifying device state changes, and (iv) train mathematical models for identifying devices and device state changes.

Quality-aware data interfaces

A set of unstructured data is analyzed to infer structural elements from the unstructured data, and quantized data quality levels, indicative of data quality in the structural elements, are assigned to the structural elements. A set of structured data is generated to include the structural elements inferred from the unstructured data and associations between respective ones of the structural elements in the set of structured data and the corresponding quantized quality levels assigned to the structural elements. The set of structured data, including the associations between respective ones of the structural elements and the corresponding quantized quality levels assigned to the structural elements, is provided to a user interface application to enable the user interface application to visually display varying data qualities in the set of structured data.