G06F11/3457

DYNAMIC QUERY RESOURCE CONTROL
20230099901 · 2023-03-30 ·

A computer implemented method for identifying problematic database operations includes identifying database transactions which exhibit performance issues and corresponding parse trees, transforming corresponding parse trees to create historical descriptor arrays, detecting a new database transaction, generating a new descriptor array corresponding to the new database transaction, analyzing the new descriptor array and the historical descriptor arrays to determine whether the new descriptor array indicates a performance issue corresponding to the new database transaction, and responsive to determining that the new descriptor array indicates a performance issue, adding the new database transaction to a resource controlled pool. The method may additionally comprise encoding one or more data items associated with the database. The method may additionally include sending the new database transaction to a virtual database simulation to simulate the new database transaction's performance, and providing the simulation results to a feedback database system.

Dynamic adjustment of web product-based performance factors in database systems
11494286 · 2022-11-08 · ·

In accordance with embodiments, there are provided mechanisms and methods for facilitating dynamic adjustment of web product-based performance factors in database systems according to one embodiment. In one embodiment and by way of example, a method includes identifying a web product and metadata associated with the web product, where the metadata reveals one or more performance factors capable of impacting performance of the web product. The method may further include generating one or more virtual toggles representing the one or more factors, and facilitating adjustment to the one or more virtual toggles to facilitate one or more changes to one or more metrics corresponding to the one or more performance factors, where the one or more changes to the one or more metrics reflect variations in the performance of the web product.

Diagnosing anomalies detected by black-box machine learning models

A computer-implemented method, a computer program product, and a computer system for diagnosing anomalies detected by a black-box machine learning model. A computer determines a local variance of a test sample in a test dataset, where the local variance represents uncertainty of a prediction by the black-box machine learning model. The computer initializes optimal compensations for the test sample, where the optimal compensations are optimal perturbations to test sample values of respective components of a multivariate input variable. The computer determines local gradients for the test sample. Based on the local variance and the local gradients, the computer updates the optimal compensations until convergences of the optimal compensations are reached. Using the optimal compensations, the computer diagnoses the anomalies detected by the black-box machine learning model.

INFRASTRUCTURE REFACTORING VIA FUZZY UPSIDE DOWN REINFORCEMENT LEARNING

Apparatus and methods for refactoring infrastructure. The methods may include (a) defining parameters of an application landscape. The methods may include (b) stress-testing an application in a simulated environment based on: the parameters; and a simulated input to the application. The methods may include (c) identifying a state of stress of the application based on output of the stress-test. The methods may include (d) repeating (b)-(c) with a different simulated input until the state of stress satisfies a predetermined stochastic threshold. The methods may include (e) providing the state of stress to an upside down reinforcement learning (“UDRL”) engine. The methods may include (f) comparing a throughput corresponding to the state of stress to a benchmark throughput. The methods may include (g) redefining the parameters. The methods may include (h) repeating (a)-(f) until a threshold proximity to the benchmark throughput is reached.

VEHICLE SOFTWARE SHADOW MODE TESTING

A test-optimizing system for supporting shadow mode testing of ADS software included in an ADS-provided vehicle. One or more potential vehicle routes are retrieved. A geographical area covering the one or more potential vehicle routes is obtained and data of crucial locations associated with past vehicle situations identified as critical and/or challenging. Moreover, the test-optimizing system retrieves respective ODD for one or more candidate software respectively adapted to run in the background of the vehicle. ODD-compliant locations for respective candidate software are determined, by identifying locations out of the data of crucial locations lying within respective candidate software's ODD. At least a first test-compliant location along at least a first route out of the one or more potential vehicle routes is determined by identifying for at least a first candidate software, locations out of the ODD-compliant locations situated along the at least first route.

METHODS, SYSTEMS, ARTICLES OF MANUFACTURE, AND APPARATUS FOR DESIGNING HARDWARE
20220335286 · 2022-10-20 ·

Methods, apparatus, systems, and articles of manufacture are disclosed for designing hardware. An example apparatus includes processor circuitry to execute machine readable instructions to determine a first hardware architectural configuration of a hardware component based on a design constraint, simulate an execution of the first hardware architectural configuration for a plurality of workloads to generate a respective plurality of objective design spaces, the objective design spaces based on one or more objectives; generate an aggregate score by aggregating a plurality of design space performance indicators, ones of the plurality of design space performance indicators corresponding to respective ones of the plurality of objective design spaces; search a design database based on the aggregate score to identify a second hardware architectural configuration, and predict a performance of the second hardware architectural configuration to generate a performance metric by executing a proxy function corresponding to the second hardware architectural configuration.

Network workflow replay tool
11477264 · 2022-10-18 · ·

A method of automatically identifying and recreating tenants environment issues in a set of datacenters by a workflow replay tool is provided. Each datacenter includes a network manager server. The method analyzes, by the workflow replay tool, a set of log files generated in the particular tenant's environment to identify tenant's workflows. The method analyzes, by the workflow replay tool, network manager server databases of the tenant's environment to identify the logical entities in the tenant environment used by the identified workflows. The method allocates resources in a lab environment to simulate the tenant's environment. The method reruns the identified tenant's workflows by the workflow replay tool using the allocated resources in the lab environment to recreate tenant environment issues.

CONTAINER DEPLOYMENT WITH VISUAL SECURITY PROFILE

A method and a corresponding system that enables developers to determine a combination of two or more security profiles in which to deploy and configure a container (or set of containers). In some instances, the determination of which two or more security profiles in which to deploy the container (or set of containers) is made based upon the use of a two-dimensional (2D) diagram or a three-dimensional (3D) diagram that provides a visual display of at least one overlap between the two or more security profiles represented therein.

Multi-layer cyber-physical systems simulation platform

Systems and methods for simulating cyber-physical systems are disclosed. A plurality of geographic simulation layers representing respective infrastructure sectors of a real-world environment may be generated, and the layers may be linked together with one another to create a multi-layer simulation. The associations between the layers of the simulation may be adjusted, and characteristics of the simulation layers themselves may be adjusted, to ensure that the simulation conforms to characteristics of the real-world environment being simulated. In some embodiments, a multi-user simulation system allows users at separate terminals to execute attack inputs and defense inputs against the simulation to try to destabilize and stabilize the simulation, respectively. Results of the attack inputs and defense inputs may be simultaneously displayed on a plurality of terminals.

Virtualization of complex networked embedded systems

A testing and verification system for an equivalent physical configuration of an in-flight entertainment and communications system with one or more hardware components includes a virtual machine manager. One or more virtual machines each including a hardware abstraction layer is instantiated by the virtual machine manager according to simulated hardware component definitions corresponding to the equivalent physical configuration of the hardware components. The virtual machines are in communication with each other over virtual network connections. A test interface to the one or more virtual machines generate test inputs to target software applications installed on the virtual machines. A display interface is connected to the virtual machines, with results from the execution of the target software applications responsive to the test inputs are output thereto.