G06F16/285

Dynamic updating of query result displays

Described are methods, systems and computer readable media for dynamic updating of query result displays.

Multi-stage adaptable continuous learning / feedback system for machine learning models

Data is received that specifies a term generated by user input in a graphical user interface. Thereafter, the term is looked up in a dictionary in which there are multiple classes for terms. The term can be classified based on a first class having a top ranked effective count for the term within the dictionary when a ratio of the first class relative to a second class having a second ranked effective count for the term in the dictionary is above a pre-defined threshold. In addition, the term is classified using a machine learning model when the ratio of the first class relative to the second class is below the pre-defined threshold. Data can be provided which characterizes the classifying. Related apparatus, systems, techniques and articles are also described.

System Providing Self-Service Access to Locked Merchandise
20230008200 · 2023-01-12 ·

A system providing self-service access to locked merchandise comprising: (a) providing a fixture that restricts access to the locked merchandise, wherein the fixture can automatically lock or unlock, allowing or restricting access to the locked merchandise; (b) providing a means of uniquely identifying an individual attempting to access the merchandise; (c) measuring a set of behaviors of the individual during any time the fixture is an open mode; (d) assessing whether the set of behaviors of the individual are suspicious or not relative to a set of suspicious event thresholds; (e) storing the individual and their set of behaviors as accessible records in at least one database; and (f) providing an algorithm which determines future access privileges of the individual to the enclosure based on a set of variables.

Dynamic performance tuning based on implied data characteristics

Techniques for improving system performance based on data characteristics are disclosed. A system may receive updates to a first data set at a first frequency. The system selects a first storage configuration, from a plurality of storage configurations, for storing the first data set based on the first frequency, and stores the first data set in accordance with the first storage configuration. The system may further receive updates to a second data set at a second frequency. The system selects a second storage configuration, from the plurality of storage configurations, for storing the second data set based on the second frequency, and stores the second data set in accordance with the second storage configuration. The second storage configuration is different than the first storage configuration.

Encryption as a service with request pattern anomaly detection

A system and method mediate transfer of encrypted data files between local applications and external computer systems. Application containers perform cryptographic operations using stored credentials to decrypt data coming from these external systems and configurably forward them to the local applications, and to encrypt data sent from the local applications to the external systems. Access to this encryption-as-a-service (EaaS) functionality is gated by a fingerprint service that classifies requests by security level, and detects anomalous requests. Security classification is performed by a supervised machine learning algorithm, while anomalous request detection is performed by unsupervised machine learning algorithm. Stored keys are monitored, and when they near expiration or are damaged, embodiments proactively undertake key renewal and key exchange with the external computer systems. Containerization enables key storage in multiple vaults, thereby making such storage vendor-agnostic.

Maintenance of clustered materialized views on a database system

A cluster view method of a database to perform compaction and clustering of database objects, such as database materialized view is shown. The database can comprise a cache to store changes to storage units of tables of the database objects. The cluster view method can implement clustering to remove data based on the cache and clustering to group the data of the materialized view.

Custodian disambiguation and data matching

Provided is a technique for matching different user representations of a person in a plurality of computer systems may be provided. The technique includes collecting information sets about user representations from a plurality of computer systems; normalizing the information sets to a unified format; grouping the information sets in the unified format into indexing buckets based on a user name using a non-phonetic algorithm; determining a similarity score for each pair of information sets in each of the indexing buckets; classifying each information set pair into a set of classes based on the similarity scores, wherein the set of classes comprise at least matches and non-matches; and using a data structure for merging information of information set pairs classified as matches.

Synthesizing disparate database entries for hardware component identification

A device retrieves historical data and new data each a respective hardware component identifier and a respective associated value. The device creates a synthesized set of data by having subsets for anomalous data, data that is associated with an attenuation signal, and other data. The device discards the anomalous data and weights the data associated with an attenuation signal. The device generates a searchable database, the searchable database including each hardware component named by an entry of the synthesized set of data, along with an associated value determined based on the weighted value of the entry. The device receives user input of a search query, and outputs search results based on a comparison of the user input of the search query to entries of the searchable database.

Trimming blackhole clusters
11704315 · 2023-07-18 · ·

Disclosed are techniques for trimming large clusters of related records. In one embodiment, a method is disclosed comprising receiving a set of clusters, each cluster in the clusters including a plurality of records. The method extracts an oversized cluster in the set of clusters and performs a breadth-first search (BFS) on the oversized cluster to generate a list of visited records. The method terminates the BFS upon determining that the size of the list of visited records exceeds a maximum size and generates a new cluster from the list of visited records and adding the new cluster to the set of clusters. By recursively performing BFS traverse over the oversized cluster and extracting smaller new clusters from it, the oversized cluster is eventually partitioned into a set of sub-clusters with the size smaller than the predefined threshold.

VISUAL RECOGNITION USING SOCIAL LINKS
20180004719 · 2018-01-04 ·

System, method and architecture for providing improved visual recognition by modeling visual content, semantic content and an implicit social network representing individuals depicted in a collection of content, such as visual images, photographs, etc., which network may be determined based on co-occurrences of individuals represented by the content, and/or other data linking the individuals. In accordance with one or more embodiments, using images as an example, a relationship structure may comprise an implicit structure, or network, determined from co-occurrences of individuals in the images. A kernel jointly modeling content, semantic and social network information may be built and used in automatic image annotation and/or determination of relationships between individuals, for example.