Images List Premium Download Classic

Heuristic

Heuristic-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
Evaluating the evaluation behaviors of evaluators
Microsoft Technology Licensing, Llc
October 12, 2017 - N°20170295194

Systems and methods for evaluating the evaluation behaviors of an evaluator are presented. In contrast to evaluation methods that monitor and analyze click behaviors, the disclosed subject matter is directed to evaluating non-click behaviors. After obtaining results of an evaluation request submitted to a response service for evaluation by the evaluator, evaluation behaviors of the evaluator are monitored. The monitored ...
Adaptive automatic email domain name correction
Lmp Software, Llc
October 12, 2017 - N°20170295134

A system and methods for correcting domain names in invalid email addresses are described herein. The method includes receiving email failure information including a bad domain name. The bad domain name is compared to valid domain names in a valid domain name database and a match distance of the bad domain name to valid domain names in the valid domain ...
Human-machine collaborative optimization via apprenticeship scheduling
Massachusetts Institute Of Technology
October 12, 2017 - N°20170293844

Domain expert heuristics are captured within a computational framework for a task scheduling system. One or more classifiers are trained to predict (i) whether a first action should be scheduled instead of a second action using pairwise comparisons between actions scheduled by a demonstrator at particular times and actions not scheduled by the demonstrator at the particular times, and (ii) ...
Heuristic Patent Pack
Download 107+ patent application PDFs
Heuristic Patent Applications
Download 107+ Heuristic-related PDFs
For professional research & prior art discovery
inventor
  • 107+ full patent PDF documents of Heuristic-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Systems and methods for enhancing control system security by detecting anomalies in descriptive characteristics of ...
Brightsource Ics2 Ltd.
October 12, 2017 - N°20170293757

To enhance the security of an industrial control system, a data stream can be received from an input device via a communications network or an i/o subsystem of a computer system. All or part of the data stream can be stored in computer memory. Stored elements of the data stream can be retrieved from the memory. A set of ...
Wearable technology device-based behavioral analysis and heuristic feedback
International Business Machines Corporation
October 05, 2017 - N°20170286967

An aspect of wearable technology device processes includes receiving, by a wireless receiver of a wearable technology device, a transaction authorization request and a transaction amount from a contactless transaction terminal. An aspect also includes comparing the transaction amount with a current balance associated with an account of an individual corresponding to the wearable technology device. Upon determining the transaction ...
Automatic revision of a predictive damage model
General Electric Company
October 05, 2017 - N°20170286854

A method for automatic revision of a predictive damage model that assess a physical system and provides maintenance recommendations to a user platform includes evaluating the predictive model at periodic intervals, identifying alternate parameters for the model that satisfy real-world physical constraints, determining an impact of the alternate parameters on an accuracy of the predictive model, forecasting performance of a ...
Heuristic Patent Pack
Download 107+ patent application PDFs
Heuristic Patent Applications
Download 107+ Heuristic-related PDFs
For professional research & prior art discovery
inventor
  • 107+ full patent PDF documents of Heuristic-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Identity risk score generation and implementation
Microsoft Technology Licensing, Llc.
October 05, 2017 - N°20170286653

Embodiments are directed to providing an identity risk score as part of an authentication assertion, applying operating heuristics to determine an operating application's validity and to providing identity risk scores to requesting third parties. In one scenario, an authentication server receives from a cloud service portal various user credentials from a user. The user credentials identify a user to the ...
Efficient buffering for a system having non-volatile memory
Apple Inc.
October 05, 2017 - N°20170286290

Systems and methods are disclosed for efficient buffering for a system having non-volatile memory (“nvm”). In some embodiments, a control circuitry of a system can use heuristics to determine whether to perform buffering of one or more write commands received from a file system. In other embodiments, the control circuitry can minimize read energy and buffering ...
Implementing dynamic cost calculation for sriov virtual function (vf) in cloud environments
International Business Machines Corporation
October 05, 2017 - N°20170286145

A method, system and computer program product are provided for implementing dynamic cost calculation for a single root input/output virtualization (sriov) virtual function (vf) in cloud environments. A management function periodically queries the sriov adapter for activity statistics for each assigned virtual function. The management function builds a usage heuristic based on the resource usage statistics. The management function ...
Deployment rule system
Intel Corporation
September 28, 2017 - N°20170277531

One embodiment provides an apparatus. The apparatus includes a deployment recipe generator to generate a plurality of deployment recipes; a deployment test engine to test each of a plurality of deployment configurations, each deployment configuration corresponding to a respective deployment recipe; and data analysis logic to determine a deployment rule based, at least in part, on deployment heuristics.
Methods to identify, handle and recover from suspect ssds in a clustered flash array
Netapp, Inc.
September 21, 2017 - N°20170269980

A technique predicts failure of one or more storage devices of a storage array serviced by a storage system and for establishes one or more threshold conditions for replacing the storage devices. The predictive technique periodically monitors soft and hard failures of the storage devices (e. G., from self-monitoring, analysis and reporting technology), as well as various usage counters pertaining ...
Programming language for execution by drone
International Business Machines Corporation
September 14, 2017 - N°20170263133

One embodiment provides a method comprising maintaining a weather model based on predicted weather conditions for an air traffic control zone. A hash table comprising multiple hash entries is maintained. Each hash entry comprises a timestamped predicted weather condition for a cell in the zone. A flight plan request for a drone is received. The request comprises a planned flight ...
Drone carrier
International Business Machines Corporation
September 14, 2017 - N°20170263131

Embodiments of the present invention provide a method comprising receiving a task set comprising multiple tasks, receiving operational information identifying one or more operating characteristics of multiple drones, and obtaining an initial heuristic ordering of the multiple tasks based on the operational information and the climate information. Each task has a corresponding task location. The method further comprises scheduling the ...
Heuristic Patent Pack
Download 107+ patent application PDFs
Heuristic Patent Applications
Download 107+ Heuristic-related PDFs
For professional research & prior art discovery
inventor
  • 107+ full patent PDF documents of Heuristic-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Service level agreement risk analysis with exogenous architecture
International Business Machines Corporation
September 07, 2017 - N°20170257389

A set of internal information technology (it) architecture is received and the internal it architecture is controlled by a service provider. A set of exogenous it architecture is received and the exogenous it architecture is not controlled by the service provider. A set of service level agreement (sla) requirements, agreed upon by the service provider and a service user, are ...
Systems and methods for problem solving, useful for example in quantum computing
D-wave Systems Inc.
September 07, 2017 - N°20170255872

Computational systems implement problem solving using heuristic solvers or optimizers. Such may iteratively evaluate a result of processing, and modify the problem or representation thereof before repeating processing on the modified problem, until a termination condition is reached. Heuristic solvers or optimizers may execute on one or more digital processors and/or one or more quantum processors. The system may ...
Heuristic process for inferring resource dependencies for recovery planning
International Business Machines Corporation
September 07, 2017 - N°20170255474

A system, a computer readable storage medium, and a method for determining a suggested component restart order in a computer system on a basis of one or more heuristic analyses of a plurality of input data. The method can include performing one or more sort or merge orders after one or more of each heuristic analysis, combining the one or ...
Wastewater monitoring system and method
I&eye Enterprises, Llc
August 31, 2017 - N°20170248835

A wastewater monitoring system uses a camera in a fixed location in a wastewater pipe that takes a still photograph of a location of interest at defined intervals, such as five minutes. The photographs are retrieved from the camera, and are then analyzed on a computer system that aggregates the still photographs into a video stream, allows a user to ...
Cloud compute scheduling using a heuristic contention model
Intel Corporation
August 17, 2017 - N°20170237681

Technologies for contention-aware cloud compute scheduling include a number of compute nodes in a cloud computing cluster and a cloud controller. Each compute node collects performance data indicative of cache contention on the compute node, for example, cache misses per thousand instructions. Each compute node determines a contention score as a function of the performance data and stores the contention ...
Method and system for co-operative on-path and off-path caching policy for information centric networks
Tata Consultancy Services Limited
August 17, 2017 - N°20170237657

A method and a system is disclosed herein for co-operative on-path and off-path caching policy for information centric networks (icn). In an embodiment, a computer implemented method and system is provided for cooperative on-path and off-path caching policy for information centric networks in which the edge routers or on-path routers optimally store the requested icn contents and are supported by ...
Preemptive content distribution
International Business Machines Corporation
August 10, 2017 - N°20170230476

An aspect of preemptive distribution of content includes monitoring content accessed in a local cache of a computing device. A time and a location of content accesses in the local cache are tracked. Prefetching heuristics are determined based on patterns of the time and the location of the content accesses. The prefetching heuristics are applied to speculatively prefetch additional content ...
Preemptive content distribution
International Business Machines Corporation
August 10, 2017 - N°20170230475

An aspect of preemptive distribution of content includes monitoring content accessed in a local cache of a computing device. A time and a location of content accesses in the local cache are tracked. Prefetching heuristics are determined based on patterns of the time and the location of the content accesses. The prefetching heuristics are applied to speculatively prefetch additional content ...
Loading