Inspired path computation in a network

    公开(公告)号:US11108678B2

    公开(公告)日:2021-08-31

    申请号:US15845291

    申请日:2017-12-18

    Abstract: In one embodiment, a controller in a network trains a deep reinforcement learning-based agent to predict traffic flows in the network. The controller determines one or more resource requirements for the predicted traffic flows. The controller assigns, using the deep reinforcement learning-based agent, paths in the network to the flows based on the determined one or more resource requirements, to avoid fragmentation of a flow during transmission of the flow through the network. The controller sends, to nodes in the network, assignment instructions that cause the flows to traverse the network via their assigned paths.

    DEEP FUSION REASONING ENGINE (DFRE) FOR DYNAMIC AND EXPLAINABLE WIRELESS NETWORK QoE METRICS

    公开(公告)号:US20210152440A1

    公开(公告)日:2021-05-20

    申请号:US17130804

    申请日:2020-12-22

    Abstract: In one embodiment, a network quality assessment service that monitors a network obtains multimodal data indicative of a plurality of measurements from the network and subjective perceptions of the network by users of the network. The network quality assessment service uses the obtained multimodal data as input to one or more neural network-based models. The network quality assessment service maps, using a conceptual space, outputs of the one or more neural network-based models to symbols. The network quality assessment service applies a symbolic reasoning engine to the symbols, to generate a conclusion regarding the monitored network. The network quality assessment service provides an indication of the conclusion to a user interface.

    Adaptive union file system based protection of services

    公开(公告)号:US10812523B2

    公开(公告)日:2020-10-20

    申请号:US15896182

    申请日:2018-02-14

    Abstract: In one embodiment, a device maintains a journal of uncommitted changes to a file system of the device in a layer that is hot-swappable with a writable container layer. The device augments the journal with metadata regarding a particular uncommitted change to the file system of the device. The device applies, within a sandbox environment of the device, a machine learning-based anomaly detector to the particular uncommitted change to the file system and the metadata regarding the change, to determine whether the particular uncommitted change to the file system is indicative of a destruction of service attack on the device. The device causes performance of a mitigation action when the machine learning-based anomaly detector determines that the particular uncommitted change to the file system is indicative of a destruction of service attack on the device.

    Dynamic person queue analytics
    68.
    发明授权

    公开(公告)号:US10509969B2

    公开(公告)日:2019-12-17

    申请号:US15702061

    申请日:2017-09-12

    Abstract: In one embodiment, a device identifies, from image data captured by one or more cameras of a physical location, a focal point of interest and people located within the physical location. The device forms a set of nodes whereby a given node represents one or more of the identified people located within the physical location. The device represents a person queue as an ordered list of nodes from the set of nodes and adds a particular one of the set of nodes to the list based on the particular node being within a predefined distance to the focal point of interest. The device adds one or more nodes to the list based on the added node being within an angle and distance range trailing a forward direction associated with at least one node in the list. The device provides an indication of the person queue to an interface.

    BAYESIAN DYNAMIC MULTIHOP WIRELESS BEST PATH PREDICTION

    公开(公告)号:US20190297004A1

    公开(公告)日:2019-09-26

    申请号:US15927014

    申请日:2018-03-20

    Abstract: In one embodiment, a processor receives observed node characteristics of a node in a network. The node characteristics include a link cost metric for a network link associated with the node. The processor uses a Bayesian learning model to estimate a virtual link cost metric based on the observed node characteristics. The model uses statistics regarding the observed link cost metric as background belief measures. The processor forms a routing path in the network that includes the network link in part based on an objective function that uses the virtual link cost metric as a parameter.

    VULNERABILITY ANALYSIS AND SEGMENTATION OF BRING-YOUR-OWN IOT DEVICES

    公开(公告)号:US20190245882A1

    公开(公告)日:2019-08-08

    申请号:US15891749

    申请日:2018-02-08

    Abstract: In one embodiment, a security device maintains a plurality of security enclaves for a computer network, each associated with a given level of security policies. After detecting a given device joining the computer network, the security device places the given device in a strictest security enclave of the plurality of security enclaves in response to joining the computer network. The security device then subjects the given device to joint adversarial training, where a control agent representing behavior of the given device is trained against an inciting agent, and where the inciting agent attempts to force the control agent to misbehave by applying destabilizing policies. Accordingly, the security device may determine control agent behavior during the joint adversarial training, and promotes the given device to a less strict security enclave of the plurality of enclaves in response to the control agent being robust against the attempts by the inciting agent.

Patent Agency Ranking