-
公开(公告)号:US12013776B2
公开(公告)日:2024-06-18
申请号:US16839915
申请日:2020-04-03
发明人: Adi I. Botea , Larisa Shwartz , Akihiro Kishimoto , Radu Marinescu , Yufang Hou , Hiroshi Kajino , Mattia Chiari , Marco Luca Sbodio
CPC分类号: G06F11/3688 , G06F11/3684 , G06N20/00
摘要: Embodiments for intelligent application scenario testing and error detection by a processor. One or more modified application scenarios may be automatically generated from an initial application scenario having configuration data and a plurality of operations relating to an error. The one or more modified application scenarios are variations of the initial application. The one or more modified application scenarios may be executed to detect the existence or non-existence of the error in the one or more modified application scenarios.
-
公开(公告)号:US20230297490A1
公开(公告)日:2023-09-21
申请号:US17655568
申请日:2022-03-21
发明人: Seema Nagar , Pooja Aggarwal , Qing Wang , Larisa Shwartz
IPC分类号: G06F11/36
CPC分类号: G06F11/3612 , G06F11/366
摘要: Localizing a faulty microservice in a microservice architecture is achieved by developing healthy execution sequence data for comparison to execution sequences during system failures. Oftentimes the faulty microservice does not emit a failure signal. Frequent sub-sequences arising from log template time series data during healthy execution facilitates localization of faulty services when there is no failure signal from the faulty service.
-
公开(公告)号:US20230236922A1
公开(公告)日:2023-07-27
申请号:US17582493
申请日:2022-01-24
发明人: Seema Nagar , Rohan R. Arora , Bing Zhou , Noah Zheutlin , Pooja Aggarwal , Amitkumar Manoharrao Paradkar , Larisa Shwartz
CPC分类号: G06F11/0793 , G06F11/0712 , G06F11/3476 , G06F11/0781
摘要: Embodiments relate to a computer platform to support processing of informational logs and corresponding performance data to detect and mitigate occurrence of anomalous behavior. Metrics are extracted from the informational logs and correlated with performance data, and in an exemplary embodiment golden signal metrics. A window or block of the logs is classified as potential candidates or indicators of anomalous behavior, which in an embodiment is indicative of potential failure or service outage. A control signal is dynamically issued to an operatively coupled device associated with the window or block of logs. The control signal is configured to selectively control a state of a physical device or process controlled by software, with the control directed at mitigating or eliminating the effect(s) of the anomalous behavior.
-
公开(公告)号:US11650072B2
公开(公告)日:2023-05-16
申请号:US16695433
申请日:2019-11-26
IPC分类号: G08G1/16 , G01C21/36 , G01C21/34 , B60W30/095 , B60W50/14
CPC分类号: G01C21/3676 , B60W30/0956 , B60W50/14 , G01C21/3492 , G01C21/3632 , G08G1/166 , B60W2554/00
摘要: Embodiments of the present invention provide computer-implemented methods, computer program products and systems. Embodiments of the present invention can receive position and location information. Embodiments of the present invention can generate a risk score for one or more maneuvers associated with a predicted trajectory of a vehicle. Embodiments of the present invention can generate a visual representation for each of the one or more maneuvers associated with the predicted trajectory of the vehicle based on the generated risk score associated with each maneuver. Embodiments of the present invention can integrate the generated visual representation into a user display.
-
公开(公告)号:US11625726B2
公开(公告)日:2023-04-11
申请号:US16448446
申请日:2019-06-21
发明人: Florian Pinel , Larisa Shwartz
IPC分类号: G06Q30/014 , G06F18/24 , G06V20/10 , G06F18/22 , G06V10/75
摘要: A system and associated method may utilize a processor that receives recall product instance group (RPIG) information (RPIGI) identifying a set of instances of products having a product type identifier (PTI) that are a subject of a product recall. The processor receives, from an imaging device associated with a user, an image containing a product instance. The method further comprises applying a classifier and determining a PTI. Based on the image, secondary product information is also identified. These may be compared with the RPIGI to determine a product instance membership. Information related to the product instance membership in the RPIG may be displayed.
-
6.
公开(公告)号:US20220027331A1
公开(公告)日:2022-01-27
申请号:US16937425
申请日:2020-07-23
发明人: Jinho Hwang , Larisa Shwartz , Srinivasan Parthasarathy , Qing Wang , Raghuram Srinivasan , Gene L. Brown , Michael Elton Nidd , Frank Bagehorn , Jakub Krchák , Ota Sandr , Tomáš Ondrej , Michal Mýlek , Altynbek Orumbayev
IPC分类号: G06F16/215 , G06N5/02 , G06N5/04 , G06N20/00
摘要: A computer-implemented method of cross-environment event correlation includes determining one or more correlated events about an issue across a plurality of domains. A knowledge data is extracted from the issue determined from the one or more correlated events is performed. A correlation graph is generated from the extracted knowledge to trace the issue and group the correlated events into one or more event groups to represent their relationship with the issue. A logical reasoning description is constructed based on the generated correlation graph for a domain-space exploration related to how the issue in one domain affects another domain of the plurality of domains. The one or more event groups of correlated events is provided with an explanation about a cause of the issue based on the logical reasoning description.
-
公开(公告)号:US20210373861A1
公开(公告)日:2021-12-02
申请号:US16882811
申请日:2020-05-26
发明人: Srinivasan Parthasarathy , Jinho HWANG , Qing Wang , Larisa Shwartz , Michael Elton Nidd , Frank Bagehorn , Jakub Krchák , Altynbek Orumbayev , Michal Mýlek , Ota Sandr , Tomás Ondrej
IPC分类号: G06F8/41 , G06F16/245 , G06F8/75
摘要: A computer implemented method for identifying an application topology includes identifying a sandbox environment corresponding to an application of interest, analyzing the sandbox environment to identify a set of communication links between services within the sandbox environment indicating a first topology, identifying a production system corresponding to the application of interest, querying the production system to identify a set of structural dependencies indicating a second topology, and creating a complete topology of the cloud application by combining the first topology and the second topology. A computer program product and computer system for identifying an application topology are additionally disclosed herein.
-
公开(公告)号:US11075954B2
公开(公告)日:2021-07-27
申请号:US16146600
申请日:2018-09-28
发明人: Larisa Shwartz , Sander Plug
摘要: Techniques regarding identifying one or more systems where a policy as a code can be applicable are provided. For example, one or more embodiments described herein can comprise a system, which can comprise a memory that can store computer executable components. The system can also comprise a processor, operably coupled to the memory, and that can execute the computer executable components stored in the memory. The computer executable components can comprise a matching component, operatively coupled to the processor, that can determine whether a policy as a code is enforceable on a computing entity based on a comparison of a plurality of commands executed on the computing entity and a plurality of actions extracted from the code.
-
公开(公告)号:US11048807B2
公开(公告)日:2021-06-29
申请号:US16128901
申请日:2018-09-12
发明人: Jinho Hwang , Larisa Shwartz , Victoria Lee Guerra
摘要: Systems, computer-implemented methods and/or computer program products that facilitate protecting data security through hierarchical authorization analysis are provided. In one embodiment, a computer-implemented method comprises generating, by a system operatively coupled to a processor, a model by extracting properties of data transmitted from executing an application to learn repeated patterns; and performing, by the system, a fine-grained authorization audit by comparing the data with the model.
-
公开(公告)号:US20210133622A1
公开(公告)日:2021-05-06
申请号:US16670748
申请日:2019-10-31
发明人: Michael Elton Nidd , Hagen Völzer , Sander Plug , Larisa Shwartz
摘要: The invention relates to a computer-implemented method for processing events. The method provides a database comprising original event objects stored in association with canonical event objects. The method executes a learning algorithm on the associated original and canonical event objects for generating a trained ML program adapted to transform an original event object of any one of the one or more original data formats into a canonical event object having the canonical data format and uses the trained machine learning program for automatically transforming original event objects generated by an active IT-monitoring system into canonical event objects processable by an event handling system.
-
-
-
-
-
-
-
-
-