EDGE CACHING FOR COGNITIVE APPLICATIONS

    公开(公告)号:US20210112133A1

    公开(公告)日:2021-04-15

    申请号:US17128936

    申请日:2020-12-21

    IPC分类号: H04L29/08 G06N5/02 G06N20/00

    摘要: For caching of cognitive applications in a communication network a first input signal from a sensor device is detected by a proxy having a cache associated therewith. A representation of the first input signal is computed and sent to a server. A handle function is applied to the representation of the first input signal to compute a first handle value corresponding to the first input signal. The representation of the first input signal is transformed using a cognitive processing model of an answer function to compute a first answer value. A content of the cache is modified by the proxy by storing the first answer value in association with the first handle value in the cache.

    Edge caching for cognitive applications

    公开(公告)号:US10944844B2

    公开(公告)日:2021-03-09

    申请号:US16736303

    申请日:2020-01-07

    IPC分类号: G06N5/02 H04L29/08 G06N20/00

    摘要: For caching of cognitive applications in a communication network a first input signal from a sensor device is detected by a proxy having a cache associated therewith. A representation of the first input signal is computed and sent to a server. A handle function is applied to the representation of the first input signal to compute a first handle value corresponding to the first input signal. The representation of the first input signal is transformed using a cognitive processing model of an answer function to compute a first answer value. A content of the cache is modified by the proxy by storing the first answer value in association with the first handle value in the cache.

    Identification of failed sensors in a system of interconnected devices

    公开(公告)号:US10753767B2

    公开(公告)日:2020-08-25

    申请号:US16457149

    申请日:2019-06-28

    IPC分类号: G01D3/08 G01D18/00 G06N7/00

    摘要: Methods and arrangements for identifying failed sensors in a system of interconnected devices. A contemplated method includes: utilizing at least one processor to execute computer code that performs the steps of: receiving data from a first plurality of sensors, each sensor being operatively coupled to a device within a system of interconnected devices; associating the data received with an activity; comparing the data received with previously stored data associated with the living activity; detecting, based on the comparing, an anomaly associated with at least one of the first plurality of sensors, wherein the anomaly indicates a problem with the at least one of the first plurality of sensors; and recording, at a data storage location, the anomaly, wherein the data storage location stores data associated with previously identified anomalies. Other variants and embodiments are broadly contemplated herein.

    Controlling incoming traffic
    18.
    发明授权

    公开(公告)号:US10680953B2

    公开(公告)日:2020-06-09

    申请号:US16008645

    申请日:2018-06-14

    摘要: A method and system are provided for controlling a volume of incoming traffic into a network having a plurality of ingress routers. The method includes monitoring respective loads of the plurality of ingress routers. The method further includes selecting a particular one of the plurality of ingress routers to receive future incoming traffic based on at least the respective loads of the plurality of ingress routers. The method also includes creating a mapping between an internal source IP address and a client IP address. The internal source IP address relates to the particular one of the plurality of routers. The client IP address is for a client device accessing the Internet through the network. The method additionally includes rewriting a destination IP address of the incoming traffic based on the mapping. At least the monitoring, selecting, and creating steps are performed by a controller.

    Spatial predicates evaluation on geohash-encoded geographical regions

    公开(公告)号:US10664234B2

    公开(公告)日:2020-05-26

    申请号:US16361850

    申请日:2019-03-22

    IPC分类号: G07F7/02 G06F16/29 G06F7/02

    摘要: A method of performing an evaluation of a spatial predicates for first and second regions includes receiving a first set of geohashes representing the first region, and receiving a second set of geohashes representing the second region. The method also includes for each geohash within the first set of geohashes: performing a respective pairwise evaluation of a first spatial primitive for the geohash within the first set and each of the geohashes within the second set to produce a set of first binary results corresponding to respective ones of the geohashes within the second set; and combining the set of first binary results using a first Boolean logic operator to produce one of a set of second binary results corresponding to respective ones of the geohashes within the first set. The method further includes combining the set of second binary results using a second Boolean logic operator to produce a third binary result corresponding to the first set of spatial primitives.

    Efficient clearinghouse transactions with trusted and un-trusted entities

    公开(公告)号:US10394720B2

    公开(公告)日:2019-08-27

    申请号:US15803206

    申请日:2017-11-03

    摘要: In an aspect of the present disclosure, a method is disclosed including receiving first transaction data from a first trusted party that includes a first pending transaction between the first trusted party and a second trusted party and a second pending transaction between the first trusted party and an un-trusted party. The method further includes receiving second transaction data from the second trusted party that includes a third pending transaction between the second trusted party and the un-trusted party. The method further includes analyzing the first and second transaction data to determine whether more than one trusted party has a pending transaction with the same un-trusted party, determining that the first trusted party and the second trusted party each have a pending transaction with the un-trusted party, and modifying the first pending transaction, the second pending transaction, and the third pending transaction. The modification includes removing the third pending transaction.