| 11860727 |
Data quality-based computations for KPIs derived from time-series data |
Vitobha Munigala, Diptikalyan Saha, Sattwati Kundu |
2024-01-02 |
| 11769098 |
Anomaly detection of physical assets by auto-creating anomaly detection or prediction models based on data from a knowledge graph of an enterprise |
Joern Ploennigs |
2023-09-26 |
| 11763196 |
Dynamically applying machine learning models from profiling received data |
Sattwati Kundu, Nair Raghunath Eledath, Mansoor Ahmed |
2023-09-19 |
| 11314584 |
Data quality-based confidence computations for KPIs derived from time-series data |
Vitobha Munigala, Diptikalyan Saha, Sattwati Kundu |
2022-04-26 |
| 11288155 |
Identifying anomalies in data during data outage |
Mansoor Ahmed, Sattwati Kundu, Nair Raghunath Eledath |
2022-03-29 |
| 11227018 |
Auto generating reasoning query on a knowledge graph |
Hari Hara Prasad Viswanathan, Sathiskumar Palaniappan, Amit M. Mangalvedkar |
2022-01-18 |
| 11221934 |
Identifying anomalies in data during data outage |
Mansoor Ahmed, Sattwati Kundu, Nair Raghunath Eledath |
2022-01-11 |
| 11063815 |
Building and fixing a dynamic application topology in a cloud based environment leveraging log file data |
Shaw-Ben Shi, Gandhi Sivakumar, Meng Hong Tsai |
2021-07-13 |
| 10977325 |
Automatic context adaptive enterprise search and result generation on behalf of a user |
Abhishek MITRA, Suranjana Samanta |
2021-04-13 |
| 10554812 |
Identifying and controlling unwanted calls |
Dinesh Radhakrishnan, Akshat Dixit, Gandhi Sivakumar |
2020-02-04 |
| 10489827 |
Personalized marketing incentives based on historical information and mobility monitoring |
Shaw-Ben Shi, Gandhi Sivakumar, Meng Hong Tsai |
2019-11-26 |
| 10438245 |
Personalized marketing incentives based on historical information and mobility monitoring |
Shaw-Ben Shi, Gandhi Sivakumar, Meng Hong Tsai |
2019-10-08 |
| 10375542 |
Data usage recommendation generator |
Shaw-Ben Shi, Gandhi Sivakumar, Meng Hong Tsai |
2019-08-06 |
| 10255167 |
Analytically selecting which tests are to be executed in a continuous delivery process |
Shaw-Ben Shi, Gandhi Sivakumar, Meng Hong Tsai |
2019-04-09 |
| 10212279 |
Identifying and controlling unwanted calls |
Dinesh Radhakrishnan, Akshat Dixit, Gandhi Sivakumar |
2019-02-19 |
| 10212278 |
Identifying and controlling unwanted calls |
Dinesh Radhakrishnan, Akshat Dixit, Gandhi Sivakumar |
2019-02-19 |
| 10089169 |
Identifying solutions to application execution problems in distributed computing environments |
Anindya Neogi, Vinay G. Rajagopal, Rohit Shetty |
2018-10-02 |
| 10078578 |
Analytically selecting which tests are to be executed in a continuous delivery process |
Shaw-Ben Shi, Gandhi Sivakumar, Meng Hong Tsai |
2018-09-18 |
| 10070285 |
Data usage recommendation generator |
Shaw-Ben Shi, Gandhi Sivakumar, Meng Hong Tsai |
2018-09-04 |
| 9836293 |
Integrated log analyzer |
Faried Abrahams, Raman Harishankar, Gandhi Sivakumar |
2017-12-05 |
| 9736671 |
Data usage recommendation generator |
Shaw-Ben Shi, Gandhi Sivakumar, Meng Hong Tsai |
2017-08-15 |
| 9465685 |
Identifying solutions to application execution problems in distributed computing environments |
Anindya Neogi, Vinay G. Rajagopal, Rohit Shetty |
2016-10-11 |
| 8954984 |
Environmentally aware load-balancing |
Andrew J. Bernoth, Sateesh S. Kannegala, Gandhi Sivakumar |
2015-02-10 |