Patents by Inventor Scott A. Banachowski

Scott A. Banachowski has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240184789
    Abstract: Methods, systems, and computer programs are presented for creating a query template optimized for recall and precision to be used in database searches. One method includes operations for identifying a training set for training a model, generating subqueries based on features associated with the training set, and performing iterations to create a query template. Each iteration comprises performing a search for each subquery based on a disjunction of the subquery and the query template, calculating a precision of each subquery, and adding the subquery with the highest precision to the query template. The method further includes operations for receiving a search query from a device of a first user, customizing the query template based on the search query and information of the first user to obtain a search selection query, and performing a search utilizing the search selection query. The search results are presented on a display.
    Type: Application
    Filed: December 6, 2022
    Publication date: June 6, 2024
    Inventors: George J. Pearman, Michael Chernyak, Jingwei Wu, Scott A. Banachowski
  • Publication number: 20190325352
    Abstract: The disclosed embodiments provide a system for processing data. During operation, the system obtains a feature dependency graph of features for a machine learning model and an operator dependency graph comprising operators to be applied to the features. Next, the system generates feature values of the features according to an evaluation order associated with the operator dependency graph and feature dependencies from the feature dependency graph. During evaluation of an operator in the evaluation order, the system updates a list of calculated features with one or more features that have been calculated for use with the operator. During evaluation of a subsequent operator in the evaluation order, the system uses the list of calculated features to omit recalculation of the feature(s) for use with the subsequent operator.
    Type: Application
    Filed: April 20, 2018
    Publication date: October 24, 2019
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Chang-Ming Tsai, Fei Chen, Siyao Sun, Shihai He, Yu Gong, Scott A. Banachowski, Joel D. Young
  • Patent number: 10067674
    Abstract: Disk-backed array techniques can, in some implementations, help ensure that the arrays contain consistent data. An alert can be provided if it is determined that the data in the array is, or may be, corrupted.
    Type: Grant
    Filed: August 10, 2016
    Date of Patent: September 4, 2018
    Assignee: Google LLC
    Inventors: Ulas Kirazci, Scott Banachowski
  • Patent number: 9542536
    Abstract: Among other things, one or more techniques and/or systems are provided for sustained data protection. In particular, a data protector may define a set of access levels associated with content within data using a set of access policies (e.g., a partial access level to inventory data for an inventory server, a full access level to inventory data and billing data for a shopping website server, etc.). The data protector may secure (e.g., encrypt) the data to create protected data, so that clients may be unable to access content of the protected data without obtaining access through the data protector. In this way, the data protector may selectively provide clients with access to content within the protected data according to respective access levels for the different clients (e.g., access to inventory data, but not billing data, may be provided to the inventory server by the data protector).
    Type: Grant
    Filed: January 13, 2012
    Date of Patent: January 10, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Sean Andrew Suchter, Ho John Lee, Charles Carson, Scott Banachowski, Yuri Romanenko, Eric Wai Ho Lau
  • Patent number: 9536016
    Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for storing data on in a storage medium. In one aspect, a method includes receiving a key-value pair including a key k and a value v. The method further includes encoding the key-value pair as (i) a first key-value pair including a first key k1 and first value v1, and (ii) a second key-value pair including a second key k2. The method further includes inserting the first key-value pair and the second key-value pair in a trie.
    Type: Grant
    Filed: August 20, 2013
    Date of Patent: January 3, 2017
    Assignee: Google Inc.
    Inventors: Ulas Kirazci, Scott Banachowski
  • Publication number: 20160350001
    Abstract: Disk-backed array techniques can, in some implementations, help ensure that the arrays contain consistent data. An alert can be provided if it is determined that the data in the array is, or may be, corrupted.
    Type: Application
    Filed: August 10, 2016
    Publication date: December 1, 2016
    Inventors: Ulas KIRAZCI, Scott Banachowski
  • Patent number: 9424125
    Abstract: Disk-backed array techniques can, in some implementations, help ensure that the arrays contain consistent data. An alert can be provided if it is determined that the data in the array is, or may be, corrupted.
    Type: Grant
    Filed: August 19, 2013
    Date of Patent: August 23, 2016
    Assignee: Google Inc.
    Inventors: Ulas Kirazci, Scott Banachowski
  • Publication number: 20140201474
    Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for storing data on in a storage medium. In one aspect, a method includes receiving a key-value pair including a key k and a value v. The method further includes encoding the key-value pair as (i) a first key-value pair including a first key k1 and first value v1, and (ii) a second key-value pair including a second key k2. The method further includes inserting the first key-value pair and the second key-value pair in a trie.
    Type: Application
    Filed: August 20, 2013
    Publication date: July 17, 2014
    Applicant: Google Inc.
    Inventors: Ulas Kirazci, Scott Banachowski
  • Publication number: 20140201229
    Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for providing display suggestions. In one aspect, a method includes accessing a resource that includes multiple terms, obtaining one or more prefixes that are derived from the multiple terms and, for each prefix, one or more actual suggestions, wherein each actual suggestion is a term from the resource that includes the prefix, obtaining one or more display suggestions, wherein each display suggestion includes two or more successive terms from the resource that are identified as related, and outputting, in response to receiving a user input of a particular prefix, a representation of a particular display suggestion that includes a term that is an actual suggestion for the particular prefix.
    Type: Application
    Filed: August 19, 2013
    Publication date: July 17, 2014
    Applicant: Google Inc.
    Inventors: Ulas Kirazci, Scott Banachowski
  • Publication number: 20140201428
    Abstract: Disk-backed array techniques can, in some implementations, help ensure that the arrays contain consistent data. An alert can be provided if it is determined that the data in the array is, or may be, corrupted.
    Type: Application
    Filed: August 19, 2013
    Publication date: July 17, 2014
    Applicant: Google Inc.
    Inventors: Ulas Kirazci, Scott Banachowski
  • Publication number: 20130185811
    Abstract: Among other things, one or more techniques and/or systems are provided for sustained data protection. In particular, a data protector may define a set of access levels associated with content within data using a set of access policies (e.g., a partial access level to inventory data for an inventory server, a full access level to inventory data and billing data for a shopping website server, etc.). The data protector may secure (e.g., encrypt) the data to create protected data, so that clients may be unable to access content of the protected data without obtaining access through the data protector. In this way, the data protector may selectively provide clients with access to content within the protected data according to respective access levels for the different clients (e.g., access to inventory data, but not billing data, may be provided to the inventory server by the data protector).
    Type: Application
    Filed: January 13, 2012
    Publication date: July 18, 2013
    Applicant: Microsoft Corporation
    Inventors: Sean Andrew Suchter, Ho John Lee, Charles Carson, Scott Banachowski, Yuri Romanenko, Eric Wai Ho Lau
  • Publication number: 20100205183
    Abstract: Methods and systems are provided that may be used to selectively decode results in messages received from child nodes for a particular search query.
    Type: Application
    Filed: February 12, 2009
    Publication date: August 12, 2010
    Applicant: Yahoo!, Inc., a Delaware corporation
    Inventors: Scott Banachowski, Swee Lim, Ki Moon Kim, Arun Kejariwal