Patents by Inventor Kumar Pasumarthy
Kumar Pasumarthy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230267277Abstract: Systems and methods of the present disclosure are directed to a method for training a machine-learned semantic matching model. The method can include obtaining a first and second document and a first and second activity log. The method can include determining, based on the first document activity log and the second document activity log, a relation label indicative of whether the documents are related. The method can include inputting the documents into the model to receive a semantic similarity value representing an estimated semantic similarity between the first document and the second document. The method can include evaluating a loss function that evaluates a difference between the relation label and the semantic similarity value. The method can include modifying values of parameters of the model based on the loss function.Type: ApplicationFiled: June 15, 2020Publication date: August 24, 2023Inventors: Weize Kong, Michael Bendersky, Marc Najork, Rama Kumar Pasumarthi, Zhen Qin, Rolf Jagerman
-
Patent number: 10671568Abstract: Systems and techniques of de-duplicating file and/or blobs within a file system are presented. In one embodiment, an email system is disclosed wherein the email system receives email messages comprising a set of associated attachments. The system determines whether the associated attachments have been previously stored in the email system, the state of the stored attachment, and if the state of the attachment is appropriate for sharing copies of the attachment, then providing a reference to the attachment upon a request to share the attachment. In another embodiment, the system may detect whether stored attachments are corrupted and, if so, attempt to repair the attachment, and possibly, prior to sharing references to the attachment.Type: GrantFiled: January 24, 2016Date of Patent: June 2, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Kristof Roomp, Gruia Pitigoi-Aron, Ivaylo Dimitrov, Brandon Pai, Cheng Ho, Kumar Pasumarthy, Lincoln Liu, Alok Dhariwal, John Rodrigues
-
Patent number: 10116689Abstract: One embodiment provides a method including identifying malicious information spreading in an information-exchange network; classifying at least one topic of the malicious information; determining a potential sub-network for future spread of the malicious information based on the at least one topic classified; and attenuating a potential future spread of the malicious information via at least one of: automatically propagating a countervailing message to the potential sub-network; and prompting manual intervention for propagating a countervailing message to the potential sub-network. Other variants and embodiments are broadly contemplated herein.Type: GrantFiled: May 16, 2016Date of Patent: October 30, 2018Assignee: International Business Machines CorporationInventors: Priyanka Agrawal, Prithu Banerjee, Ravindranath Kokku, Satya Rama Kumar Pasumarthi
-
Publication number: 20160261614Abstract: One embodiment provides a method including identifying malicious information spreading in an information-exchange network; classifying at least one topic of the malicious information; determining a potential sub-network for future spread of the malicious information based on the at least one topic classified; and attenuating a potential future spread of the malicious information via at least one of: automatically propagating a countervailing message to the potential sub-network; and prompting manual intervention for propagating a countervailing message to the potential sub-network. Other variants and embodiments are broadly contemplated herein.Type: ApplicationFiled: May 16, 2016Publication date: September 8, 2016Inventors: Priyanka Agrawal, Prithu Banerjee, Ravindranath Kokku, Satya Rama Kumar Pasumarthi
-
Publication number: 20160140138Abstract: Systems and techniques of de-duplicating file and/or blobs within a file system are presented. In one embodiment, an email system is disclosed wherein the email system receives email messages comprising a set of associated attachments. The system determines whether the associated attachments have been previously stored in the email system, the state of the stored attachment, and if the state of the attachment is appropriate for sharing copies of the attachment, then providing a reference to the attachment upon a request to share the attachment. In another embodiment, the system may detect whether stored attachments are corrupted and, if so, attempt to repair the attachment, and possibly, prior to sharing references to the attachment.Type: ApplicationFiled: January 24, 2016Publication date: May 19, 2016Inventors: Kristof Roomp, Gruia Pitigoi-Aron, Ivaylo Dimitrov, Brandon Pai, Cheng Ho, Kumar Pasumarthy, Lincoln Liu, Alok Dhariwal, John Rodrigues
-
Patent number: 9342692Abstract: Methods and arrangements for controlling a spread of malicious information in a network. A viral spread of information is tracked, in a network comprising interconnected nodes. Malicious information in the viral spread of information is identified. A topic-specific sub-network of nodes prone to be affected by the malicious information is predicted, and the effect of the malicious information at the sub-network of nodes is neutralized, via initiating a spread of neutralizing information to the sub-network of nodes. Other variants and embodiments are broadly contemplated herein.Type: GrantFiled: August 29, 2013Date of Patent: May 17, 2016Assignee: International Business Machines CorporationInventors: Priyanka Agrawal, Prithu Banerjee, Ravindranath Kokku, Satya Rama Kumar Pasumarthi
-
Patent number: 9262429Abstract: Systems and techniques of de-duplicating file and/or blobs within a file system are presented. In one embodiment, an email system is disclosed wherein the email system receives email messages comprising a set of associated attachments. The system determines whether the associated attachments have been previously stored in the email system, the state of the stored attachment, and if the state of the attachment is appropriate for sharing copies of the attachment, then providing a reference to the attachment upon a request to share the attachment. In another embodiment, the system may detect whether stored attachments are corrupted and, if so, attempt to repair the attachment, and possibly, prior to sharing references to the attachment.Type: GrantFiled: August 13, 2012Date of Patent: February 16, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Kristof Roomp, Gruia Pitigoi-Aron, Ivaylo Dimitrov, Brandon Pai, Cheng Ho, Kumar Pasumarthy, Lincoln Liu, Alok Dhariwal, John Rodrigues
-
Publication number: 20150067849Abstract: Methods and arrangements for controlling a spread of malicious information in a network. A viral spread of information is tracked, in a network comprising interconnected nodes. Malicious information in the viral spread of information is identified. A topic-specific sub-network of nodes prone to be affected by the malicious information is predicted, and the effect of the malicious information at the sub-network of nodes is neutralized, via initiating a spread of neutralizing information to the sub-network of nodes. Other variants and embodiments are broadly contemplated herein.Type: ApplicationFiled: August 29, 2013Publication date: March 5, 2015Applicant: International Business Machines CorporationInventors: Priyanka Agrawal, Prithu Banerjee, Ravindranath Kokku, Satya Rama Kumar Pasumarthi
-
Publication number: 20140046911Abstract: Systems and techniques of de-duplicating file and/or blobs within a file system are presented. In one embodiment, an email system is disclosed wherein the email system receives email messages comprising a set of associated attachments. The system determines whether the associated attachments have been previously stored in the email system, the state of the stored attachment, and if the state of the attachment is appropriate for sharing copies of the attachment, then providing a reference to the attachment upon a request to share the attachment. In another embodiment, the system may detect whether stored attachments are corrupted and, if so, attempt to repair the attachment, and possibly, prior to sharing references to the attachment.Type: ApplicationFiled: August 13, 2012Publication date: February 13, 2014Applicant: MICROSOFT CORPORATIONInventors: Kristof Roomp, Gruia Pitigoi-Aron, Ivaylo Dimitrov, Brandon Pai, Cheng Ho, Kumar Pasumarthy, Lincoln Liu, Alok Dhariwal, John Rodrigues
-
Patent number: 7571454Abstract: Scheduling functionality is employed at a head-end site to update schedules used by a plurality of respective client devices to define the recording of media presentation events. The scheduling functionality operates by: compiling a master list of unique entries culled from the plurality of schedules; determining whether any entries in the master list require updating; and updating, based on the determining, at least one of the plurality of schedules. The scheduling functionality helps reduce the amount of redundant processing operations involved in updating the plurality of schedules, and therefore provides an efficient technique for updating the schedules.Type: GrantFiled: May 4, 2005Date of Patent: August 4, 2009Assignee: Microsoft CorporationInventors: Peter J. Potrebic, Thomas H. Taylor, Naga Anjaneya Kumar Pasumarthy