Patents by Inventor Madalasa Venkataraman
Madalasa Venkataraman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250030801Abstract: Systems, methods, and other embodiments associated with an integrated data system that recommends next best agents for call centers are described. In one embodiment, a method includes a customer interaction associated with an issue and a customer ID, querying a unified data source to identify which categories of data are available in response to receiving a customer interaction associated with an issue. The unified data source integrates a plurality of data categories from different data sources. A combination of available data categories is determined and based on the combination of available data categories, selecting and executing a routing algorithm from a plurality of routing algorithms. The executed routing algorithm generates an agent recommendation for the customer interaction and a communication channel is established between a device associated with the recommended agent and the customer interaction to route the customer interaction to the recommended agent.Type: ApplicationFiled: July 21, 2023Publication date: January 23, 2025Inventors: Prateek Pramod KATAGERI, Madalasa VENKATARAMAN, Ramanujan GOVINDARAJAN, Vamsi Krishna KUMBHA
-
Publication number: 20250021641Abstract: A secure, modular multi-tenant machine learning platform is configured to: receive untrusted code supplied by a first tenant; perform a security scan of the untrusted code to determine whether the untrusted code satisfies a set of one or more security requirements; responsive to determining that the untrusted code satisfies the security requirement(s): deploy the untrusted code to a runtime execution environment; deploy a machine learning model associated with the first tenant to the runtime execution environment, the untrusted code being configured to perform one or more functions using the machine learning model; receive a set of untrusted code supplied by a second tenant; perform a security scan of the untrusted code to determine whether the untrusted code satisfies the security requirement(s); and responsive to determining that the untrusted code does not satisfy the security requirement(s): refraining from deploying the untrusted code to a runtime execution environment.Type: ApplicationFiled: September 26, 2024Publication date: January 16, 2025Applicant: Oracle International CorporationInventors: Madalasa Venkataraman, Paul Deepakraj Retinraj, Pradeep Sanchana, Rohit Sukumaran, Oleksandr Khimich
-
Patent number: 12124564Abstract: A secure, modular multi-tenant machine learning platform is configured to: receive untrusted code supplied by a first tenant; perform a security scan of the untrusted code to determine whether the untrusted code satisfies a set of one or more security requirements; responsive to determining that the untrusted code satisfies the security requirement(s): deploy the untrusted code to a runtime execution environment; deploy a machine learning model associated with the first tenant to the runtime execution environment, the untrusted code being configured to perform one or more functions using the machine learning model; receive a set of untrusted code supplied by a second tenant; perform a security scan of the untrusted code to determine whether the untrusted code satisfies the security requirement(s); and responsive to determining that the untrusted code does not satisfy the security requirement(s): refraining from deploying the untrusted code to a runtime execution environment.Type: GrantFiled: July 21, 2022Date of Patent: October 22, 2024Assignee: Oracle International CorporationInventors: Madalasa Venkataraman, Paul Deepakraj Retinraj, Pradeep Sanchana, Rohit Sukumaran, Oleksandr Khimich
-
Publication number: 20240095394Abstract: Data can be received that includes information corresponding to a set of users. Privacy protection protocols that apply to the data can be identified. A subset of the data can be identified as being personally identifiable information (PII) data, where the subset includes a set of PII attributes. The PII attributes can be split into categories based on a format of a data field in the PII attributes. The processed PII data can be combined with non-PII data to create processed client data. It can be determined to add noise to part of the processed PII data. An amount of noise can be determined based on the privacy protection protocols. The amount of noise can be added to part of the processed PII data to produce protected data. A machine-learning model can be trained using the protected data.Type: ApplicationFiled: September 16, 2022Publication date: March 21, 2024Applicant: Oracle International CorporationInventors: Rajan Madhavan, Madalasa Venkataraman, Girish Nautiya, Dinesh Ghanta
-
Publication number: 20240086762Abstract: Techniques are disclosed for generating machine learning models that are insensitive to drift. A system trains a machine learning model using a divergent training dataset including synthesized data points simulating drift. The system can evaluate the machine learning models in terms of accuracy, latency, efficiency, and other metrics. Based on the evaluation, the system can select a machine learning model least susceptible to drift.Type: ApplicationFiled: September 14, 2022Publication date: March 14, 2024Applicant: Oracle International CorporationInventors: Nishad Deosthali, Atin Modi, Akshay Kumar, Madalasa Venkataraman, Sravan Kumar Ananthula
-
Publication number: 20230334145Abstract: A secure, modular multi-tenant machine learning platform is configured to: receive untrusted code supplied by a first tenant; perform a security scan of the untrusted code to determine whether the untrusted code satisfies a set of one or more security requirements; responsive to determining that the untrusted code satisfies the security requirement(s): deploy the untrusted code to a runtime execution environment; deploy a machine learning model associated with the first tenant to the runtime execution environment, the untrusted code being configured to perform one or more functions using the machine learning model; receive a set of untrusted code supplied by a second tenant; perform a security scan of the untrusted code to determine whether the untrusted code satisfies the security requirement(s); and responsive to determining that the untrusted code does not satisfy the security requirement(s): refraining from deploying the untrusted code to a runtime execution environment.Type: ApplicationFiled: July 21, 2022Publication date: October 19, 2023Applicant: Oracle International CorporationInventors: Madalasa Venkataraman, Paul Deepakraj Retinraj, Pradeep Sanchana, Rohit Sukumaran, Oleksandr Khimich
-
Publication number: 20230008904Abstract: For at least a selected class attribute of the multiple class attributes, one or more bias metrics are determined that estimate a degree to which a particular workflow (having a set of processing stages) is biased in association with the class attribute. Each user of a set of users is associated with a set of user data to be processed by the particular workflow. At least one of the set of processing stages includes executing a machine-learning model. It can be detected that a bias-mitigation option corresponding to a specific class attribute has been selected. For each of at least two of the set of processing stages: a de-biasing technique is selected; and the processing stage is modified by applying the de-biasing technique. A modified version of the particular workflow (which includes the modified processing stages) is applied to each of a set of input data sets.Type: ApplicationFiled: July 8, 2021Publication date: January 12, 2023Applicant: Oracle International CorporationInventors: Madalasa Venkataraman, Paul Deepakraj Retinraj, Dinesh Ghanta, Girish Nautiyal