Patents by Inventor Pavel Shmakov

Pavel Shmakov has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240193421
    Abstract: A method includes obtaining a compute graph for computing a first tensor, identifying in the graph a reduction operation in at least one dimension of the first tensor, locating, at the operation, a cut point that cuts the graph into first and second portions, and determining a plurality of slices of the first tensor. The method also includes backpropagating the cut point through the graph to define a plurality of first graph pieces for the first portion, each particular first graph piece representing a computation of a particular slice of the plurality of slices based on a particular portion of a plurality of portions of a second tensor. The method further includes defining one or more second graph pieces to combine outputs of the first graph pieces, and executing the first graph pieces and the second graph pieces to execute the first portion of the compute graph.
    Type: Application
    Filed: December 9, 2022
    Publication date: June 13, 2024
    Applicant: Google LLC
    Inventors: Ashish Saxena, Vinsensius B. Vega S. Naryanto, Matej Rizman, Pavel Shmakov, Juan Antonio Navarro Perez, Cyril Chimisov
  • Publication number: 20230185622
    Abstract: A method includes obtaining a graph that includes a plurality of nodes each representing a computational job and connected to one or more other nodes via edges. Each edge represents a dependency between two connected nodes. For each computing device of a distributed computing system, the method includes obtaining resource characteristics. The method includes slicing, based on the dependencies of connected nodes, the graph into a plurality of sub-graphs each including one or more nodes. For each respective sub-graph, the method includes determining a computational cost of the respective sub-graph and distributing, based on the computational cost and the resource characteristics, the respective sub-graph to the respective one of the computing devices. The method includes receiving a respective result from the respective one of the computing devices based on execution of the computational jobs. The method includes determining a total result based on each respective result.
    Type: Application
    Filed: December 13, 2021
    Publication date: June 15, 2023
    Applicant: Google LLC
    Inventors: Ashish Saxena, Juan Antonio Navarro Perez, Pavel Shmakov, Cyril Chimisov, Vinsensius B.Vega S Naryanto, Matej Rizman, Matthew Pearce
  • Patent number: 11310192
    Abstract: A monitoring device is described. The monitoring device includes a processor. The monitoring device also includes memory in electronic communication with the processor. The monitoring device further includes instructions stored in the memory. The instructions are executable to intercept a lightweight directory access protocol (LDAP) search request sent to an LDAP search handler of a security subsystem from a calling device. The LDAP search request includes a query string containing data for a second protocol. The instructions are also executable to generate response data for the second protocol to substitute for a response by the LDAP search handler. The instructions are further executable to send an LDAP search result to the calling device, the LDAP search result comprising the response data for the second protocol.
    Type: Grant
    Filed: December 20, 2019
    Date of Patent: April 19, 2022
    Assignee: Stealthbits Technologies LLC
    Inventors: Anthony Nicholas Sarra, Alexander Ivash, Alexei Belous, Pavel Shmakov
  • Patent number: 11221968
    Abstract: A method is described. The method includes monitoring a request to access one or more files via a shadow copy on a computing device. The method also includes preventing unauthorized access to the shadow copy based on a shadow copy access policy. Monitoring the request to access a shadow copy may include using a filter driver to intercept a request for a previously created shadow copy or a request to create a shadow copy.
    Type: Grant
    Filed: February 10, 2020
    Date of Patent: January 11, 2022
    Assignee: Stealthbits Technologies LLC
    Inventors: Steve Rellinger, Sean Bergman, Pavel Shmakov
  • Patent number: 10606766
    Abstract: A method is described. The method includes monitoring a request to access one or more files via a shadow copy on a computing device. The method also includes preventing unauthorized access to the shadow copy based on a shadow copy access policy. Monitoring the request to access a shadow copy may include using a filter driver to intercept a request for a previously created shadow copy or a request to create a shadow copy.
    Type: Grant
    Filed: July 14, 2017
    Date of Patent: March 31, 2020
    Assignee: STEALTHbits Technologies, Inc.
    Inventors: Steve Rellinger, Sean Bergman, Pavel Shmakov