Patents by Inventor Raunak SHAH

Raunak SHAH has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250103912
    Abstract: A data insight generation system generates facts from a dataset. Importance scores are determined for the facts. Facts having the highest importance scores are generated for display at a user interface. A selection of a displayed fact is received. Based on the selection, dependent facts are generated by adding subspaces to the selected fact. The dependent facts are generated for display at the user interface.
    Type: Application
    Filed: September 21, 2023
    Publication date: March 27, 2025
    Inventors: Raunak SHAH, Vibhor PORWAL, Koyel MUKHERJEE, Iftikhar Ahamath BURHANUDDIN, Saurabh MAHAPATRA, Annamalai ANNAMALAI, Fan DU
  • Publication number: 20240386002
    Abstract: A dataset comprising tables is received. Embeddings are generated for column titles of a table. Based on the embeddings, similar tables are clustered. The tables are organized into smaller clusters based on statistical similarities. Similarity scores are calculated for tables within the same cluster. A relatedness graph is created based on the similarity scores; similar tables are represented by nodes connected by edges. If the similarity score for a pair of tables exceeds a threshold, a table is deleted.
    Type: Application
    Filed: May 18, 2023
    Publication date: November 21, 2024
    Inventors: Raunak Shah, Koyel MUKHERJEE, Subrata MITRA, Dhruv JOSHI, Sai KARNAM, Shivam Pravin BHOSALE
  • Publication number: 20240303662
    Abstract: Systems and methods for identifying fraudulent activity in NFT exchanges are described. Embodiments of the present disclosure obtain transaction data for non-fungible tokens (NFTs) and generate a transaction graph based on the transaction data. The transaction graph includes nodes corresponding to blockchain addresses and nodes corresponding to individual NFTs. Embodiments additionally identify a cycle of the transaction graph, predict a fraudulent activity based on the cycle using a machine learning model, and transmit an alert to a user indicating the predicted fraudulent activity.
    Type: Application
    Filed: March 9, 2023
    Publication date: September 12, 2024
    Inventors: Raunak Shah, Harshvardhan ., Mohit Kumar, Shambhavi Pardhi, Alakh Dixit, Shaddy Garg, Shiv Kumar Saini, Ramasuri Narayanam
  • Publication number: 20240303176
    Abstract: A computing resource allocation system receives entity resource usage data describing computing resource usage of an executable service platform by an entity as part of a first allocation generated using a first allocation mechanism. A computing resource allocation system generates an entity resource model based on the entity resource usage data of the computing resource usage of the executable service platform as part of the first allocation mechanism. A computing resource allocation system simulates computing resource usage of the executable service platform by the entity as part of a second allocation mechanism based on the entity resource model and the entity resource usage data. A computing resource allocation system estimates a second allocation to provide to the entity based on the simulating.
    Type: Application
    Filed: March 6, 2023
    Publication date: September 12, 2024
    Applicant: Adobe Inc.
    Inventors: Raunak Shah, Shiv Kumar Saini, Atanu R. Sinha
  • Patent number: 11907531
    Abstract: Some techniques described herein relate to determining how to optimally store datasets in a multi-tiered storage device with compression. In one example, a method includes assigning, to a data partition of a dataset, a priority based on access patterns of the data partition. Compression data is accessed describing results of compressing a data sample associated with the data partition using multiple compression schemes. Based both on the priority of the data partition and the compression data, a storage tier is determined for storing the data partition in the multi-tiered storage device. Further, based both on the priority of the data partition and the compression data, a compression scheme is determined for compressing the data partition for storage in the multi-tiered storage device. The data partition is compressed using the compression scheme to produce a compressed data partition, and the compressed data partition is stored in the storage tier.
    Type: Grant
    Filed: June 28, 2022
    Date of Patent: February 20, 2024
    Assignee: Adobe Inc.
    Inventors: Raunak Shah, Koyel Mukherjee, Khushi, Kavya Barnwal, Karanpreet Singh, Harsh Kesarwani, Ayush Chauhan
  • Publication number: 20230418468
    Abstract: Some techniques described herein relate to determining how to optimally store datasets in a multi-tiered storage device with compression. In one example, a method includes assigning, to a data partition of a dataset, a priority based on access patterns of the data partition. Compression data is accessed describing results of compressing a data sample associated with the data partition using multiple compression schemes. Based both on the priority of the data partition and the compression data, a storage tier is determined for storing the data partition in the multi-tiered storage device. Further, based both on the priority of the data partition and the compression data, a compression scheme is determined for compressing the data partition for storage in the multi-tiered storage device. The data partition is compressed using the compression scheme to produce a compressed data partition, and the compressed data partition is stored in the storage tier.
    Type: Application
    Filed: June 28, 2022
    Publication date: December 28, 2023
    Inventors: Raunak Shah, Koyel Mukherjee, Khushi, Kavya Barnwal, Karanpreet Singh, Harsh Kesarwani, Ayush Chauhan
  • Publication number: 20230022226
    Abstract: A method for dynamic access control in a virtual storage environment is provided. Embodiments include providing, by a component within a cluster of virtual computing instances (VCIs), one or more computing node identifiers associated with the cluster to a management entity associated with a file volume. Embodiments include modifying, by the management entity, an access control list associated with the file volume based on the one or more computing node identifiers. Embodiments include determining, by the component, a configuration change related to the cluster. Embodiments include providing, by the component, based on the configuration change, an updated one or more computing node identifiers associated with the cluster to the management entity. Embodiments include modifying, by the management entity, the access control list associated with the file volume based on the updated one or more computing node identifiers.
    Type: Application
    Filed: July 22, 2021
    Publication date: January 26, 2023
    Inventors: Sandeep Srinivasa Pissay Srinivasa Rao, Christian DICKMAN, Balu DONTU, Raunak SHAH