Oracle Patent Applications

TRANSFORMING A JAVA PROGRAM USING A SYMBOLIC DESCRIPTION LANGUAGE MODEL

Granted: August 15, 2024
Application Number: 20240272884
Techniques for transforming Java source code using a symbolic description language are disclosed, including: obtaining a set of Java source code corresponding to a Java program; generating a symbolic description language (SDL) model of the set of Java source code; generating, based on the SDL model, a transformed program including at least one transformation relative to the Java program.

USER INTERFACE AS A SERVICE ARCHITECTURE

Granted: August 15, 2024
Application Number: 20240272880
Large applications may access data from a number of different computing environments. Each of these computing environments may provide user interface (UI) components that are tightly coupled with the backend services providing the data. When an application is loaded in one computing environment, the main UI and local UI components from that environment may be loaded during initialization. Additionally, UI components from other computing environments may be dynamically added to the main…

DATA RECOVERY TECHNIQUES USING CLOUD CONSISTENCY GROUPS

Granted: August 15, 2024
Application Number: 20240272834
Techniques discussed herein relate to improved data recovery techniques within cloud computing environments. The disclosed techniques utilize consistency groups that are identified for volumes corresponding to a compute instance. A plurality of resource identifiers uniquely identifying a respective cloud computing resource of the cloud computing environment can be maintained. A cloud computing instance corresponding to a resource identifier may be identified and volume metadata…

AUTONOMOUS TERRAFORMING ON CLOUD INFRASTRUCTURES

Granted: August 8, 2024
Application Number: 20240267290
A process for defining a cloud service in an Infrastructure as Code (IaC) tool is designed to dynamically determine numbers of clusters, availability domains, compute nodes, and/or load balancers at run time. These values are then used to determine a number of subnet levels required for a classless inter-domain routing (CIDR) slicing operation to generate subnets for each of the compute nodes and load balancer nodes in the service. Because IaC languages do not provide nested loop control…

System And Method For Upgrading Sparkline Cluster With Zero Downtime

Granted: August 8, 2024
Application Number: 20240265013
The present embodiments relate to updating a dataflow interactive cluster with zero downtime. A request to update a first dataflow cluster can be received, and a second dataflow cluster can be generated as a replacement cluster to execute received queries. Generating the second dataflow cluster can include identifying a second series of executor nodes that are configured to execute queries from the gateway node via a second driver node. A first update to a configuration of a host…

TASK PRIORITIZATION BASED ON CURRENT CONDITIONS

Granted: August 8, 2024
Application Number: 20240264862
A system continually or periodically computes priority scores for unexecuted tasks. The system selects and executes tasks based on respective priority scores. The priority score for a particular unexecuted task may be computed as a function of a set of tasks that currently depend on the particular unexecuted task. The priority score for the particular unexecuted task may increase or decrease as the set of tasks, that depend on the particular unexecuted task, increase or decrease.

OUT-OF-DOMAIN DATA AUGMENTATION FOR NATURAL LANGUAGE PROCESSING

Granted: August 1, 2024
Application Number: 20240256777
A method includes receiving a training set of utterances for training a machine-learning model to identify one or more intents for one or more utterances, and augmenting the training set of utterances with out-of-domain (OOD) examples. The augmenting includes: generating a data set of OOD examples, filtering out OOD examples from the data set of OOD examples, determining a difficulty value for each OOD example remaining within the filtered data set of the OOD examples, and generating…

ENHANCED NETWORK-LINK ARCHITECTURE FOR IMPROVED END-TO-END LATENCY IN COMMUNICATION BETWEEN DIFFERENT CLOUD ENVIRONMENTS

Granted: August 1, 2024
Application Number: 20240259263
Techniques are described for creating a network-link between a first virtual network in a first cloud environment and a second virtual network in a second cloud environment. The first virtual network in the first cloud environment is created to enable a user associated with a customer tenancy in the second cloud environment to access one or more services provided in the first cloud environment. The network-link is created based on one or more link-enabling virtual networks being deployed…

ARCHITECTURE OF A MULTI-CLOUD CONTROL PLANE -NETWORK ADAPTOR

Granted: August 1, 2024
Application Number: 20240259261
Techniques are described for creating a network-link between a first virtual network in a first cloud environment and a second virtual network in a second cloud environment. The first virtual network in the first cloud environment is created to enable a user associated with a customer tenancy in the second cloud environment to access one or more services provided in the first cloud environment. The network-link is created based on one or more link-enabling virtual networks being deployed…

TECHNIQUES FOR GENERATING MULTI-MODAL DISCOURSE TREES

Granted: August 1, 2024
Application Number: 20240256787
Methods for generating and utilizing a multi-modal discourse tree (MMDT) are provided herein. An extended discourse tree (EDT) may be generated (e.g., from a discourse tree (DT) or a communicative DT (CDT)) from a corpus of text. Data records (e.g., records contained numerical data) may be linked to the extended discourse tree to generate a multi-modal discourse tree. The multi-modal discourse tree may link any suitable text/records from disparate sources. For example, entities…

TRAINING GRAPH NEURAL NETWORK TO IDENTIFY KEY-VALUE PAIRS IN DOCUMENTS

Granted: August 1, 2024
Application Number: 20240256771
Techniques for identifying content in key-value pairs of documents using a graph neural network (GNN) are disclosed. A system trains a GNN to identify key-value pair groupings in documents. The GNN classifies nodes in document graphs as key-type nodes and answer-type nodes. The GNN also classifies edges connecting nodes in the document graphs for keeping in the document graph or removing from the document graph. The resulting document graph includes key-value groupings in the document.…

RULE-BASED QUERY CONTROL

Granted: August 1, 2024
Application Number: 20240256547
Systems for fine-grained control of query execution are disclosed. The system receives and stores access control rules to be applied to queries. The system applies access control rules to a received query to determine one or more actions corresponding to the received query. Based on the access control rules, the system can allow execution of the query without conditions, allow execution of the query under a set of conditions, or prevent execution of the query.

Extracting Data from Heterogeneous Sources with Library Conflicts

Granted: August 1, 2024
Application Number: 20240256296
Techniques for instantiating a reference type to create a first descendant loader and a second descendant loader. The first descendant loader and the second descendant loader may be isolated loaders. The first descendant loader may load a first plugin and a first set of libraries. The first set of libraries may be needed to complete a first operation. The second descendant loader may load a second plugin and a second set of libraries. The second set of libraries may be needed to complete…

AUTHENTICATION USING WORDS AS A SINGLE-USE PASSCODE

Granted: July 25, 2024
Application Number: 20240249730
The present disclosure provide a multiple factor authentication process using text passcodes. A process performs a first verification of a user using an authentication credential transmitted via a first communication channel. Based on successfully performing the first verification, the process performs a second verification using a word or a textual phrase transmitted to the user via a different communication channel. The word or textual phrase can be a single-use, limited-time token…

HANDLING EXPLICIT INVOCATION OF CHATBOTS

Granted: July 25, 2024
Application Number: 20240249724
The present disclosure relates to chatbot systems, and more particularly, to techniques for identifying an explicit invocation of a chatbot and determining an input for the chatbot being invoked. In certain embodiments, explicit invocation analysis involves detecting an invocation name in an utterance. The invocation name is an identifier assigned to a particular chatbot. In response to detection of the invocation name, the utterance is refined for input to the particular chatbot by…

TRACKING PERFORMANCE OF RECOMMENDED CONTENT ACROSS MULTIPLE CONTENT OUTLETS

Granted: July 25, 2024
Application Number: 20240249313
The present disclosure relates to systems and methods for tracking content across multiple content outlets. Content items, characterized by first metadata, and content slots, characterized by second metadata, can be received. Third metadata for digital content slots can be generated. Fourth metadata can be received. A recommended content item package can be provided based on a comparison between a combination of the first metadata, the second metadata, and the third metadata and the…

ONLINE MERGING OF FRAGMENTED COMPUTING RESOURCES ACROSS STORAGE SERVERS BY TENANT IN CLOUD ENVIRONMENTS

Granted: July 25, 2024
Application Number: 20240248883
Client data corresponding to a single client can be stored. A decision to proceed with a defragmentation of two or more particular core groups can be determined. A destination core group to receive client data can be identified. At least one additional core group can be initiated to manage interim data write requests from the single client. Each of the two or more particular core groups can be closed to data write requests. A defragmentation of the two or more particular core groups can…

TECHNIQUES FOR MANAGING EDGE DEVICE PROVISIONING

Granted: July 18, 2024
Application Number: 20240241766
Techniques discussed herein relate to managing aspects of provisioning cloud-computing edge devices. In some embodiments, a user request specifying one or more resources to be provisioned at a cloud-computing edge device may be received by a cloud-computing device operated by a cloud-computing provider. An ephemeral credential may be generated for the edge device and used to determine whether access control policies exist that enable the edge device to access the resource(s). If the…

Methods And Systems For Memory Tracing In Asset Managing Systems

Granted: July 18, 2024
Application Number: 20240244059
The present embodiments relate to implementing change data on no-master NoSQL data stores. An optimized node can be identified from a plurality of NoSQL data storage nodes and a specialized node can be connected (e.g., collocated) to the optimized node. The specialized node can maintain change data capture (CDC) data provided by client nodes in a hash map that can be used as a point of truth for coordinating CDC data across the plurality of NoSQL data storage nodes. The plurality of…

COMPOSITE ENTITY FOR RULE DRIVEN ACQUISITION OF INPUT DATA TO CHATBOTS

Granted: July 18, 2024
Application Number: 20240242034
The present disclosure relates to chatbot systems, and more particularly, to techniques for obtaining data items for input to a chatbot. In certain embodiments, a chatbot system includes a component that can be invoked by a chatbot in the chatbot system to obtain data items needed by the chatbot. The component can be invoked based on a reference to the component in a dialog flow definition configured for the chatbot. The reference to the component can indicate a composite entity that the…