- SAN FRANCISGO CA, US Tatiana Korolevskaya - Foster City CA, US Yue Li - Foster City CA, US Jerry Wald - San Francisco CA, US
International Classification:
G06F 16/9535 G06F 16/29 G06Q 20/40
Abstract:
A system receives transaction data from payment devices of a user. The system generates a transaction profile of the user based on the received transaction data. Based on the transactional parameters, the system determines a community of the user. The system further receives one or more predefined sub-groups of the community from a database. The one or more sub-groups define subsets of activities, geographic locations, and times. The system identifies one or more rules setting limits on the transactional parameters. Absent receiving additional user interactions, the system generates a suggested community for the user as a function of the one or more rules, the activities, geographic locations, and times of the one or more sub-groups of the community. The system generates a suggested activity to the user based on the suggested community.
Client devices can send access request messages to resource management computers to request access to a resource. A data security hub can provide centralized routing between different client devices, resource management computers, and authentication data processing servers. The data security hub can reduce the risk of sensitive authentication information from leaking (e.g., due to a breach) by limiting the amount or types of authentication information distributed to the data processing servers. The data security hub can limited the authentication information being distributed based on its sensitivity, the trust level of the client device, and the security level of the requested resource. The data security hub can also evaluate the client devices and data processing servers to identify security breaches and can cancel or reroute access requests accordingly. Thus, the data security hub can maintain resource security while better preserving the privacy of the client device's authentication information.
Neural Network-Based Video Compression With Bit Allocation
A method of video processing includes determining a target bitrate for a current video unit of a video that is based on a rate distortion function in which a rate portion is weighted using lambda, wherein lambda is a rational number and wherein lambda is an adaptively adjusted for each video unit of the video and performing a conversion between the current video unit and a bitstream of the video.
Efficiency And Reliability Improvement In Computing Service
- Milpitas CA, US Yue Li - Fremont CA, US Yong Tian - Cupertino CA, US Jingchao Sun - San Jose CA, US Ashley Tung - Palo Alto CA, US Haiyan Wang - Fremont CA, US
International Classification:
G06F 11/14
Abstract:
To address loss of access to computing instances in a cloud computing environment, techniques are introduced for moving an application between computing instances in the cloud computing environment. A computing service captures baseline or delta snapshots of the state of the application running on a first computing instance. A baseline snapshot is indicative of the full state of the application, and a delta snapshot is indicative of changes in the state since a most recent snapshot was captured. Responsive to receiving an indication that the first computing instance is to stop servicing the application, the computing service stops the application from running on the first computing instance and moves data from the captured snapshots to a second computing instance. The computing service resume execution of the application on the second computing instances and captures snapshots of the state of the application at the second computing instance.
- Milpitas CA, US Yue Li - Fremont CA, US Jun Gan - Milpitas CA, US Chenggong Fan - Milpitas CA, US Robert W. Beauchamp - Milpitas CA, US
International Classification:
G06F 11/14 G06F 3/06 G06F 9/46
Abstract:
A memory image can be captured by generating metadata indicative of a state of volatile memory and/or byte-addressable PMEM at a particular time during execution of a process by an application. This memory image can be persisted without copying the in-memory data into a separate persistent storage by storing the metadata and safekeeping the in-memory data in the volatile memory and/or PMEM. Metadata associated with multiple time-evolved memory images captured can be stored and managed using a linked index scheme. A linked index scheme can be configured in various ways including a full index and a difference-only index. The memory images can be used for various purposes including suspending and later resuming execution of the application process, restoring a failed application to a previous point in time, cloning an application, and recovering an application process to a most recent state in an application log.
Continuous Learning Neural Network System Using Rolling Window
- San Francisco CA, US Tatiana Korolevskaya - Mountain View CA, US Yue Li - Sunnyvale CA, US
Assignee:
Visa International Service Association - San Francisco CA
International Classification:
G06N 3/08 G06N 3/04 H04L 9/40
Abstract:
A disclosed method an analysis computer determining a rolling window associated with interaction data for interactions that occur over time. The analysis computer can retrieve interaction data for interactions occurring in the rolling window. The analysis computer can then generate pseudo interaction data based upon historical interaction data. The analysis computer can optionally embed the interaction data for the interactions occurring within the rolling window and the pseudo interaction data to form interaction data matrices. The analysis computer can then form a neural network model using the interaction data matrices, which is derived from the interaction data in the rolling window and the pseudo interaction data.
Embodiments are directed to a method for accelerating machine learning using a plurality of graphics processing units (GPUs), involving receiving data for a graph to generate a plurality of random samples, and distributing the random samples across a plurality of GPUs. The method may comprise determining a plurality of communities from the random samples using unsupervised learning performed by each GPU. A plurality of sample groups may be generated from the communities and may be distributed across the GPUs, wherein each GPU merges communities in each sample group by converging to an optimal degree of similarity. In addition, the method may also comprise generating from the merged communities a plurality of subgraphs, dividing each sub-graph into a plurality of overlapping clusters, distributing the plurality of overlapping clusters across the plurality of GPUs, and scoring each cluster in the plurality of overlapping clusters to train an AI model.
Portable Reputation Brokering Using Linked Blockchains And Shared Events
- San Francisco CA, US Tatiana Korolevskaya - Mountain View CA, US Yue Li - San Mateo CA, US
International Classification:
G06F 21/62 G06Q 30/00 G06F 16/23 H04L 9/32
Abstract:
Described herein are a system and techniques for enabling access control utilizing one or more blockchains associated with a user. A blockchain provider can manage one or more blockchains specifically associated with a an entity, where each blockchain may be associated with a differing sensitivity level. The entity may be a person or a machine such as an IOT (Internet of Things) device. The blockchain provider can manage access control policies associated with each blockchain such that access to the data of the blockchain may be allowed or restricted to requesting entities according to those access control policies.
Sep 2014 to 2000 Google Book Quality Control OperatorNami Nami Japanese Restaurant
Aug 2014 to 2000 WaitressNordstrom Palo Alto, CA Jun 2014 to Jul 2014 Inventory Processor (Personal Stylist Assistant)
Education:
University of California Los Angeles, CA 2014 Bachelor of Arts in JapaneseFoothill Los Altos, CA 2011 AA in Psychology
Skills:
Languages: Bilingual Mandarin Chinese/Japanese. Programs: Proficient in Microsoft Word, PowerPoint, and Adobe Photoshop. Operating Systems: Familiarity with PC and Mac
OmniVision Technologies Santa Clara, CA Jun 2014 to Aug 2014 (Image Sensor Processor) Development TeamColumbia University
Mar 2014 to May 2014 CAM Design and VerificationColumbia University New York, NY Feb 2014 to May 2014 Neural Signal Processor using 130nm CMOS technologyFormal Verification of SDRAM Controller Oct 2013 to Dec 2013A Float Point Function Unit
Oct 2013 to Dec 2013 A Float Point Function Unit with Error CorrectionTsinghua University
Jul 2013 to Aug 2013 Research Assistant
Education:
Columbia University, The Fu Foundation School of Engineering and Applied Science New York, NY Dec 2014 MS in Electrical EngineeringBeijing Institute of Technology, School of Information and Electronics Jul 2013 BS in Electrical Engineering
May 2013 to Nov 2013 SALES, MARGIN ANALYSIS DASHBOARDAnswersharks, Inc
May 2013 to Nov 2013 DATA LINEAGE DASHBOARD DEPLOYMENTPURCHASING SYSTEM Nov 2012 to Dec 2012CHECKOUT SYSTEM, Group Project Jan 2012 to Mar 2012
Education:
International Technological University San Jose, CA 2013 to 2015 Masters in Software EngineeringUNIVERSITY OF FLORIDA Gainesville, FL 2012 Masters in Information System and Operation ManagementNANJING AGRICULTURE UNIVERSITY Nanjing, CN 2010 Bachelors in Information Management and Information System
Skills:
QlikView, T-SQL, Java, C#, C, HTML, XML, ASP.NET, SQL Server 2008, Microsoft Office, Minitab, NetBeans, Visual Studio, Wiresharks
Youtube
Yueli @li ~ part 2
Duration:
10m 38s
Yueli @li ~ 40 songs [[ covers version ]] #ti...
Duration:
15m 48s
San Yue Li De Xiao Yu ( ) - Karaoke
Duration:
4m 28s
san yue li de xiao yu dj remix
san yue li de xiao yu ... dj remix karaoke salah satu lagu kami mempe...
Duration:
4m 31s
Yue Li: Patient Satisfaction, Public Reportin...
A public health seminar recorded on October 31, 2016 featuring Yue Li,...
College Station, Texas, US Xinyu, China Bryan, Texas, US San Antonio, Texas, US Wuhan, China Singapore, Singapore
Education:
Texas A&M University - Computer Science, Huazhong University of Science and Technology - Information Security, Natinoal University of Singapore - Computer Science
Yue Li
Education:
Rhode Island School of Design, East Lyme High School
Yue Li
Education:
University of Toronto - Computational Biology, University of Saskatchewan - Bioinformatics
Yue Li
Education:
University of Nottingham, Ningbo, China - International Business with Communications Studies