| 9530222 |
Detecting divergence or convergence of related objects in motion and applying asymmetric rules |
Steven L. Greenspan, Paul C. Lipton, John James Harrison, Prashant Parikh, Maria C. Velez-Rojas |
2016-12-27 |
| 9503860 |
Intelligent pursuit detection |
Steven L. Greenspan, Maria C. Velez-Rojas |
2016-11-22 |
| 9497071 |
Multi-hop root cause analysis |
Carrie E. Gates, Steven L. Greenspan, Maria C. Velez-Rojas |
2016-11-15 |
| 9497072 |
Identifying alarms for a root cause of a problem in a data processing system |
Carrie E. Gates, Steven L. Greenspan, Maria C. Velez-Rojas |
2016-11-15 |
| 9467466 |
Certification of correct behavior of cloud services using shadow rank |
Steven L. Greenspan, Peter Brian Matthews |
2016-10-11 |
| 9367422 |
Determining and using power utilization indexes for servers |
Subhasis Khatua, Douglas M. Neuse, Ramanjaneyulu Malisetti, Rajasekhar Gogula |
2016-06-14 |
| 9324000 |
Identifying objects in an image using coded reference identifiers |
Maria C. Velez-Rojas, Howard Abrams |
2016-04-26 |
| 9276803 |
Role based translation of data |
Carrie E. Gates, Steven L. Greenspan, Maria C. Velez-Rojas |
2016-03-01 |
| 9256748 |
Visual based malicious activity detection |
Carrie E. Gates, Gabriel M. Silberman, Maria C. Velez-Rojas, Steven L. Greenspan |
2016-02-09 |