| 10837791 |
Generating and recommending customized traversal routes |
Pranita Sharad Dewan, Raghu Kiran Ganti |
2020-11-17 |
| 10834134 |
System, method, and recording medium for moving target defense |
Venkat Raghavan, Dinesh C. Verma |
2020-11-10 |
| 10832680 |
Speech-to-text engine customization |
Raghu Kiran Ganti, Shreeranjani Srirangamsridharan, Dakshi Agrawal |
2020-11-10 |
| 10831927 |
Noise propagation-based data anonymization |
Supriyo Chakraborty |
2020-11-10 |
| 10753767 |
Identification of failed sensors in a system of interconnected devices |
Palanivel A. Kodeswaran, Ravindranath Kokku, Sayandeep Sen |
2020-08-25 |
| 10721668 |
Network virtualization of user equipment in a wireless communication network |
Dakshi Agrawal, Bruce O. Anthony, Jr., Dinesh C. Verma, Chatschik Bisdikian |
2020-07-21 |
| 10680953 |
Controlling incoming traffic |
Franck Le, Vasileios Pappas, Dinesh C. Verma |
2020-06-09 |
| 10664234 |
Spatial predicates evaluation on geohash-encoded geographical regions |
Sameh W. Asaad, Dajung LEE, Roger Moussalli |
2020-05-26 |
| 10659558 |
Saving bandwidth in transmission of compressed data |
Dakshi Agrawal, Vasileios Pappas, Ramya Raghavendra, Dinesh C. Verma, Ho Yin Starsky Wong |
2020-05-19 |
| 10574777 |
Edge caching for cognitive applications |
Dinesh C. Verma |
2020-02-25 |
| 10542424 |
Plausible obfuscation of user location trajectories |
Supriyo Chakraborty, Raghu Kiran Ganti, Omer Tripp |
2020-01-21 |
| 10542019 |
Preventing intersection attacks |
Saritha Arunkumar, Supriyo Chakraborty, Raghu Kiran Ganti |
2020-01-21 |
| 10541878 |
Client-space network monitoring |
Ting He, Liang Ma, Erich M. Nahum |
2020-01-21 |
| 10531287 |
Plausible obfuscation of user location trajectories |
Supriyo Chakraborty, Raghu Kiran Ganti, Omer Tripp |
2020-01-07 |