| 11194303 |
Method and system for anomaly detection and notification through profiled context |
John M. Santosuosso, Jason A. Nikolai |
2021-12-07 |
| 11163883 |
Enhancing security of a touch screen device |
Mariah Nordlund, Leah R. Temple |
2021-11-02 |
| 11150969 |
Helping a hardware accelerator using software |
Paul E. Schardt, Lance G. Thompson, James E. Carey |
2021-10-19 |
| 11144357 |
Selecting hardware accelerators based on score |
Paul E. Schardt, Lance G. Thompson, James E. Carey |
2021-10-12 |
| 11144722 |
Translation of a content item |
Rafal P. Konik, Yi Jie Ma, WEN-YAN YANG |
2021-10-12 |
| 11132282 |
Managing cloud-based hardware accelerators |
Paul E. Schardt, Lance G. Thompson, James E. Carey |
2021-09-28 |
| 11048558 |
Dynamic accelerator generation and deployment |
Paul E. Schardt, Lance G. Thompson, James E. Carey |
2021-06-29 |
| 10977098 |
Automatically deploying hardware accelerators based on requests from users |
Paul E. Schardt, Lance G. Thompson, James E. Carey |
2021-04-13 |
| 10936043 |
Thermal management of hardware accelerators |
Paul E. Schardt, Lance G. Thompson, James E. Carey |
2021-03-02 |
| 10901827 |
Failover of a hardware accelerator to software |
Paul E. Schardt, Lance G. Thompson, James E. Carey |
2021-01-26 |
| 10892944 |
Selecting and using a cloud-based hardware accelerator |
Paul E. Schardt, Lance G. Thompson, James E. Carey |
2021-01-12 |
| 10884985 |
Role mutable file system |
Robert J. Traff, Margaret R. Fenlon, Charles L. Emig, II, Justin C. Nelson, Shuang Hong Wang |
2021-01-05 |