| 11863678 |
Rendering blockchain operations resistant to advanced persistent threats (APTs) |
Kelce S. Wilson, Jeff A. Hughes, Tyler J. Moody, Gary R. Tuttle, Joel B. Rieman |
2024-01-02 |
| 11863679 |
Blockchain records with third party digital signatures as a trust element for high-risk digital content |
Kelce S. Wilson, Jeff A. Hughes, Tyler J. Moody, Gary R. Tuttle, Joel B. Rieman |
2024-01-02 |
| 11863680 |
Linking blockchain records to identify certification, track pedigree and identify obsolete digital content |
Kelce S. Wilson, Jeff A. Hughes, Tyler J. Moody, Gary R. Tuttle, Joel B. Rieman |
2024-01-02 |
| 9424121 |
Root cause analysis for service degradation in computer networks |
Dan Kushnir, Ahmet Akyamac, Veena B. Mendiratta, Huseyin Uzunalioglu |
2016-08-23 |
| 9159077 |
Method and apparatus for deriving composite tie metric for edge between nodes of a telecommunication call graph |
Veena B. Mendiratta, Chitra Phadke, Huseyin Uzunalioglu, Dan Kushnir |
2015-10-13 |
| 8804929 |
System and method for generating subscriber churn predictions |
Chitra Phadke, Huseyin Uzunalioglu, Veena B. Mendiratta, Dan Kushnir |
2014-08-12 |