| 9946720 |
Searching data files using a key map |
David W. Bennett, Timothy E. Beres |
2018-04-17 |
| 9900300 |
Protection against unauthorized cloning of electronic devices |
David W. Bennett |
2018-02-20 |
| 9773118 |
Data deduplication with encryption |
David W. Bennett |
2017-09-26 |
| 9641328 |
Generation of public-private key pairs |
David W. Bennett |
2017-05-02 |
| 9529946 |
Performance estimation using configurable hardware emulation |
Paul R. Schumacher, Graham F. Schelle, Patrick Lysaght |
2016-12-27 |
| 9268898 |
Estimating power consumption of a circuit design |
Matthew H. Klein |
2016-02-23 |
| 9148032 |
Estimating power consumption of an electronic circuit |
Smitha Sundaresan |
2015-09-29 |
| 8768242 |
Remote satellite terminal with antenna polarization alignment enforcement and associated methods |
Steven Karl Wheelis, Jay Mueller, Greg Myers |
2014-07-01 |
| 8694939 |
Method for determining critical junction temperature |
Matthew H. Klein, Ronald L. Cline |
2014-04-08 |
| 8495538 |
Power estimation of a circuit design |
Paul R. Schumacher, Timothy J. Burke |
2013-07-23 |
| 8146035 |
Power estimation of a circuit design |
Paul R. Schumacher, Smitha Sundaresan, Pradip K. Jha |
2012-03-27 |
| 6581186 |
Methods and systems for providing logic cores from third party logic core providers |
Smitha Sundaresan, James L. Burnham |
2003-06-17 |