| 11874642 |
Methods to configure a safety control system |
John Klesk, Greg Sorvari, Dean Erickson, Jeff Dixon |
2024-01-16 |
| 11847384 |
Methods to generate a wiring schema |
John Klesk, Greg Sorvari, Dean Erickson, Greg Anderson, Jeff Dixon |
2023-12-19 |
| 11795281 |
Methods and compositions relating to tunable nanoporous coatings |
Peng Jiang, Sin-Yen Leo, Calen Leverant, Yin Fang |
2023-10-24 |
| 11704451 |
Methods to generate a wiring schema |
John Klesk, Greg Sorvari, Dean Erickson, Greg Anderson, Jeff Dixon |
2023-07-18 |
| 11270035 |
Methods to generate a wiring schema |
John Klesk, Greg Sorvari, Dean Erickson, Greg Anderson, Jeff Dixon |
2022-03-08 |
| 11249452 |
Methods to configure a safety control system |
John Klesk, Greg Sorvari, Dean Erickson, Jeff Dixon |
2022-02-15 |
| 11082862 |
Cell site placement system |
Gaurav Thakur, Arun Jotshi, Ashwin Sridharan, Kathleen Meier-Hellstern |
2021-08-03 |
| 11008429 |
Methods and compositions relating to tunable nanoporous coatings |
Peng Jiang, Sin-Yen Leo, Calen Leverant, Yin Fang |
2021-05-18 |
| 10959109 |
Creating and using network coverage models |
Arun Jotshi, Gaurav Thakur, Velin Kounev, Fei Wu, Yaron Kanza +1 more |
2021-03-23 |
| 10489184 |
Systems and methods for management of virtual machine resources in a network environment through localized assignment of virtual machines having complimentary resource requirements |
Eric Noel |
2019-11-26 |
| 9055012 |
Bot-network detection based on simple mail transfer protocol (SMTP) characteristics of e-mail senders within IP address aggregates |
Willa Ehrlich, David Hoeflin, Chaim Spielman, Stephen Wood |
2015-06-09 |
| 8904530 |
System and method for detecting remotely controlled E-mail spam hosts |
Willa Ehrlich, David Hoeflin, Anestis Karasaridis, Daniel F. Hurley |
2014-12-02 |
| 8713141 |
System and method for monitoring network activity |
David Hoeflin, Duncan Kirkwood Sparrell |
2014-04-29 |
| 8516104 |
Method and apparatus for detecting anomalies in aggregated traffic volume data |
Chaim Spielman |
2013-08-20 |
| 8438638 |
Bot-network detection based on simple mail transfer protocol (SMTP) characteristics of e-mail senders within IP address aggregates |
Willa Ehrlich, David Hoeflin, Chaim Spielman, Stephen Wood |
2013-05-07 |
| 8072985 |
Traffic matrix computation for packet networks |
Joseph Golan, Joseph Thomas O'Neil |
2011-12-06 |
| 7808916 |
Anomaly detection systems for a computer network |
Kenichi Futamura |
2010-10-05 |
| 7743139 |
Method of provisioning a packet network for handling incoming traffic demands |
Joseph Golan, Joseph Thomas O'Neil |
2010-06-22 |
| 7664114 |
Traffic matrix computation for packet networks |
Joseph Golan, Joseph Thomas O'Neil |
2010-02-16 |
| 7002960 |
Traffic matrix computation for packet networks |
Joseph Golan, Joseph Thomas O'Neil |
2006-02-21 |
| 6922444 |
System and method for providing adaptive rate selection |
Lujing Cai |
2005-07-26 |
| 6404885 |
Method and system for providing multiple classes of telephone access service |
Frank A. Field, Daniel Paul Heyman, R. Craig Hubbard, Yonatan Aharon Levy, Jeffrey Polhemus +1 more |
2002-06-11 |
| 6189043 |
Dynamic cache replication in a internet environment through routers and servers utilizing a reverse tree generation |
Cagatay Buyukkoc, Adrian Emmanuel Eckberg, Pravin Kumar Johri |
2001-02-13 |