| 12081443 |
Adaptive control plane policing |
Roshan Lal, Rishi Chhibber |
2024-09-03 |
| 11599842 |
Modeling expectation mismatches |
Manish Manish, Mohamed Fazil, Anirban Majumdar |
2023-03-07 |
| 11169965 |
Metadata-based data valuation |
Stephen J. Todd, Sudhir Vijendra, Narayanan Krishnakumar, Qing Ye |
2021-11-09 |
| 11144730 |
Modeling end to end dialogues using intent oriented decoding |
Nikhil Goel, Pavitar Singh, Shubham Sharma, Vasant Srinivasan, Yoginkumar Patel |
2021-10-12 |
| 11042911 |
Creation of high value data assets from undervalued data |
Stephen J. Todd |
2021-06-22 |
| 11037208 |
Economic valuation of data assets |
Stephen J. Todd, Sudhir Vijendra |
2021-06-15 |
| 10951531 |
Adapting control plane policing parameters dynamically |
Venkatesh Srinivasan, Swaminathan Narayanan, Anulekha Chodey, Ambrish Niranjan Mehta, Natarajan Manthiramoorthy |
2021-03-16 |
| 10833808 |
Multicast error detection and recovery |
Roshan Lal, Rishi Chhibber, Mankamana Prasad Mishra, Peter Psenak, Padmanab Pathikonda +1 more |
2020-11-10 |
| 10721261 |
Data governance with automated risk valuation via impact per event analytics |
Stephen J. Todd, Barbara Latulippe, Sudhir Vijendra |
2020-07-21 |
| 10687280 |
Low battery indication in Wi-Fi enabled device or sensor |
Antony Baskar Arul |
2020-06-16 |
| 10608924 |
Methods and apparatuses for non-blocking IP multicast delivery of media data in a multi-spine network |
Padmanab Pathikonda, Rishi Chhibber, Roshan Lal, Ann Roshini Paul, Nataraj Batchu |
2020-03-31 |
| 10528522 |
Metadata-based data valuation |
Stephen J. Todd, Sudhir Vijendra, Narayanan Krishnakumar, Qing Ye |
2020-01-07 |
| 10521442 |
Hierarchical value-based governance architecture for enterprise data assets |
Stephen Gatchell, Barbara Latulippe, Perry Davis, David M. Dionisio |
2019-12-31 |
| 10516598 |
Detecting and preventing network loops |
Natarajan Manthiramoorthy, Venkatesh Srinivasan, Swaminathan Narayanan, Ambrish Niranjan Mehta, Anulekha Chodey |
2019-12-24 |
| 10516600 |
Detecting and preventing network loops |
Natarajan Manthiramoorthy, Venkatesh Srinivasan, Swaminathan Narayanan, Ambrish Niranjan Mehta, Anulekha Chodey |
2019-12-24 |
| 10491508 |
Detecting and preventing network loops |
Natarajan Manthiramoorthy, Venkatesh Srinivasan, Swaminathan Narayanan, Ambrish Niranjan Mehta, Anulekha Chodey |
2019-11-26 |
| 10348677 |
Methods, systems, and products for address translation |
Jayanta Das, Bhavin A. Doshi, Saurabh Kumar |
2019-07-09 |
| 10320838 |
Technologies for preventing man-in-the-middle attacks in software defined networks |
Venkatesh Srinivasan, Ambrish Niranjan Mehta, Anulekha Chodey, Natarajan Manthiramoorthy, Swaminathan Narayanan |
2019-06-11 |
| 10303690 |
Automated identification and classification of critical data elements |
Stephen J. Todd, Barbara Latulippe |
2019-05-28 |
| 10153977 |
Adapting control plane policing parameters dynamically |
Venkatesh Srinivasan, Swaminathan Narayanan, Anulekha Chodey, Ambrish Niranjan Mehta, Natarajan Manthiramoorthy |
2018-12-11 |
| 10110469 |
Detecting and preventing network loops |
Natarajan Manthiramoorthy, Venkatesh Srinivasan, Swaminathan Narayanan, Ambrish Niranjan Mehta, Anulekha Chodey |
2018-10-23 |
| 10079752 |
Detecting and preventing network loops |
Natarajan Manthiramoorthy, Venkatesh Srinivasan, Swaminathan Narayanan, Ambrish Niranjan Mehta, Anulekha Chodey |
2018-09-18 |
| 9870219 |
Mechanisms for performing switch upgrades using remote containers |
Natarajan Manthiramoorthy, Venkatesh Srinivasan, Swaminathan Narayanan, Ambrish Niranjan Mehta, Anulekha Chodey |
2018-01-16 |
| 9842593 |
Multi-level content analysis and response |
Shiv Kumar, Paritosh Bajpay, Satyendra Tripathi |
2017-12-12 |
| 9742629 |
User-controlled network configuration for handling multiple classes of service |
Chen-Yui Yang, Paritosh Bajpay, David H. Lu |
2017-08-22 |