| 12423598 |
Managing user machine learning (ML) models |
Mahadev Khapali, Shashank Vijaykumar Vagarali, Yugandhra Rayanki |
2025-09-23 |
| 12314321 |
Automated selection of foundation models for client-specific generative artificial intelligence needs |
Ahamed Jalaldeen Shahul Hamid, Mukundan Sundararajan, Deepak Malik |
2025-05-27 |
| 12147786 |
Computer-based software development and product management |
Deepak Malik, Sudarshan, Anita Duggal, Mukundan Sundararajan |
2024-11-19 |
| 11870824 |
Control of access to restricted information presented in virtual meetings |
Sudarshan, Anita Duggal, Deepak Malik, Mukundan Sundararajan |
2024-01-09 |
| 10027622 |
Recovering lost device information in cable networks |
William Beebee, Madhu Sudan, Bernard Volz, Chad Mikkelson |
2018-07-17 |
| 9654331 |
System and method for recovery of customer premise equipment information on an access concentrator |
William Beebee, Madhu Sudan, Chad Mikkelson |
2017-05-16 |
| 9184930 |
Detection and support of a dual-stack capable host |
William Beebee, Madhu Sudan |
2015-11-10 |
| 8917737 |
Automatically identifying an edge-facing router |
William Beebee, Ralph Droms, Ole Troan |
2014-12-23 |
| 8886834 |
Hot standby neighbor discovery protocol for internet protocol version 6 |
William Beebee, Madhu Sudan |
2014-11-11 |
| 8576857 |
Automatically identifying an edge-facing router |
William Beebee, Ralph Droms, Ole Troan |
2013-11-05 |
| 8437360 |
Stateful DHCPv6 relay agent in a cable modem termination system |
Madhu Sudan, Shengyou Zeng |
2013-05-07 |
| 8102854 |
Neighbor discovery proxy with distributed packet inspection scheme |
William Beebee, Madhu Sudan, Joshua B. Littlefield |
2012-01-24 |
| 7957305 |
Hierarchical cable modem clone detection |
Shengyou Zeng |
2011-06-07 |
| 7801040 |
Node registration technique implemented in access networks |
De Fu Li, Mark E. Millet |
2010-09-21 |
| 7693180 |
Mechanisms for translating between two different voice-over-IP protocols |
William Guckel |
2010-04-06 |
| 7103067 |
Mechanism for translating between two different voice-over-IP protocols |
William Guckel |
2006-09-05 |