| 12197396 |
Using persistent memory to enable restartability of bulk load transactions in cloud databases |
Madhu S. Kumar, Johnu George, Amit Kumar Saha, Debojyoti Dutta |
2025-01-14 |
| 11706125 |
Service traffic replication and dynamic policy enforcement in a multi-cloud service mesh |
Sebastian Jeuk, Gonzalo Salgueiro |
2023-07-18 |
| 11481362 |
Using persistent memory to enable restartability of bulk load transactions in cloud databases |
Madhu S. Kumar, Johnu George, Amit Kumar Saha, Debojyoti Dutta |
2022-10-25 |
| 10938937 |
Multi-datacenter message queue |
Marc Solanas Tarre, Debojyoti Dutta, Manoj Sharma |
2021-03-02 |
| 10915516 |
Efficient trickle updates in large databases using persistent memory |
Johnu George, Amit Kumar Saha, Debojyoti Dutta, Madhu S. Kumar |
2021-02-09 |
| 10855577 |
Service traffic replication and dynamic policy enforcement in a multi-cloud service mesh |
Sebastian Jeuk, Gonzalo Salgueiro |
2020-12-01 |
| 10742686 |
Enforcing network endpoint policies in a cloud-based environment using a covert namespace |
Rajath Agasthya, Sebastian Jeuk, Sridar Kandaswamy |
2020-08-11 |
| 10715432 |
Chained collection of information |
Sebastian Jeuk, Gonzalo Salgueiro |
2020-07-14 |
| 10691671 |
Using persistent memory to enable consistent data for batch processing and streaming processing |
Johnu George, Amit Kumar Saha, Debojyoti Dutta, Madhu S. Kumar |
2020-06-23 |
| 10637756 |
Traffic analytics service for telemetry routers and monitoring systems |
Xinyuan Huang, Purushotham Kamath, Debojyoti Dutta |
2020-04-28 |
| 10601672 |
Inter-tenant workload performance correlation and recommendation |
Sebastian Jeuk, Gonzalo Salgueiro |
2020-03-24 |
| 10476982 |
Multi-datacenter message queue |
Marc Solanas Tarre, Debojyoti Dutta, Manoj Sharma |
2019-11-12 |
| 10419294 |
Entity-state relationship correlation |
Rahul Ramakrishna, Yathiraj B. Udupi |
2019-09-17 |
| 8516538 |
Providing security for queries to electronic product code information services |
Umair Akeel, Steven P. Beier, Valer-Alin Crisan, Gautham B. Pai |
2013-08-20 |
| 8141160 |
Mitigating and managing privacy risks using planning |
Kay S. Anderson, Alexandre Evfimievski, Mark D. Feblowitz, Genady Grabarnik, Nagui Halim +5 more |
2012-03-20 |
| 8032924 |
Access control method and a system for privacy protection |
Weifeng Chen, Alexandre Evfimievski, Zhen Liu, Anton V. Riabov, Pankaj Rohatgi +3 more |
2011-10-04 |
| 8020213 |
Access control method and a system for privacy protection |
Weifeng Chen, Alexandre V. Evfunievski, Zhen Liu, Anton V. Riabov, Pankaj Rohatgi +3 more |
2011-09-13 |
| 7866543 |
Security and privacy enforcement for discovery services in a network of electronic product code information repositories |
Anthony C. Asher, Steven P. Beier, Christian Clauss, Tyrone W. A. Grandison, Karin Kailing +1 more |
2011-01-11 |
| 7810142 |
Auditing compliance with a hippocratic database |
Rakesh Agrawal, Roberto J. Bayardo, Christos Faloutsos, Gerald G. Kiernan, Ramakrishnan Srikant |
2010-10-05 |