| 12309181 |
Establishing a location profile for a user device |
Vikram Kapoor, Harish Kumar Bharat Singh, Weifei Zeng, Vimalkumar Jeyakumar, Theron Tock +1 more |
2025-05-20 |
| 12277759 |
Dual deep learning architecture for machine-learning systems |
Linh Le |
2025-04-15 |
| 12244621 |
Using activity monitored by multiple data sources to identify shadow systems |
Vikram Kapoor, Harish Kumar Bharat Singh, Weifei Zeng, Vimalkumar Jeyakumar, Theron Tock +1 more |
2025-03-04 |
| 12235911 |
Computer-based systems and methods for training and using a machine learning model for improved processing of user queries based on inferred user intent |
Srivatsa Mallapragada, Varsha Rani Chawan, Zeyad Hailat, Simon Hughes, Yuanbo Wang |
2025-02-25 |
| 11991198 |
User-specific data-driven network security |
Vikram Kapoor, Harish Kumar Bharat Singh, Weifei Zeng, Vimalkumar Jeyakumar, Theron Tock +1 more |
2024-05-21 |
| 11979422 |
Elastic privileges in a secure access service edge |
Vikram Kapoor, Harish Kumar Bharat Singh, Weifei Zeng, Vimalkumar Jeyakumar, Theron Tock +1 more |
2024-05-07 |
| 11916947 |
Generating user-specific polygraphs for network activity |
Vikram Kapoor, Harish Kumar Bharat Singh, Weifei Zeng, Vimalkumar Jeyakumar, Theron Tock +1 more |
2024-02-27 |
| 11909752 |
Detecting deviations from typical user behavior |
Vikram Kapoor, Harish Kumar Bharat Singh, Weifei Zeng, Vimalkumar Jeyakumar, Theron Tock +1 more |
2024-02-20 |
| 11895135 |
Detecting anomalous behavior of a device |
Vikram Kapoor, Harish Kumar Bharat Singh, Weifei Zeng, Vimalkumar Jeyakumar, Theron Tock +1 more |
2024-02-06 |
| 11893781 |
Dual deep learning architecture for machine-learning systems |
Linh Le |
2024-02-06 |
| 11461383 |
Dual deep learning architecture for machine-learning systems |
Linh Le |
2022-10-04 |
| 10360182 |
Recovering data lost in data de-duplication system |
Curtis Anderson, Nitin Garg, Dheer Moghe |
2019-07-23 |
| 9432484 |
CIM-based data storage management system having a restful front-end |
Xuan Tang, David Parenti, James O. Pendergraft |
2016-08-30 |
| 9367397 |
Recovering data lost in data de-duplication system |
Curtis Anderson, Nitin Garg, Dheer Moghe |
2016-06-14 |
| 9201949 |
Index searching using a bloom filter |
— |
2015-12-01 |
| 9177047 |
System, method and computer program product for information sorting and retrieval using a language-modeling kernal function |
Vijay Raghavan |
2015-11-03 |
| 8938477 |
Simulating data storage system configuration data |
Xuan Tang, Yong Wang, Ken Kim, Lorenzo Bailey, Utkarsh Vipul +1 more |
2015-01-20 |
| 8825720 |
Scaling asynchronous reclamation of free space in de-duplicated multi-controller storage systems |
Srikant Varadan, Fabiano Botelho |
2014-09-02 |
| 8756238 |
Index searching using a bloom filter |
— |
2014-06-17 |
| 8494987 |
Semantic relationship extraction, text categorization and hypothesis generation |
Jayasimhaa Reddy Katukuri, Vijay Raghavan |
2013-07-23 |
| 8396873 |
Index searching using a bloom filter |
— |
2013-03-12 |
| 8346735 |
Controlling multi-step storage management operations |
Xuan Tang, Russell R. Laporte, Gregory W. Lazar, Sriram Krishnan |
2013-01-01 |
| 8095938 |
Managing alert generation |
Sriram Krishnan, Neil F. Schutzman, Ping Zhang, Munish Desai |
2012-01-10 |
| 7389339 |
Ambiguity-purging and template-conflict-resolution in computer network events-notification |
Walter T. Dobberpuhl, Andreas Bauer |
2008-06-17 |
| 7103652 |
Ambiguity-purging and template-conflict-resolution in computer network events-notification |
Walter T. Dobberpuhl, Andreas Bauer |
2006-09-05 |