| 11017077 |
Run-time security protection system and method |
Monica Farkash, Sandip Ray, Wen Chen |
2021-05-25 |
| 10495691 |
System architecture method and apparatus for adaptive hardware fault detection with hardware metrics subsystem |
Xiao Sun, Wen Chen |
2019-12-03 |
| 10481674 |
Autonomous hardware for application power usage optimization |
Wen Chen, Monica Farkash, Kuo-Kai Hsieh |
2019-11-19 |
| 9824243 |
Model-based runtime detection of insecure behavior for system on chip with security requirements |
Wen Chen, Lawrence Case |
2017-11-21 |
| 9092567 |
Systems and methods for analyzing transactions in a computer system |
VIVEKANANDA VEDULA |
2015-07-28 |
| 9069762 |
Equivalence classes over parameter state space |
Xiushan Feng, Yinfang Lin |
2015-06-30 |
| 9002694 |
Verification of design derived from power intent |
Xiushan Feng, Scott R. Little |
2015-04-07 |
| 8584063 |
Assertion-based design partitioning |
Xiushan Feng, Ross L. Patterson |
2013-11-12 |
| 8555226 |
Automatic verification of dependency |
Xiushan Feng, Ashish Goel |
2013-10-08 |
| 8234618 |
Trace reconstruction for silicon validation of asynchronous systems-on-chip |
Mrinal Bose, Hillel Miller, Edward L. Swarthout, Ekaterina A. Trofimova |
2012-07-31 |
| 8050904 |
System and method for circuit symbolic timing analysis of circuit designs |
Magdy S. Abadir, Ping Gao, Timothy David McDougall |
2011-11-01 |
| 7945418 |
Stream based stimulus definition and delivery via interworking |
Mrinal Bose, Kenneth G. Davis, Yaniv Fais, Sharon Goldschlager, Amit Hermony +4 more |
2011-05-17 |
| 7650579 |
Model correspondence method and device |
Magdy S. Abadir, Himyanshu Anand, M. Alper Sen |
2010-01-19 |
| 7360183 |
Design analysis tool and method for deriving correspondence between storage elements of two memory models |
Magdy S. Abadir, Himyanshu Anand |
2008-04-15 |
| 6952812 |
Design analysis tool for path extraction and false path identification and method thereof |
Magdy S. Abadir, Jing Zeng |
2005-10-04 |