| 12381814 |
Information centric network distributed path selection |
Yi Zhang, Srikathyayani Srikanteswara, Nageen Himayat, Xiruo Liu |
2025-08-05 |
| 12363028 |
Geographic routing |
Srikathyayani Srikanteswara, Yi Zhang, Satish Chandra Jha, S M Iftekharul Alam, Marcin Spoczynski +5 more |
2025-07-15 |
| 12363205 |
Storage node recruitment in an information centric network |
Srikathyayani Srikanteswara, Marcin Spoczynski, Yi Zhang, Kshitij A. Doshi, Francesc Guim Bernat +6 more |
2025-07-15 |
| 12099481 |
Online schema change of range-partitioned index in a distributed storage system |
Krishnan Varadarajan, Jianwu Gao, Jegan Devaraju, Shane Mainali, Zichen Sun +6 more |
2024-09-24 |
| 12095724 |
Capability discovery in an information centric network |
Yi Zhang, Srikathyayani Srikanteswara, Nageen Himayat, Gabriel Arrobo Vidal |
2024-09-17 |
| 11816084 |
Staging anchor trees for improved concurrency and performance in page range index management |
Krishnan Varadarajan, Jegan Devaraju, Shane Mainali, Quan Zhang, Sridhar Srinivasan +4 more |
2023-11-14 |
| 11487734 |
Staging anchor trees for improved concurrency and performance in page range index management |
Krishnan Varadarajan, Jegan Devaraju, Shane Mainali, Quan Zhang, Sridhar Srinivasan +4 more |
2022-11-01 |
| 11249961 |
Online schema change of range-partitioned index in a distributed storage system |
Krishnan Varadarajan, Jianwu Gao, Jegan Devaraju, Shane Mainali, Zichen Sun +6 more |
2022-02-15 |
| 11228595 |
Evaluating security of data access statements |
Sheng Yan Sun |
2022-01-18 |
| 11005850 |
Access control for database |
Shuo Li, ShengYan Sun, Xin Ying Yang |
2021-05-11 |
| 10909074 |
File table index aggregate statistics |
Shane Mainali, Krishnan Varadarajan, Quan Zhang, Jegan Devaraju, Ziehen Sun +2 more |
2021-02-02 |
| 10693877 |
Evaluating security of data access statements |
Sheng Yan Sun |
2020-06-23 |
| 10242058 |
Access path optimization through system statistics |
Shuo Li, ShengYan Sun, Xin Ying Yang |
2019-03-26 |
| 10205730 |
Access control for database |
Shuo Li, ShengYan Sun, Xin Ying Yang |
2019-02-12 |
| 10169600 |
Encryption policies for various nodes of a file |
Shuo Li, ShengYan Sun, Jun Wang |
2019-01-01 |
| 10069848 |
Method and system for data security |
Hui Jiang, Shuo Li, ShengYan Sun |
2018-09-04 |
| 9930070 |
Modifying security policies of related resources |
Shuo Li, ShengYan Sun, Jun Wang |
2018-03-27 |
| 9760797 |
Protecting specific information |
Sheng Yan Sun, Jun Wang |
2017-09-12 |
| 9734203 |
Access path optimization through system statistics |
Shuo Li, ShengYan Sun, Xin Ying Yang |
2017-08-15 |
| 9703854 |
Determining criticality of a SQL statement |
Shuo Li, Sheng Yan Sun, Xin Ying Yang |
2017-07-11 |
| 9680830 |
Evaluating security of data access statements |
Sheng Yan Sun |
2017-06-13 |
| 9591358 |
Media playback workload scheduler |
Changliang Wang, Akshat Nanda, Yunbiao Lin |
2017-03-07 |
| 9547691 |
Access path optimization through system statistics |
Shuo Li, ShengYan Sun, Xin Ying Yang |
2017-01-17 |
| 9436735 |
Access path optimization through system statistics |
Shuo Li, ShengYan Sun, Xin Ying Yang |
2016-09-06 |