MP

Marco Pistoia

IBM: 280 patents #86 of 70,183Top 1%
JPMorgan Chase: 16 patents #23 of 3,768Top 1%
Globalfoundries: 2 patents #1,397 of 4,424Top 35%
GU Globalfoundries U.S.: 1 patents #22 of 211Top 15%
📍 Carrollton, TX: #1 of 1,041 inventorsTop 1%
🗺 Texas: #28 of 125,132 inventorsTop 1%
Overall (All Time): #1,312 of 4,157,543Top 1%
299
Patents All Time

Issued Patents All Time

Showing 276–299 of 299 patents

Patent #TitleCo-InventorsDate
8473899 Automatic optimization of string allocations in a computer program Paolina Centonze, Mohammed Mostafa, Takaaki Tateishi 2013-06-25
8468605 Identifying security vulnerability in computer software Yinnon A. Haviv, Roee Hay, Adi Sharabani, Takaaki Tateishi, Omer Tripp +1 more 2013-06-18
8453125 Generating inputs for client-server programs for fault-detection and localization Shay Artzi, Julian Timothy Dolby, Frank Tip 2013-05-28
8434070 Generating specifications of client-server applications for static analysis Shay Artzi, Ryan Berg, John Peyton, Manu Sridharan, Robert Wiener 2013-04-30
8387018 Fault localization using directed test generation Shay Artzi, Julian Timothy Dolby, Frank Tip 2013-02-26
8387111 Type independent permission based access control Lawrence Koved, Anthony Joseph Nadalin, Nataraj Nagaratnam, Bruce Arland Rich 2013-02-26
8381199 Modular and/or demand-driven string analysis of a computer program Takaaki Tateishi, Omer Tripp 2013-02-19
8381242 Static analysis for verification of software program access to secure resources for computer systems Ryan Berg, Paolina Centonze, Omer Tripp 2013-02-19
8375371 Importance-based call graph construction Stephen Fink, Yinnon A. Haviv, Omer Tripp, Omri Weisman 2013-02-12
8365280 System, method, and program for determining validity of string Yinnon A. Haviv, Naoshi Tabuchi, Takaaki Tateishi 2013-01-29
8365281 Determining whether method of computer program is a validator Takaaki Tateishi, Omer Tripp, Ryan Berg, Robert Wiener 2013-01-29
8332939 System and method for the automatic identification of subject-executed code and subject-granted access rights Paolina Centonze 2012-12-11
8296722 Crawling of object model using transformation graph Sachiko Yoshihama, Shinya Kawanaka, Takaaki Tateishi, Ory Segal, Adi Sharabani +1 more 2012-10-23
8230477 System and method for the automatic evaluation of existing security policies and automatic creation of new security policies Paolina Centonze 2012-07-24
8006233 System and method for the automatic verification of privilege-asserting and subject-executed code Paolina Centonze 2011-08-23
7877812 Method, system and computer program product for enforcing privacy policies Lawrence Koved 2011-01-25
7827613 System and method for supporting digital rights management in an enhanced Java™ 2 runtime environment Lawrence Koved, Magda M. Mourad, Jonathan Paul Munson, Giovanni Pacifici, Alaa S. Youssef 2010-11-02
7810135 Apparatus for adopting authorizations Lawrence Koved, Anthony Joseph Nadalin 2010-10-05
7496757 Software verification system, method and computer program element Paul Abbott, Lawrence Koved, Anthony Joseph Nadalin 2009-02-24
7343620 Method and apparatus for adopting authorizations Lawrence Koved, Anthony Joseph Nadalin 2008-03-11
7308717 System and method for supporting digital rights management in an enhanced Java™ 2 runtime environment Lawrence Koved, Magda M. Mourad, Jonathan Paul Munson, Giovanni Pacifici, Alaa S. Youssef 2007-12-11
7237236 Method and apparatus for automatically determining optimum placement of privileged code locations in existing code Aaron Kershenbaum, Lawrence Koved, Anthony Joseph Nadalin 2007-06-26
7171558 Transparent digital rights management for extendible content viewers Magda M. Mourad, Jonathan Paul Munson, Tamer Nadeem, Giovanni Pacifici, Alaa S. Youssef 2007-01-30
7076804 Automated program resource identification and association Aaron Kershenbaum, Lawrence Koved 2006-07-11