| 10754630 |
Build-time code section-specific compiler selection |
Michael T. Strosaker, George C. Wilson, Christy L. Norman |
2020-08-25 |
| 10540350 |
Source code search engine |
Fionnuala G. Gunter, Michael T. Strosaker, George C. Wilson |
2020-01-21 |
| 10095734 |
Source code search engine |
Fionnuala G. Gunter, Michael T. Strosaker, George C. Wilson |
2018-10-09 |
| 10042775 |
Virtual disk alignment access |
Robert C. Jennings, Jr., Joel H. Schopp, Michael T. Strosaker |
2018-08-07 |
| 9940259 |
Virtual disk alignment access |
Robert C. Jennings, Jr., Joel H. Schopp, Michael T. Strosaker |
2018-04-10 |
| 9934270 |
Source code search engine |
Fionnuala G. Gunter, Michael T. Strosaker, George C. Wilson |
2018-04-03 |
| 9852056 |
Multi-level memory compression |
Christopher J. Arges, Jeffrey George, Ryan P. Grimm, Joel H. Schopp, Michael T. Strosaker +1 more |
2017-12-26 |
| 9852055 |
Multi-level memory compression |
Christopher J. Arges, Jeffrey George, Ryan P. Grimm, Joel H. Schopp, Michael T. Strosaker +1 more |
2017-12-26 |
| 9817702 |
System resource management moderator protocol |
Manish Ahuja, Monty C. Poppe, Joel H. Schopp |
2017-11-14 |
| 9811556 |
Source code search engine |
Fionnuala G. Gunter, Michael T. Strosaker, George C. Wilson |
2017-11-07 |
| 9734078 |
Resetting memory locks in a transactional memory system |
Ryan P. Grimm, Robert C. Jennings, Jr., Joel H. Schopp, Michael T. Strosaker |
2017-08-15 |
| 9594559 |
Binary file for computer program having multiple executable code variants for a function that are executable on a same processor architecture |
Fionnuala G. Gunter, Michael T. Strosaker, George C. Wilson |
2017-03-14 |
| 9552223 |
Post-return asynchronous code execution |
Robert C. Jennings, Jr., Joel H. Schopp, Michael T. Strosaker, George C. Wilson |
2017-01-24 |
| 9524246 |
Resetting memory locks in a transactional memory system |
Ryan P. Grimm, Robert C. Jennings, Jr., Joel H. Schopp, Michael T. Strosaker |
2016-12-20 |
| 9513951 |
Maintaining hardware resource bandwidth quality-of-service via hardware counter |
Christopher J. Arges, Jeffrey George, Joel H. Schopp, Michael T. Strosaker, Mark Wayne VanderWiele |
2016-12-06 |
| 9378242 |
Source code search engine |
Fionnuala G. Gunter, Michael T. Strosaker, George C. Wilson |
2016-06-28 |
| 9201642 |
Extending platform trust during program updates |
Joel H. Schopp, Michael T. Strosaker, George C. Wilson |
2015-12-01 |
| 9183022 |
Maintaining hardware resource bandwidth quality-of-service via hardware counter |
Christopher J. Arges, Joel H. Schopp, Michael T. Strosaker, Jeffrey George, Mark Wayne VanderWiele |
2015-11-10 |
| 9183054 |
Maintaining hardware resource bandwidth quality-of-service via hardware counter |
Christopher J. Arges, Joel H. Schopp, Michael T. Strosaker, Jeffrey George, Mark Wayne VanderWiele |
2015-11-10 |
| 9172719 |
Intermediate trust state |
Jeffrey George, Ryan P. Grimm, Joel H. Schopp, Michael T. Strosaker, George C. Wilson |
2015-10-27 |
| 9053018 |
Compressed memory page selection based on a population count of a dataset |
Jeffrey George, Ryan P. Grimm, Joel H. Schopp, Michael T. Strosaker |
2015-06-09 |
| 8955070 |
Controlled password modification method and apparatus |
Jeffrey George, Ryan P. Grimm, Joel H. Schopp, Michael T. Strosker, George C. Wilson |
2015-02-10 |
| 8943131 |
Predictive collaboration management |
Jeffrey George, Michael T. Strosaker |
2015-01-27 |
| 8819654 |
Simultaneous compiler binary optimizations |
Michael T. Strosaker, Joel H. Schopp |
2014-08-26 |
| 8799908 |
Hardware-enabled lock mediation for controlling access to a contested resource |
Christopher J. Arges, Joel H. Schopp, Michael T. Strosaker |
2014-08-05 |