Issued Patents All Time
Showing 1–25 of 46 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11324665 | Medication intelligent device | Shu-Hui Hung, Wei-Hua Teng | 2022-05-10 |
| 11080281 | Graph-based searching for data stream | Xiao Xing Liang, Cheng Luo, Wayne B. Riley, Meng Hong Tsai, Qingyan Wang +2 more | 2021-08-03 |
| 11063815 | Building and fixing a dynamic application topology in a cloud based environment leveraging log file data | Geetha Adinarayan, Gandhi Sivakumar, Meng Hong Tsai | 2021-07-13 |
| 10901999 | Graph-based searching for data stream | Xiao Xing Liang, Cheng Luo, Wayne B. Riley, Meng Hong Tsai, Qingyan Wang +2 more | 2021-01-26 |
| 10489827 | Personalized marketing incentives based on historical information and mobility monitoring | Geetha Adinarayan, Gandhi Sivakumar, Meng Hong Tsai | 2019-11-26 |
| 10438245 | Personalized marketing incentives based on historical information and mobility monitoring | Geetha Adinarayan, Gandhi Sivakumar, Meng Hong Tsai | 2019-10-08 |
| 10387424 | Efficiency for real-time data processing | Lei He, Yang Liu, Cheng Luo, Meng Hong Tsai, Xi Ning Wang +1 more | 2019-08-20 |
| 10375542 | Data usage recommendation generator | Geetha Adinarayan, Gandhi Sivakumar, Meng Hong Tsai | 2019-08-06 |
| 10255167 | Analytically selecting which tests are to be executed in a continuous delivery process | Geetha Adinarayan, Gandhi Sivakumar, Meng Hong Tsai | 2019-04-09 |
| 10078578 | Analytically selecting which tests are to be executed in a continuous delivery process | Geetha Adinarayan, Gandhi Sivakumar, Meng Hong Tsai | 2018-09-18 |
| 10070285 | Data usage recommendation generator | Geetha Adinarayan, Gandhi Sivakumar, Meng Hong Tsai | 2018-09-04 |
| 10026283 | Multi-sensor intrusion detection system | Chih-Hsiung Liu, Yu Chen Zhou | 2018-07-17 |
| 9946578 | Managing the persistent data of a pre-installed application in an elastic virtual machine instance | Yun Huang, Xin Peng Liu, Xia Zhang | 2018-04-17 |
| 9736671 | Data usage recommendation generator | Geetha Adinarayan, Gandhi Sivakumar, Meng Hong Tsai | 2017-08-15 |
| 8738565 | Collecting data from data sources | Jonathan Cook, Randy A. Rendahl, David G. Robinson, Byron E. Todd, III | 2014-05-27 |
| 8676758 | Extending configuration management databases using generic datatypes | Jinfang Chen, Sushma Bharat Patel | 2014-03-18 |
| 8639720 | Data access method and configuration management database system | Peng Gao, Zhen Yang, Yue Yu | 2014-01-28 |
| 8620621 | Maintenance of intelligent assets | Xiao Hu | 2013-12-31 |
| 8146054 | Hybrid data object model | Ronald B. Baker, Jinfang Chen, Benjamin Nelson Jeffcoat, Sushma Bharat Patel | 2012-03-27 |
| 8112399 | Method and apparatus for configurable data aggregation in a data warehouse | Karen Buros, Jonathan Cook, Randy A. Rendahl, David G. Robinson | 2012-02-07 |
| 7949688 | Method of recording and backtracking business information model changes | John W. Sweitzer, Yi-Hsiu Wei | 2011-05-24 |
| 7822714 | Extending configuration management databases using generic datatypes | Jinfang Chen, Sushma Bharat Patel | 2010-10-26 |
| 7668857 | Meta-data tags used to describe data behaviors | Jonathan Cook, Randy A. Rendahl, David G. Robinson, Lorraine Phyllis Vassberg | 2010-02-23 |
| 7451147 | Flexible encryption scheme for GSO target passwords | I-Lung Kao | 2008-11-11 |
| 7016897 | Authentication referral search for LDAP | Reginal R. Hill | 2006-03-21 |