| 11620392 |
Sargable evaluation of queries submitted to an encrypted database |
James W. Pickel, Yao-Ching Chen, Jeffrey W. Josten, Nina Bronnikova, Sarbinder S. Kallar +1 more |
2023-04-04 |
| 11599510 |
Methods, systems, and computer readable mediums for performing metadata-driven data collection |
Venkatesh Madhipatla, Bayi Peng |
2023-03-07 |
| 11106639 |
Methods, systems, and computer readable mediums for performing metadata-driven data collection |
Venkatesh Madhipatla, Bayi Peng |
2021-08-31 |
| 11042650 |
Sargable query-predicate evaluation for encrypted databases |
James W. Pickel, Yao-Ching Chen, Jeffrey W. Josten, Nina Bronnikova, Sarbinder S. Kallar +1 more |
2021-06-22 |
| 10901854 |
Temporal logical transactions |
Yao-Ching Chen, Fung Fung Lee, Claire McFeely, Maryela E. Weihrauch |
2021-01-26 |
| 10896096 |
Temporal logical transactions |
Yao-Ching Chen, Fung Fung Lee, Claire McFeely, Maryela E. Weihrauch |
2021-01-19 |
| 10592498 |
Enforcing temporal referential integrity |
Yao-Ching Chen, Maryela E. Weihrauch |
2020-03-17 |
| 10521418 |
Enforcing temporal referential integrity |
Yao-Ching Chen, Maryela E. Weihrauch |
2019-12-31 |
| 10244080 |
Accessing multiple converged IT infrastructures |
Rajesh Nandyalam, Venkatesh Madhipatla, Bayi Peng |
2019-03-26 |
| 10216739 |
Row-based archiving in database accelerators |
Bjoern Broll, Ruiping Li, Knut Stolze |
2019-02-26 |
| 10079715 |
Methods, systems and computer readable mediums for performing metadata-driven data collection |
Rajesh Nandyalam, Venkatesh Madhipatla, Bayi Peng, Geoffrey David Bourne |
2018-09-18 |
| 9521052 |
Methods, systems, and computer readable mediums for utilizing application programming interfaces for accessing key performance indicator information |
Rajesh Nandyalam, Bayi Peng |
2016-12-13 |
| 9348867 |
Method for using multiple plans to achieve temporal and archive transparency performance |
Frank Siu Hong Chan, Yao-Ching Chen, Tammie Dang |
2016-05-24 |
| 9280646 |
Methods, systems, and computer readable mediums for role-based access control involving one or more converged infrastructure systems |
Rajesh Nandyalam, Venkatesh Madhipatla, Joshua P. Onffroy |
2016-03-08 |