Issued Patents All Time
Showing 26–50 of 73 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 8938388 | Maintaining and supplying speech models | Bin Jia, E. Feng Lu, Jia Wu, Zhen Zhang | 2015-01-20 |
| 8832673 | Non-intrusively adapting existing portfolio optimizer for valuated dependencies | Fan Jing Meng, Dharmashankar Subramanian, Clay E. Williams, Shun Xiang Yang, Xin Zhou | 2014-09-09 |
| 8661291 | Diagnosing a fault incident in a data center | Xin Li, Ying Li, Tian Cheng Liu | 2014-02-25 |
| 8495524 | Gradient-based search mechanism for optimizing photolithograph masks | Sani R. Nassif, Xiaokang Shi | 2013-07-23 |
| 8495523 | Gradient-based search mechanism for optimizing photolithograph masks | Sani R. Nassif, Xiaokang Shi | 2013-07-23 |
| 8484212 | Providing reconstructed data based on stored aggregate data in response to queries for unavailable data | Shahrokh Sadjadi | 2013-07-09 |
| 8473872 | Gradient-based search mechanism for optimizing photolithograph masks | Sani R. Nassif, Xiaokang Shi | 2013-06-25 |
| 8458620 | Gradient-based search mechanism for optimizing photolithograph masks | Sani R. Nassif, Xiaokang Shi | 2013-06-04 |
| 8453074 | Gradient based search mechanism for optimizing photolithograph masks | Sani R. Nassif, Xiaokang Shi | 2013-05-28 |
| 8448098 | Fracturing continuous photolithography masks | David O. Melville, Alan E. Rosenbluth, Kehan Tian | 2013-05-21 |
| 8407632 | Detecting dose and focus variations during photolithography | Ibrahim M. Elfadel, Stanislav Polonsky, Amith Singhee | 2013-03-26 |
| 8365242 | Method and apparatus for confidential knowledge protection in software system development | Zhen Zhong Huo, Hui Su, Xin Zhou, Jun Zhu | 2013-01-29 |
| 8336008 | Characterization of long range variability | James A. Culp, Jerry D. Hayes, Anthony D. Polson | 2012-12-18 |
| 8327317 | Method and apparatus for providing project development environment and project development system | Shao Chun Li, Wei Zhao, Jun Zhu | 2012-12-04 |
| 8290760 | Charge-based circuit analysis | Emrah Acar, Bhavna Agrawal, Peter Feldmann, Steven G. Walker | 2012-10-16 |
| 8266556 | Fracturing continuous photolithography masks | David O. Melville, Alan E. Rosenbluth, Kehan Tian | 2012-09-11 |
| 8266580 | Editing, creating, and verifying reorganization of flowchart, and transforming between flowchart and tree diagram | Jian Wang, Jun Zhu, Sheng Ye, Jing Li, Hai Oi Liang +1 more | 2012-09-11 |
| 8245159 | Gradient based search mechanism for optimizing photolithograph masks | Sani R. Nassif, Xiaokang Shi | 2012-08-14 |
| 8217671 | Parallel array architecture for constant current electro-migration stress testing | Kanak B. Agarwal, Peter A. Habitz, Jerry D. Hayes, Deborah M. Massey, Alvin W. Strong | 2012-07-10 |
| 8208481 | Determination of packet loss locations | John Ellis | 2012-06-26 |
| 8056049 | Method and system for analyzing and presenting conflicts in model transformation and automatically reconciling model transformation | Xin Xin Bai, Jian Wang, Xin Zhou, Jun Zhu | 2011-11-08 |
| 7925661 | Method and system for information processing using meta-archives | Scott J. Broussard, Eduardo N. Spring | 2011-04-12 |
| 7886312 | Communicating with remote objects in a data processing network | Scott J. Broussard, Eduardo N. Spring | 2011-02-08 |
| 7885798 | Closed-loop modeling of gate leakage for fast simulators | Rajiv V. Joshi, Rouwaida N. Kanj, Sani R. Nassif, Jayakumaran Sivagnaname | 2011-02-08 |
| 7853549 | Method for rule compliance situation checking and related checking system | Ying Huang, Haiqi Liang, Birgit M. Pfitzmann, Jian Wang, Xin Zhou +1 more | 2010-12-14 |
