Issued Patents All Time
Showing 51–75 of 113 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 10144617 | Adjusting aspects of a moving platform | Quang C. Duong, Jenny S. Li, Min Li, Theresa Tai | 2018-12-04 |
| 10069756 | Extensible support system for service offerings | Murthy V. Devarakonda, Michael R. Head, Rafah A. Hosn, Andrzej Kochut, Jonathan Paul Munson +1 more | 2018-09-04 |
| 10028216 | Data transceiving method, modem, and terminal device | Konggang Wei, Yu Peng | 2018-07-17 |
| 9934061 | Black box techniques for detecting performance and availability issues in virtual machines | Ruchi Mahindru, Cuong Manh Pham, HariGovind V. Ramasamy, Soumitra Sarkar, Mahesh Viswanathan +1 more | 2018-04-03 |
| 9916377 | Log-aided automatic query expansion approach based on topic modeling | Russell W. Bergs, Kaoutar El Maghraoui, Matthew R. Koozer, HariGovind V. Ramasamy, Soumitra Sarkar +1 more | 2018-03-13 |
| 9906599 | Ontology based resource provisioning and management for services | Murthy V. Devarakonda, Michael R. Head, Rafah A. Hosn, Andrzej Kochut, Jonathan Paul Munson +1 more | 2018-02-27 |
| 9907025 | Data sending method, apparatus and system | Chengdong Yu, Konggang Wei | 2018-02-27 |
| 9875265 | Database table format conversion based on user data access patterns in a networked computing environment | Lisa Seacat DeLuca, Jenny S. Li, Liangzhao Zeng | 2018-01-23 |
| 9838509 | Data processing method and apparatus | Yue Zhang, Yu Peng | 2017-12-05 |
| 9798885 | Security policy generation based on snapshots of similar virtual machines | Ruchi Mahindru, HariGovind V. Ramasamy, Lakshminarayanan Renganarayana, Soumitra Sarkar, Long Wang | 2017-10-24 |
| 9762606 | Image vulnerability repair in a networked computing environment | Al Chakra, Christopher J. Dawson, Rick A. Hamilton, II, Jenny S. Li, Liangzhao Zeng | 2017-09-12 |
| 9753826 | Providing fault injection to cloud-provisioned machines | Ruchi Mahindru, Anca Sailer, Soumitra Sarkar, Long Wang | 2017-09-05 |
| 9749864 | Controlling mobile device access with a paired device | Jenny S. Li, Theresa Tai, Liangzhao Zeng | 2017-08-29 |
| 9740789 | Search engine analytics and optimization for media content in social networks | Jenny S. Li, Liangzhao Zeng | 2017-08-22 |
| 9710563 | Search engine analytics and optimization for media content in social networks | Jenny S. Li, Liangzhao Zeng | 2017-07-18 |
| 9667510 | Extensible support system for service offerings | Murthy V. Devarakonda, Michael R. Head, Rafah A. Hosn, Andrzej Kochut, Jonathan Paul Munson +1 more | 2017-05-30 |
| 9655047 | Reducing power consumption of a wireless terminal | Konggang Wei | 2017-05-16 |
| 9641618 | Ontology based resource provisioning and management for services | Murthy V. Devarakonda, Michael R. Head, Rafah A. Hosn, Andrzej Kochut, Jonathan Paul Munson +1 more | 2017-05-02 |
| 9589229 | Dynamic model-based analysis of data centers | Rafah A. Hosn, Ruchi Mahindru, HariGovind V. Ramasamy, Soumitra Sarkar | 2017-03-07 |
| 9568989 | Method for acting as service agent, modem, and terminal by establishing a heartbeat connection with an application server | Yu Peng, Qilin Li | 2017-02-14 |
| 9563777 | Security policy generation based on snapshots of similar virtual machines | Ruchi Mahindru, HariGovind V. Ramasamy, Lakshminarayanan Renganarayana, Soumitra Sarkar, Long Wang | 2017-02-07 |
| 9544380 | Data analytics and security in social networks | Jenny S. Li, Liangzhao Zeng | 2017-01-10 |
| 9529893 | Search engine analytics and optimization for media content in social networks | Jenny S. Li, Liangzhao Zeng | 2016-12-27 |
| 9497209 | Image vulnerability repair in a networked computing environment | Al Chakra, Christopher J. Dawson, Rick A. Hamilton, II, Jenny S. Li, Liangzhao Zeng | 2016-11-15 |
| 9497707 | Data sending method, device and system | Jiang Wan | 2016-11-15 |