Issued Patents All Time
Showing 26–50 of 91 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 8838908 | Using ephemeral stores for fine-grained conflict detection in a hardware accelerated STM | Bratin Saha, Ali-Reza Adl-Tabatabai, Quinn A. Jacobson | 2014-09-16 |
| 8812796 | Private memory regions and coherence optimizations | Jan Gray, David Callahan, Burton Smith, Ali-Reza Adl-Tabatabai | 2014-08-19 |
| 8812792 | Technique for using memory attributes | Quinn A. Jacobson, Anne W. Bracy, Hong Wang, John Shen, Per Hammarlund +6 more | 2014-08-19 |
| 8806101 | Metaphysical address space for holding lossy metadata in hardware | Shlomo Raikin, Vadim Bassin, Raanan Sade, Ehud Cohen, Oleg Margulis | 2014-08-12 |
| 8799582 | Extending cache coherency protocols to support locally buffered data | Shlomo Raikin, Vadim Bassin, Raanan Sade, Ehud Cohen, Oleg Margulis | 2014-08-05 |
| 8769212 | Memory model for hardware attributes within a transactional memory system | Shlomo Raikin, Vadim Bassin, Ehud Cohen, Oleg Margulis | 2014-07-01 |
| 8719514 | Software filtering in a transactional memory system | Ali-Reza Adl-Tabatabai, David Callahan, Jan Gray, Vinod Grover, Bratin Saha | 2014-05-06 |
| 8688951 | Operating system virtual memory management for hardware transactional memory | Koichi Yamada, Ali-Reza Adl-Tabatabai, Landy Wang, Martin Taillefer, Arun U. Kishan +3 more | 2014-04-01 |
| 8688917 | Read and write monitoring attributes in transactional memory (TM) systems | Shlomo Raikin, Vadim Bassin, Raanan Sade, Ehud Cohen, Oleg Margulis | 2014-04-01 |
| 8627017 | Read and write monitoring attributes in transactional memory (TM) systems | Shlomo Raikin, Vadim Bassin, Raanan Sade, Ehud Cohen, Oleg Margulis | 2014-01-07 |
| 8627014 | Memory model for hardware attributes within a transactional memory system | Shlomo Raikin, Vadim Bassin, Ehud Cohen, Oleg Margulis | 2014-01-07 |
| 8560781 | Technique for using memory attributes | Quinn A. Jacobson, Anne W. Bracy, Hong Wang, John Shen, Per Hammarlund +6 more | 2013-10-15 |
| 8539465 | Accelerating unbounded memory transactions using nested cache resident transactions | Yosseff Levanoni, Ali-Reza Adl-Tabatabai | 2013-09-17 |
| 8521995 | Handling operating system (OS) transitions in an unbounded transactional memory (UTM) mode | Koichi Yamada, Jan Gray, Landy Wang, Martin Taillefer, Arun U. Kishan +2 more | 2013-08-27 |
| 8516201 | Protecting private data from cache attacks | Shlomo Raikin, Shay Gueron | 2013-08-20 |
| 8489864 | Performing escape actions in transactions | Jan Gray, Martin Taillefer, Ali-Reza Adl-Tabatabai, Bratin Saha, Vadim Bassin +2 more | 2013-07-16 |
| 8473921 | Debugging mechanisms in a cache-based memory isolation system | Martin Taillefer, Ali-Reza Adl-Tabatabai, Peter Lachner, Richard Wurdack, Darek Mihocka +1 more | 2013-06-25 |
| 8407425 | Obscuring memory access patterns in conjunction with deadlock detection or avoidance | Shay Gueron, Shlomo Raikin | 2013-03-26 |
| 8402218 | Efficient garbage collection and exception handling in a hardware accelerated transactional memory system | Jan Gray, Martin Taillefer, Yosseff Levanoni, Ali-Reza Adl-Tabatabai, Dave Detlefs +2 more | 2013-03-19 |
| 8392929 | Leveraging memory isolation hardware technology to efficiently detect race conditions | Martin Taillefer | 2013-03-05 |
| 8370577 | Metaphysically addressed cache metadata | David Callahan, Jan Gray, Ali-Reza Adl-Tabatabai, Shlomo Raikin | 2013-02-05 |
| 8365016 | Performing mode switching in an unbounded transactional memory (UTM) system | Jan Gray, Martin Taillefer, Yossi Levanoni, Ali-Reza Adl-Tabatabai, Dave Detlefs +5 more | 2013-01-29 |
| 8359433 | Method and system of handling non-aligned memory accesses | — | 2013-01-22 |
| 8356166 | Minimizing code duplication in an unbounded transactional memory system by using mode agnostic transactional read and write barriers | Ali-Reza Adl-Tabatabai, Bratin Saha, Vadim Bassin, Robert Geva, Martin Taillefer +3 more | 2013-01-15 |
| 8341356 | Protected cache architecture and secure programming paradigm to protect applications | Shlomo Raikin, Shay Gueron | 2012-12-25 |