| 12380118 |
Generating personalized user recommendations using word vectors |
Ashish Gupta |
2025-08-05 |
| 12250302 |
Quantum cryptography in an internet key exchange procedure |
Aswin Surendran, Priyabrata Saha |
2025-03-11 |
| 12052223 |
Maintaining internet protocol security tunnels |
Naresh Chand |
2024-07-30 |
| 11915819 |
Methods and systems for multi-omic interventions |
Shreyas V. Kumbhare, Inti Pedroso, Daniel Almonacid |
2024-02-27 |
| 11791994 |
Quantum cryptography in an internet key exchange procedure |
Priyabrata Saha, Aswin Surendran |
2023-10-17 |
| 11405422 |
Transmitting multiple copies of an encrypted packet via multiple tunnels between a transmitting network device and a receiving network device |
Sarvesh K. Batta, Goutham Kondapavuluru, Rajesh S |
2022-08-02 |
| 11176145 |
Generating personalized user recommendations using word vectors |
Ashish Gupta |
2021-11-16 |
| 10999253 |
Maintaining internet protocol security tunnels |
Naresh Chand |
2021-05-04 |
| 10031976 |
Personalization platform |
Charles Bracher, Matthias Spycher |
2018-07-24 |
| 9699049 |
Predictive model for anomaly detection and feedback-based scheduling |
Chaitali Gupta, Mayank Bansal, Tzu-Cheng Chuang, Sami Ben-Romdhane |
2017-07-04 |