| 12001592 |
Protecting against resets by untrusted software during cryptographic operations |
Anuj Kumar RAO, Adam Hendrickson, Gobikrishna Dhanuskodi, Naveen Cherukuri |
2024-06-04 |
| 11966480 |
Fairly utilizing multiple contexts sharing cryptographic hardware |
Adam Hendrickson, Gobikrishna Dhanuskodi, Naveen Cherukuri, Wish Gandhi, Raymond Hoi Man Wong |
2024-04-23 |
| 11720440 |
Error containment for enabling local checkpoint and recovery |
Naveen Cherukuri, Saurabh Hukerikar, Paul Racunas, Nirmal Saxena, David Charles Patrick +10 more |
2023-08-08 |
| 11698869 |
Computing an authentication tag for partial transfers scheduled across multiple direct memory access (DMA) engines |
Naveen Cherukuri, Raymond Hoi Man Wong, Adam Hendrickson, Gobikrishna Dhanuskodi, Wish Gandhi |
2023-07-11 |
| 10571988 |
Methods and apparatus for clock gating processing modules based on hierarchy and workload |
Jeffrey G. Libby, David J. Ofelt |
2020-02-25 |
| 10474665 |
Systems and methods for generating blueprints for enterprises |
Sachin Sadashiv Jadhav, Maitreya Natu, Vaishali Paithankar Sadaphal, Harrick Mayank Vin, Rahul Ramesh Kelkar |
2019-11-12 |
| 10229416 |
Issue extraction based on ticket mining |
Vikrant Vikas Shimpi, Maitreya Natu, Vaishali Paithankar Sadaphal |
2019-03-12 |
| 9880603 |
Methods and apparatus for clock gating processing modules based on hierarchy and workload |
Jeffrey G. Libby, David J. Ofelt |
2018-01-30 |
| 9753524 |
Methods and apparatus for limiting a number of current changes while clock gating to manage power consumption of processor modules |
Jeffrey G. Libby, Mihir Wagh |
2017-09-05 |
| 9477257 |
Methods and apparatus for limiting a number of current changes while clock gating to manage power consumption of processor modules |
Jeffrey G. Libby, Mihir Wagh |
2016-10-25 |
| 6553502 |
Graphics user interface for power optimization diagnostics |
Linda L. Hurd |
2003-04-22 |