Issued Patents All Time
Showing 25 most recent of 36 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12086705 | Compute optimization mechanism for deep neural networks | Amit Bleiweiss, Abhishek Venkatesh, Gokce Keskin, John G. Gierach, Oguz H. Elibol +9 more | 2024-09-10 |
| 12056906 | Compression of machine learning models utilizing pseudo-labeled data training | Joydeep Ray, Ben J. Ashbaugh, Prasoonkumar Surti, Pradeep Ramani, Rama Harihara +14 more | 2024-08-06 |
| 11798198 | Dynamic assignment of down sampling intervals for data stream processing | Joydeep Ray, Ben J. Ashbaugh, Prasoonkumar Surti, Pradeep Ramani, Rama Harihara +14 more | 2023-10-24 |
| 11636319 | Iterative normalization for machine learning applications | Gokce Keskin, Oguz H. Elibol | 2023-04-25 |
| 11557064 | Policy-based system interface for a real-time autonomous system | Joydeep Ray, Ben Ashbaugh, Prasoonkumar Surti, Pradeep Ramani, Rama Harihara +14 more | 2023-01-17 |
| 10546393 | Compression in machine learning and deep learning processing | Joydeep Ray, Ben J. Ashbaugh, Prasoonkumar Surti, Pradeep Ramani, Rama Harihara +14 more | 2020-01-28 |
| 9898603 | Offline extraction of configuration data | Hui Dai, Catalin D. Sandu | 2018-02-20 |
| 9785470 | Memory management model and interface for unmodified applications | Jeremiah C. Spradlin, Galen C. Hunt, Steven Maillet | 2017-10-10 |
| 9436826 | Discovering malicious input files and performing automatic and distributed remediation | Vishal Kapoor, Jonathan M. Keller, Ajith Kuttannair Kumar, Adrian Marinescu, Marc E. Seinfeld +3 more | 2016-09-06 |
| 9262423 | Large scale file storage in cloud computing | Ronen Borshack, Erez Einav, Philip Taron | 2016-02-16 |
| 9043869 | Aggregating the knowledge base of computer systems to proactively protect a computer from malware | Michael Kramer, Mihai Costea, Efim Hudis, Pradeep Bahl, Rajesh Dadhia +1 more | 2015-05-26 |
| 8973135 | Selectively scanning objects for infection by malware | Adrian Marinescu, Ajith Kuttannair Kumar, Jonathan M. Keller, Omer Ben Bassat | 2015-03-03 |
| 8955133 | Applying antimalware logic without revealing the antimalware logic to adversaries | Ajith Kuttannair Kumar, Timothy Jon Fraser, Adrian Marinescu, Marc E. Seinfeld, Jack Wilson Stokes, III | 2015-02-10 |
| 8938618 | Device booting with an initial protection component | Mark F. Novak, Robert Karl Spiger, Stefan Thom, David J. Linsley, Scott A. Field | 2015-01-20 |
| 8799190 | Graph-based malware classification based on file relationships | Jack Wilson Stokes, III, Nikos Karampatziakis, John C. Platt, Adrian Marinescu | 2014-08-05 |
| 8667175 | Server selection for routing content to a client using application layer redirection | Mahesh Viveganandhan, Dipak Punnoran Koroth | 2014-03-04 |
| 8626875 | Stream server selection based on feedback information from a client | Mahesh Viveganandhan, Dipak Punnoran Koroth | 2014-01-07 |
| 8621628 | Protecting user mode processes from improper tampering or termination | Eli Zeitlin, Arnon Axelrod, Kanwaljit Marok | 2013-12-31 |
| 8516583 | Aggregating the knowledge base of computer systems to proactively protect a computer from malware | Michael Kramer, Mihai Costea, Efim Hudis, Pradeep Bahl, Rajesh Dadhia +1 more | 2013-08-20 |
| 8417962 | Device booting with an initial protection component | Mark F. Novak, Robert Karl Spiger, Stefan Thom, David J. Linsley, Scott A. Field | 2013-04-09 |
| 8381300 | Offline extraction of configuration data | Hui Dai, Catalin D. Sandu | 2013-02-19 |
| 8261312 | Linear hint video streaming | Jiang Zhu, Kaichuan He, Dipak Punnoran Koroth, Jonathan L. Lemon, Xi Xu | 2012-09-04 |
| 8230468 | Dynamically creating trick files to hide latency in streaming networks | Glenn Connery | 2012-07-24 |
| 8194149 | Infrared-aided depth estimation | Indu Mahadevan | 2012-06-05 |
| 8161557 | System and method of caching decisions on when to scan for malware | Mihai Costea, Adrian Marinescu | 2012-04-17 |