| 9112645 |
Channel control based on error correction values |
Amer A. Hassan, Kun Tan, Jiansong Zhang |
2015-08-18 |
| 8826307 |
Extensible private driver interface |
Narasimha Rao S. S. Nagampalli, Alireza Dabagh, Alok Manchanda, Taroon Mandhana, Sharad Mittal +3 more |
2014-09-02 |
| 8307071 |
Fine-grained location determination of networked computers |
Austin Donnelly, Roy D. Kuntz, Gabriel E. Montenegro, Noor-E-Gagan Singh, Tim Moore |
2012-11-06 |
| 8301081 |
Physical and MAC adaptation for interference mitigation with cognitive radio |
Paramvir Bahl, Gopala Sri Hari Narlanka, Jitendra D. Padhye, Bozidar Radunovic, Ramachandran Ramjee +2 more |
2012-10-30 |
| 8295189 |
Interference detection |
Amer A. Hassan, Jiansong Zhang, Kun Tan |
2012-10-23 |
| 8051191 |
Ethernet extensibility |
Alok Manchanda, Taroon Mandhana, Noel W. Anderson, Sharad Mittal, Deon C. Brewis +2 more |
2011-11-01 |
| 7856655 |
System and method for improved network security |
Brian D. Swander |
2010-12-21 |
| 7778170 |
Spectrum and medium access allocation for fairness |
Paramvir Bahl, Miguel Oom Temudo de Castro, Gopala Sri Hari Narlanka, Jitendra D. Padhye, Bozidar Raduvic +2 more |
2010-08-17 |
| 7778422 |
Security associations for devices |
Trevor W. Freeman, Tim Moore |
2010-08-17 |
| 7743408 |
Secure association and management frame verification |
Timothy M. Moore |
2010-06-22 |
| 7647634 |
Managing access to a network |
Paul G. Mayfield |
2010-01-12 |
| 7636935 |
Method of enforcing a policy on a computer network |
Ashwin Palekar, Narendra C. Gidwani, Michel Guittet, Todd L. Paul, David L. Eitelbach +1 more |
2009-12-22 |
| 7636938 |
Controlling network access |
Paul G. Mayfield |
2009-12-22 |
| 7549048 |
Efficient and secure authentication of computing systems |
Trevor W. Freeman, Timothy M. Moore, Daniel R. Simon |
2009-06-16 |
| 7464265 |
Methods for iteratively deriving security keys for communications sessions |
Arun Ayyagari, Daniel R. Simon, Krishna Ganugapati, Timothy M. Moore, Pradeep Bahl |
2008-12-09 |
| 7394821 |
System and method for maintaining network system information |
Kenneth Lynn Crocker, Wei Jiang, Gurdeep S. Pall, Narendra C. Gidwani |
2008-07-01 |
| 7290132 |
Establishing secure peer networking in trust webs on open networks using shared secret device key |
Toby L. Nixon |
2007-10-30 |
| 7287276 |
Coordinated network initiator management that avoids security conflicts |
Alan Warwick |
2007-10-23 |
| 7284062 |
Increasing the level of automation when provisioning a computer system to access a network |
Anton Krantz, Timothy M. Moore, Dalen Abraham, Shai Guday, Pradeep Bahl |
2007-10-16 |
| 7082200 |
Establishing secure peer networking in trust webs on open networks using shared secret device key |
Toby L. Nixon |
2006-07-25 |
| 6941465 |
Method of enforcing a policy on a computer network |
Ashwin Palekar, Narendra C. Gidwani, Michel Guittet, Todd L. Paul, David L. Eitelbach +1 more |
2005-09-06 |
| 6915437 |
System and method for improved network security |
Brian D. Swander |
2005-07-05 |
| 6850528 |
System and method for maintaining network system information |
Kenneth Lynn Crocker, Wei Jiang, Gurdeep S. Pall, Narendra C. Gidwani |
2005-02-01 |