| 11615109 |
Efficient deserialization from standardized data files |
Siyang Xie |
2023-03-28 |
| 10614077 |
Computer system for automated assessment at scale of topic-specific social media impact |
Danny Lange, Hung-Chih Yang, Xiong Zhang, Graham A. Wheeler, Jason J. Joyce +1 more |
2020-04-07 |
| 9672255 |
Social media impact assessment |
Danny Lange, Hung-Chih Yang, Xiong Zhang, Graham A. Wheeler, Jason J. Joyce +1 more |
2017-06-06 |
| 9294576 |
Social media impact assessment |
Danny Lange, Hung-Chih Yang, Xiong Zhang, Graham A. Wheeler, Jason J. Joyce +1 more |
2016-03-22 |
| 9218136 |
Cloud scale directory services |
Jeffrey B. Parham, Mark R. Brown, Murli Satagopan |
2015-12-22 |
| 8972695 |
Automatic allocation of data replicas |
Jeffrey B. Parham, Mark R. Brown, Murli Satagopan |
2015-03-03 |
| 8645660 |
Automatic allocation of data replicas |
Jeffrey B. Parham, Mark R. Brown, Murli Satagopan |
2014-02-04 |
| 8595263 |
Processing identity constraints in a data store |
Bassam Tabbara, Jeffrey B. Parham, Edward S. Miller |
2013-11-26 |
| 8024796 |
System and method for storing events to enhance intrusion detection |
Maximilian Aigner |
2011-09-20 |
| 7900257 |
Enhanced computer intrusion detection methods and systems |
Praerit Garg, Richard B. Ward, Paul J. Leach, Scott A. Field, Robert P. Reichel +1 more |
2011-03-01 |
| 7757282 |
System and method for distinguishing safe and potentially unsafe data during runtime processing |
James Truher, Jeffrey P. Snover, Bruce G. Payette |
2010-07-13 |
| 7665074 |
Mechanism for converting text output into objects |
Bruce G. Payette, James Truher |
2010-02-16 |
| 7631341 |
Extensible security architecture for an interpretive environment |
James Truher, Jeffrey P. Snover |
2009-12-08 |
| 7624373 |
Security mechanism for interpreting scripts in an interpretive environment |
Bruce G. Payette, James Truher, Jeffrey P. Snover |
2009-11-24 |
| 7555708 |
Mechanism for converting text output into objects |
Bruce G. Payette, James Truher |
2009-06-30 |
| 7543333 |
Enhanced computer intrusion detection methods and systems |
Praerit Garg, Richard B. Ward, Paul J. Leach, Scott A. Field, Robert P. Reichel +1 more |
2009-06-02 |
| 7503038 |
System and method for seamlessly comparing objects |
Bradford Daniels, James Truher, Jeffrey P. Snover, Jonathan S. Newman |
2009-03-10 |
| 7458063 |
Method and apparatus for supporting functionality documentation |
— |
2008-11-25 |
| 7257719 |
System and method for storing events to enhance intrusion detection |
Maximilian Aigner |
2007-08-14 |
| 7248691 |
Hashing using multiple sub-hashes |
Robert P. Reichel, Jeffrey B. Hamblin, Kedarnath A. Dubhashi |
2007-07-24 |
| 7073074 |
System and method for storing events to enhance intrusion detection |
Maximilian Aigner |
2006-07-04 |