| 12353595 |
Secure and private hyper-personalization system and method |
Debasish Mukhopadhyay, Bryston Nitta |
2025-07-08 |
| 11960907 |
Configuring an electronic device using artificial intelligence |
Bryston Nitta, Shayak Lahiri, Adrian Francisco Teran Guajardo |
2024-04-16 |
| 11928752 |
Allocation of dynamically batched service providers and service requesters |
Kong-Wei LYE, Yang Cao, Swara DESAI, Xiaojia Mu, Yuliang Shen +4 more |
2024-03-12 |
| 11568081 |
Secure and private hyper-personalization system and method |
Debasish Mukhopadhyay, Bryston Nitta |
2023-01-31 |
| 11494200 |
Configuring an electronic device using artificial intelligence |
Bryston Nitta, Shayak Lahiri, Adrian Francisco Teran Guajardo |
2022-11-08 |
| 11488276 |
Allocation of dynamically batched service providers and service requesters |
Kong-Wei LYE, Yang Cao, Swara DESAI, Xiaojia Mu, Yuliang Shen +4 more |
2022-11-01 |
| 11348043 |
Collective-aware task distribution manager using a computer |
Jeremy R. Fox, Kelley Anders, Andrew Charles Whiriskey |
2022-05-31 |
| 10839069 |
Protecting artificial intelligence models using virtual secure mode |
Wenbo Shen, Bryston Nitta, Adrian Francisco Teran Guajardo |
2020-11-17 |
| 10747520 |
Resource deployment using device analytics |
Marc Shepard, Marc-Andrea Klimaschewski, Ramasubramanian Shastri, Hung M. Dang, Bryston Nitta +1 more |
2020-08-18 |
| 9003184 |
Computing device and method for protecting software of the computing device |
Chui-Wen Chiu |
2015-04-07 |