| 10853329 |
Distributed file system |
Eno Thereska, James W. Scott, Richard Harper |
2020-12-01 |
| 9723028 |
Distributed file system |
Eno Thereska, James W. Scott, Richard Harper |
2017-08-01 |
| 9401832 |
Long-range nodes with adaptive preambles for coexistence |
Bo{hacek over (z)}idar Radunović, Ranveer Chandra |
2016-07-26 |
| 9385848 |
Short-range nodes with adaptive preambles for coexistence |
Bo{hacek over (z)}idar Radunović, Ranveer Chandra |
2016-07-05 |
| 9384199 |
Distributed file system |
Eno Thereska, James W. Scott, Richard Harper |
2016-07-05 |
| 8886731 |
Decentralized relaying algorithm for mobile devices |
Thomas Karagiannis, Alexandre Proutiere, Milan Vojnovic |
2014-11-11 |
| 8830792 |
Mobile device localization using audio signals |
Stuart Taylor, Timothy Regan, Philip Gosset, Eno Thereska |
2014-09-09 |
| 8743822 |
Dynamic channel and transmission rate selection |
Peter B. Key, Alexandre Proutiere, Bozidar Radunovic |
2014-06-03 |
| 8656454 |
Data store including a file location attribute |
Richard Harper, Eno Thereska |
2014-02-18 |
| 8422444 |
Dynamic channel and transmission rate selection |
Peter B. Key, Alexandre Proutiere, Bozidar Radunovic |
2013-04-16 |
| 8387144 |
Network amplification attack mitigation |
— |
2013-02-26 |
| 8340099 |
Control of background data transfers |
Richard John Black, Peter B. Key, Gregory O'Shea |
2012-12-25 |
| 8302166 |
Associating network devices with users |
Shobana Balakrishnan, Mudit Goel, Dave Maltz, Michael Schroeder, Fan Yang |
2012-10-30 |
| 8045463 |
Path estimation in a wireless mesh network |
Bozidar Radunovic, Christos Gkantsidis, Peter B. Key |
2011-10-25 |
| 8031744 |
Full-duplex wireless communications |
Bozidar Radunovic, Nikhil Kumar SINGH, Alexandre Proutiere, Peter B. Key |
2011-10-04 |
| 7966661 |
Network amplification attack mitigation |
— |
2011-06-21 |
| 7912003 |
Multipath forwarding algorithms using network coding |
Bozidar Radunovic, Christos Gkantsidis, Peter B. Key, Wenjun Hu, Pablo Rodriguez |
2011-03-22 |
| 7689686 |
Active probing for sustainable capacity estimation of networked dataflows |
Laurent Massoulie, Peter B. Key |
2010-03-30 |
| 7685200 |
Ranking and suggesting candidate objects |
Milan Vojnovic, Richard James Cruise, Peter Marbach |
2010-03-23 |
| 7649841 |
Competitive and considerate congestion control |
Shao Liu, Laurent Massoulie, Milan Vojnovic, Peter B. Key |
2010-01-19 |
| 7617538 |
Configuration information protection using cost based analysis |
Austin Donnelly, Alf Zugenmaier, Jacob Scott |
2009-11-10 |
| 7603706 |
System security using human authorization |
Austin Donnelly, Alf Zugenmaier, Jacob Scott |
2009-10-13 |
| 7225267 |
Reactive bandwidth control for streaming data |
Peter B. Key, Laurent Massoulie |
2007-05-29 |