| 11620304 |
Example management for string transformation |
Sumit Gulwani, Ranvijay Kumar, Chairy Chiu Ying Cheung, Daniel Adam Perelman, Euan Peter Garden |
2023-04-04 |
| 11256710 |
String transformation sub-program suggestion |
Sumit Gulwani, Ranvijay Kumar, Abhishek Udupa, Craig Lee |
2022-02-22 |
| 10606665 |
Job scheduling and monitoring in a distributed computing environment |
Andrew J. Peacock, Cheryl Couris, Christina Storm, Amir Netz, Chiu Ying Cheung +6 more |
2020-03-31 |
| 9684546 |
Job scheduling and monitoring in a distributed computing environment |
Andrew J. Peacock, Cheryl Couris, Christina Storm, Amir Netz, Chiu Ying Cheung +6 more |
2017-06-20 |
| 8732667 |
Debugging services for domain specific languages |
David M. Miller, David Patrick Wolfe, Neil Alexander MacIntosh, Quetzalcoatl Bradley |
2014-05-20 |
| 8725776 |
Digests to identify elements in a signature process |
Vijay K. Gajjala, Vaithialingam B. Balayoghan, Tomasz Janczuk |
2014-05-13 |
| 8321833 |
Compact syntax for data scripting language |
David E. Langworthy, Bradford H. Lovering, Donald F. Box, Jeffrey S. Pinkston, Jeffrey C. Schlimmer +2 more |
2012-11-27 |
| 8302149 |
Virtual distributed security system |
Christopher G. Kaler, Scott A. Konersmann, Butler W. Lampson, Paul J. Leach, Bradford H. Lovering +4 more |
2012-10-30 |
| 8176085 |
Modular forest automata |
Steven Lucco |
2012-05-08 |
| 8086849 |
Secure internet-scale eventing |
Christopher G. Kaler, John P. Shewchuk, Luis Felipe Cabrera |
2011-12-27 |
| 8015204 |
Scoped access control metadata element |
Christopher G. Kaler, Elliot Waingold |
2011-09-06 |
| 7921216 |
System and method for building and using communication binding objects |
Craig A. Critchley, David Wortendyke, Elliot Waingold, Eric K. Zinda, Erik B. Christensen +9 more |
2011-04-05 |
| 7899047 |
Virtual network with adaptive dispatcher |
Luis Felipe Cabrera, Erik B. Christensen, Christopher G. Kaler, David Levin, Bradford H. Lovering +5 more |
2011-03-01 |
| 7873831 |
Digests to identify elements in a signature process |
Vijay K. Gajjala, Vaithialingam B. Balayoghan, Tomasz Janczuk |
2011-01-18 |
| 7860989 |
Efficient transformation of interchange format messages |
Vaithialingam B. Balayoghan, Douglas A. Walter |
2010-12-28 |
| 7809938 |
Virtual distributed security system |
Christopher G. Kaler, Scott A. Konersmann, Butler W. Lampson, Paul J. Leach, Bradford H. Lovering +4 more |
2010-10-05 |
| 7752431 |
Virtual distributed security system |
Christopher G. Kaler, Scott A. Konersmann, Butler W. Lampson, Paul J. Leach, Bradford H. Lovering +4 more |
2010-07-06 |
| 7752442 |
Virtual distributed security system |
Christopher G. Kaler, Scott A. Konersmann, Butler W. Lampson, Paul J. Leach, Bradford H. Lovering +4 more |
2010-07-06 |
| 7730094 |
Scoped access control metadata element |
Christopher G. Kaler, Elliot Waingold |
2010-06-01 |
| 7716728 |
Security scopes and profiles |
Vijay K. Gajjala, Tomasz Janczuk, John Lambert |
2010-05-11 |
| 7707637 |
Distributed threat management |
Christopher G. Kaler, John P. Shewchuk |
2010-04-27 |
| 7664023 |
Dynamic protocol construction |
David Levin, Erik B. Christensen, Saurab Nog, Donald F. Box, Christopher G. Kaler +2 more |
2010-02-16 |
| 7640573 |
Generic security claim processing model |
Vijay K. Gajjala, Tomasz Janczuk, John Lambert, Elliot Waingold |
2009-12-29 |
| 7636939 |
Endpoint identification and security |
Christopher G. Kaler, Douglas A. Walter, Melissa W. Dunn, Richard Hasha, Tomasz Janczuk |
2009-12-22 |
| 7627541 |
Transformation of modular finite state transducers |
Steven Lucco, David E. Langworthy |
2009-12-01 |