| 12395418 |
Network verification systems and methods |
Ryan Andrew Beckett, Neha Milind Raje, Jitendra D. Padhye, Christopher Scott Johnston, Steven Jeffrey Benaloh +8 more |
2025-08-19 |
| 12199863 |
Ghost routing |
Jitendra D. Padhye, Wei Bai, Rachee Singh, Ryan Andrew Beckett, Sarah Elisabeth MCCLURE +3 more |
2025-01-14 |
| 11824727 |
Network configuration verification in computing systems |
Ryan Andrew Beckett, Nikolaj S. Bjorner |
2023-11-21 |
| 11652742 |
Ghost routing |
Jitendra D. Padhye, Wei Bai, Rachee Singh, Ryan Andrew Beckett, Sarah Elisabeth MCCLURE +3 more |
2023-05-16 |
| 11516088 |
Network configuration verification in computing systems |
Ryan Andrew Beckett, Nikolaj S. Bjorner |
2022-11-29 |
| 11121934 |
Network verification systems and methods |
Ryan Andrew Beckett, Neha Milind Raje, Jitendra D. Padhye, Christopher Scott Johnston, Steven Jeffrey Benaloh +8 more |
2021-09-14 |
| 10333794 |
Validating routing tables of routing devices |
Nikolaj S. Bjorner, Geoffrey Outhred |
2019-06-25 |
| 9900222 |
Validating routing tables of routing devices |
Nikolaj S. Bjorner, Geoffrey Outhred |
2018-02-20 |
| 9467473 |
System and method for compact form exhaustive analysis of security policies |
Charles W. Kaufman, Nikolaj S. Bjorner |
2016-10-11 |