| 11431727 |
Security of code between code generator and compiler |
Gabriel Alexandru Ghiondea, Jeremy Scott Barton, Barry Dorrans |
2022-08-30 |
| 11033813 |
Latency erasure |
Shawn Farkas |
2021-06-15 |
| 10931463 |
Cryptographic verification of a compressed archive |
Jeremy Scott Barton, Levi P. Broderick |
2021-02-23 |
| 10521208 |
Differentiated static analysis for dynamic code optimization |
David Charles Wrighton, Mei-Chin Tsai, Shah Mohammad Faizur Rahman, Yi Zhang, Ian M. Bearman +3 more |
2019-12-31 |
| 10241784 |
Hierarchical directives-based management of runtime behaviors |
John Lawrence Hamby, David Charles Wrighton, Michal Strehovsky, Fadi M. Hanna, Turgut Isik +3 more |
2019-03-26 |
| 9600272 |
Hierarchical directives-based management of runtime behaviors |
John Lawrence Hamby, David Charles Wrighton, Michal Strehovsky, Fadi M. Hanna, Turgut Isik +3 more |
2017-03-21 |
| 9389890 |
Hierarchical directives-based management of runtime behaviors |
John Lawrence Hamby, David Charles Wrighton, Michal Strehovsky, Fadi M. Hanna, Turgut Isik +3 more |
2016-07-12 |
| 9379946 |
Model-based virtual networking |
Anatoliy Panasyuk, Dharshan Rangegowda, Ram Viswanathan, Anthony S. Chavez, Jiazhen Chen +2 more |
2016-06-28 |
| 8819801 |
Secure machine enrollment in multi-tenant subscription environment |
Murali Sangubhatla, Dharshan Rangegowda, Jiazhen Chen, Anthony S. Chavez |
2014-08-26 |