| 12413613 |
System and method of discovering external attack surface based on identification data |
Kunal Modasiya, Milind Kapre, Pablo M. Quiroga |
2025-09-09 |
| 9990243 |
Using spanning tree protocol to determine a layer 2 topology of an ethernet type network |
Sameer Padhye |
2018-06-05 |
| 9973390 |
Method of discovering network topology |
Abhinay Prabhakar Padhye, Abhishek Jain, Niranjan Deepak Nandrekar |
2018-05-15 |
| 9262158 |
Reverse engineering user interface mockups from working software |
Benjamin Amodio |
2016-02-16 |
| 7809567 |
Speech recognition application or server using iterative recognition constraints |
Yun-Cheng Ju, David Ollason |
2010-10-05 |
| 7636657 |
Method and apparatus for automatic grammar generation from data entries |
Yun-Cheng Ju, David Ollason |
2009-12-22 |
| 7624016 |
Method and apparatus for robustly locating user barge-ins in voice-activated command systems |
Yun-Cheng Ju, David Ollason |
2009-11-24 |
| 7623651 |
Context retention across multiple calls in a telephone interaction system |
Yun-Cheng Ju, David Ollason |
2009-11-24 |
| 7475017 |
Method and apparatus to improve name confirmation in voice-dialing systems |
Yun-Cheng Ju, Daniel Herron, David Ollason |
2009-01-06 |
| 7460999 |
Method and apparatus for executing tasks in voice-activated command systems |
Daniel Herron, David Ollason |
2008-12-02 |
| 7299181 |
Homonym processing in the context of voice-activated command systems |
Yun-Cheng Ju, David Ollason |
2007-11-20 |
| 7197494 |
Method and architecture for consolidated database search for input recognition systems |
Kuansan Wang, David Ollason |
2007-03-27 |
| 7181387 |
Homonym processing in the context of voice-activated command systems |
Yun-Cheng Ju, David Ollason |
2007-02-20 |
| 7133501 |
Method and apparatus for soliciting personal voice recordings for a voice-dialing system |
Daniel Herron, David Ollason |
2006-11-07 |