| 12204450 |
Dynamic cache resource allocation for quality of service and system power reduction |
Jia-Ming Chen, Chien-Yuan Lai, Ya-Ting Chang, Cheng-Tse Chen |
2025-01-21 |
| 11907396 |
Using policies to comply with a request from a person for data that pertains to a person |
Shivan Kaul Sahib, Marla Hay, Yvonne Zhou |
2024-02-20 |
| 11816090 |
Selectively processing an event published responsive to an operation on a database record that relates to consent |
Marla Hay, Yvonne Zhou, Shivan Kaul Sahib |
2023-11-14 |
| 11775520 |
Updating of a denormalized database object after updating, deleting, or inserting a record in a source database object |
Marla Hay, Yvonne Zhou, Michael Allan Friedman, Shivan Kaul Sahib |
2023-10-03 |
| 11216435 |
Techniques and architectures for managing privacy information and permissions queries across disparate database tables |
Marla Hay, Michael Allan Friedman, Yvonne Zhou, Shivan Kaul Sahib |
2022-01-04 |
| 11216460 |
Updating of a denormalized database object after updating, deleting, or inserting a record in a source database object |
Marla Hay, Yvonne Zhou, Michael Allan Friedman, Shivan Kaul Sahib |
2022-01-04 |
| 10783259 |
Method and apparatus for linked encryption tokenization of user traceable data |
William Charles Eidson, David C. Hacker, Michael Boilen, Shakti Das |
2020-09-22 |
| 10740475 |
Method and system for enabling log record consumers to comply with regulations and requirements regarding privacy and the handling of personal data |
William Charles Eidson, David C. Hacker, Hui Fung Herman Kwong, Wolfgang Krause |
2020-08-11 |
| 8417891 |
Shared cache memories for multi-core processors |
Wenlong Li, Changkyu Kim, Christopher J. Hughes, Yen-Kuang Chen |
2013-04-09 |
| 7116814 |
Image-based container defects detector |
Bor-Shenn Jeng, Quen-Zong Wu, Wei-Yuan Cheng |
2006-10-03 |
| 6321584 |
Method and machine for making folded fins for a heat sink |
Kuo Chuang Lin, Chao-Kun Tseng |
2001-11-27 |