| 12344010 |
Multi-printhead end effector and associated system and method |
Shane E. Arthur, John Eric Miller, Matthew H. Mellin, Kjersta L. Larson-Smith, Anthony W. Baker +10 more |
2025-07-01 |
| 12042939 |
End effector compensation of a robotic system |
Luke C. Ingram, Anthony W. Baker |
2024-07-23 |
| 10377092 |
Verification of tow placement by a robot |
Anthony W. Baker, Christopher P Bellavia, Hugh L Taylor, Luke C. Ingram, Kenny P Bowers |
2019-08-13 |
| 10144183 |
Verification of tow placement by a robot |
Anthony W. Baker, Christopher P Bellavia, Hugh L Taylor, Luke C. Ingram, Kenny P Bowers |
2018-12-04 |
| 10018570 |
Combined surface inspection using multiple scanners |
Luke C. Ingram, Anthony W. Baker, Christopher P Bellavia |
2018-07-10 |
| 9644379 |
Elevated platform system including restraining systems and vision system |
Jonathan B. Vance, Al Salour, Douglas D. Trimble |
2017-05-09 |
| 9609004 |
Process level locality and specialization for threat detection in the dendritic cell algorithm |
Mark Handel, Douglas Alan Stuart, Hugh L Taylor |
2017-03-28 |
| 9595096 |
Composite inspection and structural check of multiple layers |
Arun Ayyagari, Jonathan B. Vance, David E. Corman, James W. Fonda, Roger W. Engelbart +1 more |
2017-03-14 |
| 9473525 |
Dynamic loading and configuation of threat detectors based on feedback from other nodes |
Mark Handel, Douglas Alan Stuart, Hugh L Taylor, Brett Michael Wilson |
2016-10-18 |
| 8949668 |
Methods and systems for use in identifying abnormal behavior in a control system including independent comparisons to user policies and an event correlation model |
Carl J. Hanks, Arun Ayyagari |
2015-02-03 |
| 8918540 |
Unmanned air vehicle interoperability agent |
David E. Corman, Thomas Herm, Eric Martens, James Louis Paunicka |
2014-12-23 |
| 7953110 |
TCP/IP tunneling protocol for link 16 |
David E. Corman, Thomas Herm, Eric Martens |
2011-05-31 |
| 7646788 |
TCP/IP tunneling protocol for link 16 |
David E. Corman, Thomas Herm, Eric Martens |
2010-01-12 |
| 7269411 |
Methods and systems for providing information network access to a host agent via a guardian agent |
David E. Corman, Thomas Herm, Eric Martens |
2007-09-11 |