$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Policy caching method and apparatus for use in a communication device based on contents of one data unit in a subset of 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-013/42
출원번호 US-0666638 (1996-06-18)
발명자 / 주소
  • Hughes James P.
  • Olson Steve A.
출원인 / 주소
  • Storage Technology Corporation
대리인 / 주소
    Brooks & Kushman, P.C.
인용정보 피인용 횟수 : 331  인용 특허 : 0

초록

A policy caching method for use in a communication device is provided. The communication device determines which instance of protocol data unit (PDU) network policy from a plurality of policies is to be applied to related-received PDUs based on contents of one of the related-received PDUs. Subsequen

대표청구항

[ What is claimed is:] [1.] A policy caching method for use in a communication device, comprising the steps of:determining an instance of protocol data unit (PDU) network policy from a plurality of policies to be applied to related-received PDUs based on contents of one of the related-received PDUs,

이 특허를 인용한 특허 (331)

  1. Sugawara Tsugio,JPX, ATM communication device using interface signal of HIPPI.
  2. Nambiar, Manali; Boonkongchuen, Arpakorn; Basavaiah, P. Murali, Accelerated tape backup restoration.
  3. Dittia, Zubin D.; Eatherton, William N.; Fingerhut, John Andrew; Galles, Michael B.; Turner, Jonathan S., Accumulating and distributing flow control information via update messages and piggybacked flow control information in other messages in a packet switching system.
  4. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  5. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  6. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  7. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  8. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  9. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  10. Larson, Victor; Short, III, Robert; Munger, Edmund; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  11. Larson,Victor; Short, III,Robert Dunham; Munger,Edmund Colby; Williamson,Michael, Agile network protocol for secure communications using secure domain names.
  12. Edmund Colby Munger ; Douglas Charles Schmidt ; Robert Dunham Short, III ; Victor Larson ; Michael Williamson, Agile network protocol for secure communications with assured system availability.
  13. Munger, Edmund Colby; Sabio, Vincent J.; Short, III, Robert Dunham; Gligor, Virgil D., Agile network protocol for secure communications with assured system availability.
  14. Munger, Edmund Colby; Sabio, Vincent J.; Short, III, Robert Dunham; Gligor, Virgil D.; Schmidt, Douglas Charles, Agile network protocol for secure communications with assured system availability.
  15. Munger, Edmund Colby; Schmidt, Douglas Charles; Short, Robert Dunham; Larson, Victor; Williamson, Michael, Agile network protocol for secure communications with assured system availability.
  16. Munger, Edmund; Schmidt, Douglas; Short, III, Robert; Larson, Victor; Williamson, Michael, Agile network protocol for secure communications with assured system availability.
  17. Munger,Edmund Colby; Sabio,Vincent J.; Short, III,Robert Dunham; Gligor,Virgil D.; Schmidt,Douglas Charles, Agile network protocol for secure communications with assured system availability.
  18. Munger,Edmund Colby; Sabio,Vincent J.; Short,Robert Dunham; Gligor,Virgil D.; Schmidt,Douglas Charles, Agile network protocol for secure communications with assured system availability.
  19. Schmidt, Douglas Charles; Short, III, Robert Dunham, Agile network protocol for secure communications with assured system availability.
  20. Munger, Edmund Colby; Schmidt, Douglas Charles; Short, III, Robert Dunham; Larson, Victor; Williamson, Michael, Agile network protocol for secure video communications with assured system availability.
  21. Petasis, Nicos A.; Yao, Xin, Amino amides, peptides and peptidomimetics.
  22. Petasis,Nicos A.; Yao,Xin, Amino amides, peptides and peptidomimetics.
  23. Petasis,Nicos A.; Zavialov,Ilia A.; Patel,Zubin D., Amino polyols and amino sugars.
  24. Serhan, Charles N.; Petasis, Nicos A.; Levy, Bruce D., Anti-inflammatory actions of neuroprotectin D1/protectin D1 and it's natural stereoisomers.
  25. Serhan, Charles N.; Petasis, Nicos A.; Levy, Bruce D., Anti-inflammatory actions of neuroprotectin D1/protectin D1 and its natural stereoisomers.
  26. Zeira,Assaf; Kamhine,Elyahou, Apparatus and method for pattern matching in text based protocol.
  27. Woolston, Thomas G., Apparatus and method for remote sellers to initiate auction instances at an auction facilitator system and receive or make payment for items bought and sold with the system by book entry accounting between participant accounts accessible to the system.
  28. Ben Nun, Michael; Ravid, Sagi; Weil, Ofer, Apparatus and method for wire-speed classification and pre-processing of data packets in a full duplex network.
  29. Shapira, Yaniv, Apparatus for and method of multiple parallel string searching.
  30. Ben Nun,Michael, Apparatus, method, and computer program for wire-speed classification and pre-processing of data packets in an ATM network.
  31. Narayanaswamy, Krishna; Yang, Siying, Application identification.
  32. Narayanaswamy, Krishna; Yang, Siying, Application identification.
  33. Narayanaswamy, Krishna; Yang, Siying, Application identification.
  34. Balassanian, Edward, Application server for delivering applets to client computing devices in a distributed environment.
  35. Serhan, Charles N.; Clish, Clary B., Aspirin-triggered lipid mediators.
  36. Panigrahy,Rina; Sharma,Samar, Assigning prefixes to associative memory classes based on a value of a last bit of each prefix and their use including but not limited to locating a prefix and for maintaining a Patricia tree data structure.
  37. Pullela,Venkateshwar Rao; Devireddy,Dileep Kumar; Kanekar,Bhushan Mangesh; Scheid,Stephen Francis, Associative memory entries with force no-hit and priority indications of particular use in implementing policy maps in communication devices.
  38. Cunetto, Philip; Doherty, James M.; Lu, Chien-Chun; Schroeder, Timothy Paul, Authentication for use of high speed network resources.
  39. Cunetto,Philip; Doherty,James M.; Lu,Chien Chun; Schroeder,Timothy Paul, Authentication for use of high speed network resources.
  40. Corl, Jr., Everett A.; Davis, Gordon T.; Jeffries, Clark D.; Vaidhyanathan, Natarajan; Verrilli, Colin B., Caching lookups based upon TCP traffic flow characteristics.
  41. Chen, Wenge; Chou, Peter; Liu, Kuo-Hul; Sinwald, Michael P.; Soon, Shih Chung, Client server SVC-based DSL service.
  42. Shima, Koji; Komaki, Kenjiro; Mitsuhashi, Hikaru, Communication processing device, communication processing method, and program.
  43. Turner, Jonathan S.; Dittia, Zubin D.; Fingerhut, John Andrew, Communications interconnection network with distributed resequencing.
  44. Woolston, Thomas G., Computer-implement method and system for conducting auctions on the internet.
  45. Woolston,Thomas G.; Kavitz,Paul Andrew; McEachern,Cameron David John, Computer-implemented method for managing dynamic pricing information.
  46. Ross, Mark A., Content addressable memory (CAM) with accesses to multiple CAM arrays used to generate result for various matching sizes.
  47. Cohen, Earl T., Content addressable memory entry coding for error detection and correction.
  48. Husby, Donald E., Content addressable memory with automated learning.
  49. Cunetto,Philip; Doherty,James M.; Lu,Chien Chun; Schroeder,Timothy Paul, Controller based call control for ATM SVC signaling.
  50. Gauvin, William, Data loss monitoring of partial data streams.
  51. Gauvin, William, Data loss monitoring of partial data streams.
  52. Tzeng Shrjie, Data packet filter using contents addressable memory (CAM) and method.
  53. Eatherton, William N.; Dittia, Zubin, Data structure using a tree bitmap and method for rapid classification of data in a database.
  54. Zuk, Nir, Detection of network security breaches based on analysis of network record logs.
  55. Zuk, Nir, Detection of network security breaches based on analysis of network record logs.
  56. Jones, Kevin Brian; Pointon, Richard, Device internet resource access filtering system and method.
  57. Lenoski,Daniel E.; Eatherton,William N.; Fingerhut,John Andrew; Turner,Jonathan S., Distributing fault indications and maintaining and using a data structure indicating faults to route traffic in a packet switching system.
  58. Natarajan, Shankar; Harvey, Andrew G.; Lee, Hsuan-Chung; Rawat, Vipin; Pereira, Leo, Dynamic adjustment of network elements using a feedback-based adaptive technique.
  59. Tindal,Glen D.; Schenk,Jeffery A., Dynamic configuration of network devices to enable data transfers.
  60. Parla, Vincent E.; Gladstone, Philip John Steuart; McCowan, David J.; Zawadowskiy, Andrew; Fitzgerald, Christopher A., Dynamic content-based routing.
  61. Natarajan, Shankar; Harvey, Andrew G.; Lee, Hsuan-Chung; Rawat, Vipin; Pereira, Leo, Dynamically adaptive network element in a feedback-based data network.
  62. Natarajan, Shankar; Harvey, Andrew G.; Lee, Hsuan-Chung; Rawat, Vipin; Pereira, Leo, Dynamically adaptive network element in a feedback-based data network.
  63. Woolston, Thomas G., Electronic marketplace system and method for creation of a two-tiered pricing scheme.
  64. Schmieder, Wilhelm R.; Ben-Shachar, Ido; Chik, Joy; Parsons, John E., Encoding for remoting graphics to decoder device.
  65. Schmieder,Wilhelm R.; Ben Shachar,Ido; Chik,Joy; Parsons,John E., Encoding for remoting graphics to decoder device.
  66. Trainin,Oded, Error protecting groups of data words.
  67. Nagaraj,Ashwath, Error protection for associative memory entries and lookup operations performed thereon.
  68. Shoham,Doron; Listman,Shimon; Shapiro,Eliahu, Error protection for lookup operations in content-addressable memory entries.
  69. Shoham,Doron; Cohen,Earl T., Error protection for lookup operations performed on ternary content-addressable memory entries.
  70. Munger,Edward Colby; Short, III,Robert Dunham; Larson,Victor; Williamson,Michael, Establishment of a secure communication link based on a domain name service (DNS) request.
  71. Chen, Wenge; Chou, Peter; Liu, Kuo-Hui; Sinwald, Michael P.; Soon, Shih Chung, Extended virtual user-to-network interface with ATM network.
  72. Chen,Wenge; Chou,Peter; Liu,Kuo Hui; Sinwald,Michael P.; Soon,Shih Chung, Extended virtual user-to-network interface with ATM network.
  73. McDysan, Dave; Thomas, Howard Lee; Yao, Lei, External processor for a distributed network access system.
  74. McDysan, Dave; Thomas, Howard Lee; Yao, Lei, External processor for a distributed network access system.
  75. McDysan, Dave; Thomas, Howard Lee; Yao, Lei, External processor for a distributed network access system.
  76. Odenwald, Louis; Ortega, William, Fibre Channel service parameter cache.
  77. Dowd,Patrick W.; McHenry,John T., Firewall for processing a connectionless network packet.
  78. Dowd, Patrick W.; McHenry, John T., Firewall for processing connection-oriented and connectionless datagrams over a connection-oriented network.
  79. Deng, Feng; Ke, Yan; Luo, Dongping, Firewall including local bus.
  80. Kanekar, Bhushan Mangesh; Pullela, Venkateshwar Rao; Devireddy, Dileep Kumar; Gurajapu, Suresh; Saharia, Gyaneshwar S.; Rawat, Atul, Generating accounting data based on access control list entries.
  81. Kanekar,Bhushan Mangesh; Pullela,Venkateshwar Rao; Devireddy,Dileep Kumar; Saharia,Gyaneshwar S.; Bhattacharya,Dipankar; Chen,Qizhong, Generating and merging lookup results to apply multiple features.
  82. Kanekar,Bhushan Mangesh; Pullela,Venkateshwar Rao; Devireddy,Dileep Kumar; Saharia,Gyaneshwar S.; Bhattacharya,Dipankar; Chen,Qizhong, Generating and merging lookup results to apply multiple features.
  83. Woolston, Thomas G.; Kavitz, Paul Andrew; McEachern, Cameron David John, Generating and navigating streaming dynamic pricing information.
  84. Cheriton, David R., Hierarchical associative memory-based classification system.
  85. Cheriton,David R., Hierarchical associative memory-based classification system.
  86. Subramanian, Sriram; Blanco, Leonardo E.; Baioura, Andrei; Ungureanu, Oreste Dorin; Sampath, Sriya; Olszta, Pawel, High level graphics stream.
  87. VerSteeg, William; Connery, Glenn; Kollmansberger, Kurt; Pickens, John, IP-based stream splicing with content-specific splice points.
  88. Oskouy, Rasoul Mirzazadeh; Ferguson, Dennis C.; Ju, Hann-Hwan; Lim, Raymond Marcelino Manese; Sindhu, Pradeep S.; Veeragandham, Sreeram; Zimmer, Jeff; Hui, Michael M. Y., In-line packet processing.
  89. Oskouy, Rasoul Mirzazadeh; Ferguson, Dennis C.; Ju, Hann-Hwan; Lim, Raymond Marcelino Manese; Sindhu, Pradeep S.; Veeragandham, Sreeram; Zimmer, Jeff; Hui, Michael M. Y., In-line packet processing.
  90. Oskouy, Rasoul Mirzazadeh; Ferguson, Dennis C.; Ju, Hann-Hwan; Lim, Raymond Marcelino Manese; Sindhu, Pradeep S.; Veeragandham, Sreeram; Zimmer, Jeff; Hui, Michael M. Y., In-line packet processing.
  91. Gai, Silvano; McCloghrie, Keith, Information searching device.
  92. Zuk, Nir, Intelligent integrated network security device.
  93. Zuk, Nir, Intelligent integrated network security device.
  94. Zuk, Nir, Intelligent integrated network security device.
  95. Zuk, Nir; Mao, Yu Ming; Guruswamy, Kowsik, Intelligent integrated network security device for high-availability applications.
  96. Zuk, Nir; Mao, Yu Ming; Guruswamy, Kowsik, Intelligent integrated network security device for high-availability applications.
  97. Zuk, Nir; Mao, Yuming; Guruswamy, Kowsik, Intelligent integrated network security device for high-availability applications.
  98. Bonefas, Rudy G.; Sobchak, Richard K.; Zombek, James M., Intelligent messaging network server interconnection.
  99. Ke, Yan; Mao, Yuming; Xu, Wilson; Leu, Brian Yean-Shiang, Internet security system.
  100. Chandrasekaran, Varagur V., L4 lookup implementation using efficient CAM organization.
  101. VerSteeg, William C.; Oran, David; Drisko, Robert; Gahm, Joshua, Locating points of interest using references to media frames within a packet flow.
  102. VerSteeg, William C.; Oran, David; Drisko, Robert; Gahm, Joshua, Locating points of interest using references to media frames within a packet flow.
  103. Ross, Mark A.; Chen, Sun-Den; Bechtolsheim, Andreas V., Logical operation unit for packet processing.
  104. Edery, Yigal Mordechai; Vered, Nimrod Itzhak; Kroll, David R.; Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  105. Edery, Yigal Mordechai; Vered, Nimrod Itzhak; Kroll, David R.; Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  106. Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  107. Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  108. Priyadarshan,Bangalore L.; Lee,Jaushin; Eatherton,William N., Managing idle time and performing lookup operations to adapt to refresh requirements or operational rates of the particular associative memory or other devices used to implement the system.
  109. Woolston, Thomas G., Marketing goods with bar codes.
  110. Woolston, Thomas G., Marketplace payments.
  111. McDysan, Dave; Thomas, Howard Lee; Yao, Lei, Message, control and reporting interface for a distributed network access system.
  112. Black, Robert Barth, Method and aparatus for presence based resource management.
  113. Lenoski, Daniel E.; Turner, Jonathan S., Method and apparatus for accumulating and distributing data items within a packet switching system.
  114. Dejanovic,Thomas; Maunder,Anurag Singh; Williams, Jr.,John J., Method and apparatus for accumulating and distributing traffic and flow control information in a packet switching system.
  115. Turner,Jonathan S.; Dittia,Zubin D.; Dejanovic,Thomas, Method and apparatus for accumulating and distributing traffic and flow control information in a packet switching system.
  116. Warkhede, Priyank Ramesh; Eatherton, William N.; Maniyar, Shyamsundar N.; Marimuthu, Peram, Method and apparatus for allocating and using range identifiers as input values to content-addressable memories.
  117. Williams, Jr.,John J.; Dejanovic,Thomas, Method and apparatus for an adaptive rate control mechanism reactive to flow control messages in a packet switching system.
  118. Cohen, Earl T.; Steiss, Donald; Eatherton, William; Williams, Jr., John; Fingerhut, John A., Method and apparatus for communicating over a resource interconnect.
  119. Turner,Jonathan S.; Dittia,Zubin D., Method and apparatus for controlling input rates within a packet switching system.
  120. Gai,Silvano; McCloghrie,Keith, Method and apparatus for defining and implementing high-level quality of service policies in computer networks.
  121. Peris, Vinod Gerard John; Turner, Jonathan S.; Dittia, Zubin D.; Eatherton, William N., Method and apparatus for delaying packets being sent from a component of a packet switching system.
  122. Westbrook,Gregg Anthony; Dejanovic,Thomas, Method and apparatus for distributed reassembly of subdivided packets using multiple reassembly components.
  123. Westbrook, Gregg Anthony; Dejanovic, Thomas, Method and apparatus for distributed resequencing and reassembly of subdivided packets.
  124. Michelson,Jonathan E.; Williams, Jr.,John J.; Dejanovic,Thomas, Method and apparatus for distributing information within a packet switching system.
  125. Oren,Eyal; Belz,David E., Method and apparatus for dynamically generating lookup words for content-addressable memories.
  126. Kay, James, Method and apparatus for electronic mail filtering.
  127. Kay, James, Method and apparatus for electronic mail filtering.
  128. Kay, James, Method and apparatus for electronic mail filtering.
  129. Duncan, Ian H.; Young, Ken; Hall, Grant; Watt, James, Method and apparatus for forwarding packets.
  130. Finkelstein,Ehud; Livne,Sarig; Shoham,Doron; Michaeli,Amir, Method and apparatus for generating and using dynamic mappings between sets of entities such as between output queues and ports in a communications system.
  131. Gai, Silvano; Edsall, Thomas J., Method and apparatus for high-speed parsing of network messages.
  132. Gai,Silvano; Edsall,Thomas J., Method and apparatus for high-speed parsing of network messages.
  133. Gai, Silvano; McCloghrie, Keith; Mohaban, Shai, Method and apparatus for identifying network data traffic flows and for applying quality of service treatments to the flows.
  134. McCloghrie Keith ; Gai Silvano,ITX ; Mohaban Shai, Method and apparatus for identifying network data traffic flows and for applying quality of service treatments to the flows.
  135. Silvano Gai ; Keith McCloghrie ; Shai Mohaban, Method and apparatus for identifying network data traffic flows and for applying quality of service treatments to the flows.
  136. Oren, Eyal; Belz, David E., Method and apparatus for implementing and using multiple virtual portions of physical associative memories.
  137. Oren, Eyal; Belz, David E.; Ratinsky, Alon, Method and apparatus for maintaining netflow statistics using an associative memory to identify and maintain netflows.
  138. Abraham,Dalen M.; Barnes,Todd A.; Bouche,Paul F.; Bougetz,Thomas P.; Gosselin,Tracy A.; Grieve,Mark G.; Langdon,Brent A.; Allison,Robert C.; Nikkel,Michael S.; Rosove,Stuart, Method and apparatus for managing internetwork and intranetwork activity.
  139. Warkhede, Priyank Ramesh; Bryant, Stewart Frederick, Method and apparatus for mapping prefixes and values of a hierarchical space to other representations.
  140. Oren, Eyal; Belz, David E., Method and apparatus for matching a string with multiple lookups using a single associative memory.
  141. Qu, Diheng; Li, Kevin; Boutros, Sami; Fan, Seren; Truong, Steve, Method and apparatus for optimizing firewall processing.
  142. Turner,Jonathan S.; Cox,Jerome R., Method and apparatus for pacing the flow of information sent from a device.
  143. Parlan, Jonathan M.; Kloth, Raymond J.; Huang, Ying; Maino, Fabio R.; Agrawal, Pawan, Method and apparatus for performing encryption of data at rest at a port of a network device.
  144. Gai, Silvano; Edsall, Thomas J., Method and apparatus for performing high-speed traffic shaping.
  145. Gai,Silvano; Edsall,Thomas J., Method and apparatus for performing high-speed traffic shaping.
  146. Galles, Michael G., Method and apparatus for pipeline sorting of ordered streams of data items.
  147. Trainin, Oded; Freund, Dov A.; Goren, Gil, Method and apparatus for possibly decreasing the number of associative memory entries by supplementing an associative memory result with discriminator bits from an original set of information.
  148. Black, Robert Barth, Method and apparatus for presence based resource management.
  149. Pullela,Venkateshwar Rao, Method and apparatus for processing packets based on information extracted from the packets and context indications such as but not limited to input interface characteristics.
  150. Tindal,Glen D.; Schenk,Jeffery A., Method and apparatus for protecting a network from attack.
  151. Lenoski, Daniel E.; Eatherton, William N.; Dittia, Zubin D.; Fingerhut, John Andrew, Method and apparatus for reducing the required size of sequence numbers used in resequencing packets.
  152. Westbrook, Gregg Anthony; Dejanovic, Thomas, Method and apparatus for resequencing of packets into an original ordering using multiple resequencing components.
  153. Dittia, Zubin D.; Turner, Jonathan S., Method and apparatus for scheduling packets being sent from a component of a packet switching system.
  154. Williams, Jr., John J.; Dejanovic, Thomas; Michelson, Jonathan E., Method and apparatus for using barrier phases to limit packet disorder in a packet switching system.
  155. Michelson,Jonathan E.; Williams, Jr.,John J.; Dejanovic,Thomas; Fingerhut,John Andrew, Method and apparatus for using barrier phases to synchronize processes and components in a packet switching system.
  156. Cheriton,David R., Method and apparatus for using ternary and binary content-addressable memory stages to classify packets.
  157. Ross,Mark A., Method and apparatus for verifying the integrity of a content-addressable memory result.
  158. Ben Nun,Michael; Ravid,Sagy; Barak,Itzhak; Weil,Offer, Method and apparatus for wire-speed application layer classification of upstream and downstream data packets.
  159. Williams, Jr., John J.; Dejanovic, Thomas, Method and apparatus using a random indication to map items to paths and to recirculate or delay the sending of a particular item when a destination over its mapped path is unreachable.
  160. Balassanian, Edward, Method and system for data demultiplexing.
  161. Balassanian, Edward, Method and system for data demultiplexing.
  162. Balassanian, Edward, Method and system for data demultiplexing.
  163. Basso,Claude; Calvignac,Jean Louis; Damon,Philippe; Davis,Gordon Taylor, Method and system for efficient layer 3-layer 7 routing of internet protocol ("IP") fragments.
  164. Woolston, Thomas G., Method and system for retrieving information regarding an item posted for sale.
  165. Wilson, David James, Method for accelerated packet processing.
  166. Corl, Jr.,Everett A.; Davis,Gordon T.; Jeffries,Clark D.; Vaidhyanathan,Natarajan; Verrilli,Colin B., Method for caching lookups based upon TCP traffic flow characteristics.
  167. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing connection between devices.
  168. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing connection between devices.
  169. Larson, Victor; Short, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing encrypted channel.
  170. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing secure communication link between computers of virtual private network.
  171. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing secure communication link between computers of virtual private network.
  172. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing secure communication link between computers of virtual private network.
  173. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing secure communication link between computers of virtual private network.
  174. Larson,Victor; Short, III,Robert Durham; Munger,Edmund Colby; Williamson,Michael, Method for establishing secure communication link between computers of virtual private network.
  175. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing secure communication link between computers of virtual private network without user entering any cryptographic information.
  176. Woolston, Thomas G., Method for facilitating commerce at an internet-based auction.
  177. Woolston, Thomas G., Method for reposting a good for sale using a consignment node.
  178. Cheriton, David R.; Bechtolsheim, Andreas V., Method for traffic management, traffic prioritization, access control, and packet forwarding in a datagram computer network.
  179. Cheriton, David R.; Bechtolsheim, Andreas V., Method for traffic management, traffic prioritization, access control, and packet forwarding in a datagram computer network.
  180. Cheriton,David R.; Bechtolsheim,Andreas V., Method for traffic management, traffic prioritization, access control, and packet forwarding in a datagram computer network.
  181. Odenwald, Louis, Methodology for providing persistent target identification in a fibre channel environment.
  182. Coss,Michael John; Majette,David L.; Sharp,Ronald L., Methods and apparatus for a computer network firewall with multiple domain support.
  183. Coss Michael John ; Majette David L. ; Sharp Ronald L., Methods and apparatus for a computer network firewall with stateful packet filtering.
  184. Williams, Jr.,John J.; Dejanovic,Thomas, Methods and apparatus for communicating time and latency sensitive information.
  185. Sadasivan,Ganesh; Srinivas,Rengabashyam; Eatherton,William N.; Ma,Xiaoxue; Marimuthu,Peram, Methods and apparatus for defining flow types and instances thereof such as for identifying packets corresponding to instances of the flow types.
  186. Panigrahy,Rina; Sharma,Samar, Methods and apparatus for distributing entries among lookup units and selectively enabling less than all of the lookup units when performing a lookup operation.
  187. Saminda De Silva,Suran; Panigrahy,Rina; Sharma,Samar, Methods and apparatus for longest common prefix based caching.
  188. Panigrahy, Rina; Sharma, Samar, Methods and apparatus for maintaining sets of ranges typically using an associative memory and for using these ranges to identify a matching range based on a query point or query range and to maintain sorted elements for use such as in providing priority queue operations.
  189. Pullela,Venkateshwar Rao; Devireddy,Dileep Kumar; Pullela,Shyamsundar Rao, Methods and apparatus for mapping fields of entries into new values and combining these mapped values into mapped entries for use in lookup operations such as for packet processing.
  190. Hariguchi, Yoichi; Panigrahy, Rina; Sharma, Samar; Nagaraj, Ashwath, Methods and apparatus for mapping ranges of values into unique values of particular use for range matching operations using an associative memory.
  191. Ruan,Yixing; Chang,Chran Ham; Dharwadkar,Pranav; Lalgudi,Hari, Methods and apparatus for performing continue actions using an associative memory which might be particularly useful for implementing access control list and quality of service features.
  192. Zemach,Rami; Sukonik,Vitaly; Eatherton,William N.; Bettink,John H. W.; Voloshin,Moshe, Methods and apparatus for processing packets including accessing one or more resources shared among processing engines.
  193. Sukonik,Vitaly; Laor,Michael; Galles,Michael B.; Voloshin,Moshe; Eatherton,William N.; Zemach,Rami; Bettink,John H. W., Methods and apparatus for processing packets including distributing packets across multiple packet processing engines and gathering the processed packets from the processing engines.
  194. Eatherton,William N.; Bettink,John H. W., Methods and apparatus for selectively discarding packets during overload conditions.
  195. Woolston, Thomas G., Methods and systems for searching for goods.
  196. Woolston, Thomas G., Methods and systems for searching for goods and services.
  197. Woolston, Thomas G., Methods and systems for searching for goods in a virtual marketplace.
  198. Serhan,Charles N.; Arita,Makoto, Methods for identification and uses of anti-inflammatory receptors for eicosapentaenoic acid analogs.
  199. Serhan, Charles N.; Arita, Makoto, Methods for identification of eicosapentaenoic acid analogs using anti-inflammatory receptors.
  200. Woodall,Thomas R., Multi-level secure multi-processor computer architecture.
  201. Zuk, Nir; Guruswamy, Kowsik, Multi-method gateway-based network security systems and methods.
  202. Zuk, Nir; Guruswamy, Kowsik, Multi-method gateway-based network security systems and methods.
  203. Zuk, Nir; Guruswamy, Kowsik, Multi-method gateway-based network security systems and methods.
  204. Willardson, Richard, Multi-protocol data classification using on-chip CAM.
  205. Willardson, Richard, Multi-protocol data classification using on-chip cam.
  206. Docter Eric E. ; Hofmann William D. ; Hurley Paul E., Multi-stage data filtering system employing multiple filtering criteria.
  207. Schneider, Marco; Cunetto, Philip, Multiservice use of network connection capability.
  208. Schneider,Marco; Cunetto,Philip, Multiservice use of network connection capability.
  209. Schneider, Marco; Cunetto, Philip, Multiservice use of network connection capability under user-to-network interface signaling.
  210. Schneider,Marco; Cunetto,Philip, Multiservice use of network connection capability under user-to-network interface signaling.
  211. McDysan, Dave; Thomas, Howard Lee; Yao, Lei, Network access system including a programmable access device having distributed service control.
  212. McDysan,Dave; Thomas,Howard Lee; Yao,Lei, Network access system including a programmable access device having distributed service control.
  213. McDysan,Dave; Thomas,Howard Lee; Yao,Lei, Network access system including a programmable access device having distributed service control.
  214. Wolf,Jonathan S.; Mellor,Arthur B.; Tackabury,Wayne F.; Anderson,Christopher B.; Whitworth,Robin M.; Haag,Michael D.; Del Vecchio,Brian A., Network configuration manager.
  215. Kerr, Darren R.; Bruins, Barry L., Network flow switching and flow data export.
  216. Kerr,Darren R.; Bruins,Barry L., Network flow switching and flow data export.
  217. Kerr,Darren R.; Bruins,Barry L, Network flow switching and flow data report.
  218. Schuba, Christoph L.; Krsul, Ivan V.; Zamboni, Diego; Spafford, Eugene H.; Sundaram, Aurobindo M.; Kuhn, Markus G., Network protection for denial of service attacks.
  219. Ke, Yan; Mao, Yuming; Tong, Jian; Huang, Guangsong, Network security device.
  220. Ke, Yan; Mao, Yuming; Tong, Jian; Huang, Guangsong, Network security device and method.
  221. O'Callaghan, Sorcha; Fanning, Neil O; Jennings, Kevin; O'Neill, Eugene; Butler, Joseph N, Network switch with mutually coupled look-up engine and network processor.
  222. Petasis, Nicos A.; Yao, Xin; Raber, Jeffrey C., Nitrogen-containing heterocycles.
  223. Uzun, Necdet, Optimized content addressable memory (CAM).
  224. Eatherton,William N.; Lee,Jaushin; Priyadarshan,Bangalore L.; Warkhede,Priyank Ramesh; Ertemalp,Fusun; Holbrook,Hugh Weber; Devireddy,Dileep Kumar; Kanekar,Bhushan Mangesh; Pullela,Venkateshwar Rao, PERFORMING LOOKUP OPERATIONS USING ASSOCIATIVE MEMORIES OPTIONALLY INCLUDING MODIFYING A SEARCH KEY IN GENERATING A LOOKUP WORD AND POSSIBLY FORCING A NO-HIT INDICATION IN RESPONSE TO MATCHING A PART.
  225. Sadot, Emek; Zilbershtein, Itai Ephraim, Packet fragmentation prevention.
  226. Bechtolsheim,Andreas V.; Cheriton,David R., Packet processing engine architecture.
  227. Zuk, Nir; Mao, Yu Ming, Packet processing in a multiple processor system.
  228. Zuk, Nir; Mao, Yu Ming, Packet processing in a multiple processor system.
  229. Chen, Wenge; Chou, Peter; Liu, Kuo Hui; Sinwald, Michael P.; Soon, Shih Chung, Peer to peer SVC-based DSL service.
  230. Chen, Wenge; Chou, Peter; Liu, Kuo-Hui; Sinwald, Michael P.; Soon, Shih Chung, Peer to peer SVC-based DSL service.
  231. Eatherton,William N.; Lee,Jaushin; Priyadarshan,Bangalore L.; Warkhede,Priyank Ramesh; Ertemalp,Fusun; Holbrook,Hugh Weber; Devireddy,Dileep Kumar; Kanekar,Bhushan Mangesh; Pullela,Venkateshwar Rao, Performing lookup operations on associative memory entries.
  232. Eatherton,William N.; Lee,Jaushin; Priyadarshan,Bangalore L.; Warkhede,Priyank Ramesh; Ertemalp,Fusun, Performing lookup operations using associative memories optionally including selectively determining which associative memory blocks to use in identifying a result and possibly propagating error indi.
  233. Natarajan, Shankar; Harvey, Andrew G.; Lee, Hsuan-Chung; Rawat, Vipin; Pereira, Leo, Policy engine which supports application specific plug-ins for enforcing policies in a feedback-based, adaptive data network.
  234. Natarajan, Shankar; Harvey, Andrew G.; Lee, Hsuan-Chung; Rawat, Vipin; Pereira, Leo, Policy engine which supports application specific plug-ins for enforcing policies in a feedback-based, adaptive data network.
  235. Munger, Edmund Colby; Schmidt, Douglas Charles; Short, III, Robert Dunham; Larson, Victor, Preventing packet flooding of a computer on a computer network.
  236. McDysan, Dave; Thomas, Howard Lee; Yao, Lei, Programmable access device for a distributed network access system.
  237. Willardson,Richard, Programmable packet filtering in a prioritized chain.
  238. Robert Edward Markowitz ; Joseph Thomas O'Neil ; Kenneth H Rosen ; Peter H Stuntebeck, Proxy apparatus and method for streaming media information.
  239. Markowitz, Robert E.; O'Neil, Joseph T.; Rosen, Kenneth H.; Stuntebeck, Peter H., Proxy apparatus and method for streaming media information and for increasing the quality of stored media information.
  240. Markowitz, Robert Edward; O'Neil, Joseph Thomas; Rosen, Kenneth H.; Stuntebeck, Peter H., Proxy apparatus and method for streaming media information and for increasing the quality of stored media information.
  241. Markowitz, Robert Edward; O'Neil, Joseph Thomas; Rosen, Kenneth H.; Stuntebeck, Peter H., Proxy apparatus and method for streaming media information and for increasing the quality of stored media information.
  242. Markowitz, Robert; O'Neil, Joseph; Rosen, Kenneth; Stuntebeck, Peter, Proxy apparatus and method for streaming media information and for increasing the quality of stored media information.
  243. Markowitz,Robert Edward; O'Neil,Joseph Thomas; Rosen,Kenneth H.; Stantebeck,Peter H., Proxy apparatus and method for streaming media information and for increasing the quality of stored media information.
  244. Filsfils, Clarence; Bettink, John H. W.; Bryant, Stewart Frederick; Oran, David R., Quasi RTP metrics for non-RTP media flows.
  245. Ver Steeg, William C.; Begen, Ali C., RTP-based loss recovery and quality monitoring for non-IP and raw-IP MPEG transport flows.
  246. Begen, Ali C.; Ver Steeg, William C., Ratings and quality measurements for digital broadcast viewers.
  247. Tindal, Glen; Schenk, Jeffery A., Redirecting data generated by network devices.
  248. Leichtling, Ivan; Zhong, Chenyin; Chik, Joy; Khouzam, Gilles; David, Paul; Ungureanu, Oreste Dorin, Remote client graphics rendering.
  249. Oran, David R., Remote monitoring of real-time internet protocol media streams.
  250. Brugiolo, Ivan, Remoting redirection layer for graphics device interface.
  251. Strassner,John, Repository-independent system and method for asset management and reconciliation.
  252. Turner, Jonathan S.; Lenoski, Daniel E., Resequencing packets at output ports without errors using packet timestamps and timestamp floors.
  253. Nash, Alistair, Resource access filtering system and database structure for use therewith.
  254. Marimuthu,Peram; Warkhede,Priyank Ramesh, Reverse path forwarding protection of packets using automated population of access control lists based on a forwarding information base.
  255. Turner, Jonathan S.; Galles, Michael B., Route scheduling of packet streams to achieve bounded delay in a packet switching system.
  256. Mao, Yu Ming; Lian, Roger Jia-Jyi; Huang, Guangsong; Cheung, Lee Chik, Routing a packet by a device.
  257. Mao, Yu Ming; Lian, Roger Jia-Jyi; Huang, Guangsong; Cheung, Lee Chik, Routing a packet by a device.
  258. Mao, Yuming; Lian, Roger Jia-Jyi; Huang, Guangsong; Cheung, Lee Chik, Routing a packet by a device.
  259. Kloth, Axel K., Rule based IP data processing.
  260. Cloonan, Thomas J.; Hickey, Daniel W.; Cepeda, Ubaldo; Ryan, Gerald P., Signal splitter matrix for a cable modem termination system.
  261. Parthasarathy, Anand; Kondamuri, Chandra Sekhar; Chinchani, Ramkumar; Boffa, Gian Carlo; Cometto, Maurilio, Storage media encryption with write acceleration.
  262. Oran, David R.; Drisko, Robert Andrew; Gahm, Joshua B.; Faheem, Atif, Surrogate stream for monitoring realtime media.
  263. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  264. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  265. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  266. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  267. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  268. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  269. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  270. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  271. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  272. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  273. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  274. Baddour, Victor L.; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J.; Mesdaq, Ali A., System and method for analyzing web content.
  275. Baddour, Victor L.; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J; Mesdaq, Ali A., System and method for analyzing web content.
  276. Baddour, Victor L; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J; Mesdaq, Ali A, System and method for analyzing web content.
  277. Tindal,Glen D.; Schenk,Jeffery A., System and method for configuration, management and monitoring of network resources.
  278. Tindal, Glen D., System and method for configuring a network device.
  279. Rider,Kenneth D.; Ferrin,Daniel; Post,Ted, System and method for controlling access rights to network resources.
  280. Tindal, Glen D., System and method for defining a policy enabled network.
  281. Hubbard, Daniel Lyle; Ruskin, Dan, System and method for dynamic and real-time categorization of webpages.
  282. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method for establishing a communication link.
  283. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method for establishing an encrypted communication link based on IP address lookup requests.
  284. Gorthy, Scott B.; Kelly, Brendan; Hearne, Derek S.; Heiser, David B.; Taylor, Bret C., System and method for generating a configuration schema.
  285. Courtney,Mike, System and method for generating a representation of a configuration schema.
  286. Harrison, Bret Elliott; Reed, William Donald; Temoshenko, Leo, System and method for generation VPN network policies.
  287. Strassner, John, System and method for mapping between and controlling different device abstractions.
  288. Courtney,Mike, System and method for modeling a network device's configuration.
  289. Zombek, James M.; Edwards, Donald J., System and method for re-directing requests from browsers for communications over non-IP based networks.
  290. Thakor, Sanjiv, System and method for transforming configuration commands.
  291. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method for using a registered name to connect network devices with a link that uses encryption.
  292. Hubbard, Dan; Tse, Alan, System and method of analyzing web addresses.
  293. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  294. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  295. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  296. Hubbard, Dan, System and method of controlling access to the internet.
  297. Sinclair, John W.; Pettener, Ian James; Nash, Alistair H., System, method and apparatus for use in monitoring or controlling internet access.
  298. Sinclair, John W.; Pettener, Ian James; Nash, Alistair H., System, method and apparatus for use in monitoring or controlling internet access.
  299. Sinclair, John W.; Pettener, Ian James; Nash, Alistair H., System, method and apparatus for use in monitoring or controlling internet access.
  300. McDysan, David E., System, method and apparatus that employ virtual private networks to resist IP QoS denial of service attacks.
  301. McDysan, David E., System, method and apparatus that isolate virtual private network (VPN) and best effort traffic to resist denial of service attacks.
  302. McDysan, David E., System, method and apparatus that isolate virtual private network (VPN) and best effort traffic to resist denial of service attacks.
  303. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Systems and methods for connecting network devices over communication network.
  304. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
  305. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
  306. Stavrou, Angelos; Keromytis, Angelos D., Systems and methods for inhibiting attacks with a network.
  307. Stavrou, Angelos; Keromytis, Angelos D., Systems and methods for inhibiting attacks with a network.
  308. Stavrou, Angelos; Keromytis, Angelos D., Systems and methods for inhibiting attacks with a network.
  309. Natarajan, Shankar; Harvey, Andrew G.; Lee, Hsuan-Chung; Rawat, Vipin; Pereira, Leo, Technique for providing automatic event notification of changing network conditions to network elements in an adaptive, feedback-based data network.
  310. Natarajan, Shankar; Harvey, Andrew G.; Lee, Hsuan Chung; Rawat, Vipin; Pereira, Leo, Technique for providing dynamic modification of application specific policies in a feedback-based, adaptive data network.
  311. Natarajan, Shankar; Harvey, Andrew G.; Lee, Hsuan-Chung; Rawat, Vipin; Pereira, Leo, Technique for providing dynamic modification of application specific policies in a feedback-based, adaptive data network.
  312. Natarajan, Shankar; Harvey, Andrew G.; Lee, Hsuan-Chung; Rawat, Vipin; Pereira, Leo, Technique for providing dynamic modification of application specific policies in a feedback-based, adaptive data network.
  313. Natarajan, Shankar; Harvey, Andrew G.; Lee, Hsuan-Chung; Rawat, Vipin; Pereira, Leo, Technique for providing dynamic modification of application specific policies in a feedback-based, adaptive data network.
  314. Patra, Abhijit; Panigrahy, Rina; Sharma, Samar, Techniques for efficient memory management for longest prefix match problems.
  315. Van Dyke, Thomas E., Treatment and prevention of bone loss using resolvins.
  316. Van Dyke, Thomas E., Treatment and prevention of bone loss using resolvins.
  317. Petasis, Nicos A., Trihydroxy polyunsaturated eicosanoid derivatives.
  318. Petasis, Nicos A., Trihydroxy polyunsaturated eicosanoid derivatives.
  319. Petasis, Nicos A., Trihydroxy polyunsaturated eicosanoid derivatives.
  320. Petasis, Nicos A., Trihydroxy polyunsaturated eicosanoid derivatives.
  321. Petasis, Nicos A., Trihydroxy polyunsaturated eicosanoids.
  322. Oran, David R., Tunneling reports for real-time Internet Protocol media streams.
  323. Serhan, Charles N.; Levy, Bruce D., Use of docasatrienes, resolvins, and their stable analogs in the treatment of airway diseases and asthma.
  324. Serhan, Charles N.; Levy, Bruce D., Use of docosatrienes, resolvins and their stable analogs in the treatment of airway diseases and asthma.
  325. Serhan, Charles N.; Levy, Bruce D., Use of docosatrienes, resolvins, and their stable analogs in the treatment of airway diseases and asthma.
  326. Cheriton, David R., Using ternary and binary content addressable memory stages to classify information such as packets.
  327. McDysan, David E., Virtual private network (VPN)-aware customer premises equipment (CPE) edge router.
  328. McDysan,David E., Virtual private network (VPN)-aware customer premises equipment (CPE) edge router.
  329. Allen, Keith Joseph; Chen, Weijing; Salguero, Anna, Virtual private network over asynchronous transfer mode.
  330. Allen,Keith Joseph; Chen,Weijing; Salguero,Anna, Virtual private network over asynchronous transfer mode.
  331. Malerevich, Oren, Wire-speed packet management in a multi-pipeline network processor.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로