$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and apparatus for transparently directing requests for web objects to proxy caches 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-015/16
출원번호 US-0212980 (1998-12-16)
발명자 / 주소
  • Ariel Cohen
  • Sampath Rangarajan
  • Navjot Singh
출원인 / 주소
  • Lucent Technologies Inc.
대리인 / 주소
    Stephen M. Gurey
인용정보 피인용 횟수 : 588  인용 특허 : 13

초록

In order to transparently redirect an HTTP connection request that is directed to an origin server (107) to a proxy cache (110-1), a proxy redirector (104) translates the destination address of packets directed to the origin server to the address of the proxy. During a handshaking procedure, a TCP c

대표청구항

1. A method at a Layer 4 switch for redirecting an HTTP connection request from a client that is directed to an origin server to a proxy cache over a packet-based computer network comprising the steps of:receiving at least one packet containing a request message within the HTTP connection, the at le

이 특허에 인용된 특허 (13)

  1. Hind John Raithel ; Lindquist David Bruce ; Nanavati Pratik Biharilal ; Tan Yih-Shin ; Wesley Ajamu Akinwunmi, Applet redirection for controlled access to non-orginating hosts.
  2. Sridhar Manickam R. ; Boruchovich Boris ; Sigel Steven ; Louchez Sylvain ; Khan Malik Z., Distributed directory for enhanced network communication.
  3. Hailpern Brent Tzion ; Malkin Peter Kenneth ; Schloss Robert Jeffrey ; Yu Philip Shi-Lung, Dynamic push filtering based on information exchanged among nodes in a proxy hierarchy.
  4. Sidana Ashmeet S., General purpose web annotations without modifying browser.
  5. Pistriotto Joseph C. ; Montinola Katrina, Method and apparatus for configuring a client to redirect requests to a caching proxy server based on a category ID with the request.
  6. Kirsch Steven T. ; Lindblad Christopher J., Method and apparatus for redirection of server external hyper-link references.
  7. DeSimone Antonio ; Shur David Hilton ; Sibal Sandeep, Method of transferring connection management information in world wideweb requests and responses.
  8. Kalajan Kevin E., Network message redirection.
  9. Luotonen Ari, Proxy server caching mechanism that provides a file directory structure and a mapping mechanism within the file director.
  10. Subramaniam Anand ; Ebrahimi Hashem M., Secure intranet access.
  11. Domenikos Steven D. ; Domenikos George C., Systems and methods for executing application programs from a memory device linked to a server.
  12. Heitler Jesse, Systems and methods for organizing and analyzing information stored on a computer network.
  13. Brendel Juergen ; Kring Charles J. ; Liu Zaide ; Marino Christopher C., World-wide-web server with delayed resource-binding for resource-based load balancing on a distributed resource multi-n.

이 특허를 인용한 특허 (588)

  1. Srinivasan, Suresh; Shukla, Amitabh, Access of elements for a secure web page through a non-secure channel.
  2. Yu, Zhi Z., Accessing network databases.
  3. Onyon, Richard M.; Multer, David L., Acquisition and synchronization of digital media to a personal information space.
  4. Price, David; Darbyshire, Alan; Kaura, Ricky, Adaptable network service access through dynamic request routing.
  5. Brown, Scott K.; Gorman, Bradley Paul; Patterson, Brooke Lamont; Filteau, Mark Lionel; Mason, Kevin Eugene; Manchester, Eric Adam, Adding advertising content to media content.
  6. Landrum, Alfred; Ly, Kand; McCanne, Steve, Address manipulation to provide for the use of network tools even when transaction acceleration is in use over a network.
  7. Landrum, Alfred; Ly, Kand; McCanne, Steven, Address manipulation to provide for the use of network tools even when transaction acceleration is in use over a network.
  8. Onyon, Richard; Stannard, Liam; Ridgard, Leighton, Advanced contact identification system.
  9. Oshiba, Dennis; Xiao, Hong, Allocating resources in multi-core computing environments.
  10. Jungck, Peder J., Apparatus and method for domain name resolution.
  11. Jungck,Peder J., Apparatus and method for domain name resolution.
  12. Tu, Edgar Allan; Pang, Eric, Apparatus and method for operational support of remote network systems.
  13. Chawla,Rajeev; Wong,Thomas K.; Tsirigotis,Panagiotis; Ahmadian,Omid; Radia,Sanjay R.; Kamaraju,Ashvin, Apparatus and method for providing a transparent proxy server.
  14. Jungck, Peder J., Apparatus and method for virtual edge placement of web sites.
  15. Venkat, Balaji; Narayan, Kaushik; Namasivayan, Manokar; Sthanuretnam, Shankar, Apparatus and methods for providing an application level gateway for use in networks.
  16. Fung,Priscilla C.; Somogyi,Alexander J., Apparatus for highly available transaction recovery for transaction processing systems.
  17. Susai, Michel K.; Sinha, Rajiv; Shetty, Anil, Apparatus, method and computer program product for efficiently pooling connections between clients and servers.
  18. Susai, Michel K.; Sinha, Rajiv; Shetty, Anil, Apparatus, method and computer program product for efficiently pooling connections between clients and servers.
  19. Susai, Michel K.; Sinha, Rajiv; Shetty, Anil, Apparatus, method and computer program product for efficiently pooling connections between clients and servers.
  20. Luft, Siegfried J., Application driven fast unicast flow replication.
  21. Amdahl, Saxon; Lennie, Robert; Larson, Richard, Application layer network traffic prioritization.
  22. Zeldis, Mark; Caudy, Ryan; Kent, IV, David R.; Wright, Charles; Teodorescu, Radu; Dorfman, Nathaniel J., Applying a GUI display effect formula in a hidden column to a section of data.
  23. Tannous,Sameer, Arrangement for emulating an unlimited number of IP devices without assignment of IP addresses.
  24. Miller, Karl Frederick, Authentication proxy agent.
  25. Miller, Karl Frederick, Authentication proxy agent.
  26. Johnson, David Alan, Automated access of an enhanced command set.
  27. Gladieux,Ted Franklin; Sadhu,Avinash, Automating document reviews in a project management system.
  28. Cohen, Shy, Bi-directional HTTP-based reliable messaging protocol and system utilizing same.
  29. Ebrahimi, Hashem Mohammad; Major, Robert Drew, Brokering state information and identity among user agents, origin servers, and proxies.
  30. Freed,Michael; Gannesan,Elango; Moorthy,Arun, Bufferless secure sockets layer architecture.
  31. Hughes, Earnest E.; Murphy, John A.; Donzis, Lewis T., Bump in the wire transparent internet protocol.
  32. Greschler, David M.; Mysliwy, Owen; Schaefer, Stuart, Business method and system for serving third party software applications.
  33. Chan, Alex Yiu-Man; Haridas, Snehal; De Datta, Raj K., Caching content and state data at a network element.
  34. Wheeler, Thomas T., Calling a second functionality by a first functionality.
  35. Kommula, Sunanda Lakshmi, Canonical name (CNAME) handling for global server load balancing.
  36. Kommula, Sunanda Lakshmi, Canonical name (CNAME) handling for global server load balancing.
  37. Talmor, Ron; Yóna, Shlomo; Margalit, Orit; Serfaty, Beni, Client side human user indicator.
  38. Jacobs,Dean Bernard; Woollen,Rob; Messinger,Adam; White,Seth, Cluster caching with concurrency checking.
  39. Asai, Rieko; Omura, Takeshi; Horiuchi, Masaki, Cluster server apparatus.
  40. Sewall, Patrick; Johnson, David Alan; Wood, Steven, Communicating network status.
  41. Wood, Steven; Sewall, Patrick; Johnson, David A., Communicating network status.
  42. Uchikawa, Shinichi, Communication apparatus and control method of the apparatus.
  43. Uchikawa, Shinichi, Communication apparatus conditional notification destination registration.
  44. Wright, Charles, Computer assisted completion of hyperlink command segments.
  45. Caudy, Ryan; Kent, IV, David R.; Wright, Charles; Teodorescu, Radu, Computer data distribution architecture.
  46. Caudy, Ryan; Kent, IV, David R.; Wright, Charles; Ries, Brian; Teodorescu, Radu, Computer data distribution architecture connecting an update propagation graph through multiple remote query processors.
  47. Caudy, Ryan; Kent, IV, David R.; Wright, Charles; Teodorescu, Radu, Computer data distribution architecture with table data cache proxy.
  48. Kent, IV, David R.; Caudy, Ryan; Wright, Charles; Zeldis, Mark; Teodorescu, Radu, Computer data system current row position query language construct and array processing query language constructs.
  49. Kent, IV, David R.; Caudy, Ryan; Wright, Charles; Teodorescu, Radu, Computer data system data source having an update propagation graph with feedback cyclicality.
  50. Wright, Charles; Caudy, Ryan; Kent, IV, David R.; Bronnimann, Herve; Teodorescu, Radu, Computer data system data source refreshing using an update propagation graph.
  51. Wright, Charles; Caudy, Ryan; Kent, IV, David R.; Zeldis, Mark; Basralian, Raffi; Teodorescu, Radu, Computer data system data source refreshing using an update propagation graph having a merged join listener.
  52. Wright, Charles; Caudy, Ryan; Kent, IV, David R.; Ferretti-Smythe, Juan Cristian; Bronnimann, Herve; Teodorescu, Radu, Computer data system position-index mapping.
  53. Joshi, Prajakta S., Configurable geographic prefixes for global server load balancing.
  54. Joshi, Prajakta S., Configurable geographic prefixes for global server load balancing.
  55. Joshi, Prajakta S., Configurable geographic prefixes for global server load balancing.
  56. Joshi,Prajakta S., Configurable geographic prefixes for global server load balancing.
  57. Vedam, Jude Pragash; Sharma, Shailender; Varimalla, Rakesh, Configuration of a network visibility system.
  58. Sharma, Shailender; Varimalla, Rakesh, Configuration of rules in a network visibility system.
  59. Sewall, Patrick; Johnson, David Alan, Configuring a wireless router.
  60. Hauser, Robert R., Constructing an agent in a first execution environment using canonical rules.
  61. Hauser, Robert R., Constructing an agent that utilizes a compiled set of canonical rules.
  62. Hauser, Robert R., Constructing an agent that utilizes supplied rules and rules resident in an execution environment.
  63. Patoskie, John P., Construction of an agent that utilizes as-needed canonical rules.
  64. Weller, Timothy N.; Leiserson, Charles E., Content delivery network service provider (CDNSP)-managed content delivery network (CDN) for network service provider (NSP).
  65. Weller, Timothy N.; Leiserson, Charles E., Content delivery network service provider (CDNSP)-managed content delivery network (CDN) for network service provider (NSP).
  66. Weller,Timothy N.; Leiserson,Charles E., Content delivery network service provider (CDNSP)-managed content delivery network (CDN) for network service provider (NSP).
  67. Akadiri, Tayo, Content distribution system and method.
  68. Akadiri, Tayo, Content distribution system and method.
  69. Akadiri, Tayo, Content distribution system and method.
  70. Akadiri, Tayo, Content distribution system and method.
  71. Akadiri, Tayo, Content distribution system and method.
  72. Akadiri, Tayo, Content distribution system and method.
  73. Akadiri, Tayo, Content distribution system and method.
  74. Akadiri, Tayo, Content distribution system and method.
  75. Akadiri, Tayo, Content distribution system and method.
  76. Akadiri, Tayo, Content distribution system and method.
  77. Blumenau, Trevor I., Content distribution system for distributing content over a network, with particular applicability to distributing high-bandwidth content.
  78. Aviani, Jr., James Anthony; Baker, Frederick Jurgens; Legedza, Ulana Maria Sonia, Content routing.
  79. Gourlay,Douglas, Content routing services protocol.
  80. Wheeler, Thomas T., Creating a proxy object and providing information related to a proxy object.
  81. Landfeldt,Bjorn; Seneviratne,Aruna; Gunningberg,Per; Ardon,Sebastien; Portmann,Marius; Ismailov,Yuri, Creating distributed proxy configurations.
  82. Prince, Matthew Browning; Holloway, Lee Hahn; Zatlyn, Michelle Marie, Custom responses for resource unavailable errors.
  83. Sewall, Patrick; Johnson, David Alan; Wood, Steven, Data path switching.
  84. Sewall, Patrick; Johnson, David Alan; Wood, Steven, Data plan activation and modification.
  85. Jacobs, Dean Bernard; Kramer, Reto; Srinivasan, Ananthan Bala, Data replication protocol.
  86. Wright, Charles; Caudy, Ryan; Basralian, Raffi; Bronnimann, Herve, Data store access permission system with interleaved application of deferred access control filters.
  87. Wright, Charles; Caudy, Ryan; Basralian, Raffi; Bronnimann, Herve, Data store access permission system with interleaved application of deferred access control filters.
  88. Multer, David L.; Garner, Robert E.; Ridgard, Leighton A.; Stannard, Liam J.; Cash, Donald W.; Onyon, Richard M., Data transfer and synchronization between mobile systems using change log.
  89. Multer, David L.; Garner, Robert E.; Ridgard, Leighton A.; Stannard, Liam J.; Cash, Donald W.; Onyon, Richard M., Data transfer and synchronization system.
  90. Multer, David L.; Garner, Robert E.; Ridgard, Leighton A.; Stannard, Liam J.; Cash, Donald W.; Onyon, Richard M., Data transfer and synchronization system.
  91. Kahol, Anurag; Majee, Sumandra; Waterman, Alex; Mathison, Paul, Delayed network protocol proxy for packet inspection in a network.
  92. Onyon, Richard; Stannard, Liam; Ridgard, Leighton, Device message management system.
  93. Onyon, Richard; Stannard, Liam; Ridgard, Leighton, Device message management system.
  94. Onyon, Richard; Stannard, Liam; Ridgard, Leighton, Device message management system.
  95. Murakami,Takuya, Device, method and program for protocol translation.
  96. Joshi, Prajakta S.; Cheung, David Chun Ying, Distributed health check for global server load balancing.
  97. Chen, Lee; Szeto, Ronald Wai Lun, Distributed multi-processing security gateway.
  98. Chen, Lee; Szeto, Ronald Wai Lun, Distributed multi-processing security gateway.
  99. Chen, Lee; Szeto, Ronald Wai Lun, Distributed multi-processing security gateway.
  100. Chen, Lee; Szeto, Ronald Wai Lun, Distributed multi-processing security gateway.
  101. Chen, Lee; Szeto, Ronald Wai Lun, Distributed multi-processing security gateway.
  102. Chen, Lee; Szeto, Ronald Wai Lun, Distributed multi-processing security gateway.
  103. Chen, Lee; Szeto, Ronald Wai Lun, Distributed multi-processing security gateway.
  104. Coates, Joshua L.; Bozeman, Patrick E.; Landrum, Alfred Gary; Mattis, Peter D.; Nalam, Naveen; Roselli, Drew S., Distributed network attached storage system.
  105. Aviani, James; Swanson, David Eric; Baker, Frederick; Mueller, II, Kenneth E.; Gnagy, Matthew Richard, Distributed network traffic load balancing technique implemented without gateway router.
  106. Baird, Randall B.; Friedl, Stephan E.; Wesselman, Thomas M., Distributed overlay browser for transparent streaming media support in virtualized desktop environment.
  107. Coates, Joshua L.; Bozeman, Patrick E.; Patterson, David A., Distributed storage cluster architecture.
  108. McLaggan, Douglas; Wilson, Ian Herbert; Denny, Mark A.; Williams, Rick L., Distributing and balancing traffic flow in a virtual gateway.
  109. Sankar, Swaminathan; Karampurwala, Hasnain; Gupta, Rahul; Kamat, Gurudeep; Jalan, Rajkumar, Distributing service sessions.
  110. Datta, Sanchaita; Ragula, Bhaskar, Domain name resolution making IP address selections in response to connection status when multiple connections are present.
  111. Devarapalli, Sridhar J.; Joshi, Prajakta S., Domain name system security extensions (DNSSEC) for global server load balancing.
  112. Devarapalli, Sridhar J.; Joshi, Prajakta S., Domain name system security extensions (DNSSEC) for global server load balancing.
  113. Brown, Scott K., Duplicating digital streams for digital conferencing using switching technologies.
  114. Brown, Scott K., Duplicating digital streams for digital conferencing using switching technologies.
  115. Brown, Scott K., Duplicating digital streams for digital conferencing using switching technologies.
  116. Natarajan, Hari; Sahle, Eskinder; Helfinstine, Charles; Oskuie, Chris, Duplicating network traffic through transparent VLAN flooding.
  117. Natarajan, Hari; Sahle, Eskinder; Helfinstine, Charles; Oskuie, Chris, Duplicating network traffic through transparent VLAN flooding.
  118. Weigand, Gilbert G.; Raduchel, William J., Duplicating switch for streaming data units to a terminal.
  119. Weigand, Gilbert G.; Raduchel, William J., Duplicating switch for streaming data units to a terminal using different communication protocols.
  120. Weigand, Gilbert G.; Raduchel, William J., Duplicating switch for streaming data units to a terminal using different communication protocols.
  121. Caudy, Ryan; Kent, IV, David R.; Zeldis, Mark; Dorfman, Nathaniel J.; Wright, Charles; Teodorescu, Radu, Dynamic code loading.
  122. Caudy, Ryan; Kent, IV, David R.; Zeldis, Mark; Dorfman, Nathaniel J.; Wright, Charles; Teodorescu, Radu, Dynamic code loading.
  123. Caudy, Ryan; Kent, IV, David R.; Zeldis, Mark; Dorfman, Nathaniel J.; Wright, Charles; Teodorescu, Radu, Dynamic code loading.
  124. Hauser, Robert R., Dynamic determination of needed agent rules.
  125. Wright, Charles; Caudy, Ryan; Kent, IV, David R.; Zeldis, Mark; Bronnimann, Herve; Teodorescu, Radu, Dynamic filter processing.
  126. Wright, Charles; Caudy, Ryan; Kent, IV, David R.; Zeldis, Mark; Bronnimann, Herve; Teodorescu, Radu, Dynamic filter processing.
  127. Wright, Charles; Caudy, Ryan; Kent, IV, David R.; Zeldis, Mark; Basralian, Raffi; Teodorescu, Radu, Dynamic join processing using real time merged notification listener.
  128. Coates,Joshua L.; Bozeman,Patrick E., Dynamic replication of files in a network storage system.
  129. Wright, Charles; Caudy, Ryan; Kent, IV, David R.; Zeldis, Mark; Teodorescu, Radu, Dynamic table index mapping.
  130. Wright, Charles; Caudy, Ryan; Kent, IV, David R.; Zeldis, Mark; Teodorescu, Radu, Dynamic table index mapping.
  131. Mackler, Russell T., Dynamic trust connection.
  132. Jungck,Peder J.; Najam,Zahid; Nguyen,Andrew T.; Penke,Ramachandra Rao, Edge adapter apparatus and method.
  133. Jungck,Peder J.; Najam,Zahid; Nguyen,Andrew T.; Penke,Ramachandra Rao, Edge adapter architecture apparatus and method.
  134. Dale,Lincoln; Cieslak,Martin, Efficient IP load-balancing traffic distribution using ternary CAMs.
  135. Sewall, Pat; Johnson, Dave, Embedded DNS.
  136. Masters, Richard R., Enabling application level persistence between a server and another resource over a network.
  137. Masters,Richard R., Enabling encryption of application level persistence between a server and a client.
  138. Golshan, Ali; Sankar, Swaminathan; Natham, Venky, Enabling planned upgrade/downgrade of network devices without impacting network sessions.
  139. Golshan, Ali; Sankar, Swaminathan; Natham, Venky, Enabling planned upgrade/downgrade of network devices without impacting network sessions.
  140. Chavez, John Anthony; Ridgard, Leighton, Event dependent notification system and method.
  141. Jacobs,Dean Bernard; Halpern,Eric M., Exactly once JMS communication.
  142. Jacobs,Dean Bernard; Halpern,Eric M., Exactly once cache framework.
  143. Jacobs,Dean Bernard; Halpern,Eric M., Exactly once data framework method.
  144. Jacobs,Dean Bernard; Halpern,Eric M., Exactly once data framework system.
  145. Hauser, Robert R., Execution of a canonical rules based agent.
  146. Neerdaels,Charles J.; Lewin, deceased,Daniel M., Extending an Internet content delivery network into an enterprise.
  147. Jalan, Rajkumar; Kamat, Gurudeep, Facilitating a secure 3 party network session by a network device.
  148. Coates,Joshua L., Failover architecture for a distributed storage system.
  149. Coates,Joshua L.; Bozeman,Patrick E.; Jones,F. Alan; Gautier,Taylor, Failover architecture for local devices that access remote storage.
  150. Schneider, Eric, Fictitious domain name method, system, product, and apparatus.
  151. Schneider, Eric, Fictitious domain name method, system, product, and apparatus.
  152. Van Loo, James, Firmware cache coherence.
  153. Matsubayashi, Don Hideyasu; Martinez, Martin; Muto, Steve Yasuhiro; Sodhi, Ajit Singh, Flexible secure network data transfer and messaging.
  154. Short, Joel E.; Ewan, Ray S.; Sorcsek, Jerome, Gateway device having an XML interface and associated method.
  155. Nosella, Thomas J.; Wilson, Ian Herbert, Gateway load balancing protocol.
  156. Bill, David S.; Brown, Scott K.; Raduchel, William J.; Weigand, Gilbert G.; Amen-Kroeger, Christopher L., Generating multiple data streams from a single data source.
  157. Hsu, Ivy Pei Shan; Cheung, David Chun Ying; Jalan, Rajkumar Ramniranjan, Global server load balancing.
  158. Hsu, Ivy Pei-Shan; Cheung, David Chun Ying; Jalan, Rajkumar Ramniranjan, Global server load balancing.
  159. Hsu, Ivy Pei-Shan; Cheung, David Chun-Ying; Jalan, Rajkumar Ramniranjan, Global server load balancing.
  160. Hsu, Ivy Pei-Shan; Cheung, David Chun-Ying; Jalan, Rajkumar Ramniranjan, Global server load balancing.
  161. Hsu,Ivy Pei Shan; Cheung,David Chun Ying; Jalan,Rajkumar Ramniranjan, Global server load balancing.
  162. Kommula, Sunanda L., Global server load balancing.
  163. Kommula, Sunanda L., Global server load balancing.
  164. Kommula, Sunanda Lakshmi; Hsu, Ivy Pei-Shan; Jalan, Rajkumar; Cheung, David Chun Ying, Global server load balancing.
  165. Kommula,Sunanda Lakshmi; Hsu,Ivy Pei Shan; Jalan,Rajkumar; Cheung,David Chun Ying, Global server load balancing.
  166. Joshi, Prajakta S., Global server load balancing support for private VIP addresses.
  167. Leighton, F. Thomson; Lewin, Daniel M.; Lewin, legal representative, Anne E., HTML delivery from edge-of-network servers in a content delivery network (CDN).
  168. Fullagar, David; Newton, Christopher; Lipstone, Laurence, Handling long-tail content in a content delivery network (CDN).
  169. Fullagar, David; Newton, Christopher; Lipstone, Laurence R., Handling long-tail content in a content delivery network (CDN).
  170. Newton, Christopher; Lipstone, Laurence; Fullagar, David, Handling long-tail content in a content delivery network (CDN).
  171. Halpern, Eric M.; Peddada, Prasad; Messinger, Adam; Jacobs, Dean Bernard; Pullara, Sam, Hardware load-balancing apparatus for session replication.
  172. Davis, Ian E., Hardware-based packet editor.
  173. Davis, Ian E., Hardware-based packet editor.
  174. Davis, Ian E., Hardware-based packet editor.
  175. Davis, Ian E., Hardware-based packet editor.
  176. Hillard, David A.; Anand, Venkataraman, Healing of incomplete circuits in networks.
  177. Chase, Jeffrey Scott; Doyle, Ronald P., Hierarchical load balancing.
  178. Kent, IV, David R.; Caudy, Ryan; Wright, Charles; Vydrov, Oleg; Teodorescu, Radu, Historical data replay utilizing a computer system.
  179. Kim, Jooyong; Abate, Jason Michael, Host migration system.
  180. Joshi, Prajakta S., Host-level policies for global server load balancing.
  181. Joshi, Prajakta S., Host-level policies for global server load balancing.
  182. Joshi, Prajakta S., Host-level policies for global server load balancing.
  183. Sewall, Pat; Johnson, Dave, Hotspot communication limiter.
  184. Mo, Jianxiang, In-server redirection of HTTP requests.
  185. Mo, Jianxiang, In-server redirection of HTTP requests.
  186. Mo, Jianxiang, In-server redirection of HTTP requests.
  187. Mo, Jianxiang, In-server redirection of HTTP requests.
  188. Ooi,Junji, Information processing apparatus and method, recording medium product, and program.
  189. Hauser, Robert R, Initiating construction of an agent in a first execution environment.
  190. Sewall, Patrick; Johnson, David Alan, Initiating router functions.
  191. Brown, Scott K.; Gorman, Bradley Paul; Patterson, Brooke Lamont; Filteau, Mark Lionel; Mason, Kevin Eugene; Manchester, Eric Adam, Inserting advertising content.
  192. Brown, Scott K.; Gorman, Bradley Paul; Patterson, Brooke Lamont; Filteau, Mark Lionel; Mason, Kevin Eugene; Manchester, Eric Adam, Inserting advertising content.
  193. Gupta, Ajit Kumar; Day, Richard David; Swildens, Eric Sven-Johan, Integrated point of presence server network and functionally organized web sites.
  194. Baird, Randall B.; O'Gorman, Liam P.; Friedl, Stephan E.; Mayer, J. Steven; Smyth, Joe, Integrated user interface for unified communications applications.
  195. Baird, Randall B.; O'Gorman, Liam P.; Friedl, Stephan E.; Mayer, J. Steven; Smyth, Joe, Integrated user interface for unified communications applications.
  196. Dubagunta, Saikumar V., Integrating applications in multiple languages.
  197. Goodwin, III, James S.; Jain, Amit; Natarajan, Ravi, Intelligent HTTP based load-balancing, persistence, and application traffic management of SSL VPN tunnels.
  198. Chun, Jon Andre; Hui Hsu, Stephen Dao; Hormuzdiar, James Noshir, Intelligent secure data manipulation apparatus and method.
  199. Li, Xiaodong; Mao, Wei; Tian, Ye; Wang, Wei; Chen, Tao; Ma, Di, Internet address information processing method, apparatus, and internet system.
  200. Holloway, Lee Hahn; Prince, Matthew Browning; Zatlyn, Michelle Marie, Internet-based proxy security services.
  201. Holloway, Lee Hahn; Prince, Matthew Browning, Internet-based proxy service for responding to server offline errors.
  202. Holloway, Lee Hahn; Prince, Matthew Browning, Internet-based proxy service for responding to server offline errors.
  203. Holloway, Lee Hahn; Prince, Matthew Browning; Pye, Ian Gerald, Internet-based proxy service to limit internet visitor connection speed.
  204. Holloway, Lee Hahn; Prince, Matthew Browning; Pye, Ian Gerald, Internet-based proxy service to limit internet visitor connection speed.
  205. Holloway, Lee Hahn; Prince, Matthew Browning; Tourne, Matthieu Philippe François, Internet-based proxy service to modify internet responses.
  206. Holloway, Lee Hahn; Prince, Matthew Browning; Tourne, Matthieu Philippe François, Internet-based proxy service to modify internet responses.
  207. Holloway, Lee Hahn; Prince, Matthew Browning; Tourne, Matthieu Philippe François, Internet-based proxy service to modify internet responses.
  208. June, Deborah C.; Chesebro, Brian, J2EE connector architecture.
  209. Zisapel, Roy; Peles, Amir; Fuks, Smadar, Load balancing.
  210. Freed, Michael; Gannesan, Elango, Load balancing secure sockets layer accelerator.
  211. Tormasov, Alexander G., Load balancing service for servers of a web farm.
  212. Brown, Scott K., Load balancing with direct terminal response.
  213. Kanekar, Bhushan Mangesh; Rajendran, Saravanakumar; Davar, Jonathan, Load sharing and redundancy scheme.
  214. Kanekar, Bhushan Mangesh; Rajendran, Saravanakumar; Davar, Jonathan, Load sharing and redundancy scheme.
  215. Joel, Christopher Stephen; Benterou, Jason Thomas Walter; Holloway, Lee Hahn; Prince, Matthew Browning; Pye, Ian Gerald, Loading of web resources.
  216. Joel, Christopher Stephen; Benterou, Jason Thomas Walter; Holloway, Lee Hahn; Prince, Matthew Browning; Pye, Ian Gerald, Loading of web resources.
  217. Seed, Steven L.; Hobbs, Kevin; Glynn, Shane M.; Foraker, Isaac W.; Jones, Peter J.; Chen, Homer H.; Greer, William Patrick, Managed object replication and delivery.
  218. Seed, Steven L.; Hobbs, Kevin; Glynn, Shane M.; Foraker, Isaac W.; Jones, Peter J.; Chen, Homer H.; Greer, William Patrick, Managed object replication and delivery.
  219. Rao, Anureita; Gupta, Mohit, Management of streaming media playlists.
  220. Sankaran, Ganesh Chennimalai, Managing sequence values with added headers in computing devices.
  221. Chang, Rong-Wen, Mechanism for enabling a program to be executed while the execution of an operating system is suspended.
  222. Chang,Rong Wen, Mechanism for intuitively invoking one or more auxiliary programs during a computer booting process.
  223. Wright, Charles; Caudy, Ryan; Kent, IV, David R.; Zeldis, Mark; Basralian, Raffi; Teodorescu, Radu, Memory-efficient computer system for dynamic updating of join processing.
  224. Almeras, Arnaud; Jaussoin, Thomas, Metasearch redirection system and method.
  225. Dashora, Vinod; Kumar, Sandeep, Method and apparatus for adaptive application message payload content transformation in a network infrastructure element.
  226. Dashora, Vinod; Kumar, Sandeep, Method and apparatus for adaptive application message payload content transformation in a network infrastructure element.
  227. Schmeidler, Yonah; Atkins, Derek; Eichin, Mark W.; Rostcheck, David J., Method and apparatus for content protection in a secure content delivery system.
  228. Gupta, Amit; Baehr, Geoffrey, Method and apparatus for dynamic proxy insertion in network traffic flow.
  229. Gupta, Amit; Baehr, Geoffrey, Method and apparatus for dynamic proxy insertion in network traffic flow.
  230. Hsu, Stephen Dao Hui; Hormuzdiar, James Noshir; Chun, Jon A, Method and apparatus for encrypted communications to a secure server.
  231. Hsu,Stephen Dao Hui; Hormuzdiar,James Noshir; Chun,Jon A, Method and apparatus for encrypted communications to a secure server.
  232. Hui Hsu, Stephen Dao; Hormuzdiar, James Noshir, Method and apparatus for encrypted communications to a secure server.
  233. Deng, Xuelai, Method and apparatus for equalizing load of streaming media server.
  234. Deng, Xuelai, Method and apparatus for equalizing load of streaming media server.
  235. Jungck,Peder J., Method and apparatus for facilitating client server communications over a network.
  236. Ramarao, Karempudi; Anthias, Jr., Tefcros; Potti, Sunil; Kumar, Sandeep; Cho, Stephen; Chan, Alex Yin-Man; Jin, Yi; Ho, Ricky, Method and apparatus for high-speed processing of structured application messages in a network device.
  237. Ramarao, Karempudi; Anthias, Tefcros; Potti, Sunil; Kumar, Sandeep; Cho, Stephen; Chan, Alex Yiu-Man; Jin, Yi; Ho, Ricky, Method and apparatus for high-speed processing of structured application messages in a network device.
  238. Moriarty,Kathleen M., Method and apparatus for intercepting performance metric packets for improved security and intrusion detection.
  239. Burckart, Erik John; Cammarata, John Paul; Morton, Michael John, Method and apparatus for proxying initial client requests to support asynchronous resource initialization.
  240. Kirsch, Steven T.; Lindblad, Christopher J., Method and apparatus for redirection of server external hyper-link references.
  241. Kirsch, Steven T.; Lindblad, Christopher J., Method and apparatus for redirection of server external hyper-link references.
  242. Kirsch, Steven T.; Lindblad, Christopher J., Method and apparatus for redirection of server external hyper-link references.
  243. Kwan, Bill K.; Gorti, Atchyuth K.; Hack, Norm; Kaplan, David, Method and apparatus for saving and restoring soft repair data.
  244. Schmeidler, Yonah; Atkins, Derek; Eichin, Mark W.; Rostcheck, David J., Method and apparatus for secure content delivery over broadband access networks.
  245. Pullara,Sam; Halpern,Eric M.; Peddada,Prasad; Messinger,Adam; Jacobs,Dean Bernard, Method and apparatus for session replication and failover.
  246. Zavalkovsky,Arthur, Method and apparatus for simulating a load on an application server in a network.
  247. Oliveira,Fred; D'Errico,Matthew J.; Rodgers,Kevin, Method and apparatus for using multiple paths for processing out of band commands.
  248. Rothman,Michael A.; Zimmer,Vincent J., Method and apparatus to enhance platform boot efficiency.
  249. Yamaguchi,Kohei; Chimura,Yasubumi; Sakano,Tsuneyuki, Method and device for connecting networks.
  250. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan K. R., Bharath; Kumar, Anil, Method and device for performing caching of dynamically generated objects in a data communication network.
  251. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan K.R., Bharath; Kumar, Anil, Method and device for performing caching of dynamically generated objects in a data communication network.
  252. Khemani, Prakash; Sundarrajan, Prabakar; Kumar, Lakshmi; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravanakumar, Method and device for performing integrated caching in a data communication network.
  253. Hericourt, Olivier, Method and system for caching HTTP data transported with socks data in IP datagrams.
  254. Berg, Mitchell T., Method and system for communicating a request packet in response to a state.
  255. Berg,Mitchell T., Method and system for communicating an information packet through multiple networks.
  256. Berg, Mitchell T., Method and system for communicating an information packet through multiple router devices.
  257. Berg, Mitchell T., Method and system for communicating an information packet through multiple router devices.
  258. Connell, Brian; Acton, Paul, Method and system for communication between computer systems.
  259. Lamberton, Marc; Levy-Abegnoli, Eric; Montagnon, Eric; Thubert, Pascal, Method and system for dispatching client sessions within a cluster of servers connected to the world wide web.
  260. Berg,Mitchell T., Method and system for establishing a data structure of a connection with a client.
  261. Berg,Mitchell T., Method and system for executing protocol stack instructions to form a packet for causing a computing device to perform an operation.
  262. Saxena, Avinash C., Method and system for generating values for a request for caching of content items.
  263. Berg,Mitchell T., Method and system for identifying a computing device in response to a request packet.
  264. Berg,Mitchell T., Method and system for identifying a computing device in response to an information packet.
  265. Berg,Mitchell T., Method and system for initiating execution of software in response to a state.
  266. Sloat, David E.; Kearny, Ryan C., Method and system for inserting POST data into the GET request to apply normal caching rules.
  267. Bhatti, Nina T.; Abdelzaher, Tarek Farouk, Method and system for maintaining a content server at safe load conditions.
  268. Giroir, Didier; Hericourt, Olivier, Method and system for optimally dispatching internetwork traffic.
  269. James, Zackary Antone, Method and system for processing a service request associated with a particular priority level of service in a network data processing system using parallel proxies.
  270. James,Zackary Antone, Method and system for processing a service request associated with a particular priority level of service in a network data processing system using parallel proxies.
  271. Stannard, Liam; Huff, Brandon; Burns, Jason; Taketa, Bryan; Onyon, Jr., Richard, Method and system for promoting and transferring licensed content and applications.
  272. Giroir,Didier; Hericourt,Olivier, Method and system for providing SNA access to telnet 3270 and telnet 3270 enhanced services over wide area networks.
  273. Hughes, John R.; Masters, Richard Roderick; Gilde, Robert George, Method and system for providing persistence in a secure network access.
  274. Hughes, John R.; Masters, Richard Roderick; Gilde, Robert George, Method and system for providing persistence in a secure network access.
  275. Hughes, John R.; Masters, Richard Roderick; Gilde, Robert George, Method and system for providing persistence in a secure network access.
  276. Tock, Theron; Xia, Zeqing, Method and system for providing secure access to private networks.
  277. Tock, Theron; Xia, Zeqing, Method and system for providing secure access to private networks.
  278. Tock, Theron; Xia, Zeqing, Method and system for providing secure access to private networks.
  279. Berg, Mitchell T., Method and system for selecting a computing device for maintaining a client session in response to a request packet.
  280. Berg, Mitchell T., Method and system for selecting a computing device for maintaining a client session in response to a request packet.
  281. Dilley,John A.; Berkheimer,Andrew D., Method and system for tiered distribution in a content delivery network.
  282. Gerthe, John David, Method and system for transparent file proxying.
  283. Saxena, Avinash C., Method and system for uniform resource locator transformation.
  284. Saxena, Avinash C., Method and system for uniform resource locator transformation.
  285. Kommula, Sunanda L., Method and system to clear counters used for statistical tracking for global server load balancing.
  286. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Method and systems for routing packets from a gateway to an endpoint.
  287. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Method and systems for routing packets from a gateway to an endpoint.
  288. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Method and systems for securing remote access to private networks.
  289. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Method and systems for securing remote access to private networks.
  290. Daruwalla, Feisal; Forster, James R.; Roeck, Guenter E.; Chapman, John T.; Zang, Joanna Qun; Lu, Yong, Method for a cable modem to rapidly switch to a backup CMTS.
  291. Fung, Priscilla C.; Somogyi, Alexander J., Method for highly available transaction recovery for transaction processing systems.
  292. Roy, Ronald J.; Jacob, Mark L., Method for host selection based on discovered NAT type.
  293. Ridel, Leonid; Tumarkin, Valentin, Method for load balancing of requests' processing of diameter servers.
  294. Ridel, Leonid; Tumarkin, Valentin, Method for load balancing of requests' processing of diameter servers.
  295. Backman, Jan, Method for modifying MSS.
  296. Majee, Sumandra, Method for optimizing remote file saves in a failsafe way.
  297. Gray, Robert H M, Method for processing a request for access to a data network.
  298. Mochida, Kei; Homma, Hideki, Method of bandwidth control by rewriting ACK number.
  299. Pannu, Jatinder Singh, Method system, and program for dynamic resource linking when copies are maintained at different storage locations.
  300. Kamat, Gurudeep; Davis, Ian E.; Jalan, Rajkumar, Method to process HTTP header with hardware assistance.
  301. Brodsky, Elizabeth Adleberg; Elnozahy, Elmootazbellah Nabil; Rajamony, Ramakrishnan, Method, apparatus and computer program product to crawl a web site.
  302. Schneider, Eric, Method, product, and apparatus for enhancing resolution services, registration services, and search services.
  303. Schneider, Eric, Method, product, and apparatus for enhancing resolution services, registration services, and search services.
  304. Schneider, Eric, Method, product, and apparatus for processing a data request.
  305. Schneider, Eric, Method, product, and apparatus for requesting a network resource.
  306. Schneider,Eric, Method, product, and apparatus for requesting a network resource.
  307. Dutta,Rabindranath, Method, system, and computer program product to redirect requests from content servers to load distribution servers and to correct bookmarks.
  308. Coates,Joshua L.; Bozeman,Patrick E., Methods and apparatus for accessing remote storage through use of a local device.
  309. Morris,Stephen; Clarkson,Richard, Methods and apparatus for delivery of content requests within a content delivery network.
  310. Siegel, Kenneth P., Methods and apparatus for directing a flow of data between a client and multiple servers.
  311. Siegel,Kenneth P., Methods and apparatus for directing a flow of data between a client and multiple servers.
  312. Jawahar, Janardhanan; Dilip, Venkatachari, Methods and apparatus for enabling dynamic resource collaboration.
  313. Jawahar, Janardhanan; Dilip, Venkatachari, Methods and apparatus for enabling dynamic resource collaboration.
  314. Coates,Joshua L.; Bozeman,Patrick E.; Landrum,Alfred Gary; Mattis,Peter D.; Nalam,Naveen; Roselli,Drew S., Methods and apparatus for load balancing storage nodes in a distributed network attached storage system.
  315. Coates, Joshua L.; Bozeman, Patrick E.; Landrum, Alfred Gary; Mattis, Peter D.; Nalam, Naveen; Roselli, Drew S., Methods and apparatus for load balancing storage nodes in a distributed storage area network system.
  316. Aviani, James A.; Sutton, Carl D.; Gourlay, Douglas A., Methods and apparatus for managing access to data through a network device.
  317. Coates,Joshua L.; Bozeman,Patrick E.; Gautier,Taylor, Methods and apparatus for off loading content servers through direct file transfer from a storage center to an end-user.
  318. Kwok, Danny; Tiwana, Gurumukh S.; Aviani, Jr., James A.; Cieslak, Martin; Kagan, Martin A., Methods and apparatus for redirecting network traffic.
  319. Liskov, Barbara; Carr, John F., Methods and apparatus for redirecting requests for content.
  320. Liskov, Barbara; Carr, John F., Methods and apparatus for redirecting requests for content.
  321. Holloway, Lee Hahn; Prince, Matthew Browning; Pye, Ian Gerald; Tourne, Matthieu Philippe François; Zatlyn, Michelle Marie, Methods and apparatuses for providing Internet-based proxy services.
  322. Thornewell, Peter M.; Baker, Christopher R., Methods for DNSSEC proxying and deployment amelioration and systems thereof.
  323. Jain, Amit; Martynenko, Konstantin; Costlow, Jeff; Holmes, David, Methods for dynamically constructing a service principal name and devices thereof.
  324. Michels, Timothy S.; Johnson, C Stuart, Methods for improving flow cache bandwidth utilization and devices thereof.
  325. Amdahl, Saxon, Methods for managing progressive image delivery and devices thereof.
  326. Natarajan, Ravi; Amdahl, Saxon, Methods for managing traffic in a multi-service environment and devices thereof.
  327. Walker, Anthony; Bellhart, Michael, Methods for optimizing service of content requests and devices thereof.
  328. MacVittie, Lori, Methods for provisioning application delivery service and devices thereof.
  329. Amdahl, Saxon; Majee, Sumandra; Shukla, Rajendra, Methods for traffic rate control and devices thereof.
  330. Schneider, Eric, Methods, systems, products, and devices for processing DNS friendly identifiers.
  331. Schneider, Eric, Methods, systems, products, and devices for processing DNS friendly identifiers.
  332. Ridgard, Leighton A.; Garner, Robert E.; Multer, David L.; Stannard, Liam J.; Cash, Donald W.; Onyon, Richard M.; Huff, Brandon; Burns, Jason; Taketa, Bryan, Mobile data transfer and synchronization system.
  333. Neuert, Holger; Hoerisch, Michael; Breitkopf, Stefan, Mobile device interface generator.
  334. Patoskie, John P.; Hauser, Robert R., Mobile device tracking using mobile agent location breadcrumbs.
  335. Arsenault, David, Modifying browser requests to track browsing activities.
  336. Brown, Scott K., Modifying payloads of digital streams for digital conferencing.
  337. Wang, Bing; Cheung, David, Monitoring server load balancing.
  338. Wang, Bing; Cheung, David, Monitoring server load balancing.
  339. Hauser, Robert R., Movement of an agent that utilizes a compiled set of canonical rules.
  340. Patoskie, John P., Moving an agent from a first execution environment to a second execution environment.
  341. Hauser, Robert R., Moving an agent from a first execution environment to a second execution environment using supplied and resident rules.
  342. Hauser, Robert R., Moving and agent with a canonical rule from one device to a second device.
  343. Takeda, Yutaka; White, Payton R.; Marr, James E.; Detwiler, Stephen C., NAT traversal for mobile network devices.
  344. Ridel, Leonid; Nas, Petrus Wilhelmus Andrianus Jacobus Maria, National traffic steering device for a better control of a specific wireless/LTE network.
  345. Dingsor,Andrew D.; Lanzen,Craig A., Network Address Translation and Port Mapping.
  346. Lamb,Richard H.; Guzovsky,Eduard, Network access control using network address translation.
  347. March,Sean W.; Sollee,Patrick N.; McKnight,David W., Network address and/or port translation.
  348. Albert, Mark; Howes, Richard A.; Jordan, James A.; Kersey, Edward A.; LeBlanc, William M.; McGuire, Jacob Mark; Menditto, Louis F.; O'Rourke, Chris; Tiwari, Pranav Kumar; Tsang, Tzu-Ming, Network address translation using a forwarding agent.
  349. Takeda, Yutaka; Marr, James E.; Detwiler, Stephen C.; Vass, Attila; White, Payton R., Network bandwidth detection and distribution.
  350. Takeda, Yutaka; Marr, James E.; Detwiler, Stephen C.; Vass, Attila; White, Payton R., Network bandwidth detection and distribution.
  351. Takeda, Yutaka; Marr, James E.; White, Payton R., Network communication with path MTU size discovery.
  352. Hartrick, Timothy W.; Kazerani, Alexander A.; Sakata, Jayson G., Network connection hand-off and hand-back.
  353. Hartrick, Timothy W.; Kazerani, Alexander A.; Sakata, Jayson G., Network connection hand-off using state transformations.
  354. Hartrick, Timothy W.; Kazerani, Alexander A.; Sakata, Jayson G., Network connection hand-off using state transformations.
  355. Ochiai, Masato, Network device control apparatus, network device control method, network device control program, and computer-readable recording medium storing network device control program therein.
  356. Shibata,Atsushi, Network management system.
  357. Sørensen, Lauge S., Network processor for cache array routing.
  358. Schneider, Eric, Network resource access method, product, and apparatus.
  359. Coates,Joshua L.; Jones,F. Alan; Russell,Georgina L.; Gonzalez,Michael; Bozeman,Patrick E.; Gautier,Taylor; Patterson,David A., Network storage system.
  360. ParandehGheibi, Ali; Barry, Richard, Non-intrusive proxy system and method for applications without proxy support.
  361. ParandehGheibi, Ali; Barry, Richard, Non-intrusive proxy system and method for applications without proxy support.
  362. Morton, Gary D.; Thornton, Paul R.; Pressley, Ryan; Shaughnessy, Robert John; Vange, Mark; Plumb, Mark; Kouts, Michael; Wilson, Glenn Sydney, Optimization of enhanced network links.
  363. Kent, IV, David R.; Caudy, Ryan; Wright, Charles; Zeldis, Mark; Teodorescu, Radu, Parsing and compiling data system queries.
  364. Harris, Adam Pierce; Gordon, Jeremy Joseph; Jacob, Mark, Peer to peer network communication.
  365. Takeda, Yutaka, Peer-to-peer communication traversing symmetric network address translators.
  366. Wheeler, Thomas T., Performing operations by a first functionality within a second functionality in a same or in a different programming language.
  367. Creamer, Thomas E.; Hilf, Bill H.; Jaiswal, Peeyush; Mirt, Michael H., Performing tests with ghost agents.
  368. Teodorescu, Radu; Caudy, Ryan; Kent, IV, David R.; Wright, Charles; Dorfman, Nathan; Ries, Brian, Persistent query dispatch and execution architecture.
  369. Onyon, Richard M.; Stannard, Liam J.; Ridgard, Leighton A., Personal information space management system and method.
  370. Schaefer, Stuart; Schmeidler, Yonah; Levin, Ilya, Policy based composite file system and method.
  371. Srisuresh, Pyda; Murgia, Marco A.; Gunuganti, Ramakanth, Policy based network address translation.
  372. Srisuresh, Pyda; Murgia, Marco A.; Gunuganti, Ramakanth, Policy based network address translation.
  373. Brown, Scott K., Prioritizing digital streams during digital conferencing.
  374. Arsenault, David, Processing browser requests based on trap lists.
  375. Arsenault, David, Processing browser requests to provide multiple portions of content having a consistent appearance.
  376. Harada, Larry T.; Dolecki, Mark A.; Purdum, Christopher S; Hendren, III, C. Hudson, Processing data using information embedded in a data request.
  377. Kamat, Gurudeep; Davis, Ian E.; Jalan, Rajkumar, Processing packet header with hardware assistance.
  378. Arsenault, David, Processing selected browser requests.
  379. Arsenault, David, Processing selected browser requests.
  380. Arsenault, David, Processing selected browser requests.
  381. Sollee, Patrick N., Providing network address translation information.
  382. Sollee, Patrick N., Providing telephony services to terminals behind a firewall and/or a network address translator.
  383. Sollee, Patrick N., Providing telephony services to terminals behind a firewall and/or a network address translator.
  384. Vogt,David, Provision of transparent proxy services to a user of a client device.
  385. Nathan,Abraham; Valloppillil,Vinod V., Proxy network address translation.
  386. Wheeler, Thomas T, Proxy object creation and use.
  387. Kent, IV, David R.; Caudy, Ryan; Wright, Charles; Dorfman, Nathaniel J.; Teodorescu, Radu, Query dispatch and execution architecture.
  388. Teodorescu, Radu; Caudy, Ryan; Kent, IV, David R.; Wright, Charles; Ferretti-Smythe, Juan Cristian; Ries, Brian, Remote data object publishing/subscribing system having a multicast key-value protocol.
  389. Tate, Patrick Darrell; Waterman, Alexander S.; Grimm, Martin David; Kahol, Anurag, Reproxying an unproxied connection.
  390. Jellinek, Herbert D., Reverse proxy mechanism for retrieving electronic content associated with a local network.
  391. Deen, Brian; Hopmann, Alex; Soderberg, Joel, Routing client requests to back-end servers.
  392. Chen, Xiaochu; Hsu, Ivy Pei-Shan; Chinthalapati, Eswara; Chhabria, Sanjeev, Rule-based network traffic interception and distribution scheme.
  393. Chen, Xiaochu; Hsu, Ivy Pei-Shan; Chinthalapati, Eswara; Chhabria, Sanjeev, Ruled-based network traffic interception and distribution scheme.
  394. Van Loo, James, Scalable transfer feedback.
  395. Schneider, Eric; Schneider, Steven; Heintz, Daniel V., Search engine request method, product, and apparatus.
  396. Schneider, Eric; Schneider, Steven; Heintz, Daniel V., Search engine request method, product, and apparatus.
  397. Harada, Larry T.; Dolecki, Mark A.; Purdum, Christopher S; Hendren, III, C. Hudson, Secure data exchange.
  398. Harada, Larry T.; Dolecki, Mark A.; Purdum, Christopher S; Hendren, III, C. Hudson, Secure data exchange based on request destination.
  399. Harada, Larry T.; Dolecki, Mark A.; Purdum, Christopher S.; Hendren, III, C. Hudson, Secure data exchange between data processing systems.
  400. Harada, Larry T.; Dolecki, Mark A.; Purdum, Christopher S; Hendren, III, C. Hudson, Secure data exchange between data processing systems.
  401. Harada, Larry T.; Dolecki, Mark A.; Purdum, Christopher S; Hendren, III, C. Hudson, Secure data exchange for processing requests.
  402. Freed, Michael; Gannesan, Elango, Secure sockets layer proxy architecture.
  403. Freed,Michael; Gannesan,Elango, Secure sockets layer proxy architecture.
  404. Takechi,Hideaki; Kato,Naonori; Takeda,Hidetoshi; Yamamura,Toshiki; Hamai,Shinji; Kunihira,Tadashi, Secured TCP/IP communication system for devices and private networks connected to the internet.
  405. Sewall, Patrick; Johnson, David Alan; Wood, Steven, Selecting a data path.
  406. Martini, Paul Michael, Selectively altering references within encrypted pages using man in the middle.
  407. Ims,Steven D.; Lindquist,David B., Selectively handling data processing requests in a computer communications network.
  408. Martini, Paul Michael, Selectively performing man in the middle decryption.
  409. Martini, Paul Michael, Selectively performing man in the middle decryption.
  410. Seed, Steven L.; Hobbs, Kevin; Glynn, Shane M.; Foraker, Isaac W.; Jones, Peter J.; Chen, Homer H., Server handoff in content delivery network.
  411. Seed, Steven L.; Hobbs, Kevin; Glynn, Shane M.; Foraker, Isaac W.; Jones, Peter J.; Chen, Homer H.; Greer, William Patrick, Server handoff in content delivery network.
  412. Tormasov,Alexander, Server load balancing system.
  413. Thomas, Anil; Viveganandhan, Mahesh Chakravarthy Vittal; Koroth, Dipak Punnoran, Server selection for routing content to a client using application layer redirection.
  414. Greschler, David M.; Schaefer, Stuart, Serving software applications from servers for client computers.
  415. Greschler, David M.; Schaefer, Stuart, Serving software applications from servers to client computers.
  416. Mukherjee, Sarit; Rangarajan, Sampath; Rodriguez, Pablo, Session level technique for improving web browsing performance on low speed links.
  417. Hsu, Ivy Pei-Shan; Chhabria, Sanjeev Nand; Chen, Xiaochu; Munshi, Sanjay; Narasimhan, Arvindsrinivasan Lakshmi, Session-based packet routing for facilitating analytics.
  418. Sabiers, Mark L.; Davidson, David Christopher; Knitter, Jay D.; Grush, Donna J.; Martin, Terry M.; Southam, Blaine R., Simulation of network service test environments.
  419. Devanneaux, Thomas P.; Kovacs, Laszlo; Ludin, Stephen L., Site acceleration with content prefetching enabled through customer-specific configurations.
  420. Schneider, Eric, Sitemap access method, product, and apparatus.
  421. Joshi, Prajakta S., Smoothing algorithm for round trip time (RTT) measurements.
  422. Joshi, Prajakta S., Smoothing algorithm for round trip time (RTT) measurements.
  423. Joshi,Prajakta S., Smoothing algorithm for round trip time (RTT) measurements.
  424. Hegde, Deepak; Sharma, Shailender; Varimalla, Rakesh; Pragash, Vedam Jude; Dasgupta, Shubharanjan, Software-based packet broker.
  425. Ostrowski, Martin Andrew, Spoofing technique for transparent proxy caching.
  426. Joshi, Prajakta Suresh; Kommula, Sunanda Lakshmi, Statistical tracking for global server load balancing.
  427. Joshi,Prajakta Suresh; Kommula,Sunanda Lakshmi, Statistical tracking of global server load balancing for selecting the best network address from ordered list of network addresses based on a set of performance metrics.
  428. Baird, Randall B.; Friedl, Stephan E.; Wesselman, Thomas M., Survivable browsing in virtualized desktop environment when host connectivity is lost.
  429. Wheeler, Thomas T.; Patoskie, John P., Survival rule usage by software agents.
  430. Bar-Yaacov, Assaf; Aviran, Sharon, System and a method for accelerating communication of TCP/IP based content.
  431. Bar Yaacov,Assaf; Aviran,Sharon, System and a method for accelerating communication of TCP/IP based content through the use of fake host names.
  432. Tighe,James R.; Higgins,Ronald D.; Platt,Richard B.; Bell,Robert T., System and method for a virtual telephony intermediary.
  433. Pagan, Florence C. I.; Short, Joel E., System and method for authorizing a portable communication device.
  434. Menon,Rama R., System and method for automatic stream fail-over.
  435. Sans, Charles; Bouche, Jean-Yves, System and method for caching of reusable objects.
  436. Tang,Wenting; Cherkasova,Ludmila; Fu,Yun, System and method for collecting desired information for network transactions at the kernel level.
  437. Sewall, Patrick; Johnson, David Alan, System and method for collecting individualized network usage data in a personal hotspot wireless network.
  438. Einarson, Jeffrey W.; Manepally, Narayan R.; Wood, Holland J., System and method for content caching implementing compensation for providing caching services.
  439. Chong, Lester J; Makaijani, Michael; Cheline, Douglas, System and method for content filtering.
  440. Chen, Lee; Szeto, Ronald Wai Lun, System and method for distributed multi-processing security gateway.
  441. Chen, Lee; Szeto, Ronald Wai Lun, System and method for distributed multi-processing security gateway.
  442. Leppinen,Mika, System and method for effective use of air link between mobile stations and gateway servers.
  443. Amir, Ofir; Mahat, Einat; Amizur, Or; Dekel, Ohad, System and method for efficient caching and delivery of adaptive bitrate streaming.
  444. Pearce,Christopher E.; Whetten,Delon R.; Michalewicz,Larry G., System and method for enabling multicast telecommunications.
  445. Jacobson,Van; Poduri,Kedar, System and method for establishing a secure connection.
  446. Sundarrajan, Prabakar; He, Junxiao; Soni, Ajay; Nanjundaswamy, Shashidhara; Kumar, Arkesh, System and method for establishing a virtual private network.
  447. Sundarrajan, Prabakar; He, Junxiao; Soni, Ajay; Nanjundaswamy, Shashidhara; Kumar, Arkesh, System and method for establishing a virtual private network.
  448. Short, Joel E.; Kleinrock, Leonard, System and method for establishing network connection.
  449. Short, Joel E.; Kleinrock, Leonard, System and method for establishing network connection.
  450. Sloss,Reed J., System and method for fault tolerant stream splitting.
  451. Jacobs,Dean Bernard; Woollen,Rob; White,Seth, System and method for flushing bean cache.
  452. Gnagy,Matthew R.; Champagne,Jean Philippe; Aviani,James A.; Lueckenhoff,Bruce Arthur; O'Toole, Jr.,James W., System and method for generalized URL-rewriting.
  453. Vogel,Claude, System and method for generating a taxonomy from a plurality of documents.
  454. Mousseau,Richard; Mukherjee,Prasenjit; June,Deborah C., System and method for implementing J2EE connector architecture.
  455. Vange, Mark; Plumb, Mark; Kouts, Michael; Wilson, Glenn Sydney, System and method for implementing application functionality within a network infrastructure.
  456. Vange, Mark; Plumb, Mark; Kouts, Michael; Wilson, Glenn Sydney, System and method for implementing application functionality within a network infrastructure.
  457. Jaffray,Andrew J.; Polson,Michael J., System and method for locating web services.
  458. Pearce, Christopher E.; Whetten, Delon R.; Higgins, Ronald D.; Henning, Scott, System and method for maintaining a communication link.
  459. Smith, Jack J.; Burright, Richard T.; Worley, III, W. Spencer; MacDonell, Eoin B.; Vastano, John A.; Weatherford, William T., System and method for managing connections between a client and a server.
  460. McBrearty, Gerald Francis; Mullen, Shawn Patrick; Shieh, Johnny Meng-Han; Venkataraman, Guha Prasad, System and method for managing multiple proxy servers.
  461. Masters, Richard R., System and method for performing application level persistence.
  462. Masters, Richard R., System and method for performing application level persistence.
  463. Masters, Richard Roderick, System and method for performing application level persistence.
  464. Masters, Richard Roderick, System and method for performing application level persistence.
  465. Masters,Richard R., System and method for performing application level persistence.
  466. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan KR, Bharath; Kumar, Anil, System and method for performing flash caching of dynamically generated objects in a data communication network.
  467. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; K.R., Bharat Bhushan; Kumar, Anil, System and method for performing flash caching of dynamically generated objects in a data communication network.
  468. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bushan K. R., Bharath; Kumar, Anil, System and method for performing flash crowd caching of dynamically generated objects in a data communication network.
  469. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan KR, Bharath; Kumar, Anil, System and method for performing granular invalidation of cached dynamically generated objects in a data communication network.
  470. Adrangi, Farid, System and method for populating cache servers with popular media contents.
  471. Menditto, Louis F.; Housel, Barron C.; Tsang, Tzu-Ming; Zallocco, Mauro; Shah, Gaurang K.; Vilhuber, Jan; Bhargava, Anurag; Tiwari, Pranav K.; Batz, Robert M.; Brim, Scott W., System and method for processing a request for information in a network.
  472. Menditto,Louis F.; Housel,Barron C.; Tsang,Tzu Ming; Zallocco,Mauro; Shah,Gaurang K.; Vilhuber,Jan; Bhargava,Anurag; Tiwari,Pranav K.; Batz,Robert M.; Brim,Scott W., System and method for processing a request for information in a network.
  473. Jungck, Peder J., System and method for processing packets according to concurrently reconfigurable rules.
  474. Jungck, Peder J., System and method for processing packets according to user specified rules governed by a syntax.
  475. Jungck,Peder J., System and method for processing packets using location and content addressable memories.
  476. Jacobs, Dean Bernard; Woollen, Robert; White, Seth, System and method for providing a cache that stores entity beans and employs data invalidation.
  477. Tighe, James R.; Higgins, Ronald D.; Platt, Richard B.; Bell, Robert T., System and method for providing security in a telecommunication network.
  478. Tighe,James R.; Higgins,Ronald D.; Platt,Richard B.; Bell,Robert T., System and method for providing security in a telecommunication network.
  479. Onyon, Richard; Pakarinen, Tony; Tani, William; Jellinek, Herb, System and method for providing social context to digital activity.
  480. O'Rourke,Chris; Batz,Robert M., System and method for providing source awareness in a network environment.
  481. Fu,Yun; Cherkasova,Ludmila; Tang,Wenting, System and method for reconstructing client web page accesses from captured network packets.
  482. Cherkasova, Ludmila; Fu, Yun; Tang, Wenting, System and method for relating aborted client accesses of data to quality of service provided by a server in a client-server network.
  483. Soderberg, Joel; Deen, Brian; Hopmann, Alex, System and method for transparently redirecting client requests for content using a front-end indicator to preserve the validity of local caching at the client system.
  484. Eisenberg, Alfred J.; Thompson, John A.; Bundy, David O., System and method for traversing firewalls, NATs, and proxies with rich media communications and other application protocols.
  485. Srinivasan, Ananthan; Kramer, Reto; Jacobs, Dean B., System and method for using a data replication service to manage a configuration repository.
  486. Amdahl, Saxon, System and method for utilizing a data reducing module for dictionary compression of encoded data.
  487. McCann, Benjamin E., System and method of algorithmically generating a server side transaction identifier.
  488. Li, Qing; Frederick, Ronald, System and method of delaying connection acceptance to support connection request processing at layer-7.
  489. Ramanathan, Venkataraman; Srinivas, Nk; Eydelman, Vadim; Gbadegesin, Abolade, System and method of enhancing web server throughput in single and multiple processor systems.
  490. Ramanathan,Venkataraman; Srinivas,Nk; Eydelman,Vadim; Gbadegesin,Abolade, System and method of enhancing web server throughput in single and multiple processor systems.
  491. Baentsch, Michael; Hermann, Reto; Kramp, Thorsten; Weigold, Thomas D.; Buhler, Peter; Eirich, Thomas; Visegrady, Tamas; Hoering, Frank; Kuyper-Hammond, Michael P., System and method of performing electronic transactions.
  492. Ranganath, Panduranga, System for and method of field mapping.
  493. Onyon, Richard; Stannard, Liam; Ridgard, Leighton, System for and method of updating a personal profile.
  494. Fung,Priscilla C.; Somogyi,Alexander J., System for highly available transaction recovery for transaction processing systems.
  495. Ferguson, JC; Cain, Bradley E.; Heneghan, Kevin, System for mitigating file virtualization storage import latency.
  496. Barde,Kaushik; Hartman,Richard; Rebala,Gopinath, System for reducing server loading during content delivery.
  497. Dilley, John A.; Berkheimer, Andrew D., System for tiered distribution in a content delivery network.
  498. Kent, IV, David R.; Caudy, Ryan; Wright, Charles; Teodorescu, Radu, System performance logging of complex remote query processor query operations.
  499. Raphel, Jose Kolencheril; Kailash, Kailash; Susai, Michel K., System, method and computer program product to maximize server throughput while avoiding server overload by controlling the rate of establishing server-side net work connections.
  500. Raphel, Jose K.; Kailash, Kailash; Susai, Michel K., System, method and computer program product to maximize server throughput while avoiding server overload by controlling the rate of establishing server-side network connections.
  501. Lamberton, Marc; Levy-Abegnoli, Eric; Thubert, Pascal, System, method and program product for providing invisibility to a proxy-server.
  502. Klinefelter, Robert Glenn; Piccionelli, Gregory A., System, method, and apparatus for providing interpretive communication on a network.
  503. Dubagunta, Saikumar V., System, method, and computer readable medium for integrating an original application with a remote application.
  504. Dubagunta, Saikumar V., System, method, and computer readable medium for integrating an original language application with a target language application.
  505. Lipari, Paul A.; Wheeler, Thomas T.; Patoskie, John P., System, method, and computer readable medium for processing a message in a transport.
  506. Cowin, Gregory L., System, method, and computer readable medium for processing a message queue.
  507. Odom, Wayne; Gee, Karolyn, System, method, and device for communicating and storing and delivering data.
  508. Odom, Wayne; Gee, Karolyn, System, method, and device for communicating and storing and delivering data.
  509. Odom, Wayne; Gee, Karolyn, System, method, and device for communicating and storing and delivering data.
  510. Odom, Wayne; Gee, Karolyn, System, method, and device for delivering communications and storing and delivering data.
  511. Odom, Wayne; Gee, Karolyn, System, method, and device for delivering communications and storing and delivering data.
  512. Odom, Wayne; Gee, Karolyn, System, method, and device for storing and delivering data.
  513. Pagan, Florence C. I.; Short, Joel E., Systems and methods for authorizing, authenticating and accounting users having transparent computer access to a network using a gateway device.
  514. Halpern,Eric M., Systems and methods for automated service migration.
  515. Sundarrajan, Prabakar; He, Junxiao; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil, Systems and methods for automatic installation and execution of a client-side acceleration program.
  516. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for client-side application-aware prioritization of network communications.
  517. Southam, Blaine R., Systems and methods for collecting data regarding network service operation.
  518. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for communicating a lossy protocol via a lossless protocol.
  519. Rao, Goutham P.; Rodriguez, Robert; Brueggemann, Eric, Systems and methods for communicating a lossy protocol via a lossless protocol using false acknowledgements.
  520. Raphel, Jose Kolencheril; Kailash, Kailash; Susai, Michel K., Systems and methods for controlling the number of connections established with a server.
  521. Short, Joel E.; Jacquet-Pagan, Florence; Goldstein, Joshua J., Systems and methods for controlling user perceived connection speed.
  522. Mackey, Timothy, Systems and methods for error detection.
  523. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for facilitating a peer to peer route via a gateway.
  524. Annamalaisami, Saravanakumar; Shetty, Anil; Suganthi, Josephine; Choudhary, Akshat, Systems and methods for maintaining transparent end to end cache redirection.
  525. Annamalaisami, Saravanakumar; Shetty, Anil; Suganthi, Josephine; Choudhary, Akshat, Systems and methods for maintaining transparent end to end cache redirection.
  526. Halpern,Eric M., Systems and methods for migratable services.
  527. Halpern,Eric M., Systems and methods for migratable services.
  528. Rao, Goutham P.; Rodriguez, Robert; Brueggemann, Eric, Systems and methods for providing a VPN solution.
  529. Sundarrajan, Prabakar; He, Junxiao; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil, Systems and methods for providing client-side accelerated access to remote applications via TCP buffering.
  530. Sundarrajan, Prabakar; He, Junxiao; Nanjundaswamy, Shashi; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil, Systems and methods for providing client-side accelerated access to remote applications via TCP multiplexing.
  531. Sundarrajan, Prabakar; He, Junxiao; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil; Nanjundaswamy, Shashi, Systems and methods for providing client-side accelerated access to remote applications via TCP pooling.
  532. Sundarrajan, Prabakar; He, Junxiao; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil; Suganthi, Josephine, Systems and methods for providing client-side dynamic redirection to bypass an intermediary.
  533. Short, Joel E.; Jacquet-Pagan, Florence; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  534. Short, Joel E.; Jacquet-Pagan, Florence; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  535. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J, Systems and methods for providing content and services on a network system.
  536. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  537. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  538. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  539. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  540. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  541. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  542. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  543. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  544. Short, Joel E; Pagan, Florence C. I.; Goldstein, Josh J, Systems and methods for providing dynamic network authorization, authentication and accounting.
  545. Mackey, Timothy, Systems and methods for script injection.
  546. Mackey, Timothy, Systems and methods for script injection.
  547. Short, Joel E.; Ewan, Ray S.; Sorcsek, Jerome, Systems and methods of communicating using XML.
  548. Khemani, Prakash; Sundarrajan, Prabakar; Kumar, Lakshmi; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravanakumar, Systems and methods of maintaining freshness of a cached object based on demand and expiration time.
  549. Khemani, Prakash; Sundarrajan, Prabakar; Kumar, Lakshmi; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravanakumar, Systems and methods of marking large objects as non-cacheable.
  550. Abraham, Magid; Carnes, Jeffrey; Disch, Jason; Larrison, James, Systems for and methods of user demographic reporting usable for identifying users and collecting usage data.
  551. Bashyam, Murali; Finn, Norman W.; Patra, Abhijit, TCP proxy connection management in a gigabit environment.
  552. Vasseur, Jean-Philippe; Iturralde, Carol; Swallow, George, Technique for dynamically restoring original TE-LSP attributes for interdomain TE-LSPs.
  553. Laxman, Latha; Seth, Vishal; Narasimhan, Arvindsrinivasan Lakshmi, Techniques for user-defined tagging of traffic in a network visibility system.
  554. Brodsky, Elizabeth A.; Elnozahy, Elmootazbellah N.; Rajamony, Ramakrishnan, Technology for web site crawling.
  555. Qiu, Kermit; Svedberg, Johan; Yu, Terry, Testing the performance of a layer 3 proxy device using traffic amplification.
  556. Weigand, Gilbert G.; Raduchel, William J., Time-shifting streaming data.
  557. Hegde, Deepak; Sharma, Shailender; Varimalla, Rakesh, Traffic deduplication in a visibility network.
  558. Tu,Edgar Allan; Pang,Eric, Transaction authentication system and method.
  559. Kanevsky, Dimitri; Zlatsin, Alexander, Transcoding system and method for improved access by users with special needs.
  560. Charlot,Philippe, Translation of identifiers of user installation terminal in a packet network.
  561. Agarwal, Mugdha; Suganthi, Josephine; Annamalaisami, Saravana; Kurma, Jyotheesh Rao; Goel, Deepak; Shetty, Anil, Transparent layer 2 redirection of request to single sign in service based on applying policy to content of request.
  562. Singh, Balraj; Singh, Amit P.; Paxson, Vern, Transparent optimization for session establishment using characterized synchronization packet.
  563. Singh,Balraj; Singh,Amit P.; Paxson,Vern, Transparent optimization for session establishment using characterized synchronization packet.
  564. Singh, Balraj; Singh, Amit P.; Paxson, Vern, Transparent optimization for transmission control protocol flow control.
  565. Singh,Balraj; Singh,Amit P.; Paxson,Vern, Transparent optimization for transmission control protocol initial session establishment.
  566. Jungck, Peder J.; Drown, Matthew Donald; Goller, Sean M., Transparent provisioning of network access to an application.
  567. Jungck, Peder J.; Drown, Matthew Donald; Goller, Sean M., Transparent provisioning of network access to an application.
  568. Jungck, Peder J.; Drown, Matthew Donald; Goller, Sean M., Transparent provisioning of services over a network.
  569. Jungck, Peder J.; Drown, Matthew Donald; Goller, Sean M., Transparent provisioning of services over a network.
  570. Jungck, Peder J.; Drown, Matthew Donald; Goller, Sean M., Transparent provisioning of services over a network.
  571. Jungck, Peder J.; Drown, Matthew Donald; Goller, Sean M., Transparent provisioning of services over a network.
  572. Koning, G. Paul; Hayden, Peter C.; Long, Paula, Transparent request routing for a partitioned application service.
  573. Koning, G. Paul; Hayden, Peter C.; Long, Paula, Transparent request routing for a partitioned application service.
  574. Allen, Nicholas Alexander; Thaler, Jay C.; Wolf, Kenneth David, Transport independent redirection.
  575. Takeda, Yutaka, Traversal of symmetric network address translator for multiple simultaneous connections.
  576. Takeda, Yutaka, Traversal of symmetric network address translator for multiple simultaneous connections.
  577. Takeda, Yutaka, Traversal of symmetric network address translator for multiple simultaneous connections.
  578. Curtis, Bruce W., User level web server cache control of in-kernel http cache.
  579. Hauser, Robert R., Using data narrowing rule for data packaging requirement of an agent.
  580. Creamer, Thomas E.; Hilf, Bill H.; Jaiswal, Peeyush; Mirt, Michael, Validating software in a grid environment using ghost agents.
  581. Creamer,Thomas E.; Hilf,Bill H.; Jaiswal,Peeyush; Mirt,Michael, Validating software in a grid environment using ghost agents.
  582. Prince, Matthew Browning; Holloway, Lee Hahn; Pye, Ian Gerald, Validating visitor internet-based security threats.
  583. Raciborski, Nathan F.; Thompson, Mark R., Viewer object proxy.
  584. Raciborski, Nathan F.; Thompson, Mark R., Viewer object proxy.
  585. Tripathi,Sunay; Curtis,Bruce W., Web server in-kernel interface to data transport system and cache manager.
  586. DeAnna, Robert, Web service interface for mobile agents.
  587. Decasper, Dan S.; Dittia, Zubin; Mundkur, Prashanth; Ghosh, Rajib, Web-integrated display of locally stored content objects.
  588. Onyon, Richard M.; Stannard, Liam J.; Garner, Robert E.; Ridgard, Leighton A., Wireless telephone data backup system.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로