$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method for translating an object attribute converter in an information services patterns environment 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-017/30
출원번호 US-0386837 (1999-08-31)
발명자 / 주소
  • Bowman-Amuah, Michel K.
출원인 / 주소
  • Accenture LLP
대리인 / 주소
    Oppenheimer Wolff & Donnelly LLP
인용정보 피인용 횟수 : 503  인용 특허 : 14

초록

A system, method and article of manufacture are provided for translating an object attribute to and from a database value. A database is provided and a conversion process is determined for converting an object attribute to and from a database value. The conversion process is encapsulated in an attri

대표청구항

1. A method for translating an object attribute to and from a database value, comprising the steps of: (a) providing a database; (b) determining a conversion process for converting an object attribute to and from a database value; (c) encapsulating the conversion process in an attribute convert

이 특허에 인용된 특허 (14)

  1. Bach Mark A. ; Charlet Kyle Jeffrey ; Ho Shyh-Mei Fang ; McBride Kevin M. ; Rowe-Anderson Huey Moncrief ; Sander Thomas Beavers ; Vogel Thomas Arthur, Command line interface for creating business objects for accessing a hierarchical database.
  2. Fujii Yasushi,JPX ; Imura Hideo,JPX ; Hashizume Yasuhiko,JPX, Communications control apparatus and client/server computer system.
  3. Lagarde Konrad Charles ; Rogers Richard Michael, Computer network for WWW server data access over internet.
  4. Davidson Harold R. ; Penn Derek, Creating and configuring component-based applications using a text-based descriptive attribute grammar.
  5. Van Huben Gary Alan ; Mueller Joseph Lawrence ; Siegel Michael Steven ; Warnock Thomas Bernard ; McDonald Darryl James, Data management system and process.
  6. Huang Ying ; Desiraju Ramakrishna ; Begue Christophe ; Bakkalbasi Omer ; Chan Lap Mui Ann ; Bhaskaran Krishnakumar ; Federgruen Awi ; Krasinski Raymond J. ; Boey Peter, Decision support system for the management of an agile supply chain.
  7. Xu Jian J., Framework for object-oriented interface to record file data.
  8. Gudmundson Norman K. ; MacInnis Bo Yu, Hierarchical encapsulation of instantiated objects in a multimedia authoring system including internet accessible objec.
  9. Ernst Michael,DEX, Method and apparatus for dynamic optimization of business processes managed by a computer system.
  10. Chang David Yu ; High ; Jr. Robert Howard ; Newcombe Russell Lev, Method and apparatus for enabling persistent attributes in an object oriented environment.
  11. Hoover Michael K. ; Miller Barrick H. ; Schurenberg Kurt ; Daigle Richard A., Method and system for object-based relational distributed databases.
  12. Hoover Michael K. (Roswell GA) Miller Barrick H. (Marietta GA) Schurenberg Kurt (Roswell GA) Daigle Richard A. (Atlanta GA), Methods and systems for object-based relational distributed databases.
  13. Baer William Joseph ; Doong Jane Ku ; Hu Jung-hsin Eva ; Kauffman Steven Victor ; Lewis Lara Marie ; Parrish Ronald Elliott, Object management system for digital libraries.
  14. McAtee John D. (Shrewsbury MA) Kennedy Stephen M. (Hudson MA) Piccolomini Paul J. (Fitchburg MA) Cerqua Paul J. (Chelmsford MA), Workflow management and control system.

이 특허를 인용한 특허 (503)

  1. Haselden, J. Kirk; David, Matthew E., Abstract pipeline component connection.
  2. Robinson, Scott H.; Espinosa, Gustavo P.; Bennett, Steven M., Accessing private data about the state of a data processing machine from storage that is publicly accessible.
  3. Robinson, Scott H.; Espinosa, Gustavo P.; Bennett, Steven M., Accessing private data about the state of a data processing machine from storage that is publicly accessible.
  4. Robinson, Scott H.; Espinosa, Gustavo P.; Bennett, Steven M., Accessing private data about the state of a data processing machine from storage that is publicly accessible.
  5. Chandrashekar, Sridhar; Rogerson, Dale E.; McRoberts, J. Shane; Dong, Wenlong; Reddish, Andrew D., Activating content based on state.
  6. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Adaptive pattern recognition based controller apparatus and method and human-interface therefore.
  7. Miller, Clint; Renteria, Ray; Castoe, Mark; Rodney, Daniel; Dalton, Craig; Reynolds, Shad; Ellerbee, Jeff, Adaptive system for dynamic object-oriented schemas.
  8. Graunke, Gary L., Apparatus and method for distributing private keys to an entity with minimal secret, unique information.
  9. Graunke, Gary L., Apparatus and method for distributing private keys to an entity with minimal secret, unique information.
  10. Brickell, Ernest F., Apparatus and method for establishing a secure session with a device without exposing privacy-sensitive information.
  11. Sridhar, Avinash; Campana, David Anthony; Boyce, Jill MacDonald; Anthru, Shemimom M., Apparatus and method for file size estimation over broadcast networks.
  12. Brickell,Ernest F., Apparatus and method for proving the denial of a direct proof signature.
  13. Sridhar, Avinash; Campana, David Anthony; Anthru, Shemimon Manalikudy; Boyce, Jill MacDonald, Apparatus and method for simulcast over a variable bandwidth channel.
  14. Kozuch,Michael A.; Sutton, II,James A.; Grawrock,David; Neiger,Gilbert; Uhlig,Richard A.; Burgess,Bradley G.; Poisner,David I.; Hall,Clifford D.; Glew,Andy; Smith, III,Lawrence O.; George,Robert, Apparatus and method for unilaterally loading a secure operating system within a multiprocessor environment.
  15. Kapoor, Vikas; Madhavarapu, Abhilash, Apparatuses, methods and systems for a real-time phone configurer.
  16. Blanch, Robert; Parthasarathy, Srinivasan; Olsen, Jesper, Application loader for support of version management.
  17. Panda, Biswaranjan; Andreasen, Flemming S.; Rosenberg, Jonathan D., Application-aware policy enforcement.
  18. Goodman,Marina; Mesoy,Tor; Taylor,Stanton J.; Reiter,Scott R.; Bowen,Michael T.; Auriemma,Ralph; Alairys,Tamara D.; Degiorgio,Christopher M.; Coleman,Lizbeth Johnson, Architectures for netcentric computing systems.
  19. Goodman,Marina; Mesoy,Tor; Taylor,Stanton J.; Reiter,Scott R.; Bowen,Michael T.; Auriemma,Ralph; Alairys,Tamara D.; Degiorgio,Christopher M.; Coleman,Lizbeth Johnson, Architectures for netcentric computing systems.
  20. Rosenberg, Jonathan D.; Stammers, Timothy P., Assigning a serving-CSCF during access authentication.
  21. Grawrock,David W., Attestation using both fixed token and portable token.
  22. Lin,Zhenhai, Attribute partitioning for user extensibility.
  23. White,Russell W.; Imes,Kevin R., Audio system and method.
  24. Yegani, Parviz; Iyer, Jayaraman; Stammers, Timothy P.; Oswal, Anand K., Authentication of access terminals in a cellular communication network.
  25. Cook,Charles I., Automated cross-box and methods for using an automated cross-box.
  26. Cicman, Joseph Stephan; Deshpande, Piyush; Kapoor, Anshu; Kasthuriswamy, Karthikeyan, Automated migration of translation maps for use in exchanging documents between entities.
  27. Abu el Ata, Nabil A.; Desmichels, Marc; Drucbert, Annie; Spelman, Guy; Blunt, Jonathan, Automated system and method for service and cost architecture modeling of enterprise systems.
  28. Starkovich, Daniel P.; Rappa, Scott L.; Erickson, Joey L.; Campbell, Richard P., Automatic COBOL working storage to open/OLTP view conversion.
  29. Samuels, Allen R.; Sutter, Paul G., Automatic detection and window virtualization for flow control.
  30. Samuels, Allen R.; Sutter, Paul G., Automatic detection and window virtualization for flow control.
  31. Panasyuk, Anatoliy; Kramer, Andre; Pedersen, Bradley Jay; Stone, David Sean; Treder, Terry, Automatically reconnecting a client across reliable and persistent communication sessions.
  32. Sargent, Scott R., Base service architectures for netcentric computing systems.
  33. Moncla, Brenda; Ghosh, Sujit, Business constructs.
  34. Moncla, Brenda; Ghosh, Sujit, Business constructs.
  35. Jeyasingh,Stalinselvaraj; Anderson,Andrew V.; Bennett,Steven M.; Cota Robles,Erik; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard, Chipset support for managing hardware interrupts in a virtual machine system.
  36. Jeyasingh,Stalinselvaraj; Anderson,Andrew V.; Bennett,Steven M.; Cota Robles,Erik; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard, Chipset support for managing hardware interrupts in a virtual machine system.
  37. Kaltenmark,John K.; Alber,Michael W.; Gilliland,William M., Communication service architectures for netcentric computing systems.
  38. Cullen, III, Andrew A.; Danilov, Ivan; Zilberman, Leonid, Computer system and method for facilitating and managing the project bid and requisition process.
  39. Cullen, III, Andrew A.; Danilov, Ivan; Zilberman, Leonid, Computer system and method for producing analytical data related to the project bid and requisition process.
  40. Pittelko, Michael H., Confirming data consistency in a data storage environment.
  41. Pittelko, Michael H., Confirming data consistency in a data storage environment.
  42. Grawrock,David W., Connecting a virtual token to a physical token.
  43. White, Russell W.; Imes, Kevin R., Content delivery system and method.
  44. White,Russell W.; Imes,Kevin R., Content delivery system and method.
  45. Ghose, Kanad, Continuous run-time validation of program execution: a practical approach.
  46. Bennett,Steve; Anderson,Andrew V.; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard; Zou,Xiang; Kozuch,Michael A., Control over faults occurring during the operation of guest software in the virtual-machine architecture.
  47. Bennett,Steve; Anderson,Andrew V.; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard; Kozuch,Michael A., Control register access virtualization performance improvement in the virtual-machine architecture.
  48. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Millind, Controlling access to multiple memory zones in an isolated execution environment.
  49. Cohen,Simona; Mesika,Yossi, Conversion of hierarchically-structured HL7 specifications to relational databases.
  50. Weddeling, Peter; Dehn, Rene; Scholz, Martin, Converting user interface panels.
  51. Stanciu, Constantin; Halstead, Patrick H.; Shur, Andrey; Essey, Edward G., Correlation, association, or correspondence of electronic forms.
  52. Stanciu, Constantin; Halstead, Patrick; Shur, Andrey; Essey, Edward G., Correlation, association, or correspondence of electronic forms.
  53. Stanciu, Constantin; Halstead, Patrick; Shur, Andrey; Essey, Edward G., Correlation, association, or correspondence of electronic forms.
  54. Stacey, Christopher H.; Cardente, John T., Creating copies of space-reduced files in a file server having a redundant data elimination store.
  55. Grawrock,David W., Creation and distribution of a secret value between two devices.
  56. Abrahams, Faried; Arsanjani, Ali P.; Hogg, Kerard R.; Jalaldeen, Ahamed; Purohit, Siddharth; Sivakumar, Gandhi, Data element categorization in a service-oriented architecture.
  57. Abrahams, Faried; Arsanjani, Ali P.; Hogg, Kerard R.; Jalaldeen, Ahamed; Purohit, Siddharth; Sivakumar, Gandhi, Data element categorization in a service-oriented architecture.
  58. Taylor,Stanton J., Data management for netcentric computing systems.
  59. Campos, Marcos M.; Kelly, Mark, Data mining recommendation web beans and JSP tag libraries.
  60. Kii,Manabu; Shimizu,Masahiro; Hayashi,Takamichi, Data reproducing apparatus, information processing apparatus, information processing method, and computer program.
  61. Thiruvillamalai,Varadarajan, Data store for arbitrary data types with type safe storage and retrieval.
  62. Anonsen, Steven P., Database simulation of data types.
  63. Reddington, Francis X.; Sahota, Neil, Decomposing a process model in an enterprise intelligence (‘EI’) framework.
  64. Bell, Joshua S.; Roberts, Scott M.; Jin, Jun; Teutsch, Brian C.; Mollicone, Laurent, Designer-created aspect for an electronic form template.
  65. Fortini, Christian; Paoli, Jean D.; Mollicone, Laurent; Mohan, Bulusu Krishna; Catorcini, Alessandro, Designing electronic forms.
  66. Rosenberg, Jonathan D.; Andreasen, Flemming S.; Panda, Biswaranjan, Determining a policy output for a communication session.
  67. O'Connor, Brian G.; Deobhakta, Kalpita S.; Ifrim, Silviu, Digital signatures for network forms.
  68. Apparao, Vidur; Bandhauer, John; Waterson, Christopher Robert, Display of media asset information.
  69. Raghunathan, Prabhu R.; Danial, Patrick J.; Young, Mark E., Distributed intelligent systems and methods therefor.
  70. Lev, Boaz, Distributed search in a casual network of servers.
  71. Bande, Amit; Itikarlapalli, Krishna Mohan; Chatterjee, Debashish, Dynamically sizing buffers to optimal size in network layers when supporting data transfers related to database applications.
  72. Samuels, Allen; Sutter, Paul, Early generation of acknowledgements for flow control.
  73. Balachandran, Shridharan, Effectuating personalized, process-integrated information, communications and entertainment (ICE) service delivery.
  74. Larcheveque, Jean-Marie H.; Narendran, Arungundram; Sikchi, Prakash; Levenkov, Alexei; Ardeleanu, Adriana; Shur, Andrey; Catorcini, Alessandro; Selim, Nora S.; Bath, Kamaljit S., Electronic form user interfaces.
  75. Haselden, J. Kirk; David, Matthew E., Employing abstract pipeline component connections to maintain data flow.
  76. Rivers-Moore, Jonathan E.; Moldovanu, Petru M.; Singh, Balbir, Enabling electronic documents for limited-capability computing devices.
  77. Rivers-Moore, Jonathan E.; Moldovanu, Petru M; Singh, Balbir, Enabling electronic documents for limited-capability computing devices.
  78. Reddington, Francis X.; Sahota, Neil, Enterprise intelligence (‘EI’) management in an EI framework.
  79. Sargent, Scott R., Environment service architectures for netcentric computing systems.
  80. Rosenberg, Jonathan D.; Andreasen, Flemming S.; Stammers, Timothy P., Establishing facets of a policy for a communication session.
  81. Pal, Dmitri V.; Gallagher, Stephen J.; Dennis, John R., Event logging application programming interface (API).
  82. Stott, Nathaniel W.; Kelkar, Amol S; O'Connor, Brian G.; Rosenberg, Lee B; Catorcini, Alessandro; Narendran, Arungundram C.; Sikchi, Prakash, Executing applications at appropriate trust levels.
  83. Kasi,Jayaram Rajan; Mehta,Vinkesh Omprakash; Sapuram,Raghunath; Venkat,Ramshankar, Exposing process flows and choreography controllers as web services.
  84. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S., File checking using remote signing authority via a network.
  85. Mason, W. Anthony; Noone, Scott J.; Widdowson, Roderick David Wolfe, File system directory attribute correction.
  86. Mason, W. Anthony; Noone, Scott J.; Widdowson, Roderick David Wolfe, File system directory attribute correction.
  87. Samuels, Allen R.; Sutter, Paul G., Flow control system architecture.
  88. Busalacchi, Frank; Tinsley, David; Skinner, Wesley; Bressler, Paul; Yarbrough, Eric, GINA WorldSpace.
  89. Busalacchi, Frank A.; Tinsley, David C.; Skinner, Wesley; Bressler, Paul W.; Yarbrough, Eric, GINA service orchestration.
  90. Schiebeler, Dirk; Rumig, Jan, Gateway service manager for business object applications.
  91. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Generating isolated bus cycles for isolated execution.
  92. Sethi, Manish, Generic infrastructure for migrating data between applications.
  93. Busalacchi, Frank; Tinsley, David; Skinner, Wesley; Bressler, Paul; Yarbrough, Eric, Global information architecture.
  94. Busalacchi, Frank; Tinsley, David; Skinner, Wesley; Bressler, Paul; Yarbrough, Eric, Global information network architecture.
  95. Carapella, Sean Peter; Daniels, Christine Ann; Mott, Michelle Marguerite; Raleigh, Chandrah Lee; Venugopal, Mahenthiran, Graphical user interface for search request management.
  96. Mincarelli, John; Hager, Scott, Group management using Unix NIS groups.
  97. Uhlig,Richard; Anderson,Andrew V.; Bennett,Steve; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert, Handling faults associated with operation of guest software in the virtual-machine architecture.
  98. Darnell, Stephen; Charnell, William Thomas; Plummer, Wayne; Dias, Blaise Abel Alec; Guthrie, Philippa Joy; Kramskoy, Jeremy Paul; Sexton, Jeremy James; Wynn, Michael John; Rautenback, Keith; Thomas, , Hash table dispatch mechanism for interface methods.
  99. Ben-Natan, Ron; Segal, Ury, Identifying attribute propagation for multi-tier processing.
  100. Honma, Mikimasa, Image forming apparatus and method for remote job editing.
  101. Ishii, Kensuke, Image sharing system and method.
  102. Weissman, Craig; Moellenhoff, Dave; Wong, Simon, Improving a multi-tenant database query using contextual knowledge about tenant data.
  103. Rogerson, Dale E.; Chandrashekar, Sridhar; McRoberts, J. Shane; Dong, Wenlong; Reddish, Andrew D.; Chavda, Praful, In-place content substitution via code-invoking link.
  104. Chauhan, Abhishek; Mirani, Rajiv; Kohli, Prince; Sikka, Namit, Inferencing data types of message components.
  105. Chauhan, Abhishek; Mirani, Rajiv; Kohli, Prince; Sikka, Namit, Inferencing data types of message components.
  106. Chauhan, Abhishek; Mirani, Rajiv; Kohli, Prince; Sikka, Namit, Inferencing data types of message components.
  107. Abels, Timothy; Janosky, Brian L., Information handling system configuration identification tool and method.
  108. Subramanian, Sowmya; Harris, Larry Dean; Khemani, Sandeep; Nickerson, Thomas W.; Buzsaki, George A.; De Groot, Michael, Integration functionality for a test tool for application programming interfaces.
  109. Katzer, Robin D.; Lee, Wing K., Integration of COTS software data stores into integrated data access layer.
  110. Haney, Richard D., Inter-autonomous networking involving multiple service providers.
  111. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Internet appliance system and method.
  112. Kilian-Kehr, Roger, Items on workplaces.
  113. Satomi, Hiroshi; Igeta, Satoshi; Inoue, Atsushi; Watanabe, Satoshi; Matsuura, Kenichiro, Managing a data file with an access code.
  114. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Managing a secure environment using a chipset in isolated execution mode.
  115. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Milland, Managing a secure platform using a hierarchical executive architecture in isolated execution mode.
  116. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Milland, Managing a secure platform using a hierarchical executive architecture in isolated execution mode.
  117. Mason, W. Anthony; Viscarola, Peter G.; Cariddi, Mark J.; Noone, Scott J., Managing access to a resource.
  118. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Managing accesses in a processor for isolated execution.
  119. Mason, W. Anthony; Viscarola, Peter G.; Cariddi, Mark J.; Noone, Scott J., Managing application resources.
  120. Grossfeld, Elena; Widjojo, Surjatini; Lockert, Thorsten; Seitz, Greg; Wigginton, Kenneth Randall; Kasten, Christopher J., Managing data transaction requests.
  121. Rosenpflanzer, Lutz; Leblanc, Richard; Steuernagel, Ralf, Managing different representations of information.
  122. Mason, W. Anthony; Viscarola, Peter G.; Cariddi, Mark J.; Noone, Scott J., Managing lock rankings.
  123. Mason,W. Anthony; Viscarola,Peter G.; Cariddi,Mark J.; Noone,Scott J., Managing lock rankings.
  124. Reddington, Francis X.; Sahota, Neil, Managing processes in an enterprise intelligence (‘EI’) assembly of an EI framework.
  125. Kozuch,Michael; Chou,Stephen; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert; Schoenberg,Sebastian; Uhlig,Richard, Mechanism for providing power management through virtualization.
  126. Hall, Clifford D.; Campbell, Randolph L., Mechanism for remapping post virtual machine memory pages.
  127. Bennett,Steven M.; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Neiger,Gilbert; Uhlig,Richard, Mechanism to control hardware interrupt acknowledgement in a virtual machine system.
  128. Fish, Andrew J., Mechanism to determine trust of out-of-band management agents.
  129. Mikkelsen, John; Freidson, Robert, Media delivery platform.
  130. Mikkelsen, John; Freidson, Robert, Media delivery platform.
  131. Mikkelsen, John; Freidson, Robert, Media delivery platform.
  132. Mikkelsen, John; Freidson, Robert, Media delivery platform.
  133. Mikkelsen, John; Freidson, Robert, Media delivery platform.
  134. Mikkelsen, John; Freidson, Robert, Media delivery platform.
  135. Mikkelsen, John; Freidson, Robert, Media delivery platform.
  136. Mikkelsen, John; Freidson, Robert, Media delivery platform.
  137. Mikkelsen, John; Freidson, Robert, Media delivery platform.
  138. Mikkelsen, John; Freidson, Robert, Media delivery platform.
  139. Mikkelsen, John; Freidson, Robert, Media delivery platform.
  140. Mikkelsen, John; Freidson, Robert, Media delivery platform.
  141. Mikkelsen, John; Freidson, Robert, Media delivery platform.
  142. Brickell, Ernest; Graunke, Gary; Stevens, William A.; Vembu, Balaji, Method and apparatus for authenticated, recoverable key distribution with no database secrets.
  143. Poisner,David I.; Grawrock,David W.; Sutton,James A., Method and apparatus for communicating securely with a token.
  144. Cota Robles,Erik; Chou,Stephen; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Neiger,Gilbert; Uhlig,Richard, Method and apparatus for constructing host processor soft devices independent of the host processor operating system.
  145. Wong, Stanley; Hoskin, Steve; Oian, Xiao Feng, Method and apparatus for data integration and management.
  146. Crupi,John; Alur,Deepak; Malks,Daniel, Method and apparatus for developing enterprise applications using design patterns.
  147. Bennett, Steven M.; Anderson, Andrew V.; Cota Robles, Erik; Jeyasingh, Stalinselvaraj; Kagi, Alain; Neiger, Gilbert; Uhlig, Richard, Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment.
  148. Bennett, Steven M.; Anderson, Andrew V.; Cota-Robles, Erik; Jeyasingh, Stalinselvaraj; Kagi, Alain; Neiger, Gilbert; Uhlig, Richard, Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment.
  149. Ali, Syed M.; Kamen, Yury; Alur, Deepak; Crupi, John P.; Malks, Daniel B., Method and apparatus for generating components for pattern-based system design analysis using a characteristics model.
  150. Kozuch, Michael A.; Sutton, II, James A.; Grawrock, David, Method and apparatus for loading a trustable operating system.
  151. Kozuch, Michael A.; Sutton, II, James A.; Grawrock, David, Method and apparatus for loading a trustable operating system.
  152. Kozuch, Michael A.; Sutton, James A.; Grawrock, David, Method and apparatus for loading a trustable operating system.
  153. Warkhede, Priyank Ramesh; Bryant, Stewart Frederick, Method and apparatus for mapping prefixes and values of a hierarchical space to other representations.
  154. Anderson, Andrew V.; Kägi, Alain, Method and apparatus for supporting address translation in a virtual machine environment.
  155. Anderson,Andrew V.; K��gi,Alain, Method and apparatus for supporting address translation in a virtual machine environment.
  156. Fallen Bailey, Tim; Hastings, Mark C.; Jindal, Bharat; Kulkarni, Jayant; Shroff, Vipul; Thorson, Peter A., Method and apparatus to control translatable properties of metadata.
  157. Desai, Arun K., Method and apparatus using connection pools in communication networks.
  158. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan K. R., Bharath; Kumar, Anil, Method and device for performing caching of dynamically generated objects in a data communication network.
  159. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan K.R., Bharath; Kumar, Anil, Method and device for performing caching of dynamically generated objects in a data communication network.
  160. Khemani, Prakash; Sundarrajan, Prabakar; Kumar, Lakshmi; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravanakumar, Method and device for performing integrated caching in a data communication network.
  161. Cason, Jr., William C.; Dalton, Craig F.; Morio, Jason S; Reynolds, Shad W.; Renteria, Ramon; Lemay, Stéphane, Method and system for a reference model for an enterprise architecture.
  162. Dutta, Rabindranath; French, Steven Michael; Janakiraman, Janani, Method and system for augmenting web-indexed search engine results with peer-to-peer search results.
  163. Maginniss, Eric, Method and system for calculating cost of an asset using a data model.
  164. Grimes, Mikal; Williams, David K.; Balling, Jr., James, Method and system for determination of data completeness for analytic data calculations.
  165. Thomas, Stephen Paul; Charnell, William Thomas; Darnell, Stephen; Dias, Blaise Abel Alec; Guthrie, Philippa Joy; Kramskoy, Jeremy Paul; Sexton, Jeremy James; Wynn, Michael John; Rautenbach, Keith; Plummer, Wayne, Method and system for dynamic memory management.
  166. Thomas, Stephen Paul; Charnell, William Thomas; Darnell, Stephen; Dias, Blaise Abel Alec; Guthrie, Philippa Joy; Kramskoy, Jeremy Paul; Sexton, Jeremy James; Wynn, Michael John; Rautenbach, Keith; Plummer, Wayne, Method and system for dynamic memory management.
  167. Lawrence, Kelvin Roderick, Method and system for dynamically adjustable and configurable garbage collector.
  168. Duvall, Clayton; Maginniss, Eric; Stewart, Brandon, Method and system for impact analysis using a data model.
  169. Grossfeld, Elena; Widjojo, Surjatini; Lockert, Thorsten; Seitz, Greg; Wigginton, Kenneth Randall; Kasten, Christopher J., Method and system for managing data transaction requests.
  170. Grossfeld, Elena; Widjojo, Surjatini; Lockert, Thorsten; Seitz, Greg; Wigginton, Kenneth Randall; Kasten, Christopher J., Method and system for managing data transaction requests.
  171. Ryman, Paul; Croft, Richard; Low, Tony, Method and system for real-time seeking during playback of remote presentation protocols.
  172. Innes, Andrew; Mayers, Chris; Syms, Mark James; Otway, David John, Method and system for requesting and granting membership in a server farm.
  173. Schauser, Klaus E.; Christiansen, Bernd Oliver; Von Eicken, Thorsten; Alexandrov, Albert; Saavedra, Rafael H., Method and system for synchronizing presentation of a dynamic data set to a plurality of nodes.
  174. Bodman, Mark David; Brown, Gary I.; Grimes, Mikal; Renteria, Ramon; Van Riper, James Edward, Method and system for tailoring software functionality.
  175. Coyne, Patrick J., Method and system for the management of professional services project information.
  176. Coyne, Patrick J., Method and system for the management of professional services project information.
  177. Apps,Eric; Ono,Ken, Method and system for the visual presentation of data mining models.
  178. Damm, Mark Gordon, Method and system to manage complex systems knowledge.
  179. Damm, Mark Gordon, Method and system to manage complex systems knowledge.
  180. Bajikar, Sundeep M., Method and system to provide a trusted channel within a computer system for a SIM device.
  181. Amies, Alexander Phillip; Doll, Dennis Raymond; Hassoun, Bassam H.; Matthiesen, Brian Robert, Method and system to synchronize account names across a plurality of security systems.
  182. Bots, Henk; Devarajan, Srikanth; Annamalaisami, Saravana, Method and systems for efficient delivery of previously stored content.
  183. Bots, Henk; Devarajan, Srikanth; Annamalaisami, Saravana, Method and systems for efficient delivery of previously stored content.
  184. Lentini, Russell P.; Rao, Goutham P.; Regovich, Timothy; Weaver, Terence M., Method and systems for providing access to dynamic content via static pages.
  185. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Method and systems for routing packets from a gateway to an endpoint.
  186. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Method and systems for routing packets from a gateway to an endpoint.
  187. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Method and systems for routing packets from an endpoint to a gateway.
  188. Rao, Goutham; Rodriguez, Robert; Brueggemann, Eric, Method and systems for routing packets from an endpoint to a gateway.
  189. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Method and systems for securing remote access to private networks.
  190. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Method and systems for securing remote access to private networks.
  191. Clarke,William D.; Zhan,Tao, Method for loading large XML documents on demand.
  192. Rao, Goutham P.; Brueggemann, Eric R.; Rodriguez, Robert A., Method for maintaining transaction integrity across multiple remote access servers.
  193. White, Russell W.; Imes, Kevin R., Method for managing media.
  194. Neiger,Gilbert; Chou,Stephen; Cota Robles,Erik; Jevasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Uhlig,Richard; Schoenberg,Sebastian, Method for resolving address space conflicts between a virtual machine monitor and a guest operating system.
  195. Neiger,Gilbert; Chou,Stephen; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Uhlig,Richard; Schoenberg,Sebastian, Method for resolving address space conflicts between a virtual machine monitor and a guest operating system.
  196. Moore, Jeffrey Allen; Stefaniak, Joseph Peter; Sulgrove, Lonnie Dale, Method for synchronizing JAVA with UML in a version configuration management system.
  197. Moore, Jeffrey Allen; Stefaniak, Joseph Peter; Sulgrove, Lonnie Dale, Method for synchronizing UML with JAVA in a version configuration management system.
  198. Cullen, III, Andrew A.; Shaw, Steven A.; Zilberman, Leonid, Method of and system for consultant re-seller business information transfer.
  199. Cullen, III, Andrew A.; Shaw, Steven A., Method of and system for enabling and managing sub-contracting entities.
  200. Cullen, III, Andrew A.; Shaw, Steven A., Method of and system for enabling and managing sub-contracting entities.
  201. Brickell,Ernie F., Method of confirming a secure key exchange.
  202. Samuels, Allen; Sutter, Paul, Method of determining path maximum transmission unit.
  203. Samuels, Allen; Sutter, Paul, Method of determining path maximum transmission unit.
  204. Boucher,Jordan T., Method, system, and program for translating a class schema in a source language to a target language.
  205. Martin,Robert; Dubin,Jared; Williamson,Jeff; Tio,Cathy, Methods and apparatus for call service processing by instantiating an object that executes a compiled representation of a mark-up language description of operations for performing a call feature or s.
  206. Calvin, Phil, Methods and apparatus for secure online access on a client device.
  207. Schauser, Klaus E.; Christiansen, Bernd Oliver; Von Eicken, Thorsten; Alexandrov, Albert; Saavedra, Rafael H., Methods and apparatus for sharing graphical screen data in a bandwidth-adaptive manner.
  208. Schauser, Klaus E.; Christiansen, Bernd Oliver; Von Eicken, Thorsten; Alexandrov, Albert; Saavedra, Rafael H., Methods and apparatus for synchronization of data set representations in a bandwidth-adaptive manner.
  209. Schauser, Klaus E.; Christiansen, Bernd Oliver; von Eicken, Thorsten; Alexandrov, Albert; Saavedra, Rafael H., Methods and apparatus for synchronization of data set representations in a bandwidth-adaptive manner.
  210. Moran,Douglas R.; Hall,Clifford D.; Piazza,Thomas A.; Jensen,Richard W., Methods and arrangements to interface memory.
  211. Sullivan, Darin; Muklashy, Shadi, Methods and interfaces for displaying performance data related to a current remote access session.
  212. Sullivan, Darin; Muklashy, Shadi, Methods and interfaces for displaying performance data related to a current remote access session.
  213. Sood, Manish; Qian, Xiaofeng, Methods and systems for accessing data.
  214. Alexandrov, Albert; Saavedra, Rafael; Chalmers, Robert; Srinivasan, Kavitha, Methods and systems for bandwidth adaptive N-to-N communication in a distributed system.
  215. Alexandrov, Albert; Saavedra, Rafael; Chalmers, Robert; Srinivasan, Kavitha, Methods and systems for bandwidth adaptive N-to-N communication in a distributed system.
  216. Ryman, Paul; Feijoo, Ricardo Fernando; Nagubadi, Anil, Methods and systems for cataloging text in a recorded session.
  217. Mason, W. Anthony, Methods and systems for data storage.
  218. James, Sarita M.; Syme, Brian J.; Raman, Suryanarayanan V.; Licata, John A.; Sanchez, Lawrence M., Methods and systems for delivering software via a network.
  219. Mazzaferri, Richard James, Methods and systems for generating playback instructions for playback of a recorded computer session.
  220. Mazzaferri, Richard James, Methods and systems for generating playback instructions for rendering of a recorded computer session.
  221. Ryman, Paul Adam, Methods and systems for in-session playback on a local machine of remotely-stored and real time presentation layer protocol data.
  222. Hayton, Richard, Methods and systems for interactive evaluation of policies.
  223. Hayton, Richard, Methods and systems for interactive evaluation using dynamically generated, interactive resultant sets of policies.
  224. Hayton, Richard, Methods and systems for interactive evaluation using dynamically generated, interactive resultant sets of policies.
  225. Ryman, Paul, Methods and systems for joining a real-time session of presentation layer protocol data.
  226. Nord, Joseph; Hayton, Richard, Methods and systems for providing a consistent profile to overlapping user sessions.
  227. Nord, Joseph; Hayton, Richard, Methods and systems for providing a consistent profile to overlapping user sessions.
  228. Nord, Joseph; Hayton, Richard, Methods and systems for providing a consistent profile to overlapping user sessions.
  229. Ryman, Paul Adam, Methods and systems for real-time seeking during real-time playback of a presentation layer protocol data stream.
  230. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Methods and systems for securing access to private networks using encryption and authentication technology built in to peripheral devices.
  231. von Eicken, Thorsten; Winterstein, Florian, Methods for providing performance improvement recommendations.
  232. James, Sarita M.; Syme, Brian J.; Raman, Suryanarayanan V.; Licata, John A.; Sanchez, Lawrence M., Methods, systems, architectures and data structures for delivering software via a network.
  233. Grawrock,David W., Multi-token seal and unseal.
  234. Busalacchi, Frank; Tinsley, David; Skinner, Wesley, Network clustering technology.
  235. Ben-Natan, Ron, Network intrusion blocking security overlay.
  236. Murray, Michael C.; Erickson, Paul R.; Fisher, Oliver G.; Raman, Suryanarayanan V., Network-based software extensions.
  237. Andreasen, Flemming S.; Iyer, Jayaraman R.; Rosenberg, Jonathan D.; Panda, Biswaranjan, Network-triggered quality of service (QoS) reservation.
  238. Ben-Natan, Ron, Nondestructive interception of secure data in transit.
  239. Kaltenmark,John K.; Degiorgio,Christopher M., Operations architectures for netcentric computing systems.
  240. Bennett, Steven M.; Anderson, Andrew V.; Jeyasingh, Stalinselvaraj; Kagi, Alain; Neiger, Gilbert; Uhlig, Richard; Zou, Xiang; Smith, III, Lawrence; Rodgers, Scott, Optimizing processor-managed resources based on the behavior of a virtual machine monitor.
  241. Bennett, Steven M.; Anderson, Andrew V.; Jeyasingh, Stalinselvaraj; Kägi, Alain; Neiger, Gilbert; Uhlig, Richard; Zou, Xiang; Smith, Lawrence; Rodgers, Scott, Optimizing processor-managed resources based on the behavior of a virtual machine monitor.
  242. Cullen, III, Andrew A.; Shaw, Steven A., Outsourced service level agreement provisioning management system and method.
  243. Andreasen, Flemming; Hamel, Eric; Arbel, Yaacov; Morgenstern, Meir, Packet flow optimization (PFO) policy management in a communications network by rule name.
  244. Rosenberg, Jonathan D., Performing deep packet inspection for a communication session.
  245. Ellison, Carl M.; Sutton, James A., Platform and method for establishing provable identities while maintaining privacy.
  246. Ellison, Carl M.; Sutton, James A., Platform and method for establishing provable identities while maintaining privacy.
  247. Brickell,Ernie F., Platform and method for establishing trust without revealing identity.
  248. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Platform and method for issuing and certifying a hardware-protected attestation key.
  249. Herbert,Howard C.; Grawrock,David W.; Ellison,Carl M.; Golliver,Roger A.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Platform and method for remote attestation of a platform.
  250. Grawrock,David W., Platform and method of creating a secure boot that enforces proper user authentication and enforces hardware configurations.
  251. Srisuresh, Pyda; Murgia, Marco A.; Gunuganti, Ramakanth, Policy based network address translation.
  252. Srisuresh, Pyda; Murgia, Marco A.; Gunuganti, Ramakanth, Policy based network address translation.
  253. Benantar, Messaoud B.; Madduri, Hari Haranath, Policy-based access control approach to staff activities of a business process.
  254. Andreasen, Flemming S.; Rosenberg, Jonathan D., Policy-based control of content intercept.
  255. Arvanitis,Yannis S.; Taylor,Stanton J., Presentation service architectures for netcentric computing systems.
  256. Moran, Douglas R.; Acharya, Satish; Bogin, Zohar; Galloway, Sean G., Prioritized address decoder.
  257. Nanda, Kumari Bijayalaxmi, Priority based data scrubbing on a deduplicated data store.
  258. Haney, Richard D., Private tunnel usage to create wide area network backbone over the internet.
  259. Apparao, Vidur; Bandhauer, John; Waterson, Christopher, Process and system for locating a media asset based on audit trail information incorporated into the asset itself.
  260. Sacco, Giovanni, Process for physical database design based on transaction workload.
  261. Sacco, Giovanni, Process for physical database design based on transaction workload.
  262. Apparao, Vidur; Bandhauer, John; Waterson, Christopher, Processes and system for accessing externally stored metadata associated with a media asset using a unique identifier incorporated into the asset itself.
  263. Neiger, Gilbert; Chou, Stephen; Cota-Robles, Erik; Jeyasingh, Stalinselvaraj; Kagi, Alain; Kozuch, Michael; Uhlig, Richard, Processor mode for limiting the operation of guest software running on a virtual machine supported by a virtual machine monitor.
  264. Croicu, Alexandru; Bath, Kamaljit S.; Shur, Andrey; Essey, Edward G.; Stott, Nathaniel W.; Perlow, Jonathan D.; Cupala, Shiraz J.; O'Connor, Brian G., Promoting data from structured data files.
  265. Seibel,John C.; Feng,Yu; Foster,Robert L., Prospects harvester system for providing contact data about customers of product or service offered by business enterprise extracting text documents selected from newsgroups, discussion forums, maili.
  266. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Protecting software environment in isolated execution.
  267. White, Russell W.; Imes, Kevin R., Providing broadcast content.
  268. Bennett,Steven M.; Anderson,Andrew V.; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; K��gi,Alain; Neiger,Gilbert; Uhlig,Richard; Mondal,Sanjoy K.; Brandt,Jason, Providing support for single stepping a virtual machine in a virtual machine environment.
  269. Weissman, Craig; Moellenhoff, Dave; Wong, Simon; Nakada, Paul, Query optimization in a multi-tenant database system.
  270. Weissman, Craig; Moellenhoff, Dave; Wong, Simon; Nakada, Paul, Query optimization in a multi-tenant database system.
  271. Weissman, Craig; Moellenhoff, Dave; Wong, Simon; Nakada, Paul, Query optimization in a multi-tenant database system.
  272. Mirzad, Nima; Begun, Andrew Paul; Palmer, Michael B.; Mollicone, Laurent, Query to an electronic form.
  273. Cota Robles,Erik C.; Flautner,Krisztian, Real-time scheduling of virtual machines.
  274. Uhlig,Richard; Neiger,Gilbert; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Bennett,Steven M, Reclaiming existing fields in address translation data structures to extend control over memory accesses.
  275. Hoang, Khanh; Danforth, Gregory, Relationship data management.
  276. Hoang, Khanh; Danforth, Gregory, Relationship data management.
  277. Hoang, Khanh; Danforth, Gregory, Relationship data management.
  278. Wood, Matthew D.; Brickell, Ernie, Replacing blinded authentication authority.
  279. Wood, Matthew D.; Brickell, Ernie, Replacing blinded authentication authority.
  280. Chauhan, Abhishek; Mirani, Rajiv; Kohli, Prince; Nanduri, Priya, Rule generalization for web application entry point modeling.
  281. Chauhan, Abhishek; Mirani, Rajiv; Kohli, Prince; Nanduri, Priya, Rule generalization for web application entry point modeling.
  282. Allavarpu,Sai V.; Dong,Xeusi; Lee,Linda C., Secure access to managed network objects using a configurable platform-independent gateway providing individual object-level access control.
  283. Ben-Natan, Ron; Tarandach, Izar, Selective local database access restriction.
  284. Liwerant, Gad; Dodge, Christopher; Boissiere, Guillaume, Sharing a streaming video.
  285. Ripley,John R., Similarity search engine for use with relational databases.
  286. Ramnani, Subash, Simulating multi-monitor functionality in a single monitor environment.
  287. Ruthfield, Scott L.; Wolf, Richard J.; Hopcroft, Michael J.; Erickson, Paul R.; Nakajima, Satoshi, Single window navigation methods and systems.
  288. Grawrock,David W.; Poisner,David I., Sleep protection.
  289. Stakutis, Christopher J.; Whalley, Christopher, Storage area network methods and apparatus for logical-to-physical block address mapping.
  290. Evans, Douglas B.; Conwell, William Y., Substituting or replacing components in sound based on steganographic encoding.
  291. Neiger,Gilbert; Anderson,Andrew V.; Bennett,Steven M.; Brandt,Jason; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; K채gi,Alain; Mondal,Sanjoy K.; Parthasarathy,Rajesh; Rodgers,Dion; Smith,Lawrence O.; Uhlig,Richard A., Support for nested fault in a virtual machine environment.
  292. Yegani, Parviz; Salowey, Joseph A.; Iyer, Jayaraman R.; Oswal, Anand K., System and method for access authentication in a mobile wireless network.
  293. Cota Robles,Erik C.; Campbell,Randolph L.; Hall,Clifford D.; Neiger,Gilbert; Uhlig,Richard A., System and method for binding virtual machines to hardware contexts.
  294. Andreasen, Flemming S.; Rosenberg, Jonathan D.; Iyer, Jayaraman R., System and method for capturing accounting data for a communication session.
  295. Cullen, III, Andrew A., System and method for collecting and providing resource rate information using resource profiling.
  296. Cullen, III, Andrew A., System and method for collecting and providing resource rate information using resource profiling.
  297. White, Russell W.; Imes, Kevin R., System and method for communicating media center.
  298. White, Russell W.; Imes, Kevin R., System and method for communicating media content.
  299. Andreasen, Flemming S.; Rosenberg, Jonathan D.; Iyer, Jayaraman R., System and method for consolidating accounting data for a communication session.
  300. McConnell, Christopher C., System and method for context sensitive searching.
  301. Neiger, Gilbert; Bennett, Steven M.; Cota-Robles, Erik; Schoenberg, Sebastian; Hall, Clifford D.; Rodgers, Dion; Smith, Lawrence O.; Anderson, Andrew V.; Uhlig, Richard A.; Kozuch, Michael; Glew, Andy, System and method for controlling switching between VMM and VM using enabling value of VMM timer indicator and VMM timer value having a specified time.
  302. Miller, Clint; Williams, David K.; Dennis, Matthew F.; Kitchin, Anthony, System and method for data collection.
  303. Bhatia, Rishi; Schulze, Matthew J.; Tomaszewski, John M.; Kittredge, Robert B.; Srinivas, Davanum, System and method for data manipulation.
  304. Bhatia, Rishi; Schulze, Matthew J.; Tomaszewski, John M.; Kittredge, Robert B.; Srinivas, Davanum, System and method for data manipulation.
  305. Bhatia, Rishi; Schulze, Matthew J.; Tomaszewski, John M.; Kittredge, Robert B.; Srinivas, Davanum, System and method for data manipulation.
  306. Rylander, Steve C.; Strong, Justin M. R., System and method for dynamically summarizing data stores.
  307. Korablev, Dmitri; Danforth, Gregory, System and method for efficiently securing enterprise data resources.
  308. Korablev, Dmitri; Danforth, Gregory, System and method for efficiently securing enterprise data resources.
  309. Korablev, Dmitri; Danforth, Gregory, System and method for efficiently securing enterprise data resources.
  310. Cullen, III, Andrew A., System and method for enabling and maintaining vendor qualification.
  311. Sundarrajan, Prabakar; He, Junxiao; Soni, Ajay; Nanjundaswamy, Shashidhara; Kumar, Arkesh, System and method for establishing a virtual private network.
  312. Sundarrajan, Prabakar; He, Junxiao; Soni, Ajay; Nanjundaswamy, Shashidhara; Kumar, Arkesh, System and method for establishing a virtual private network.
  313. Sundarrajan, Prabakar; He, Junxiao; Soni, Ajay; Nanjundaswamy, Shashidhara; Kumar, Arkesh, System and method for establishing a virtual private network.
  314. Brickell,Ernie F., System and method for establishing trust without revealing identity.
  315. Brickell,Ernie F., System and method for establishing trust without revealing identity.
  316. Rosenberg, Jonathan D.; Andreasen, Flemming S., System and method for exchanging policy information in a roaming communications environment.
  317. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  318. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  319. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  320. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  321. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  322. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  323. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  324. Sutton, II,James A.; Grawrock,David W., System and method for execution of a secured environment initialization instruction.
  325. Sutton, James A; Grawrock, David W, System and method for execution of a secured environment initialization instruction.
  326. Korablev, Dmitri; Danforth, Gregory, System and method for flexible security access management in an enterprise.
  327. Korablev, Dmitri; Danforth, Gregory, System and method for flexible security access management in an enterprise.
  328. Andreasen, Flemming S.; Rosenberg, Jonathan D.; Iyer, Jayaraman R.; Panda, Biswaranjan, System and method for generating a unified accounting record for a communication session.
  329. Upton, Mitch, System and method for implementing an event adapter.
  330. Hoang, Khanh, System and method for integrating, managing and coordinating customer activities.
  331. Hoang, Khanh, System and method for integrating, managing and coordinating customer activities.
  332. Brief, Victor; Cullen, III, Andrew; Zarrelli, Margaret, System and method for internet based procurement and administrative management of workers.
  333. Brief, Victor; Cullen, III, Andrew A.; Zarrelli, Margaret, System and method for internet based procurement of goods and services.
  334. White, Russell W.; Imes, Kevin R., System and method for managing media.
  335. White, Russell W.; Imes, Kevin R., System and method for managing media.
  336. Rosenberg, Jonathan D.; Andreasen, Flemming S., System and method for network charging using policy peering.
  337. Gruenwald, Bjorn J., System and method for organizing data.
  338. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan K R, Bharath; Kumar, Anil, System and method for performing entity tag and cache control of a dynamically generated object not identified as cacheable in a network.
  339. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan K R, Bharath; Kumar, Anil, System and method for performing entity tag and cache control of a dynamically generated object not identified as cacheable in a network.
  340. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan KR, Bharath; Kumar, Anil, System and method for performing flash caching of dynamically generated objects in a data communication network.
  341. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; K.R., Bharat Bhushan; Kumar, Anil, System and method for performing flash caching of dynamically generated objects in a data communication network.
  342. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bushan K. R., Bharath; Kumar, Anil, System and method for performing flash crowd caching of dynamically generated objects in a data communication network.
  343. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan KR, Bharath; Kumar, Anil, System and method for performing granular invalidation of cached dynamically generated objects in a data communication network.
  344. Van Riper, James E.; Miller, Clint; Williams, David K., System and method for planning or monitoring system transformations.
  345. Wasicek, Wyatt; Thornburg, Scott C.; Cullen, III, Andrew A., System and method for productizing human capital labor employment positions/jobs.
  346. Bhatia, Rishi; Schulze, Matthew J.; Tomaszewski, John M.; Kittredge, Robert B.; Srinivas, Davanum, System and method for providing data manipulation using web services.
  347. Rosenberg, Jonathan D.; Andreasen, Flemming S., System and method for providing emergency services in a visited communications environment.
  348. Rosenberg, Jonathan D.; Andreasen, Flemming S., System and method for providing multimedia services.
  349. Rosenberg, Jonathan D.; Andreasen, Flemming S., System and method for providing telephony services.
  350. Larcheveque, Jean-Marie H.; Narendran, Arungudnram; Sikchi, Prakash; Levenkov, Alexei; Ardeleanu, Adriana; Shur, Andrey; Catorcini, Alessandro; Selim, Nora S.; Bath, Kamaljit S., System and method for real-time validation of structured data files.
  351. Grawrock,David W.; Sutton, II,James A., System and method for resetting a platform configuration register.
  352. Steelberg, Ryan; Steelberg, Chad, System and method for secure sharing of creatives.
  353. Yang, Ping; Gopalan, Kartik, System and method for security and privacy aware virtual machine checkpointing.
  354. Yang, Ping; Gopalan, Kartik, System and method for security and privacy aware virtual machine checkpointing.
  355. Grimes, Mikal; Corbett, William; Devine, Alex, System and method for the implementation of policies.
  356. Trivedi, Pooja; Momchilov, Georgy; Pope, David, System and method for transferring data among computing environments.
  357. Trivedi, Pooja; Momchilov, Georgy; Pope, David, System and method for transferring data among computing environments.
  358. Ghose, Kanad, System and method for validating program execution at run-time.
  359. Ghose, Kanad, System and method for validating program execution at run-time using control flow signatures.
  360. Simon, Kimberly DaShawn; Wijono, Jeffrey, System and method for verifying database security across multiple platforms.
  361. Hurek, Thomas; Reichert, III, William A.; Thakkar, Nishant; Trevathan, Matthew B., System and method of reconstructing complex custom objects.
  362. Hurek, Thomas; Reichert, III, William A.; Thakkar, Nishant; Trevathan, Matthew B., System and method of reconstructing complex custom objects.
  363. Hurek, Thomas; Reichert, III, William A.; Thakkar, Nishant; Trevathan, Matthew B., System and method of reconstructing complex custom objects.
  364. Hurek, Thomas; Reichert, III, William A.; Thakkar, Nishant; Trevathan, Matthew B., System and method of reconstructing complex custom objects.
  365. White, Russell W.; Imes, Kevin R., System and method to communicate targeted information.
  366. White, Russell W.; Imes, Kevin R., System and method to communicate targeted information.
  367. Mazzaferri, Richard James, System and methods for automatic time-warped playback in rendering a recorded computer session.
  368. Weissman, Craig; Moellenhoff, Dave; Wong, Simon, System and methods of improving a multi-tenant database query using contextual knowledge about non-homogeneously distributed tenant data.
  369. Apparao, Vidur; Bandhauer, John; Waterson, Christopher, System for incorporating information about a source and usage of a media asset into the asset itself.
  370. Apparao,Vidur; Bandhauer,John; Waterson,Christopher, System for incorporating information about a source and usage of a media asset into the asset itself.
  371. Milden, Robert L.; Kennell, Terri C.; Carbery, Timothy; Dunphy, Anne-Marie; Cooper, Heidi L., System for managing and tracking an inventory of elements.
  372. Burrows, Andrew P.; Bowers, Andrew M., System performance prediction.
  373. White, Russell W.; Imes, Kevin R., System to communicate media.
  374. White, Russell W.; Imes, Kevin R., System to communicate media.
  375. White, Russell W.; Imes, Kevin R., System to communicate media.
  376. Rao,Goutham P.; Rodriguez,Robert; Brueggemann,Eric, System, apparatus and method for establishing a secured communications link to form a virtual private network at a network protocol layer other than at which packets are filtered.
  377. Cinarkaya, Bulent; Tamm, Steven; Sureshchandra, Jayesh; Warshavsky, Alex; Bulumulla, Irandi Upeka; Fry, Benjamin; Scott, Kenneth Douglas; Brooks, David, System, method and computer program product for publicly providing web content of a subscriber of an on-demand database service.
  378. Cinarkaya, Bulent; Tamm, Steven; Sureshchandra, Jayesh; Warshavsky, Alex; Bulumulla, Irandi Upeka; Fry, Benjamin; Scott, Kenneth Douglas; Brooks, David, System, method and computer program product for publicly providing web content of a tenant using a multi-tenant on-demand database service.
  379. Cinarkaya, Bulent; Tamm, Steven; Sureshchandra, Jayesh; Warshavsky, Alex; Bulumulla, Irandi Upeka; Fry, Benjamin; Scott, Kenneth Douglas; Brooks, David, System, method and computer program product for publicly providing web content of a tenant using a multi-tenant on-demand database service.
  380. Cinarkaya, Bulent; Tamm, Steven; Sureshchandra, Jayesh; Warshavsky, Alex; Bulumulla, Irandi Upeka; Fry, Benjamin; Scott, Kenneth Douglas; Brooks, David, System, method and computer program product for publicly providing web content using a multi-tenant system.
  381. Cinarkaya, Bulent; Tamm, Steven; Sureshchandra, Jayesh; Warshavsky, Alex; Bulumulla, Irandi Upeka; Fry, Benjamin; Scott, Kenneth Douglas; Brooks, David, System, method and computer program product for publicly providing web content using a multi-tenant system.
  382. McQueeney,Matthew R., System, method, and computer program product for communicating with an LDAP server.
  383. Bobick, Mark; Pace, Charles P.; Pizzorni, Paolo R.; DeForest, Darin S., System, method, and data structure for packaging assets for processing and distribution on multi-tiered networks.
  384. Abu El Ata, Nabil A.; Drucbert, Annie, Systemic enterprise management method and apparatus.
  385. Plamondon, Robert, Systems and method of using HTTP head command for prefetching.
  386. Pedersen, Bradley J.; Sinha, Rajiv; Sundarrajan, Prabakar; Treder, Terry, Systems and methods for accelerating delivery of a computing environment to a remote user.
  387. Plamondon, Robert; Ovsiannikov, Michael; Samuels, Allen, Systems and methods for additional retransmissions of dropped packets.
  388. Plamondon, Robert; Ovsiannikov, Michael; Samuels, Allen, Systems and methods for additional retransmissions of dropped packets.
  389. Rao, Goutham P.; Rodriguez, Robert; Brueggemann, Eric, Systems and methods for adjusting the maximum transmission unit by an intermediary device.
  390. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for adjusting the maximum transmission unit for encrypted communications.
  391. Mason, W. Anthony; Viscarola, Peter G.; Cariddi, Mark J.; Noone, Scott J., Systems and methods for arbitrary data transformations.
  392. Mason, W. Anthony; Viscarola, Peter G.; Cariddi, Mark J.; Noone, Scott J., Systems and methods for arbitrary data transformations.
  393. Sundarrajan, Prabakar; He, Junxiao; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil, Systems and methods for automatic installation and execution of a client-side acceleration program.
  394. Chadda, Sanjay; Samuels, Allen; DeCasper, Dan; Dittia, Zubin; Ankam, Shiva, Systems and methods for bridging a WAN accelerator with a security gateway.
  395. He, Junxiao; Suganthi, Josephine; Verzunov, Sergey; Shetty, Anil; Venkatraman, Charu, Systems and methods for bypassing an appliance.
  396. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for client-side application-aware prioritization of network communications.
  397. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for communicating a lossy protocol via a lossless protocol.
  398. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for communicating a lossy protocol via a lossless protocol.
  399. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for communicating a lossy protocol via a lossless protocol using false acknowledgements.
  400. Rao, Goutham P.; Rodriguez, Robert; Brueggemann, Eric, Systems and methods for communicating a lossy protocol via a lossless protocol using false acknowledgements.
  401. Khemani, Prakash; Bandekar, Vishal, Systems and methods for configuring flow control of policy expressions.
  402. Khemani, Prakash; Bandekar, Vishal, Systems and methods for configuring handling of undefined policy events.
  403. Khemani, Prakash; Bandekar, Vishal, Systems and methods for configuring policy bank invocations.
  404. Khemani, Prakash; Bandekar, Vishal, Systems and methods for configuring policy bank invocations.
  405. Khemani, Prakash; Bandekar, Vishal, Systems and methods for configuring policy bank invocations.
  406. Cook,Charles I., Systems and methods for creating a wireless network.
  407. Plamondon, Robert, Systems and methods for domain name resolution interception caching.
  408. Kamath, Sandeep; Raja, Murali; Suganthi, Josephine; Shetty, Anil; Verzunov, Sergey, Systems and methods for dynamic decentralized load balancing across multiple sites.
  409. Chacko, Vinoo; Agarwal, Puneet; Nanjudaswamy, Shashi; Soni, Ajay, Systems and methods for enabling assured records using fine grained auditing of virtual private network traffic.
  410. Mullick, Amarnath; Venkatraman, Charu; Nanjundaswamy, Shashi; He, Junxiao; Soni, Ajay; Stavrakos, Nicholas; Koopmans, Chris, Systems and methods for enhanced client side policy.
  411. Bots, Henk; Devarajan, Srikanth; Annamalaisami, Saravana; Stavrakos, Nicholas; Monks, Jeff; Koopmans, Fred; Koopmans, Chris; Dakhane, Kapil, Systems and methods for enhanced delta compression.
  412. Van Der Linden, Rob; Halls, David; Waterhouse, Simon; Benoit, Peter, Systems and methods for establishing a cloud bridge between virtual storage resources.
  413. van der Linden, Rob; Halls, David; Waterhouse, Simon; Benoit, Peter, Systems and methods for establishing a cloud bridge between virtual storage resources.
  414. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for facilitating a peer to peer route via a gateway.
  415. Plamondon, Robert, Systems and methods for identifying long matches of data in a compression history.
  416. Plamondon, Robert, Systems and methods for identifying long matches of data in a compression history.
  417. Plamondon, Robert D., Systems and methods for identifying long matches of data in a compression history.
  418. Plamondon,Robert, Systems and methods for identifying long matches of data in a compression history.
  419. Kim, Jane T; Sommer, Peter D.; Wang, Simin; Eason, Natalie M; Cupala, Shiraz J., Systems and methods for interacting with a computer through handwriting to a screen.
  420. Panasyuk, Anatoliy; Kramer, Andre; Pedersen, Bradley Jay; Stone, David Sean; Treder, Terry, Systems and methods for maintaining a client's network connection thru a change in network identifier.
  421. Sikka, Namit; Reddy, Anoop; Mirani, Rajiv; Chauhan, Abhishek, Systems and methods for managing application security profiles.
  422. Sikka, Namit; Reddy, Anoop; Mirani, Rajiv; Chauhan, Abhishek, Systems and methods for managing application security profiles.
  423. Goodnow, II, James E.; Bancroft, James A.; Morgan, Jonathan G., Systems and methods for managing blood donations.
  424. Barton, Gary Lee; Feijoo, Ricardo Fernando, Systems and methods for managing printer settings in a networked computing environment.
  425. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for network disruption shielding techniques.
  426. Rao, Goutham P.; Rodriguez, Robert; Brueggemann, Eric, Systems and methods for providing a VPN solution.
  427. Rao, Goutham P.; Rodriguez, Robert; Brueggemann, Eric, Systems and methods for providing a VPN solution.
  428. Day, Jeff; Valdes, Roberto, Systems and methods for providing authentication credentials across application environments.
  429. Sundarrajan, Prabakar; He, Junxiao; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil, Systems and methods for providing client-side accelerated access to remote applications via TCP buffering.
  430. Sundarrajan, Prabakar; He, Junxiao; Nanjundaswamy, Shashi; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil, Systems and methods for providing client-side accelerated access to remote applications via TCP multiplexing.
  431. Sundarrajan, Prabakar; He, Junxiao; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil; Nanjundaswamy, Shashi, Systems and methods for providing client-side accelerated access to remote applications via TCP pooling.
  432. Sundarrajan, Prabakar; He, Junxiao; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil; Suganthi, Josephine, Systems and methods for providing client-side dynamic redirection to bypass an intermediary.
  433. Samuels, Allen; Jensen, Richard; Dittia, Zubin; Decasper, Dan; Osviannikov, Michael; Plamondon, Robert, Systems and methods for providing dynamic ad hoc proxy-cache hierarchies.
  434. Samuels, Allen; Jensen, Richard; Dittia, Zubin; Decasper, Dan; Ovsiannikov, Michael; Plamondon, Robert, Systems and methods for providing dynamic ad hoc proxy-cache hierarchies.
  435. Harris, James; He, Max; Kumar, Arkesh; Soni, Ajay; Venkatraman, Charu; Najundaswamy, Shashi; Mullick, Amarnath, Systems and methods for providing levels of access and action control via an SSL VPN appliance.
  436. Cook, Charles I., Systems and methods for providing pooled access in a telecommunications network.
  437. Cook,Charles I., Systems and methods for providing pooled access in a telecommunications network.
  438. Khemani, Prakash; Bandekar, Vishal, Systems and methods for providing structured policy expressions to represent unstructured data in a network appliance.
  439. Suganthi, Josephine; He, Junxiao; Verzunov, Sergey; Shetty, Anil; Venkatraman, Charu, Systems and methods for routing VPN traffic around network distribution.
  440. Samuels, Allen R.; Jensen, Richard; Dittia, Zubin; Decasper, Dan S.; Ovsiannikov, Michael; Plamondon, Robert D., Systems and methods for sharing compression histories between multiple devices.
  441. Samuels, Allen; Jensen, Richard; Dittia, Zubin; Decasper, Dan; Ovsiannikov, Michael; Plamondon, Robert, Systems and methods for sharing compression histories between multiple devices.
  442. Samuels, Allen; Jensen, Richard; Dittia, Zubin; Decasper, Dan; Ovsiannikov, Michael; Plamondon, Robert, Systems and methods for sharing compression histories between multiple devices.
  443. Liwerant, Gad; Dodge, Christopher; Boissiere, Guillaume, Systems and methods for sharing video with advertisements over a network.
  444. Ryman, Paul, Systems and methods for single stack shadowing.
  445. Rosenstein, Adam H., Systems and methods for state signing of internet resources.
  446. Plamondon, Robert; Ovsiannikov, Michael; Samuels, Allen, Systems and methods for stochastic-based quality of service.
  447. Indiran, Eric; Green, Brian; Piasecki, Derek, Systems and methods for transferring data between computing devices.
  448. He, Junxiao; Venkatraman, Charu; Soni, Ajay, Systems and methods for using an HTTP-aware client agent.
  449. He, Junxiao; Venkatraman, Charu; Soni, Ajay, Systems and methods for using an HTTP-aware client agent.
  450. Venkatraman, Charu; He, Junxiao; Soni, Ajay; Stavrakos, Nicholas; Monks, Jeff; Koopmans, Fred; Koopmans, Chris; Dakhane, Kapil, Systems and methods for using an HTTP-aware client agent.
  451. Korrapati, Vamsi; Khemani, Prakash; Mirani, Rajiv; Chauhan, Abhishek, Systems and methods for using object oriented expressions to configure application security policies.
  452. Samuels,Allen; Jensen,Richard; Dittia,Zubin; Decasper,Dan; Ovsiannikov,Michael; Plamondon,Robert, Systems and methods of clustered sharing of compression histories.
  453. Samuels, Allen; Jensen, Richard; Dittia, Zubin; Decasper, Dan; Ovsiannikov, Michael; Plamondon, Robert, Systems and methods of compression history expiration and synchronization.
  454. Plamondon, Robert, Systems and methods of dynamically checking freshness of cached objects based on link status.
  455. Verzunov, Sergey; He, Junxiao; Nanjundaswamy, Shashi; Venkatraman, Charu; Bhushan, Bharath; Annamalaisami, Saravana; Shetty, Anil, Systems and methods of for providing multi-mode transport layer compression.
  456. Plamondon, Robert, Systems and methods of freshening and prefreshening a DNS cache.
  457. Plamondon, Robert, Systems and methods of prefetching objects for caching using QoS.
  458. Plamondon, Robert, Systems and methods of prefreshening cached objects based on user's current web page.
  459. Plamondon, Robert, Systems and methods of providing security and reliability to proxy caches.
  460. Plamondon, Robert, Systems and methods of revalidating cached objects in parallel with request for object.
  461. Plamondon, Robert, Systems and methods of revalidating cached objects in parallel with request for object.
  462. Samuels, Allen; Jensen, Richard; Dittia, Zubin; Decasper, Dan; Ovsiannikov, Michael; Plamondon, Robert, Systems and methods of using application and protocol specific parsing for compression.
  463. Samuels, Allen; Jensen, Richard; Dittia, Zubin; Decasper, Dan; Ovsiannikov, Michael; Plamondon, Robert, Systems and methods of using application and protocol specific parsing for compression.
  464. Plamondon, Robert; Ovsiannikov, Michael; Samuels, Allen, Systems and methods of using packet boundaries for reduction in timeout prevention.
  465. Plamondon, Robert; Ovsiannikov, Michael; Samuels, Allen R., Systems and methods of using packet boundaries for reduction in timeout prevention.
  466. Plamondon, Robert, Systems and methods of using the refresh button to determine freshness policy.
  467. Samuels, Allen; Sutter, Paul, TCP selection acknowledgements for communicating delivered and missing data packets.
  468. Fiacco, Daniel M.; Drewek, Nicholas J.; Mohan, Dineshkumar; Alaguvel, Senthilkumaran; Muthuvaithyalingam, Senthil, Task concurrency limiter.
  469. Seibel,John C.; Feng,Yu; Foster,Robert L., Text mining system for web-based business intelligence.
  470. Seibel, John C.; Feng, Yu; Foster, Robert L., Text mining system for web-based business intelligence applied to web site server logs.
  471. Seibel,John C.; Feng,Yu; Foster,Robert L., Text mining system for web-based business intelligence applied to web site server logs.
  472. Bennett, Steven M.; Neiger, Gilbert; Anderson, Andrew V., Timer offsetting mechanism in a virtual machine environment.
  473. Redmond,Anthony; Mangan,Martin, Tracking of computer based training courses.
  474. Cota Robles,Erik; Schoenberg,Sebastian; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Neiger,Gilbert; Uhlig,Richard, Tracking operating system process and thread execution and virtual machine execution in hardware or in a virtual machine monitor.
  475. Apparao, Vidur; Bandhauer, John; Waterson, Christopher Robert, Tracking source and transfer of a media asset.
  476. Apparao, Vidur; Bandhauer, John; Waterson, Christopher Robert, Tracking source and usage of a media asset.
  477. Apparao, Vidur; Bandhauer, John; Waterson, Christopher Robert, Tracking usage of a media asset.
  478. Samuels, Allen R.; Sutter, Paul G., Transaction boundary detection for reduction in timeout penalties.
  479. Sikchi, Prakash; Veselov, Evgeny N.; Mooney, Stephen J., Translation file.
  480. Sikchi, Prakash; Veselov, Evgeny N.; Mooney, Stephen J., Translation file.
  481. Grawrock, David, Trusted platform module for generating sealed data.
  482. Poisner,David I., Trusted system clock.
  483. Neiger,Gilbert; Bennett,Steven M.; K��gi,Alain; Jeyasingh,Stalinselvaraj; Anderson,Andrew V.; Uhlig,Richard; Cota Robles,Erik; Rodgers,Scott; Smith,Lawrence, Use of multiple virtual machine monitors to handle privileged events.
  484. Chauhan, Abhishek; Mirani, Rajiv; Kohli, Prince, Using statistical analysis to generate exception rules that allow legitimate messages to pass through application proxies and gateways.
  485. Chauhan, Abhishek; Mirani, Rajiv; Kohli, Prince, Using statistical analysis to generate exception rules that allow legitimate messages to pass through application proxies and gateways.
  486. Haney, Richard D., VPN usage to create wide area network backbone over the internet.
  487. Haney, Richard D., VPN usage to create wide area network backbone over the internet.
  488. Grawrock,David W.; Sutton, II,James A., Validation of inclusion of a platform within a data center.
  489. Bennett,Steven M.; Anderson,Andrew V.; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard; Kozuch,Michael; Smith,Lawrence; Rodgers,Scott, Vectoring an interrupt or exception upon resuming operation of a virtual machine.
  490. Lindsay, Walter, Virtual aggregate fields.
  491. Neiger, Gilbert; Chou, Stephen; Cota-Robles, Erik; Jeyasingh, Stalinselvaraj; Kagi, Alain; Kozuch, Michael; Uhlig, Richard; Schoenberg, Sebastian, Virtual translation lookaside buffer.
  492. Neiger,Gilbert; Chou,Stephen; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Uhlig,Richard; Schoenberg,Sebastian, Virtual translation lookaside buffer.
  493. Samuels, Allen R.; Sutter, Paul G., Wavefront detection and disambiguation of acknowledgements.
  494. Samuels, Allen R.; Sutter, Paul G., Wavefront detection and disambiguation of acknowledgements.
  495. Samuels, Allen R.; Sutter, Paul G., Wavefront detection and disambiguation of acknowledgments.
  496. Seibel,John C.; Feng,Yu; Foster,Robert L., Web-based customer lead generator system with pre-emptive profiling.
  497. Seibel,John C.; Feng,Yu; Foster,Robert L., Web-based customer prospects harvester system.
  498. Seibel,John C.; Feng,Yu; Foster,Robert L., Web-based system and method for archiving and searching participant-based internet text sources for customer lead data.
  499. Haney, Richard D., Wide area network with high quality of service.
  500. Kelly, Kevin C.; Guckenheimer, Sam, Work item tracking system for projects.
  501. Eby, Douglas A.; De George, Steve Andrew, Workflow authoring environment and runtime.
  502. Wijnstra,Jan Gerben, X-ray examination apparatus containing a shared software modules and an application to access software module services.
  503. Francker, Soren; Arellano Lopez, Ann Martha, XML based form modification with import/export capability.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로