$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Multi-object identifier system and method for information service pattern environment

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-017/00
출원번호 US-0386714 (1999-08-31)
발명자 / 주소
  • Bowman-Amuah, Michel K.
출원인 / 주소
  • Accenture LLP
대리인 / 주소
    Oppenheimer Wolff & Donnelly LLP
인용정보 피인용 횟수 : 498  인용 특허 : 14

초록

A system and method for implementing an association of business objects without retrieving said objects from a database on which they are stored. A business object in the business cache is provided and an instance of an associated object is stored on a database. An association of the business object

대표청구항

A system and method for implementing an association of business objects without retrieving said objects from a database on which they are stored. A business object in the business cache is provided and an instance of an associated object is stored on a database. An association of the business object

이 특허에 인용된 특허 (14)

  1. Lagarde Konrad Charles ; Rogers Richard Michael, Computer network for WWW server data access over internet.
  2. Burnett Colin J. (Sydney AUX) Haas Garry L. (San Jose CA), Computer program product for object specification, generation, and management in a distributed database.
  3. Barber Ronald Jason ; Herbert David Mark ; Mohan Chandrasekaran ; Somani Amit ; Watts Steven John ; Zaharioudakis Markos, Data recovery in a transactional database using write-ahead logging and file caching.
  4. Huang Ying ; Desiraju Ramakrishna ; Begue Christophe ; Bakkalbasi Omer ; Chan Lap Mui Ann ; Bhaskaran Krishnakumar ; Federgruen Awi ; Krasinski Raymond J. ; Boey Peter, Decision support system for the management of an agile supply chain.
  5. Mattis Peter ; Plevyak John ; Haines Matthew ; Beguelin Adam ; Totty Brian ; Gourley David, Delivering alternate versions of objects from an object cache.
  6. Challenger James Robert Harold ; Dantzig Paul Michael ; Iyengar Arun K. ; Spivak Gerald A., Determining how changes to underlying data affect cached objects.
  7. Gudmundson Norman K. ; MacInnis Bo Yu, Hierarchical encapsulation of instantiated objects in a multimedia authoring system including internet accessible objec.
  8. Ernst Michael,DEX, Method and apparatus for dynamic optimization of business processes managed by a computer system.
  9. Jensen Richard H. ; Henninger Derek P., Method and apparatus for managing relational data in an object cache.
  10. Weinreb Daniel L. ; Haradhvala Sam J., Method and apparatus for virtual memory mapping and transaction management in an object-oriented database system.
  11. Whitmore Thomas John,NZX, Method for managing and accessing relational data in a relational cache.
  12. Abraham Robert L. (Marietta GA) Ross Cynthia A. (Boynton Beach FL) Moore Richard E. (Marietta GA) Rich William L. (Stone Mountain GA) Shackelford Floyd W. (Buford GA) Tiller ; Jr. John R. (Peachtree , System for persistent and delayed allocation object reference in an object oriented environment.
  13. Havens George Lee ; Stouffer Jay Douglas ; Seabold Helen Robie ; Vaughan Meredith Smith, Systems, methods and computer program products for generating and validating user defined object classes in an object o.
  14. McAtee John D. (Shrewsbury MA) Kennedy Stephen M. (Hudson MA) Piccolomini Paul J. (Fitchburg MA) Cerqua Paul J. (Chelmsford MA), Workflow management and control system.

이 특허를 인용한 특허 (498)

  1. Knouse, Charles W.; Gupta, Minoo, Access system interface.
  2. Knouse,Charles W.; Gupta,Minoo, Access system interface.
  3. Knouse,Charles W.; Gupta,Minoo, Access system interface.
  4. Yang, Liuxi; Surlaker, Kapil; Krishnamurthy, Ravi; Corwin, Michael; Branscome, Jeremy; Meiyyappan, Krishnan; Chamdani, Joseph I., Accessing data in column store database based on hardware compatible data structures.
  5. Erb, David; Aikas, Erkki Ville, Accessing objects in hosted storage.
  6. Chandrashekar, Sridhar; Rogerson, Dale E.; McRoberts, J. Shane; Dong, Wenlong; Reddish, Andrew D., Activating content based on state.
  7. Webman, Erez; Novick, Yoram, Advanced clock synchronization technique.
  8. Govindaraj, Subbian; Bronikowski, Joseph; Kalan, Michael; Kowal, Steven John; Jasper, Taryl; Plache, Kenneth; Reichard, Douglas J.; Reid, Douglas W.; Rischar, Charles, Agile control model system and method.
  9. Ismalon, Emil, Anchoring for content synchronization.
  10. Sridhar, Avinash; Campana, David Anthony; Boyce, Jill MacDonald; Anthru, Shemimom M., Apparatus and method for file size estimation over broadcast networks.
  11. Sridhar, Avinash; Campana, David Anthony; Anthru, Shemimon Manalikudy; Boyce, Jill MacDonald, Apparatus and method for simulcast over a variable bandwidth channel.
  12. Brooks, David; Tucker, Lewis Wiley; Jasik, Benji; Mason, Timothy; Bezar, Eric David; Wong, Simon; Chasman, Douglas; Tzuo, Tien; Hansma, Scott; Gross, Adam; Tamm, Steven, Application installation system, method and computer program product for allowing a package to be installed by a third party.
  13. Mishra, AMulya; Rajasekaran, Vinoth Kumar; Fothergill, Alan; Steinmeier, Oliver; Mizuta, Kenichi, Application tier data dictionary.
  14. Panda, Biswaranjan; Andreasen, Flemming S.; Rosenberg, Jonathan D., Application-aware policy enforcement.
  15. Goodman,Marina; Mesoy,Tor; Taylor,Stanton J.; Reiter,Scott R.; Bowen,Michael T.; Auriemma,Ralph; Alairys,Tamara D.; Degiorgio,Christopher M.; Coleman,Lizbeth Johnson, Architectures for netcentric computing systems.
  16. Goodman,Marina; Mesoy,Tor; Taylor,Stanton J.; Reiter,Scott R.; Bowen,Michael T.; Auriemma,Ralph; Alairys,Tamara D.; Degiorgio,Christopher M.; Coleman,Lizbeth Johnson, Architectures for netcentric computing systems.
  17. Lane, Eoin, Asset advisory intelligence engine for managing reusable software assets.
  18. Rosenberg, Jonathan D.; Stammers, Timothy P., Assigning a serving-CSCF during access authentication.
  19. White,Russell W.; Imes,Kevin R., Audio system and method.
  20. Yegani, Parviz; Iyer, Jayaraman; Stammers, Timothy P.; Oswal, Anand K., Authentication of access terminals in a cellular communication network.
  21. Villavicencio,Francisco J.; Knouse,Charles W., Authorization services with external authentication.
  22. Pieper, Tobid; Martinelli, Paul; Northing, Richard, Automated entitlement management method and apparatus for capturing maintenance renewals revenues.
  23. Cicman, Joseph Stephan; Deshpande, Piyush; Kapoor, Anshu; Kasthuriswamy, Karthikeyan, Automated migration of translation maps for use in exchanging documents between entities.
  24. Kaminsky, Ross G.; Angell, Richard A.; Evora, Gordon D., Automated trading exchange system having integrated quote risk monitoring and integrated quote modification services.
  25. Montesano, Anthony; Kaminsky, Ross G.; Angell, Richard A.; Evora, Gordon D., Automated trading exchange system having integrated quote risk monitoring and integrated quote modification services.
  26. Samuels, Allen R.; Sutter, Paul G., Automatic detection and window virtualization for flow control.
  27. Samuels, Allen R.; Sutter, Paul G., Automatic detection and window virtualization for flow control.
  28. Panasyuk, Anatoliy; Kramer, Andre; Pedersen, Bradley Jay; Stone, David Sean; Treder, Terry, Automatically reconnecting a client across reliable and persistent communication sessions.
  29. Coldicott, Peter Alan; Ellis, Raymond Walter; Gonzalez, Celso; Lane, Eoin, Automation of software application engineering using machine learning and reasoning.
  30. Sargent, Scott R., Base service architectures for netcentric computing systems.
  31. Moncla, Brenda; Ghosh, Sujit, Business constructs.
  32. Moncla, Brenda; Ghosh, Sujit, Business constructs.
  33. Gilpin, Brian M.; Griffo, Paul J., Common component modeling.
  34. Kaltenmark,John K.; Alber,Michael W.; Gilliland,William M., Communication service architectures for netcentric computing systems.
  35. Aikas, Erkki Ville Juhani; Schwartz, Michael F.; Newson, Paul E., Composing objects in hosted storage.
  36. Purpura, William J., Computer defenses and counterattacks.
  37. Bradley, Michael J.; Rehkopf, Thomas W., Computer-readable medium and data structure for communicating technical architecture standards to vendors.
  38. Bradley,Michael J.; Rehkopf,Thomas W, Computer-readable medium and data structure for defining and communicating a standard operating environment.
  39. Lee,Teck Yang; Chu,Singyun Brian; Kennedy,Todd M., Configuration description language value management method and system.
  40. White, Russell W.; Imes, Kevin R., Content delivery system and method.
  41. White,Russell W.; Imes,Kevin R., Content delivery system and method.
  42. Le, Khanh M.; Hu, Tawei; Perry, Edward J.; Zhang, Howard; Liang, Lily L., Content management system and methodology employing a tree-based table hierarchy which accomodates opening a dynamically variable number of cursors therefor.
  43. Moore, Jr., J. Lynn; Hankins, Lance W, Continuous integration of business intelligence software.
  44. Moore, Jr., J. Lynn; Hankins, Lance W, Continuous integration of business intelligence software.
  45. Moore, Jr., J. Lynn; Hankins, Lance W., Continuous integration of business intelligence software.
  46. Moore, Jr., J. Lynn; Hankins, Lance W., Continuous integration of business intelligence software.
  47. Moore, Jr., J. Lynn; Hankins, Lance W., Continuous integration of business intelligence software.
  48. Ghose, Kanad, Continuous run-time validation of program execution: a practical approach.
  49. Coldicott, Peter Alan; Lane, Eoin; Mourad, Magda Mahmoud; van Ham, Franciscus Jacobus, Cross repository impact analysis using topic maps.
  50. Yang, Wanli; Sinha, Bipul; Ganesh, Amit; Hu, Wei; Pareek, Alok; Hwang, Alexander H.; Wertheimer, Steven Charles; Sanchez, Francisco M.; Potapov, Dmitry Mikhailovich; Meng, Shen Ban; Loaiza, Juan R.; Bridge, William H.; Lee, J. William, Cross-platform transportable database.
  51. Fong, Wai Kit; Saladi, Naresh, Customizable workflow reporter.
  52. Taylor,Stanton J., Data management for netcentric computing systems.
  53. Matsubara, Takanobu, Data processing device capable of performing data transmission in a predetermined access method.
  54. Banks, Justin G., Data replication from one-to-one or one-to-many heterogeneous devices.
  55. Banks, Justin G., Data replication from one-to-one or one-to-many heterogeneous devices.
  56. Sawhney, Sanjay; Wu, Weibao, Deconstruction and transformation of complex objects for de-duplicated storage.
  57. Shaburov, Victor; Fildebrandt, Ulf; Penmatsa, Vinay Nath, Designtime services for multiple patterns.
  58. Rosenberg, Jonathan D.; Andreasen, Flemming S.; Panda, Biswaranjan, Determining a policy output for a communication session.
  59. Coldicott, Peter Alan; Lane, Eoin; Mourad, Magda Mahmoud, Determining context specific content.
  60. Gilboa, Yuval; Stienhans, Frank; Shumakher, Gennady; Giese, Peter; Shaburov, Victor; Kavaler, Adi; Penmatsa, Vinay Nath, Developing and executing applications with configurable patterns.
  61. Stienhans, Frank; Muenkel, Markus; Shaburov, Victor; Giese, Peter; Goerke, Bjoern, Developing and executing applications with configurable patterns.
  62. Qayyum, Kashif; Ruggiero, Jon, Dimensional data explorer.
  63. Ruggiero, Jon; Qayyum, Kashif, Dimensional data explorer.
  64. Musteata, Oleg; Bentley, Glen; Kosov, Yury; Kulkarni, Zeenat, Discovering object definition information in an integrated application environment.
  65. Musteata, Oleg; Bentley, Glen; Kosov, Yury; Kulkarni, Zeenat, Discovering object definition information in an integrated application environment.
  66. Musteata, Oleg; Bentley, Glen; Kosov, Yury; Lainwala, Zeenat, Discovering object definition information in an integrated application environment.
  67. Musteata,Oleg; Bentley,Glen; Kosov,Yury; Kulkarni,Zeenat, Discovering object definition information in an integrated application environment.
  68. Apparao, Vidur; Bandhauer, John; Waterson, Christopher Robert, Display of media asset information.
  69. Raghunathan, Prabhu R.; Danial, Patrick J.; Young, Mark E., Distributed intelligent systems and methods therefor.
  70. Lev, Boaz, Distributed search in a casual network of servers.
  71. Shaburov, Victor V., Distribution of data changes in pattern configurations.
  72. Saheba, Jigesh; Masiero, Roberto A.; Espina Carvajal, Isabel, Dynamic application programming interface builder.
  73. Klemm, Reinhard Peter, Dynamic multikeys for persistent objects.
  74. Siegel,Neil G.; Penedo,Maria Heloisa, Dynamic software integration architecture.
  75. Bande, Amit; Itikarlapalli, Krishna Mohan; Chatterjee, Debashish, Dynamically sizing buffers to optimal size in network layers when supporting data transfers related to database applications.
  76. Samuels, Allen; Sutter, Paul, Early generation of acknowledgements for flow control.
  77. Balachandran, Shridharan, Effectuating personalized, process-integrated information, communications and entertainment (ICE) service delivery.
  78. Schilling, John R.; Cooperstein, Howard L.; Antonio, Michael J.; Vandeberghe, Keri D.; Knowlton, Vlada, Electronic document style matrix.
  79. Sargent, Scott R., Environment service architectures for netcentric computing systems.
  80. Rosenberg, Jonathan D.; Andreasen, Flemming S.; Stammers, Timothy P., Establishing facets of a policy for a communication session.
  81. Adams, Kyle, Filtering data using malicious reference information.
  82. Duffy, John Joseph; Detlefs, David; Magruder, Michael M., Finalizable object usage in software transactions.
  83. Sheehan, John M., Flexible namespace prioritization.
  84. Samuels, Allen R.; Sutter, Paul G., Flow control system architecture.
  85. Lane, Eoin; Selvage, Mei Yang; Mourad, Magda Mahmoud; Pendergrass, Harry T., Framework to populate and maintain a service oriented architecture industry model repository.
  86. Busalacchi, Frank; Tinsley, David; Skinner, Wesley; Bressler, Paul; Yarbrough, Eric, GINA WorldSpace.
  87. Busalacchi, Frank A.; Tinsley, David C.; Skinner, Wesley; Bressler, Paul W.; Yarbrough, Eric, GINA service orchestration.
  88. Schiebeler, Dirk; Rumig, Jan, Gateway service manager for business object applications.
  89. Durvasula, Vijaya Sarathi, Generation of XML search profiles.
  90. Ismalon, Emil, Generation of refinement terms for search queries.
  91. Ismalon, Emil, Generation of refinement terms for search queries.
  92. Busalacchi, Frank; Tinsley, David; Skinner, Wesley; Bressler, Paul; Yarbrough, Eric, Global information architecture.
  93. Busalacchi, Frank; Tinsley, David; Skinner, Wesley; Bressler, Paul; Yarbrough, Eric, Global information network architecture.
  94. Villaron, Shawn A.; Robarge, Nick, Graphic object themes.
  95. Darnell, Stephen; Charnell, William Thomas; Plummer, Wayne; Dias, Blaise Abel Alec; Guthrie, Philippa Joy; Kramskoy, Jeremy Paul; Sexton, Jeremy James; Wynn, Michael John; Rautenback, Keith; Thomas, , Hash table dispatch mechanism for interface methods.
  96. Morgan, Ashley L., Hierarchical property storage.
  97. Kalra, Vishal; Cliffe, David R.; Wolf, Kenneth David; Welicki, Leon, Host agnostic messaging in a continuation based runtime.
  98. Banks, Justin; El Haddi, Abderrahman Aba A.; Sustman, Paul A.; Lee, Jr., Victor T., Hybrid real-time data replication.
  99. Sustman, Paul A.; Banks, Justin; El Haddi, Abderrahman Aba A.; Lee, Jr., Victor T., Hybrid real-time data replication.
  100. Kinno,Akira; Etoh,Minoru; Yonemoto,Yoshifumi, Identifier generating method, identity determining method, identifier transmitting method, identifier generating apparatus, identity determining apparatus, and identifier transmitting apparatus.
  101. Ben-Natan, Ron; Segal, Ury, Identifying attribute propagation for multi-tier processing.
  102. Honma, Mikimasa, Image forming apparatus and method for remote job editing.
  103. Ishii, Kensuke, Image sharing system and method.
  104. Villavicencio, Francisco J., Impersonation in an access system.
  105. Villavicencio,Francisco J., Impersonation in an access system.
  106. Lane, Eoin; Selvage, Mei Yang; Pendergrass, Harry Thomas; Mourad, Magda Mahmoud, Implementing service oriented architecture industry model repository using semantic web technologies.
  107. Rogerson, Dale E.; Chandrashekar, Sridhar; McRoberts, J. Shane; Dong, Wenlong; Reddish, Andrew D.; Chavda, Praful, In-place content substitution via code-invoking link.
  108. Rieger, Michael L.; Boman, Mathias; Bekhazi, Naji V.; Hung, Daniel D.; Brashler, Michael G.; Hall, Thomas Brett, Incremental concurrent processing for efficient computation of high-volume layout data.
  109. Rieger, Michael L.; Boman, Mathias; Bekhazi, Naji V.; Hung, Daniel D.; Brashler, Michael G.; Hall, Thomas Brett, Incremental concurrent processing for efficient computation of high-volume layout data.
  110. Aboulnaga, Ashraf; Balmin, Andrey; Beyer, Kevin S.; Elghandour, Iman; Chiang, Fei Yen; Zilio, Daniele Costante; Zuzarte, Calisto Paul, Index selection for XML database systems.
  111. Aboulnaga, Ashraf; Balmin, Andrey; Beyer, Kevin S.; Elghandour, Iman; Chiang, Fei Yen; Zilio, Daniele Costante; Zuzarte, Calisto Paul, Index selection for XML database systems.
  112. Thanu, Lakshmi Narayanan; Eberhardy, Peter; Baliga, Vijay Govind, Indirect persistent storage for plugin in container.
  113. Chauhan, Abhishek; Mirani, Rajiv; Kohli, Prince; Sikka, Namit, Inferencing data types of message components.
  114. Chauhan, Abhishek; Mirani, Rajiv; Kohli, Prince; Sikka, Namit, Inferencing data types of message components.
  115. Chauhan, Abhishek; Mirani, Rajiv; Kohli, Prince; Sikka, Namit, Inferencing data types of message components.
  116. Kawasaki, Hiromasa, Information processing apparatus, method for controlling same.
  117. Weiss, Andrew D.; Rachmiel, Andrew G., Integrated version control in a business intelligence environment.
  118. Morgan, Ashley L.; Li, Barn-Wan; Huang, Ke-Cheng; Kim, Michael; Ling-le, Sissie; Parker, Robert L. C.; Kumar, Amit, Integration of composite objects in host applications.
  119. Haney, Richard D., Inter-autonomous networking involving multiple service providers.
  120. Ismalon, Emil, Interactions among online digital identities.
  121. Wolf, Kenneth D.; Pinto, Edmund Samuel Victor; Schmidt, Robert Brian; Box, Donald F.; Kizer, Geoffrey M.; Talbert, Nathan C.; Kamani, Kavita; Maestro, Alberto Arias; Cliffe, David Robert; Vishwanath, Tirunelveli R.; Ge, HongMei; Maine, Stephen Jared; DeJarnatt, Alexander Martin, Interface infrastructure for a continuation based runtime.
  122. Wolf, Kenneth D.; Pinto, Edmund Samuel Victor; Schmidt, Robert Brian; Box, Donald F.; Kizer, Geoffrey M.; Talbert, Nathan C.; Kamani, Kavita; Maestro, Alberto Arias; Cliffe, David Robert; Vishwanath, Tirunelveli R.; Ge, HongMei; Maine, Stephen Jared; DeJarnatt, Alexander Martin, Interface infrastructure for a continuation based runtime.
  123. Burke,James, Layered and vectored graphical user interface to a knowledge and relationship rich data source.
  124. Ramamurthy,Srinivasagopalan; Teng,Joan C., Localized access.
  125. Mace, James E.; Parab, Nitin, Log structured content addressable deduplicating storage.
  126. Driscoll, Alan S.; Mallaiah, Damarugendra; Makkar, Gaurav; Rao, Balaji, Logical block replication with deduplication.
  127. Coldicott, Peter A.; Lane, Eoin; Mourad, Magda M.; Pendergrass, Harry T.; Selvage, Mei Y., Managing and maintaining scope in a service oriented architecture industry model repository.
  128. Grossfeld, Elena; Widjojo, Surjatini; Lockert, Thorsten; Seitz, Greg; Wigginton, Kenneth Randall; Kasten, Christopher J., Managing data transaction requests.
  129. Berg, Daniel Christopher; Makin, Narinder; Rich, Lawrence Scott; Schacher, Ritchard Leonard, Mechanism for defining queries in terms of data objects.
  130. Murthy, Ravi, Mechanism for multi-domain indexes on XML documents.
  131. Mikkelsen, John; Freidson, Robert, Media delivery platform.
  132. Mikkelsen, John; Freidson, Robert, Media delivery platform.
  133. Mikkelsen, John; Freidson, Robert, Media delivery platform.
  134. Mikkelsen, John; Freidson, Robert, Media delivery platform.
  135. Mikkelsen, John; Freidson, Robert, Media delivery platform.
  136. Mikkelsen, John; Freidson, Robert, Media delivery platform.
  137. Mikkelsen, John; Freidson, Robert, Media delivery platform.
  138. Mikkelsen, John; Freidson, Robert, Media delivery platform.
  139. Mikkelsen, John; Freidson, Robert, Media delivery platform.
  140. Mikkelsen, John; Freidson, Robert, Media delivery platform.
  141. Mikkelsen, John; Freidson, Robert, Media delivery platform.
  142. Mikkelsen, John; Freidson, Robert, Media delivery platform.
  143. Mikkelsen, John; Freidson, Robert, Media delivery platform.
  144. Wright, Linda, Method and apparatus for creating and categorizing exemplar structures to access information regarding a collection of objects.
  145. Crupi,John; Alur,Deepak; Malks,Daniel, Method and apparatus for developing enterprise applications using design patterns.
  146. Berg, Daniel Christopher; Makin, Narinder; Rich, Lawrence Scott; Schacher, Ritchard Leonard, Method and apparatus for generating a service data object based service pattern for an enterprise Java beans model.
  147. Cannon, Lincoln C.; Conover, Paul J., Method and apparatus for generating readable, unique identifiers.
  148. Lipe, Ralph; Chambers, Robert L.; Connell, Edward W.; Sarkar, Abhijit, Method and apparatus for identifying programming object attributes.
  149. Lipe,Ralph; Chambers,Robert L.; Connell,Edward W.; Sarkar,Abhijit, Method and apparatus for identifying programming object attributes.
  150. Lipe,Ralph; Chambers,Robert L.; Connell,Edward W.; Sarkar,Abhijit, Method and apparatus for identifying programming object attributes.
  151. Chiviendacz, Michael; Neville, Steve; Voice, Chris; Morgan, Michael, Method and apparatus for providing authentication using policy-controlled authentication articles and techniques.
  152. Green,Brett A.; Reese,Curtis; Hatten,John R., Method and apparatus for securing a print job.
  153. Moore, Christopher S.; Jeday, Adrian; Fruin, Matt; Yang, Chia; Bosch, Derek, Method and apparatus for using a one-time or few-time programmable memory with a host device designed for erasable-rewriteable memory.
  154. Moore, Christopher S.; Jeday, Adrian; Fruin, Matt; Yang, Chia; Bosch, Derek, Method and apparatus for using a one-time or few-time programmable memory with a host device designed for erasable/rewriteable memory.
  155. Moore, Christopher S.; Jeday, Adrian; Fruin, Matt; Yang, Chia; Bosch, Derek, Method and apparatus for using a one-time or few-time programmable memory with a host device designed for erasable/rewriteable memory.
  156. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan K. R., Bharath; Kumar, Anil, Method and device for performing caching of dynamically generated objects in a data communication network.
  157. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan K.R., Bharath; Kumar, Anil, Method and device for performing caching of dynamically generated objects in a data communication network.
  158. Khemani, Prakash; Sundarrajan, Prabakar; Kumar, Lakshmi; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravanakumar, Method and device for performing integrated caching in a data communication network.
  159. Broden, Theresa W.; Codoy, Glenn C.; Murphy, Jane M.; Musa, Mark A.; Wilson, Sherry L., Method and program storage device for managing a supplier for participation in a plurality of trading networks.
  160. Melnikov, Rodion; Ashkenazi, Yonatan; Ovadia, Meir, Method and system for automated debugging memory allocation and memory release.
  161. Urban, Daniel R., Method and system for automated project management.
  162. Monahan, Jay; Handler, Bradley A., Method and system for communicating user interfaces between first and second users over a network.
  163. Monahan, Jay; Handler, Bradley A., Method and system for communicating user interfaces between first and second users over a network.
  164. Monahan, Jay; Handler, Bradley A., Method and system for communicating user interfaces between first and second users over a network.
  165. Monahan, Jay; Handler, Bradley A., Method and system for communicating user interfaces between first and second users over a network.
  166. Thomas, Stephen Paul; Charnell, William Thomas; Darnell, Stephen; Dias, Blaise Abel Alec; Guthrie, Philippa Joy; Kramskoy, Jeremy Paul; Sexton, Jeremy James; Wynn, Michael John; Rautenbach, Keith; Plummer, Wayne, Method and system for dynamic memory management.
  167. Thomas, Stephen Paul; Charnell, William Thomas; Darnell, Stephen; Dias, Blaise Abel Alec; Guthrie, Philippa Joy; Kramskoy, Jeremy Paul; Sexton, Jeremy James; Wynn, Michael John; Rautenbach, Keith; Plummer, Wayne, Method and system for dynamic memory management.
  168. Lawrence, Kelvin Roderick, Method and system for dynamically adjustable and configurable garbage collector.
  169. Elza, Dethe; Coward, Ken; Flego, Anton; Fergusson, Michael, Method and system for enabling collaborative authoring of hierarchical documents with locking.
  170. Grossfeld, Elena; Widjojo, Surjatini; Lockert, Thorsten; Seitz, Greg; Wigginton, Kenneth Randall; Kasten, Christopher J., Method and system for managing data transaction requests.
  171. Grossfeld, Elena; Widjojo, Surjatini; Lockert, Thorsten; Seitz, Greg; Wigginton, Kenneth Randall; Kasten, Christopher J., Method and system for managing data transaction requests.
  172. Brentano, James; Pieber, Toby; Martinelli, Paul; Thompson, Brad; Northing, Richard, Method and system for managing digital goods.
  173. Brentano, James; Pieber, Toby; Martinelli, Paul; Thompson, Brad; Northing, Richard, Method and system for managing digital goods.
  174. Ryman, Paul; Croft, Richard; Low, Tony, Method and system for real-time seeking during playback of remote presentation protocols.
  175. Innes, Andrew; Mayers, Chris; Syms, Mark James; Otway, David John, Method and system for requesting and granting membership in a server farm.
  176. Schauser, Klaus E.; Christiansen, Bernd Oliver; Von Eicken, Thorsten; Alexandrov, Albert; Saavedra, Rafael H., Method and system for synchronizing presentation of a dynamic data set to a plurality of nodes.
  177. Coyne, Patrick J., Method and system for the management of professional services project information.
  178. Coyne, Patrick J., Method and system for the management of professional services project information.
  179. Kakumani, Badari N.; Brady, Erik E.; Klashinsky, Karl B., Method and system for using virtual labels in a software configuration management system.
  180. Bots, Henk; Devarajan, Srikanth; Annamalaisami, Saravana, Method and systems for efficient delivery of previously stored content.
  181. Bots, Henk; Devarajan, Srikanth; Annamalaisami, Saravana, Method and systems for efficient delivery of previously stored content.
  182. Lentini, Russell P.; Rao, Goutham P.; Regovich, Timothy; Weaver, Terence M., Method and systems for providing access to dynamic content via static pages.
  183. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Method and systems for routing packets from a gateway to an endpoint.
  184. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Method and systems for routing packets from a gateway to an endpoint.
  185. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Method and systems for routing packets from an endpoint to a gateway.
  186. Rao, Goutham; Rodriguez, Robert; Brueggemann, Eric, Method and systems for routing packets from an endpoint to a gateway.
  187. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Method and systems for securing remote access to private networks.
  188. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Method and systems for securing remote access to private networks.
  189. Draper, Patrick J.; Galloway, Kevin D.; Hyde, Jim; Li, Ying; Liu, Liang; Ma, Qian; Ratakonda, Krishna C.; Sun, Kewei, Method for enabling traceability and recovery from errors during migration of software applications.
  190. Clarke,William D.; Zhan,Tao, Method for loading large XML documents on demand.
  191. Rao, Goutham P.; Brueggemann, Eric R.; Rodriguez, Robert A., Method for maintaining transaction integrity across multiple remote access servers.
  192. White, Russell W.; Imes, Kevin R., Method for managing media.
  193. Treil,Nicolas Herve Edouard; Gregor,Serge Jean Francois; Leclerc,Vincent Philippe, Method for processing structured data using an object-oriented computer language.
  194. Peterson, James C., Method for strongly encrypting .ZIP files.
  195. Peterson, James C., Method for strongly encrypting .zip files.
  196. Letkeman, Kim; Grygoryev, Oleksiy, Method of aligning meta-models.
  197. Samuels, Allen; Sutter, Paul, Method of determining path maximum transmission unit.
  198. Samuels, Allen; Sutter, Paul, Method of determining path maximum transmission unit.
  199. Lim, Peter S.; Broderson, Robert, Method of maintaining a network of partially replicated database system.
  200. Chudnovsky,David V.; Chudnovsky,Gregory V., Method to resolve an incorrectly entered uniform resource locator (URL).
  201. Yaung,Alan Tsu I, Method, system, and program for enabling access to a plurality of services.
  202. Yaung,Alan Tsu I, Method, system, and program for selecting one user to assign a work item in a workflow.
  203. Lee, Taejae; Yaung, Alan Tsu-I, Method, system, and program for transferring data from an application engine.
  204. Lin,Jy Jine James; Miller,Wayne F.; Yaung,Alan Tsu I, Method, system, and program for using objects in data stores during execution of a workflow.
  205. Broden, Theresa W.; Godoy, Glenn C.; Murphy, Jane M.; Musa, Mark A.; Wilson, Sherry L., Method, system, and storage device for managing trading network packages for a plurality of trading networks.
  206. Martin,Robert; Dubin,Jared; Williamson,Jeff; Tio,Cathy, Methods and apparatus for call service processing by instantiating an object that executes a compiled representation of a mark-up language description of operations for performing a call feature or s.
  207. Calvin, Phil, Methods and apparatus for secure online access on a client device.
  208. Schauser, Klaus E.; Christiansen, Bernd Oliver; Von Eicken, Thorsten; Alexandrov, Albert; Saavedra, Rafael H., Methods and apparatus for sharing graphical screen data in a bandwidth-adaptive manner.
  209. Schauser, Klaus E.; Christiansen, Bernd Oliver; Von Eicken, Thorsten; Alexandrov, Albert; Saavedra, Rafael H., Methods and apparatus for synchronization of data set representations in a bandwidth-adaptive manner.
  210. Schauser, Klaus E.; Christiansen, Bernd Oliver; von Eicken, Thorsten; Alexandrov, Albert; Saavedra, Rafael H., Methods and apparatus for synchronization of data set representations in a bandwidth-adaptive manner.
  211. Sullivan, Darin; Muklashy, Shadi, Methods and interfaces for displaying performance data related to a current remote access session.
  212. Sullivan, Darin; Muklashy, Shadi, Methods and interfaces for displaying performance data related to a current remote access session.
  213. Beck, Christopher Clemmett Macleod; Sidell, Mark Franklin; Gold, Thomas Knox; Powers, James Karl; Knuff, Charles Dazler, Methods and system for creating and managing identity oriented networked communication.
  214. Alexandrov, Albert; Saavedra, Rafael; Chalmers, Robert; Srinivasan, Kavitha, Methods and systems for bandwidth adaptive N-to-N communication in a distributed system.
  215. Alexandrov, Albert; Saavedra, Rafael; Chalmers, Robert; Srinivasan, Kavitha, Methods and systems for bandwidth adaptive N-to-N communication in a distributed system.
  216. Ryman, Paul; Feijoo, Ricardo Fernando; Nagubadi, Anil, Methods and systems for cataloging text in a recorded session.
  217. Elza,Dethe; Coward,Ken; Flego,Anton; Fergusson,Michael, Methods and systems for enabling collaborative authoring of hierarchical documents.
  218. Mazzaferri, Richard James, Methods and systems for generating playback instructions for playback of a recorded computer session.
  219. Mazzaferri, Richard James, Methods and systems for generating playback instructions for rendering of a recorded computer session.
  220. Ryman, Paul Adam, Methods and systems for in-session playback on a local machine of remotely-stored and real time presentation layer protocol data.
  221. Hayton, Richard, Methods and systems for interactive evaluation of policies.
  222. Hayton, Richard, Methods and systems for interactive evaluation using dynamically generated, interactive resultant sets of policies.
  223. Hayton, Richard, Methods and systems for interactive evaluation using dynamically generated, interactive resultant sets of policies.
  224. Ryman, Paul, Methods and systems for joining a real-time session of presentation layer protocol data.
  225. Nord, Joseph; Hayton, Richard, Methods and systems for providing a consistent profile to overlapping user sessions.
  226. Nord, Joseph; Hayton, Richard, Methods and systems for providing a consistent profile to overlapping user sessions.
  227. Nord, Joseph; Hayton, Richard, Methods and systems for providing a consistent profile to overlapping user sessions.
  228. Ryman, Paul Adam, Methods and systems for real-time seeking during real-time playback of a presentation layer protocol data stream.
  229. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Methods and systems for securing access to private networks using encryption and authentication technology built in to peripheral devices.
  230. von Eicken, Thorsten; Winterstein, Florian, Methods for providing performance improvement recommendations.
  231. Medlock, Joe, Methods, systems and computer program products for controlling network asset recovery.
  232. Adkinson, Timothy K.; Moering, Carl E., Methods, systems and computer program products for inventory reconciliation.
  233. Sanabria, Andres; Mihai, Constantin; Kothari, Nikhil; Hilerio, Israel; Harder, Michael; Maybee, Paul E., Modeling user input and interaction in workflow based applications.
  234. Sanabria, Andres; Mihai, Constantin; Kothari, Nikhil; Hilerio, Israel; Harder, Michael; Maybee, Paul E., Modeling user input and interaction in workflow based applications.
  235. Remahl, Thomas; Tsang, Andy; Summers, Bob, Multi-language support for enterprise identity and access management.
  236. Busalacchi, Frank; Tinsley, David; Skinner, Wesley, Network clustering technology.
  237. Ben-Natan, Ron, Network intrusion blocking security overlay.
  238. Andreasen, Flemming S.; Iyer, Jayaraman R.; Rosenberg, Jonathan D.; Panda, Biswaranjan, Network-triggered quality of service (QoS) reservation.
  239. Ben-Natan, Ron, Nondestructive interception of secure data in transit.
  240. Surna, Aleksandras; Ismert, Erik; Rangarajan, Srikumar; Khanolkar, Nimish S., Normalizing data for fast superscalar processing.
  241. Surna, Aleksandras; Ismert, Erik; Rangarajan, Srikumar; Khanolkar, Nimish S., Normalizing data for fast superscalar processing.
  242. Surna, Aleksandras; Ismert, Erik; Rangarajan, Srikumar; Khanolkar, Nimish S., Normalizing data for fast superscalar processing.
  243. Collins, Jesse; Fischer, Mark A.; Kim, Thomas; Tobin, Thomas Joseph; Wong, Simon, On-demand database service system, method and computer program product for generating a custom report.
  244. Collins, Jesse; Fischer, Mark A.; Kim, Thomas; Tobin, Thomas Joseph; Wong, Simon, On-demand database service system, method and computer program product for generating a custom report.
  245. Kaltenmark,John K.; Degiorgio,Christopher M., Operations architectures for netcentric computing systems.
  246. Cook, James C.; McCamish, Patrick E.; Quesenberry, Gary M.; Robinson, Jr., Robert C.; Warren, John S., Optimal data storage and access for clustered data in a relational database.
  247. Andreasen, Flemming; Hamel, Eric; Arbel, Yaacov; Morgenstern, Meir, Packet flow optimization (PFO) policy management in a communications network by rule name.
  248. Chen, Yao-Ching Stephen; Huang, Yue; Lin, Fen-Ling; Tran, Brian Thinh-Vinh; Zhang, Guogen, Packing nodes into records to store XML XQuery data model and other hierarchically structured data.
  249. Rosenberg, Jonathan D., Performing deep packet inspection for a communication session.
  250. Moore, Reagan W.; Rajasekar, Arcot; Baru, Chaitanya K.; Ludaescher, Bertram; Gupta, Amarnath; Marciano, Richard J., Persistent archives.
  251. Moore,Reagan W.; Rajasekar,Arcot; Baru,Chaitanya K.; Ludaescher,Bertram; Gupta,Amarnath; Marciano,Richard J., Persistent archives.
  252. Srisuresh, Pyda; Murgia, Marco A.; Gunuganti, Ramakanth, Policy based network address translation.
  253. Srisuresh, Pyda; Murgia, Marco A.; Gunuganti, Ramakanth, Policy based network address translation.
  254. Andreasen, Flemming S.; Rosenberg, Jonathan D., Policy-based control of content intercept.
  255. Knouse,Charles W.; Thiyagarajan,Lakshmi Velandai, Post data processing.
  256. Arvanitis,Yannis S.; Taylor,Stanton J., Presentation service architectures for netcentric computing systems.
  257. Okabe, Hiroki; Takabayashi, Nobuhisa; Shimada, Mikiya, Print job management apparatus and print job management method.
  258. Okabe, Hiroki; Takabayashi, Nobuhisa; Shimada, Mikiya, Print management system and print management method.
  259. Haney, Richard D., Private tunnel usage to create wide area network backbone over the internet.
  260. Apparao, Vidur; Bandhauer, John; Waterson, Christopher, Process and system for locating a media asset based on audit trail information incorporated into the asset itself.
  261. Apparao, Vidur; Bandhauer, John; Waterson, Christopher, Processes and system for accessing externally stored metadata associated with a media asset using a unique identifier incorporated into the asset itself.
  262. Hoeye, Robin F.; Wenban, James D., Projector control markup language.
  263. Bracha,Gilad, Protecting object identity in a language with built-in synchronization objects.
  264. White, Russell W.; Imes, Kevin R., Providing broadcast content.
  265. Bruening, Karsten; Dopf, Georg; Gauger, Stefan; Pannicke, Danny; Schumann, Rolf; Schwarz, Peter; Seyfried, Juergen Alfred; Reccius, Andreas, Provision of data for data warehousing applications.
  266. Bruening,Karsten; Dopf,Georg; Gauger,Stefan; Pannicke,Danny; Schumann,Rolf; Schwarz,Peter; Seyfried,Juergen Alfred; Reccius,Andreas, Provision of data for data warehousing applications.
  267. Subramanyam, V., Quality management framework for a software lifecycle.
  268. Kuzma, Peter J.; Eldering, Charles A., RFID tag filtering and monitoring.
  269. Kuzma,Peter J.; Eldering,Charles A., RFID tag filtering and monitoring.
  270. Kuzma,Peter J.; Eldering,Charles A., RFID tag filtering and monitoring.
  271. Matsuda,Koichi; Ueno,Hiroshi, Receiving apparatus and method, sending apparatus and method, recording medium, and communication system.
  272. Coldicott, Peter Alan; Pendergrass, Harry Thomas; Lane, Eoin, Recognition of and support for multiple versions of an enterprise canonical message model.
  273. Chauhan, Abhishek; Mirani, Rajiv; Kohli, Prince; Nanduri, Priya, Rule generalization for web application entry point modeling.
  274. Chauhan, Abhishek; Mirani, Rajiv; Kohli, Prince; Nanduri, Priya, Rule generalization for web application entry point modeling.
  275. Jacobson, Neil A.; Sheehan, John M., Running add-on components in virtual environments.
  276. Chen, Yao-Ching Stephen; Lin, Fen-Ling; Mukai, Jerry; Shyam, Kalpana; Teng, James Zu-Chia; Zhang, Guogen, Scalable storage schemes for native XML column data of relational tables.
  277. Ismalon, Emil, Search phrase refinement by search term replacement.
  278. Kuzma,Peter J.; Eldering,Charles A.; Mauriel,Michael, Secondary card reader.
  279. Allavarpu,Sai V.; Dong,Xeusi; Lee,Linda C., Secure access to managed network objects using a configurable platform-independent gateway providing individual object-level access control.
  280. Joshi,Vrinda S.; Swadi,Praveen R.; Summers,Robert L., Selective cache flushing in identity and access management systems.
  281. Joshi,Vrinda S.; Swadi,Praveen R.; Summers,Robert L., Selective cache flushing in identity and access management systems.
  282. Ben-Natan, Ron; Tarandach, Izar, Selective local database access restriction.
  283. Gitelson,Gary; Boe,Michael; Murugesan,Prasannakumar, Selective process restart based on API changes.
  284. Akkiraju, Rama K. T.; Ivan, Anca-Andreea; Lee, Juhnyoung; Lin, Grace Y.; Nurullaev, Timur, Semantic business model management.
  285. Bobick, Mark; Pace, Charles P.; Pizzorni, Paolo R.; Chen, Shuang, Server system and method for exporting digital assets in enterprise information systems.
  286. Coldicott, Peter Alan; Lane, Eoin; Mourad, Magda Mahmoud; Pendergrass, Harry Thomas; Selvage, Mei Yang; van Ham, Franciscus Jacobus, Service oriented architecture industry model repository meta-model component with a standard based index.
  287. Liwerant, Gad; Dodge, Christopher; Boissiere, Guillaume, Sharing a streaming video.
  288. Ramnani, Subash, Simulating multi-monitor functionality in a single monitor environment.
  289. Lane, Eoin; Larsen, Grant J.; Patten, Willie R., Solution that automatically recommends design assets when making architectural design decisions for information services.
  290. Coldicott, Peter A.; Lane, Eoin, Standard based mapping of industry vertical model to legacy environments.
  291. Kulkarni,Raghavendra; Ramani,Rajesh, Storing and retrieving computer data files using an encrypted network drive file system.
  292. Cooper, Thomas A.; Downey, Timothy, Subscription-based information system.
  293. Hankins, Lance W.; Moore, Roger P., Supplemental system for business intelligence systems.
  294. Hankins, Lance W.; Moore, Roger P., Supplemental system for business intelligence systems.
  295. Hankins, Lance W.; Moore, Roger P., Supplemental system for business intelligence systems.
  296. Hankins, Lance W., Supplemental system for business intelligence systems to provide visual identification of meaningful differences.
  297. Ghatare, Sanjay P., Support for RDBMS in LDAP system.
  298. Sirr, Patrick E.; Winternitz, Fabian O.; McClenahan, Jill M., Support for heterogeneous database artifacts in a single project.
  299. Yegani, Parviz; Salowey, Joseph A.; Iyer, Jayaraman R.; Oswal, Anand K., System and method for access authentication in a mobile wireless network.
  300. Dekker, Bethany; Nicodemo, John; Rounds, Kimberly; Scriffignano, Anthony J.; Hara, Karma; Klein, Michael; Hanuschak, David, System and method for aggregation and association of professional affiliation data with commercial data content.
  301. Tovo, Patricia A., System and method for archiving data.
  302. Baumann, Carl Steven; May, Michael Randy; Munson, John Irving; Sjostrom, William Montgomery; Wilson, Sherry Lee, System and method for automating invoice processing with positive confirmation.
  303. Andreasen, Flemming S.; Rosenberg, Jonathan D.; Iyer, Jayaraman R., System and method for capturing accounting data for a communication session.
  304. White, Russell W.; Imes, Kevin R., System and method for communicating media center.
  305. White, Russell W.; Imes, Kevin R., System and method for communicating media content.
  306. Andreasen, Flemming S.; Rosenberg, Jonathan D.; Iyer, Jayaraman R., System and method for consolidating accounting data for a communication session.
  307. Coile, Brantley W., System and method for content management over network storage devices.
  308. McConnell, Christopher C., System and method for context sensitive searching.
  309. Brydon, Antony; Patterson, Jeff, System and method for enforcing privacy in social networks.
  310. Sundarrajan, Prabakar; He, Junxiao; Soni, Ajay; Nanjundaswamy, Shashidhara; Kumar, Arkesh, System and method for establishing a virtual private network.
  311. Sundarrajan, Prabakar; He, Junxiao; Soni, Ajay; Nanjundaswamy, Shashidhara; Kumar, Arkesh, System and method for establishing a virtual private network.
  312. Sundarrajan, Prabakar; He, Junxiao; Soni, Ajay; Nanjundaswamy, Shashidhara; Kumar, Arkesh, System and method for establishing a virtual private network.
  313. Rosenberg, Jonathan D.; Andreasen, Flemming S., System and method for exchanging policy information in a roaming communications environment.
  314. Andreasen, Flemming S.; Rosenberg, Jonathan D.; Iyer, Jayaraman R.; Panda, Biswaranjan, System and method for generating a unified accounting record for a communication session.
  315. Shah, Devang K.; Driscoll, Alan S., System and method for hijacking inodes based on replication operations received in an arbitrary order.
  316. Shah, Devang K.; Driscoll, Alan S., System and method for hijacking inodes based on replication operations received in an arbitrary order.
  317. Taniai, Masayuki; Igari, Hirokazu, System and method for implementing MBSTRING in weblogic tuxedo connector.
  318. Nagle, John, System and method for improving integrity of internet search.
  319. Nagle, John, System and method for improving integrity of internet search.
  320. Nagle, John, System and method for improving integrity of internet search.
  321. Cirulli, Susan Bumgardner; Evans, Robert Martin; Robinson, Gerald R.; Wilson, Sherry Lee, System and method for leveraging procurement across companies and company groups.
  322. White, Russell W.; Imes, Kevin R., System and method for managing media.
  323. White, Russell W.; Imes, Kevin R., System and method for managing media.
  324. Peterson, James C.; Peterson, Karen L.; Basin, Yuri; Beirne, Michael J., System and method for manipulating and managing computer archive files.
  325. Rosenberg, Jonathan D.; Andreasen, Flemming S., System and method for network charging using policy peering.
  326. Wei, Coach K., System and method for network-based computing.
  327. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan K R, Bharath; Kumar, Anil, System and method for performing entity tag and cache control of a dynamically generated object not identified as cacheable in a network.
  328. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan K R, Bharath; Kumar, Anil, System and method for performing entity tag and cache control of a dynamically generated object not identified as cacheable in a network.
  329. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan KR, Bharath; Kumar, Anil, System and method for performing flash caching of dynamically generated objects in a data communication network.
  330. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; K.R., Bharat Bhushan; Kumar, Anil, System and method for performing flash caching of dynamically generated objects in a data communication network.
  331. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bushan K. R., Bharath; Kumar, Anil, System and method for performing flash crowd caching of dynamically generated objects in a data communication network.
  332. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan KR, Bharath; Kumar, Anil, System and method for performing granular invalidation of cached dynamically generated objects in a data communication network.
  333. Morsch, Andreas F.; Schaude, Horst F.; Bruss, Ingo; Bauer, Michael H., System and method for process controls in master data modeling.
  334. Cirulli, Susan Bumgardner; Evans, Robert Martin, System and method for processing tax codes by company group.
  335. Snavely, Amy J.; Sjostrom, William M.; Musa, Mark A., System and method for providing a role table GUI via company group.
  336. Rosenberg, Jonathan D.; Andreasen, Flemming S., System and method for providing emergency services in a visited communications environment.
  337. Rosenberg, Jonathan D.; Andreasen, Flemming S., System and method for providing multimedia services.
  338. Rosenberg, Jonathan D.; Andreasen, Flemming S., System and method for providing telephony services.
  339. Yang, Ping; Gopalan, Kartik, System and method for security and privacy aware virtual machine checkpointing.
  340. Yang, Ping; Gopalan, Kartik, System and method for security and privacy aware virtual machine checkpointing.
  341. Lee, Chung-I; Lin, Floye; Fan, David, System and method for synchronizing distributed stored documents.
  342. Deo, Shardul; Dixon, Aaron; Sanchez, Matthew; Teleki, Steven, System and method for the autogeneration of ontologies.
  343. Benson, Greg, System and method for the automated processing of physical objects.
  344. Benson, Gregory P., System and method for the automated processing of physical objects.
  345. Trivedi, Pooja; Momchilov, Georgy; Pope, David, System and method for transferring data among computing environments.
  346. Bruso, Kelsey L.; Plasek, James M.; Reichow, William J., System and method for transforming a database state.
  347. Brydon, Antony; Patterson, Jeff, System and method for using social networks to facilitate business processes.
  348. Ghose, Kanad, System and method for validating program execution at run-time.
  349. Ghose, Kanad, System and method for validating program execution at run-time using control flow signatures.
  350. White, Russell W.; Imes, Kevin R., System and method to communicate targeted information.
  351. White, Russell W.; Imes, Kevin R., System and method to communicate targeted information.
  352. Mazzaferri, Richard James, System and methods for automatic time-warped playback in rendering a recorded computer session.
  353. Ben Natan,Ron, System and methods for nonintrusive database security.
  354. Apparao, Vidur; Bandhauer, John; Waterson, Christopher, System for incorporating information about a source and usage of a media asset into the asset itself.
  355. Apparao,Vidur; Bandhauer,John; Waterson,Christopher, System for incorporating information about a source and usage of a media asset into the asset itself.
  356. Broden, Theresa W.; Godoy, Glenn C.; Murphy, Jane M.; Musa, Mark A.; Wilson, Sherry L., System for managing a supplier for participation in a plurality of trading networks.
  357. Baumann, Carl Steven; May, Michael Randy; Munson, John Irving; Sjostrom, William Montgomery; Wilson, Sherry Lee, System for processing a purchase request for goods or services.
  358. White, Russell W.; Imes, Kevin R., System to communicate media.
  359. White, Russell W.; Imes, Kevin R., System to communicate media.
  360. White, Russell W.; Imes, Kevin R., System to communicate media.
  361. Rao,Goutham P.; Rodriguez,Robert; Brueggemann,Eric, System, apparatus and method for establishing a secured communications link to form a virtual private network at a network protocol layer other than at which packets are filtered.
  362. Brooks, David; Tucker, Lewis Wiley; Jasik, Benji; Mason, Timothy; Bezar, Eric David; Wong, Simon; Chasman, Douglas; Tzuo, Tien; Hansma, Scott; Gross, Adam; Tamm, Steven, System, method and computer program product for validating one or more metadata objects.
  363. Brooks, David; Tucker, Lewis Wiley; Jasik, Benji; Mason, Timothy; Bezar, Eric David; Wong, Simon; Chasman, Douglas; Tzuo, Tien; Hansma, Scott; Gross, Adam; Tamm, Steven, System, method and computer program product for validating one or more metadata objects.
  364. Vailaya,Aditya, System, tools and methods to facilitate identification and organization of new information based on context of user's existing information.
  365. Plamondon, Robert, Systems and method of using HTTP head command for prefetching.
  366. Pedersen, Bradley J.; Sinha, Rajiv; Sundarrajan, Prabakar; Treder, Terry, Systems and methods for accelerating delivery of a computing environment to a remote user.
  367. Plamondon, Robert; Ovsiannikov, Michael; Samuels, Allen, Systems and methods for additional retransmissions of dropped packets.
  368. Plamondon, Robert; Ovsiannikov, Michael; Samuels, Allen, Systems and methods for additional retransmissions of dropped packets.
  369. Rao, Goutham P.; Rodriguez, Robert; Brueggemann, Eric, Systems and methods for adjusting the maximum transmission unit by an intermediary device.
  370. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for adjusting the maximum transmission unit for encrypted communications.
  371. Agrawal, Sonali; Macklem, Walter; Mathew, Reena; Wong, Simon Y., Systems and methods for analyzing operations in a multi-tenant database system environment.
  372. Sundarrajan, Prabakar; He, Junxiao; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil, Systems and methods for automatic installation and execution of a client-side acceleration program.
  373. Chadda, Sanjay; Samuels, Allen; DeCasper, Dan; Dittia, Zubin; Ankam, Shiva, Systems and methods for bridging a WAN accelerator with a security gateway.
  374. He, Junxiao; Suganthi, Josephine; Verzunov, Sergey; Shetty, Anil; Venkatraman, Charu, Systems and methods for bypassing an appliance.
  375. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for client-side application-aware prioritization of network communications.
  376. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for communicating a lossy protocol via a lossless protocol.
  377. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for communicating a lossy protocol via a lossless protocol.
  378. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for communicating a lossy protocol via a lossless protocol using false acknowledgements.
  379. Rao, Goutham P.; Rodriguez, Robert; Brueggemann, Eric, Systems and methods for communicating a lossy protocol via a lossless protocol using false acknowledgements.
  380. Khemani, Prakash; Bandekar, Vishal, Systems and methods for configuring flow control of policy expressions.
  381. Khemani, Prakash; Bandekar, Vishal, Systems and methods for configuring handling of undefined policy events.
  382. Khemani, Prakash; Bandekar, Vishal, Systems and methods for configuring policy bank invocations.
  383. Khemani, Prakash; Bandekar, Vishal, Systems and methods for configuring policy bank invocations.
  384. Khemani, Prakash; Bandekar, Vishal, Systems and methods for configuring policy bank invocations.
  385. Bal, Rajpaul Singh; Lochmann, Mark; Peries, Chaminda; Reid, Laurence, Systems and methods for correlating meta-data model representations and asset-logic model representations.
  386. Shinn,Matthew; White,Seth, Systems and methods for cursored collections.
  387. Doane, David A.; Walker, Douglas Jock, Systems and methods for delegating information technology authorization to at least one other person.
  388. Plamondon, Robert, Systems and methods for domain name resolution interception caching.
  389. Kamath, Sandeep; Raja, Murali; Suganthi, Josephine; Shetty, Anil; Verzunov, Sergey, Systems and methods for dynamic decentralized load balancing across multiple sites.
  390. Shinn, Matthew; White, Seth; Woollen, Robert, Systems and methods for dynamic querying.
  391. Chacko, Vinoo; Agarwal, Puneet; Nanjudaswamy, Shashi; Soni, Ajay, Systems and methods for enabling assured records using fine grained auditing of virtual private network traffic.
  392. Mullick, Amarnath; Venkatraman, Charu; Nanjundaswamy, Shashi; He, Junxiao; Soni, Ajay; Stavrakos, Nicholas; Koopmans, Chris, Systems and methods for enhanced client side policy.
  393. Bots, Henk; Devarajan, Srikanth; Annamalaisami, Saravana; Stavrakos, Nicholas; Monks, Jeff; Koopmans, Fred; Koopmans, Chris; Dakhane, Kapil, Systems and methods for enhanced delta compression.
  394. Van Der Linden, Rob; Halls, David; Waterhouse, Simon; Benoit, Peter, Systems and methods for establishing a cloud bridge between virtual storage resources.
  395. van der Linden, Rob; Halls, David; Waterhouse, Simon; Benoit, Peter, Systems and methods for establishing a cloud bridge between virtual storage resources.
  396. Brooks, David; Jasik, Benji; Bezar, Eric David; Chasman, Douglas; Hansma, Scott; Tamm, Steven; Tucker, Lewis Wiley; Mason, Timothy; Tzuo, Tien; Gross, Adam; Wong, Simon, Systems and methods for exporting, publishing, browsing and installing on-demand applications in a multi-tenant database environment.
  397. Brooks, David; Tucker, Lewis Wiley; Jasik, Benji; Mason, Timothy; Bezar, Eric David; Wong, Simon; Chasman, Douglas; Tzuo, Tien; Hansma, Scott; Gross, Adam; Tamm, Steven, Systems and methods for exporting, publishing, browsing and installing on-demand applications in a multi-tenant database environment.
  398. Brooks, David; Tucker, Lewis Wiley; Jasik, Benji; Mason, Timothy; Bezar, Eric David; Wong, Simon; Chasman, Douglas; Tzuo, Tien; Hansma, Scott; Gross, Adam; Tamm, Steven, Systems and methods for exporting, publishing, browsing and installing on-demand applications in a multi-tenant database environment.
  399. Brooks, David; Tucker, Lewis Wiley; Jasik, Benji; Mason, Timothy; Bezar, Eric David; Wong, Simon; Chasman, Douglas; Tzuo, Tien; Hansma, Scott; Gross, Adam; Tamm, Steven, Systems and methods for exporting, publishing, browsing and installing on-demand applications in a multi-tenant database environment.
  400. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for facilitating a peer to peer route via a gateway.
  401. Plamondon, Robert, Systems and methods for identifying long matches of data in a compression history.
  402. Plamondon, Robert, Systems and methods for identifying long matches of data in a compression history.
  403. Plamondon, Robert D., Systems and methods for identifying long matches of data in a compression history.
  404. Plamondon,Robert, Systems and methods for identifying long matches of data in a compression history.
  405. Panasyuk, Anatoliy; Kramer, Andre; Pedersen, Bradley Jay; Stone, David Sean; Treder, Terry, Systems and methods for maintaining a client's network connection thru a change in network identifier.
  406. Sikka, Namit; Reddy, Anoop; Mirani, Rajiv; Chauhan, Abhishek, Systems and methods for managing application security profiles.
  407. Sikka, Namit; Reddy, Anoop; Mirani, Rajiv; Chauhan, Abhishek, Systems and methods for managing application security profiles.
  408. Goodnow, II, James E.; Bancroft, James A.; Morgan, Jonathan G., Systems and methods for managing blood donations.
  409. Walker, Douglas Jock, Systems and methods for managing identities in a database system.
  410. Barton, Gary Lee; Feijoo, Ricardo Fernando, Systems and methods for managing printer settings in a networked computing environment.
  411. Basin, Yuri; Beirne, Michael J.; Peterson, James C.; Peterson, Karen L., Systems and methods for manipulating and managing computer archive files.
  412. Basin, Yuri; Beirne, Michael J; Peterson, James C; Peterson, Karen L, Systems and methods for manipulating and managing computer archive files.
  413. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for network disruption shielding techniques.
  414. Walker, Douglas Jock, Systems and methods for notifying multiple systems and applications of changes to data attributes.
  415. Rao, Goutham P.; Rodriguez, Robert; Brueggemann, Eric, Systems and methods for providing a VPN solution.
  416. Rao, Goutham P.; Rodriguez, Robert; Brueggemann, Eric, Systems and methods for providing a VPN solution.
  417. Sundarrajan, Prabakar; He, Junxiao; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil, Systems and methods for providing client-side accelerated access to remote applications via TCP buffering.
  418. Sundarrajan, Prabakar; He, Junxiao; Nanjundaswamy, Shashi; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil, Systems and methods for providing client-side accelerated access to remote applications via TCP multiplexing.
  419. Sundarrajan, Prabakar; He, Junxiao; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil; Nanjundaswamy, Shashi, Systems and methods for providing client-side accelerated access to remote applications via TCP pooling.
  420. Sundarrajan, Prabakar; He, Junxiao; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil; Suganthi, Josephine, Systems and methods for providing client-side dynamic redirection to bypass an intermediary.
  421. Samuels, Allen; Jensen, Richard; Dittia, Zubin; Decasper, Dan; Osviannikov, Michael; Plamondon, Robert, Systems and methods for providing dynamic ad hoc proxy-cache hierarchies.
  422. Samuels, Allen; Jensen, Richard; Dittia, Zubin; Decasper, Dan; Ovsiannikov, Michael; Plamondon, Robert, Systems and methods for providing dynamic ad hoc proxy-cache hierarchies.
  423. Harris, James; He, Max; Kumar, Arkesh; Soni, Ajay; Venkatraman, Charu; Najundaswamy, Shashi; Mullick, Amarnath, Systems and methods for providing levels of access and action control via an SSL VPN appliance.
  424. Khemani, Prakash; Bandekar, Vishal, Systems and methods for providing structured policy expressions to represent unstructured data in a network appliance.
  425. Doane, David A.; Walker, Douglas Jock, Systems and methods for provisioning content from multiple sources to a computing device.
  426. Suganthi, Josephine; He, Junxiao; Verzunov, Sergey; Shetty, Anil; Venkatraman, Charu, Systems and methods for routing VPN traffic around network distribution.
  427. Samuels, Allen R.; Jensen, Richard; Dittia, Zubin; Decasper, Dan S.; Ovsiannikov, Michael; Plamondon, Robert D., Systems and methods for sharing compression histories between multiple devices.
  428. Samuels, Allen; Jensen, Richard; Dittia, Zubin; Decasper, Dan; Ovsiannikov, Michael; Plamondon, Robert, Systems and methods for sharing compression histories between multiple devices.
  429. Samuels, Allen; Jensen, Richard; Dittia, Zubin; Decasper, Dan; Ovsiannikov, Michael; Plamondon, Robert, Systems and methods for sharing compression histories between multiple devices.
  430. Liwerant, Gad; Dodge, Christopher; Boissiere, Guillaume, Systems and methods for sharing video with advertisements over a network.
  431. Ryman, Paul, Systems and methods for single stack shadowing.
  432. Liu,James; Pillutla,Raghavender; Yen,Chien Hua; Mac,Timothy; Yacoub,Yousef, Systems and methods for software performance tuning.
  433. Rosenstein, Adam H., Systems and methods for state signing of internet resources.
  434. Plamondon, Robert; Ovsiannikov, Michael; Samuels, Allen, Systems and methods for stochastic-based quality of service.
  435. Kulkarni,Raghavendra; Ramani,Rajesh, Systems and methods for storing, backing up and recovering computer data files.
  436. Chan,Christine Wai Han, Systems and methods for testing whether access to a resource is authorized based on access information.
  437. Indiran, Eric; Green, Brian; Piasecki, Derek, Systems and methods for transferring data between computing devices.
  438. He, Junxiao; Venkatraman, Charu; Soni, Ajay, Systems and methods for using an HTTP-aware client agent.
  439. He, Junxiao; Venkatraman, Charu; Soni, Ajay, Systems and methods for using an HTTP-aware client agent.
  440. Venkatraman, Charu; He, Junxiao; Soni, Ajay; Stavrakos, Nicholas; Monks, Jeff; Koopmans, Fred; Koopmans, Chris; Dakhane, Kapil, Systems and methods for using an HTTP-aware client agent.
  441. Korrapati, Vamsi; Khemani, Prakash; Mirani, Rajiv; Chauhan, Abhishek, Systems and methods for using object oriented expressions to configure application security policies.
  442. Samuels,Allen; Jensen,Richard; Dittia,Zubin; Decasper,Dan; Ovsiannikov,Michael; Plamondon,Robert, Systems and methods of clustered sharing of compression histories.
  443. Samuels, Allen; Jensen, Richard; Dittia, Zubin; Decasper, Dan; Ovsiannikov, Michael; Plamondon, Robert, Systems and methods of compression history expiration and synchronization.
  444. Plamondon, Robert, Systems and methods of dynamically checking freshness of cached objects based on link status.
  445. Verzunov, Sergey; He, Junxiao; Nanjundaswamy, Shashi; Venkatraman, Charu; Bhushan, Bharath; Annamalaisami, Saravana; Shetty, Anil, Systems and methods of for providing multi-mode transport layer compression.
  446. Plamondon, Robert, Systems and methods of freshening and prefreshening a DNS cache.
  447. Plamondon, Robert, Systems and methods of prefetching objects for caching using QoS.
  448. Plamondon, Robert, Systems and methods of prefreshening cached objects based on user's current web page.
  449. Plamondon, Robert, Systems and methods of providing security and reliability to proxy caches.
  450. Plamondon, Robert, Systems and methods of revalidating cached objects in parallel with request for object.
  451. Plamondon, Robert, Systems and methods of revalidating cached objects in parallel with request for object.
  452. Samuels, Allen; Jensen, Richard; Dittia, Zubin; Decasper, Dan; Ovsiannikov, Michael; Plamondon, Robert, Systems and methods of using application and protocol specific parsing for compression.
  453. Samuels, Allen; Jensen, Richard; Dittia, Zubin; Decasper, Dan; Ovsiannikov, Michael; Plamondon, Robert, Systems and methods of using application and protocol specific parsing for compression.
  454. Plamondon, Robert; Ovsiannikov, Michael; Samuels, Allen, Systems and methods of using packet boundaries for reduction in timeout prevention.
  455. Plamondon, Robert; Ovsiannikov, Michael; Samuels, Allen R., Systems and methods of using packet boundaries for reduction in timeout prevention.
  456. Plamondon, Robert, Systems and methods of using the refresh button to determine freshness policy.
  457. Samuels, Allen; Sutter, Paul, TCP selection acknowledgements for communicating delivered and missing data packets.
  458. Fiacco, Daniel M.; Drewek, Nicholas J.; Mohan, Dineshkumar; Alaguvel, Senthilkumaran; Muthuvaithyalingam, Senthil, Task concurrency limiter.
  459. Ismalon, Emil, Techniques for ranking search results.
  460. Carrato, Anthony L.; Coldicott, Peter A.; Ellis, Raymond W.; Hopkins, Richard A.; Jones, Brad N.; Kelley, Edward E.; Lane, Eoin; Scott, Ian J.; van Ham, Franciscus J.; Young-Garder, Anthony J., Temporal scope translation of meta-models using semantic web technologies.
  461. Redmond,Anthony; Mangan,Martin, Tracking of computer based training courses.
  462. Apparao, Vidur; Bandhauer, John; Waterson, Christopher Robert, Tracking source and transfer of a media asset.
  463. Apparao, Vidur; Bandhauer, John; Waterson, Christopher Robert, Tracking source and usage of a media asset.
  464. Apparao, Vidur; Bandhauer, John; Waterson, Christopher Robert, Tracking usage of a media asset.
  465. Samuels, Allen R.; Sutter, Paul G., Transaction boundary detection for reduction in timeout penalties.
  466. Leverett, Bruce; Kazar, Michael; Driscoll, Alan Stuart; Corbett, Peter Frank; Shah, Devang K.; Simharajan, Srishylam; Smith, Toby, Unordered idempotent logical replication operations.
  467. Leverett, Bruce; Kazar, Michael; Simharajan, Srishylam; Corbett, Peter Frank; Smith, Toby; Driscoll, Alan Stuart; Shah, Devang K., Unordered idempotent logical replication operations.
  468. Leverett, Bruce, Unordered idempotent replication operations.
  469. Pizzo, Michael J.; Divringi, Lale R., Use of server processing of temporary results for stateless paging over arbitrary user queries.
  470. Martherus, Robin E.; Ramamurthy, Srinivasagopalan, User authentication.
  471. Martherus,Robin E.; Ramamurthy,Srinivasagopalan, User authentication.
  472. Maes, Stephane H., Using identity/resource profile and directory enablers to support identity management.
  473. Maes, Stephane H., Using identity/resource profile and directory enablers to support identity management.
  474. Condict, Michael N.; Kleiman, Steven R., Using logical block addresses with generation numbers as data fingerprints for network deduplication.
  475. Condict, Michael N.; Kleiman, Steven R., Using logical block addresses with generation numbers as data fingerprints for network deduplication.
  476. Condict, Michael N., Using logical block addresses with generation numbers as data fingerprints to provide cache coherency.
  477. Condict, Michael N., Using logical block addresses with generation numbers as data fingerprints to provide cache coherency.
  478. Chauhan, Abhishek; Mirani, Rajiv; Kohli, Prince, Using statistical analysis to generate exception rules that allow legitimate messages to pass through application proxies and gateways.
  479. Chauhan, Abhishek; Mirani, Rajiv; Kohli, Prince, Using statistical analysis to generate exception rules that allow legitimate messages to pass through application proxies and gateways.
  480. Haney, Richard D., VPN usage to create wide area network backbone over the internet.
  481. Haney, Richard D., VPN usage to create wide area network backbone over the internet.
  482. Lipton, Alan J.; Clark, John I. W.; Zhang, Zhong; Venetianer, Peter L.; Strat, Thomas; Allmen, Mark; Severson, William; Haering, Niels; Chosak, Andrew; Frazier, Matthew; Sfekas, James; Hirata, Tasuki, Video analytic rule detection system and method.
  483. Lipton, Alan J.; Haering, Niels; Rasheed, Zeeshan; Javed, Omar; Zhang, Zhong; Yin, Weihong; Venetianer, Peter L.; Myers, Gary W., Video segmentation using statistical pixel modeling.
  484. Lipton, Alan J.; Haering, Niels; Rasheed, Zeeshan; Javed, Omar; Zhang, Zhong; Yin, Weihong; Venetianer, Peter L.; Myers, Gary W., Video segmentation using statistical pixel modeling.
  485. Venetianer, Peter L.; Lipton, Alan J.; Chosak, Andrew J.; Frazier, Matthew F.; Haering, Niels; Myers, Gary W.; Yin, Weihong; Zhang, Zhong; Cutting, Robert, Video surveillance system employing video primitives.
  486. Venetianer, Peter L.; Lipton, Alan J.; Hu, Yongtong; Martone, Andrew J.; Yin, Weihong; Yu, Li; Zhang, Zhong, Video surveillance system employing video primitives.
  487. Venetianer, Peter L.; Lipton, Alan J.; Hu, Yongtong; Martone, Andrew J.; Yin, Weihong; Yu, Li; Zhang, Zhong, Video surveillance system employing video primitives.
  488. Venetianer, Peter L.; Lipton, Alan J.; Hu, Yongtong; Martone, Andrew J.; Yin, Weihong; Yu, Li; Zhang, Zhong, Video surveillance system employing video primitives.
  489. Samuels, Allen R.; Sutter, Paul G., Wavefront detection and disambiguation of acknowledgements.
  490. Samuels, Allen R.; Sutter, Paul G., Wavefront detection and disambiguation of acknowledgements.
  491. Samuels, Allen R.; Sutter, Paul G., Wavefront detection and disambiguation of acknowledgments.
  492. Haney, Richard D., Wide area network with high quality of service.
  493. Kelly, Kevin C.; Guckenheimer, Sam, Work item tracking system for projects.
  494. Eby, Douglas A.; De George, Steve Andrew, Workflow authoring environment and runtime.
  495. Joseph, Jojo, Write behind cache with M-to-N referential integrity.
  496. Joseph, Jojo, Write behind cache with M-to-N referential integrity.
  497. Teng, James Zu Chia; Zhang, Guogen; Zou, Qinghua, XML sub-document versioning method in XML databases using record storages.
  498. Teng, James Zu-Chia; Zhang, Guogen; Zou, Qinghua, XML sub-document versioning method in XML databases using record storages.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트