10908 patents
Page 37 of 546
Utility
Cryptographic computing with disaggregated memory
12 Sep 23
In one embodiment, an application executing on a host node allocates a memory address of a remote node.
Anna Trikalinou, Abhishek Basak
Filed: 26 Dec 20
Utility
Trusted local memory management in a virtualized GPU
12 Sep 23
Embodiments are directed to trusted local memory management in a virtualized GPU.
Pradeep M. Pappachan, Luis S. Kida, Reshma Lal
Filed: 19 Dec 22
Utility
98v87ucvx 1rrfvl6efhy1
12 Sep 23
Methods, apparatus, systems and articles of manufacture are disclosed to manage process excursions.
Brian McCarson, Keith Ellis, Michael McGrath, Niall Cahill, Lisa Sherin, Daire Healy
Filed: 24 Jun 19
Utility
fptatcgqlsnuljsetx9m67louz2mf5t2ozae3ekb8v
12 Sep 23
An apparatus for applying dynamic quantization of a neural network is described herein.
Michael E. Deisher
Filed: 28 Dec 17
Utility
gfc3run1wo3shxb6vaks1uac 0p7vwbf
12 Sep 23
Embodiments include a microelectronic device package structure having a first die on the substrate.
Krishna Vasanth Valavala, Ravindranath Mahajan, Chandra Mohan Jha, Kelly Lofgreen, Weihua Tang
Filed: 2 Oct 18
Utility
q72ch3ve3vrmxlj3c6ywgsbgjmql3 2hd9kphqmivl4ohs1g0fxofjw74
12 Sep 23
Epitaxial oxide plugs are described for imposing strain on a channel region of a proximate channel region of a transistor.
Karthik Jambunathan, Biswajeet Guha, Anupama Bowonder, Anand S. Murthy, Tahir Ghani
Filed: 6 Jan 22
Utility
65cqndto baohfrfgz54z5qr
12 Sep 23
Techniques are disclosed for forming transistors including source and drain (S/D) regions employing double-charge dopants.
Glenn A. Glass, Anand S. Murthy, Tahir Ghani
Filed: 30 Sep 16
Utility
tsqmglo19l0u21ilo8h8q5v4nk0alifeeiy h44k91xji02by1lk1m1f
12 Sep 23
Embodiments of the present disclosure describe techniques and configurations to reduce transistor gate short defects.
Sridhar Govindaraju, Matthew J. Prince
Filed: 6 May 22
Utility
iyyeqdn0237 53kpye8j
12 Sep 23
Embodiments disclosed herein include electronic packages and methods of forming such packages.
Srinivas Pietambaram, Rahul Manepalli, Gang Duan
Filed: 28 Apr 22
Utility
to1g53vmrk0p 1of3u7bsmbex1
12 Sep 23
Microelectronic assemblies, and related devices and methods, are disclosed herein.
Shawna M. Liff, Adel A. Elsherbini, Johanna M. Swan
Filed: 29 Dec 17
Utility
i363wvba1oqkb09lp159fgrq24s4jym2kiky7xher92p4hbjn
12 Sep 23
Embodiments described herein are directed to a thin film capacitor (TFC) for power delivery that is in situ in a package substrate and techniques of fabricating the TFC.
Thomas Sounart, Aleksandar Aleksov, Henning Braunisch
Filed: 1 May 19
Utility
u79rsvb92ng5h tzdgb3mwdlbi
12 Sep 23
Techniques are disclosed for implementing am Intelligent Distributed Relay (IDR).
Artyom Lomayev, Fatemeh Fazel Sarjoui, Andrey Pudeyev, Alexander Maltsev, Ali Sadri
Filed: 21 Apr 22
Utility
slt2lbj4h l0wsv5tkxw9xib82
12 Sep 23
Technologies for dynamically managing a batch size of packets include a network device.
Ren Wang, Mia Primorac, Tsung-Yuan C. Tai, Saikrishna Edupuganti, John J. Browne
Filed: 13 Jun 22
Utility
ht216r07ig80qtdemia42bydojq7ev7eqgv003q6f3w66d8lakyy88jkyfp
12 Sep 23
Various techniques for collective perception messaging are disclosed herein.
Leonardo Gomes Baltar, Dario Sabella, Ingolf Karls, Honglei Miao, Kilian Roth, Markus Dominik Mueck
Filed: 25 Sep 17
Utility
zsltje78607xk7cdit6g6h907qnm3 hzckp
12 Sep 23
Embodiments described herein provide for techniques to reduce the complexity of rendering immersive 3D video content.
Jill Boyce
Filed: 27 Dec 21
Utility
lo4jem9yv8nqv1yeyld4xj91i5od4c74l qeb7k3wma0kjclkoal
12 Sep 23
Various systems and methods for distributing orchestration of network services using blockchain technology are disclosed.
Kapil Sood, Ned M. Smith
Filed: 28 Dec 18
Utility
d2t9 uoq5o6mrxtp69yw5ahmez
12 Sep 23
In one example an apparatus comprises a computer readable memory; and a signature module to generate a set of cryptographic keys for attestation of group member devices and a set of leaf nodes in a sub-tree of a Merkle tree corresponding to the set of cryptographic keys, forward the set of leaf nodes to a group manager device, receive, from the group manager device, a subset of intermediate nodes in the Merkle tree, the intermediate nodes being common to all available authentications paths through the Merkel tree for signatures originating in the sub-tree, and determine a cryptographic key that defines an authentication path through the Merkle tree, the authentication path comprising one or more nodes from the set of leaf nodes and one or more nodes from the intermediate nodes received from the group manager device.
Manoj Sastry, Rafael Misoczki
Filed: 15 Apr 22
Utility
8nv wctnrwc8w4g3odw57g6
12 Sep 23
A security accelerator device stores a first credential that is uniquely associated with the individual security accelerator device and represents a root of trust to a trusted entity.
Kapil Sood, Naveen Lakkakula, Hari K. Tadepalli, Lokpraveen Mosur, Rajesh Gadiyar, Patrick Fleming
Filed: 14 May 21
Utility
ak229n4qlsfj2td8eczux291e 2im
12 Sep 23
Various systems and methods for implementing a software defined industrial system are described herein.
Rita H. Wouhaybi, John Vicente, Kirk Smith, Robert Chavez, Mark Yarvis, Steven M. Brown, Jeremy Ouillette, Roderick E. Kronschnabel, Matthew J. Schneider, Chris D. Lucero, Atul N. Hatalkar, Sharad K. Garg, Casey Rathbone, Aaron R. Berck, Xubo Zhang, Ron Kuruvilla Thomas, Mandeep Shetty, Ansuya Negi
Filed: 9 May 22
Utility
1t9t7xfp01mprrbvxjqn96
5 Sep 23
The present disclosure is directed to a system for sensor-based objective determination.
Richard Paul Crawford, David I. Poisner, Yuri I. Krimon
Filed: 17 Mar 22