US2010306769A1
|
|
Migration of functionalities across systems
|
US2010306294A1
|
|
String hashing using a number generator
|
US2010306217A1
|
|
Separating content from noisy context in template-based documents for search indexing
|
US2010220855A1
|
|
Strengthened key schedule for arcfour
|
US2010223358A1
|
|
Thwarting keyloggers using proxies
|
US2010223456A1
|
|
Security implementation within a browser
|
US2010223613A1
|
|
Per process virtual machines
|
US2010218201A1
|
|
Method and an apparatus to implement secure system call wrappers
|
US2010218174A1
|
|
Dynamic compiling and loading at runtime
|
US2010215172A1
|
|
Sharing a secret with modular inverses
|
US2010217938A1
|
|
Sorting cache objects based on access counters reset upon garbage collection
|
US2010217841A1
|
|
Provisioning network resources based on environment
|
US2010217986A1
|
|
Authenticated secret sharing
|
US2010228703A1
|
|
Reducing memory required for prediction by partial matching models
|
US2010218261A1
|
|
Isolating processes using aspects
|
US2010217947A1
|
|
Discontiguous object addressing
|
US2010138815A1
|
|
Implementing aspects with callbacks in virtual machines
|
US2010124328A1
|
|
Extensive ciphertext feedback
|
US2010125840A1
|
|
Automation of application deployment
|
US2010058338A1
|
|
Callbacks in virtual machines
|