关注
Navjot Singh
Navjot Singh
Guru Nanak Dev Engineering College
在 pbi.ac.in 的电子邮件经过验证
标题
引用次数
引用次数
年份
Method and apparatus for transparently directing requests for web objects to proxy caches
A Cohen, S Rangarajan, N Singh
US Patent 6,389,462, 2002
9262002
Transparent {Run-Time} defense against {Stack-Smashing} attacks
A Baratloo, N Singh, T Tsai
2000 USENIX Annual Technical Conference (USENIX ATC 00), 2000
5772000
Multi-tier security event correlation and mitigation
A Agarwal, D Ahrens, R Livingood, M Mani, N Singh, A Zmolek
US Patent App. 12/234,248, 2009
2892009
Supporting soft real-time tasks in the xen hypervisor
M Lee, AS Krishnakumar, P Krishnan, N Singh, S Yajnik
Proceedings of the 6th ACM SIGPLAN/SIGOPS international conference on …, 2010
1922010
Facilitating a contact center agent to select a contact in a contact center queue
RP Klemm, P Krishnan, DD Seligmann, N Singh
US Patent 9,106,750, 2015
1842015
Scidive: A stateful and cross protocol intrusion detection architecture for voice-over-ip environments
YS Wu, S Bagchi, S Garg, N Singh
International conference on dependable systems and networks, 2004, 433-442, 2004
1792004
Automatic failure detection and recovery of applications
RP Klemm, N Singh
US Patent 7,243,267, 2007
1712007
A log mining approach to failure analysis of enterprise telephony systems
C Lim, N Singh, S Yajnik
2008 IEEE International Conference on Dependable Systems and Networks With …, 2008
1362008
Method and apparatus for providing extensible object-oriented fault injection
N Singh, T Tsai
US Patent 6,484,276, 2002
1332002
System and method for location-based protection of mobile data
P Krishnan, N Singh
US Patent App. 13/611,022, 2014
1292014
Method and apparatus for target application program supervision
RP Klemm, N Singh
US Patent 6,457,142, 2002
1212002
Communication between a document editor in-space user interface and a document editor out-space user interface
JI Gordner, M Dukhon, JC Satterfield, N Singh, MF Trevino, AE Alberts, ...
US Patent 8,484,578, 2013
1032013
Distributed indirect software instrumentation
R Klemm, N Singh, T Tsai
US Patent 6,216,237, 2001
1012001
Fault tolerance software system with periodic external self-test failure detection
N Singh, T Tsai
US Patent 7,096,388, 2006
882006
Libsafe: Protecting critical elements of stacks
A Baratloo, T Tsai, N Singh
White Paper http://www. research. avayalabs. com/project/libsafe, 1999
831999
Intelligent merging of transactions based on a variety of criteria
JL Bentley, FJ Boyle III, AS Krishnakumar, P Krishnan, JH Meiners, ...
US Patent 8,752,054, 2014
792014
Spam detection in voice-over-ip calls through semi-supervised clustering
YS Wu, S Bagchi, N Singh, R Wita
2009 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2009
792009
System and method for mitigating denial of service attacks on communication appliances
S Garg, N Singh
US Patent App. 11/157,880, 2006
722006
Security vulnerability monitor
N Singh, T Tsai
US Patent App. 10/611,264, 2005
672005
Libsafe 2.0: Detection of format string vulnerability exploits
T Tsai, N Singh
white paper, Avaya Labs, 2001
642001
系统目前无法执行此操作,请稍后再试。
文章 1–20