Robust and scalable de-skew method for data path skew control
Robust authentication and key agreement protocol for...
Robust computer subsystem power management with or without...
Robust efficient distributed RSA-key generation
Robust efficient distributed RSA-key generation
Robust encryption and decryption of packetized data...
Robust peer-to-peer networks and methods of use thereof
Robust power sequencing management solution for notebook...
Robust watermark for DSD signals
Robust watermark for DSD signals
Robust watermark method and apparatus for digital signals
Role aware network security enforcement
ROM writer has switching device for switching between...
Rootkit detection
Rote based tool delegation
Routing data to one or more entities in a network
Routing voice over internet (VoIP) call
Royalty collection method and system for use of copyrighted...
Rules engine architecture and implementation
Run-time reconfiguration method for programmable units