1
Clark Bremer, Christine E Severns, Brian D Vanderwarn: System and method for processing data packets. Ascend Communications, Weingarten Schurgin Gagnebin & Hayes, February 29, 2000: US06032190 (133 worldwide citation)

An apparatus and method for processing a data packet to determine the routing of the data packet through a communications network is provided in which the data packet has a header portion and a data portion. The apparatus stores the header portion of the data packet, and processes the header portion ...


2
Clark Bremer, Marlon Gunderson, Christine E Severns: Apparatus and method for routing data packets through a communications network. Ascend Communications, April 22, 2003: US06553002 (97 worldwide citation)

A method and apparatus for determining the next router that a data packet is transmitted to on its way to a destination host by traversing a routing table using a hardware search engine and a unique search tree. The step of traversing each node in the search tree takes only one memory cycle, decreas ...


3
Christopher W Hamilton, Noy C Kucuk, Jinhui Li, Christine E Severns Williams: Wireless network scheduling methods and apparatus based on both waiting time and occupancy. Agere Systems, Ryan Mason & Lewis, August 3, 2010: US07769038 (4 worldwide citation)

A scheduler is adapted to schedule packets or other data blocks for transmission from a plurality of transmission elements in timeslots in a communication system. The scheduler determines scaled capacity measures for respective ones of the transmission elements, with each of the scaled capacity meas ...


4
Christopher W Hamilton, Noy C Kucuk, Jinhui Li, Christine E Severns Williams: High-throughput scheduler with guaranteed fairness for wireless networks and other applications. Agere Systems, Ryan Mason & Lewis, July 24, 2012: US08228920 (1 worldwide citation)

A scheduler is adapted to schedule packets or other data blocks for transmission from a plurality of transmission elements in timeslots of a frame in a communication system. In scheduling for a given frame, the scheduler initially designates each of the transmission elements as eligible to transmit ...


5
Anatoli Bolotov, Mikhail Grinchuk, Lav Ivanovic, Christine E Severns Williams: Cipher independent interface for cryptographic hardware service. LSI Corporation, Alexander J Neudeck, Cochran Freund & Young, February 18, 2014: US08654969

Disclosed is a cipher independent cryptographic hardware service. Cipher independent transactions are received into input slots (202). The input slots contain FIFOs to hold the transactions. The transactions are converted from cipher independent form to cipher dependent form (206) and timing as they ...


6
Christopher W Hamilton, Noy C Kucuk, Jinhui Li, Christine E Severns Williams: High-throughput scheduler with guaranteed fairness for wireless networks and other applications. Ryan Mason & Lewis, November 1, 2007: US20070253375-A1

A scheduler is adapted to schedule packets or other data blocks for transmission from a plurality of transmission elements in timeslots of a frame in a communication system. In scheduling for a given frame, the scheduler initially designates each of the transmission elements as eligible to transmit ...


7
Christopher W Hamilton, Noy C Kucuk, Jinhui Li, Christine E Severns Williams: Wireless network scheduling methods and apparatus based on both waiting time and occupancy. Ryan Mason & Lewis, November 1, 2007: US20070253425-A1

A scheduler is adapted to schedule packets or other data blocks for transmission from a plurality of transmission elements in timeslots in a communication system. The scheduler determines scaled capacity measures for respective ones of the transmission elements, with each of the scaled capacity meas ...


8
Anatoli Bolotov, Mikhail Grinchuk, Lav Ivanovic, Christine E Severns Williams: Cipher independent interface for cryptographic hardware service. May 17, 2012: US20120121079-A1

Disclosed is a cipher independent cryptographic hardware service. Cipher independent transactions are received into input slots (202). The input slots contain FIFOs to hold the transactions. The transactions are converted from cipher independent form to cipher dependent form (206) and timing as they ...