1
Kent H Kienzle, Mark J Jeffery, Trent R Jaeger, Karon A Barber: Expert system for automically generating gear designs. General Motors Corporation, Howard N Conkey, March 22, 1994: US05297054 (42 worldwide citation)

An automated generative gear design process, which designs parallel axis gearsets to meet constraints and performance goals. The process uses state space searches, generate and test, and other knowledge based techniques to automatically generate gearset designs and recommend cutting and inspection t ...


2
Trent R Jaeger, Lawrence Koved, Liangzhao Zeng, Xiaolan Zhang: Methods and arrangements for unified program analysis. International Business Machines Corporation, Ference & Associates, February 17, 2009: US07493602 (7 worldwide citation)

A unified program analysis framework that facilitates the analysis of complex multi-language software systems, analysis reuse, and analysis comparison, by employing techniques such as program translation and automatic results mapping, is presented. The feasibility and effectiveness of such a framewo ...


3
Trent R Jaeger, Lawrence Koved, Liangzhao Zeng, Xiaolan Zhang: Methods and arrangements for unified program analysis. International Business Machines Corporation, Ference & Associates, January 28, 2014: US08640107 (2 worldwide citation)

A unified program analysis framework that facilitates the analysis of complex multi-language software systems, analysis reuse, and analysis comparison, by employing techniques such as program translation and automatic results mapping, is presented. The feasibility and effectiveness of such a framewo ...


4
Kay S Anderson, Pau Chen Cheng, Mark D Feblowitz, Genady Grabarnik, Shai Halevi, Nagui Halim, Trent R Jaeger, Paul Ashley Karger, Zhen Liu, Ronald Perez, Anton V Riabov, Pankaj Rohatgi, Angela Marie Schuett, Michael Steiner, Grant M Wagner: Method of managing and mitigating security risks through planning. International Business Machines Corporation, Chau & Associates, November 9, 2010: US07832007 (2 worldwide citation)

An exemplary method is provided for managing and mitigating security risks through planning. A first security-related information of a requested product is received. A second security-related information of resources that are available for producing the requested product is received. A multi-stage p ...


5
Kay S Anderson, Pau Chen Cheng, Mark D Feblowitz, Genady Grabarnik, Shai Halevi, Nagui Halim, Trent R Jaeger, Paul Ashley Karger, Zhen Liu, Ronald Perez, Anton V Riabov, Pankaj Rohatgi, Angela Marie Schuett, Michael Steiner, Grant M Wagner: Method of managing and mitigating security risks through planning. International Business Machines Corporation, F Chau & Associates, January 17, 2012: US08099781 (1 worldwide citation)

An exemplary method is provided for managing and mitigating security risks through planning. A first security-related information of a requested product is received. A second security-related information of resources that are available for producing the requested product is received. A multi-stage p ...


6
Stefan Berger, Kenneth Goldman, Trent R Jaeger, Ronald Perez, Reiner Sailer, Enriquillo Valdez: Method, system, and program product for remotely attesting to a state of a computer system. International Business Machines Corporation, Hoffman Warnick, Mercedes Hobson, January 3, 2017: US09536092

A method, system, and program product for remotely attesting to a state of computing system is provided. Specifically, the present invention allows a remote system to establish trust in the properties of the computer system. The properties to be trusted are expanded from the usual system software la ...


7
Stefan Berger, Kenneth Goldman, Trent R Jaeger, Ronald Perez, Reiner Sailer, Enriquillo Valdez: Method, system, and program product for remotely attesting to a state of a computer system. International Business Machines Corporation, Rabin Bhattacharya, Hoffman Warnick, December 5, 2017: US09836607

A method, system, and program product for remotely attesting to a state of computing system is provided. Specifically, the present invention allows a remote system to establish trust in the properties of the computer system. The properties to be trusted are expanded from the usual system software la ...


8
Trent R Jaeger, Lawrence Koved, Liangzhao Zeng, Xiaolan Zhang: Methods and arrangements for unified program analysis. International Business Machines Corporation, Ference & Associates, February 5, 2013: US08370813

A unified program analysis framework that facilitates the analysis of complex multi-language software systems, analysis reuse, and analysis comparison, by employing techniques such as program translation and automatic results mapping, is presented. The feasibility and effectiveness of such a framewo ...


9
Trent R Jaeger, Reiner Sailer, Leendert P Van Doorn: Method, system and program product for remotely verifying integrity of a system. International Business Machines Corporation, Preston Young, Hoffman Warnick, April 30, 2013: US08434147

The present invention provides a computer-implemented method system and program product for remotely verifying (e.g., analytic) integrity of a system. Specifically, at startup of the system an access control policy that sets forth information flows within the system is read and a set of trusted subj ...


10
Trent R Jaeger, Lawrence Koved, Liangzhao Zeng, Xiaolan Zhang: Methods and arrangements for unified program analysis. IBM Corporation, Ference & Associates, November 2, 2006: US20060248519-A1

A unified program analysis framework that facilitates the analysis of complex multi-language software systems, analysis reuse, and analysis comparison, by employing techniques such as program translation and automatic results mapping, is presented. The feasibility and effectiveness of such a framewo ...