1
Christian Huitema, John L Miller: Peer-to-peer name resolution protocol (PNRP) and multilevel cache for use therewith. Microsoft Corporation, Microsoft Corporation, June 20, 2006: US07065587 (171 worldwide citation)

A serverless name resolution protocol ensures convergence despite the size of the network, without requiring an ever-increasing cache and with a reasonable numbers of hops. This convergence is ensured through a multi-level cache and a proactive cache initialization strategy. The multi-level cache is ...


2
Dan Teodosiu, Nikolaj S Bjorner, Markus M Breunig: Universal naming scheme for peer to peer resources. Microsoft Corporation, Microsoft Corporation, July 4, 2006: US07072982 (160 worldwide citation)

Peer devices register with a resource locator service so that the peer devices can be uniquely identified in a networking environment. An addressing scheme addresses a peer resource in the networking environment based on the unique identifier of a peer device that is a master publisher of the resour ...


3
Gary S Burd, Kenneth B Cooper, Scott D Guthrie, David S Ebbo, Mark T Anders, Ted A Peters: Server-side code generation from a dynamic web page content file. Microsoft Corporation, Microsoft Corporation, January 24, 2006: US06990653 (106 worldwide citation)

A method and apparatus to create an intermediate language or source code file from a server-side resource or dynamic web page file. The source code can then be compiled into an executable class allowing for rapid generation of web page control objects that perform server-side functions, including th ...


4
Pradeep Bahl: Session load balancing and use of VIP as source address for inter-cluster traffic through the use of a session identifier. Microsoft Corporation, Microsoft Corporation, February 21, 2006: US07003574 (106 worldwide citation)

A method and system for enhancing a load balancing network's ability to load balance sessions is presented. A session identifier is placed within the TCP packet to enable a new mechanism of load distribution and connection grouping within a load balancing system. Specifically, TCP is invoked by a us ...


5
Timothy S Paek, Eric Norman Badger, Daniel Allen Rosenfeld: Protective shroud for handheld device. Microsoft Corporation, Microsoft Corporation, July 24, 2012: US08229509 (94 worldwide citation)

An apparatus for communicating with a handheld device (e.g., a cellular telephone) is provided herein. A protective shroud is configured to enclose the handheld device and protect it against incidents that commonly cause damage to handheld devices. Integral to the protective shroud is at least one o ...


6
Don Syme, Andrew Gordon, Jonathan A Forbes, Vance P Morrison: Verifying intermediate language code. Microsoft Corporation, Microsoft Corporation, February 1, 2005: US06851108 (92 worldwide citation)

A verification module evaluates intermediate language code to verify that the code is type safe before passing the code for execution. Code that is not deemed type safe can cause execution errors, corrupt the runtime environment in which the code is executing, or cause unauthorized access to protect ...


7
Arun Ayyagari, Sachin C Sheth, Krishna Ganugapati, Timothy M Moore, Pradeep Bahl, Mihai S Peicu, Florin Teodorescu: System and method for achieving zero-configuration wireless computing and computing device incorporating same. Microsoft Corporation, Microsoft Corporation, October 10, 2006: US07120129 (91 worldwide citation)

A system and method for enabling a zero configuration nomadic wireless and wired computing environment presenting a just works experience is presented. The system examines predefined user preference or profile settings to determine to which of a competing number of wireless networks available it sho ...


8
Jeffrey A Andrews, Nicholas R Baker, J Andrew Goossen, Michael Abrash: System and method for parallel execution of data generation tasks. Microsoft, Microsoft Corporation Lee & Hayes PLLC, March 1, 2005: US06862027 (91 worldwide citation)

A CPU module includes a host element configured to perform a high-level host-related task, and one or more data-generating processing elements configured to perform a data-generating task associated with the high-level host-related task. Each data-generating processing element includes logic configu ...


9
Yi Min Wang, Wilf G Russell, Jun Xu, Anish K Arora, Paramvir Bahl: Automation system for controlling and monitoring devices and sensors. Microsoft Corporation, Microsoft Corporation, November 1, 2005: US06961763 (73 worldwide citation)

An architecture for an automation system is disclosed that includes look-up services, a soft-state store, and a publication/subscription eventing component. The look-up services maintain a database of a number of devices to be controlled and monitored, and a database of a number of device objects co ...


10
Surajit Chaudhuri, Ashraf I Aboulnaga: Query optimization by sub-plan memoization. Microsoft Corporation, Microsoft Corporation, February 1, 2005: US06850925 (70 worldwide citation)

Database system query optimizers use several techniques such as histograms and sampling to estimate the result sizes of operators and sub-plans (operator trees) and the number of distinct values in their outputs. Instead of estimates, the invention uses the exact actual values of the result sizes an ...