1
David J Yates, Abdelsalam A Heddaya, Sulaiman A Mirdad: Method and system for distributed caching, prefetching and replication. Trustees of Boston University, Hamilton Brook Smith & Reynolds P C, December 26, 2000: US06167438 (419 worldwide citation)

A technique for automatic, transparent, distributed, scalable and robust caching, prefetching, and replication in a computer network that request messages for a particular document follow paths from the clients to a home server that form a routing graph. Client request messages are routed up the gra ...


2
Abdelsalam A Heddaya, Sulaiman A Mirdad, David J Yates, Ian C Yates: Protocol for distributing fresh content among networked cache servers. InfoLibria, Hamilton Brook Smith & Reynolds P C, March 20, 2001: US06205481 (156 worldwide citation)

A technique for automatic, transparent, distributed, scalable and robust replication of document copies in a computer network wherein request messages for a particular document follow paths from the clients to a home server that form a routing graph. Client request messages are routed up the graph t ...


3
Abdelsalam A Heddaya, Kevin T Lewis, Sulaiman A Mirdad, David J Yates, Ian C Yates: Extending network services using mobile agents. Certeon, Hamilton Brook Smith & Reynolds P C, September 16, 2003: US06622157 (132 worldwide citation)

A technique fulfills service requests in a system of computers that communicate as nodes within a network. The technique involves sending, in response to an initial service request that requests a service provided by a primary server node, a mobile agent from the primary server node to an intermedia ...


4
Abdelsalam A Heddaya, Kevin T Lewis, Sulaiman A Mirdad, David J Yates, Ian C Yates: Extending network services using mobile agents. Certeon, Goodwin Procter, May 10, 2005: US06892218 (39 worldwide citation)

A technique fulfills service requests in a system of computers that communicate as nodes within a network. The technique involves sending, in response to an initial service request that requests a service provided by a primary server node, a mobile agent from the primary server node to an intermedia ...


5
Baskar Sridharan, Abdelsalam A Heddaya, Jonathan D Morrison, Mujtaba S Khambatti, Anthony J Lorelli, Tristan P K Schmelcher: Process reflection. Microsoft Corporation, March 15, 2011: US07908521 (32 worldwide citation)

Process reflection techniques are described in which a reflected process is created to facilitate analysis of a process. Events are detected to initiate reflection of a target process. Process reflection of a target process may be initiated by an external process or by the target process itself. A r ...


6
Baskar Sridharan, Jason Stewart Wohlgemuth, Abdelsalam A Heddaya, Elsie Nallipogu: Automatically resource leak diagnosis and detecting process within the operating system. Microsoft Corporation, Marshall Gerstein & Borun, August 10, 2010: US07774741 (8 worldwide citation)

The resource leak detector attempts to identify the causes of resource leaks and fix the causes if possible. At a minimum, the located resource leaks are reported to an operating system manufacture for additional study and possible correction, either by the operating system manufacturer or the appli ...


7
Abdelsalam A Heddaya, Kevin T Lewis, Sulaiman A Mirdad, David J Yates, Ian C Yates: Extending network services using mobile agents. Certeon, Hamilton Brook Smith & Reynolds PC, August 5, 2004: US20040153499-A1

A technique fulfills service requests in a system of computers that communicate as nodes within a network. The technique involves sending, in response to an initial service request that requests a service provided by a primary server node, a mobile agent from the primary server node to an intermedia ...


8
Abdelsalam A Heddaya, Stephan A Doll, Bradley M Waters, William R Barnes: Detection, diagnosis and resolution of deadlocks and hangs. Microsoft Corporation, Marshall Gerstein & Borun, May 3, 2007: US20070101338-A1

A computer configured for managing multiple processing threads is susceptible to deadlocks or hangs when resources needed by one process are locked by another process that is not progressing. Locking relationships are created and released so quickly that rigidly monitoring these relationships would ...


9
Abdelsalam A Heddaya, Sulaiman A Mirdad: Managing distribution and local execution of computing resources. InfoLibria, Hamilton Brook Smith & Reynolds PC, June 27, 2002: US20020082858-A1

A configuration management service in a client-server data processing system that manages distribution and installation of different versions and formats of resources so that they remain compatible with each other. When the resources are application programs, the service only distributes combination ...


10
Baskar Sridharan, Jason Stewart Wohlgemuth, Abdelsalam A Heddaya, Elsie Nallipogu: Resource leak diagnosis. Microsoft Corporation, Marshall Gerstein & Borun, November 22, 2007: US20070271418-A1

The resource leak detector attempts to identify the causes of resource leaks and fix the causes if possible. At a minimum, the located resource leaks are reported to an operating system manufacture for additional study and possible correction, either by the operating system manufacturer or the appli ...