1
Himanshu Raj, Stefan Saroiu, Alastair Wolman, Paul England, Anh M Nguyen, Shravan Rayanchu: Attestation protocol for securely booting a guest operating system. Microsoft Corporation, Dan Choi, Carole Boelitz, Micky Minhas, August 19, 2014: US08812830 (2 worldwide citation)

In a cloud computing environment, a production server virtualization stack is minimized to present fewer security vulnerabilities to malicious software running within a guest virtual machine. The minimal virtualization stack includes support for those virtual devices necessary for the operation of a ...


2
Vishnu Navda, Ramachandran Ramjee, Venkata N Padmanabhan, Shravan Rayanchu: Network assisted power management. Microsoft Corporation, July 16, 2013: US08488501 (1 worldwide citation)

Embodiments of the claimed subject matter provide an approach to managing the power state of wireless network devices in a wireless network. Embodiments include a process for modifying the scheduling of data distribution device by referencing the data buffer in an access point for data intended for ...


3
Arunesh Mishra, Suman Banerjee, Vivek Shrivastava, Shravan Rayanchu: System and method for interference mitigation in wireless networks. Wisconsin Alumni Research Foundation, Boyle Fredrickson S C, July 10, 2012: US08218493 (1 worldwide citation)

A computer-implemented method for scheduling a packet for transmission in a wireless local area network can be used to account for hidden and/or exposed terminals. The method includes determining whether the packet is to be transmitted to a computing device through a wireless access point that is in ...


4
Himanshu Raj, Stefan Saroiu, Alastair Wolman, Paul England, Anh M Nguyen, Shravan Rayanchu: Attestation protocol for securely booting a guest operating system. Microsoft Technology Licensing, Stephen A Wight, Judy Yee, Micky Minhas, October 25, 2016: US09477486

In a cloud computing environment, a production server virtualization stack is minimized to present fewer security vulnerabilities to malicious software running within a guest virtual machine. The minimal virtualization stack includes support for those virtual devices necessary for the operation of a ...


5
Suman Banerjee, Shravan Rayanchu, Ashish Patro: Method, system and program product for detecting, quantifying and localizing of wireless interferers. May 3, 2016: US09332454

A method, system and program product comprise receiving spectrum data from one or more WiFi communication devices being configured to be operable as observers of transmissions within a frequency band associated with a WiFi communication system. The spectrum data at least comprises signal levels and ...


6
Vishnu Navda, Ramachandran Ramjee, Venkata N Padmanabhan, Shravan Rayanchu: Network assisted power management. Microsoft Corporation, February 24, 2015: US08964619

Embodiments of the claimed subject matter provide an approach to managing the power state of wireless network devices in a wireless network. Embodiments include a process for modifying the scheduling of data distribution device by referencing the data buffer in an access point for data intended for ...


7
Vishnu Navda, Ramachandran Ramjee, Venkata N Padmanabhan, Shravan Rayanchu: Network assisted power management. Microsoft Corporation, Microsoft Corporation, August 5, 2010: US20100195548-A1

Embodiments of the claimed subject matter provide an approach to managing the power state of wireless network devices in a wireless network. Embodiments include a process for modifying the scheduling of data distribution device by referencing the data buffer in an access point for data intended for ...


8
Arunesh Mishra, Suman Banerjee, Vivek Shrivastava, Shravan Rayanchu: System And Method For Interference Mitigation In Wireless Networks. Wisconsin Alumni Research Foundation, April 1, 2010: US20100080183-A1

A computer-implemented method for scheduling a packet for transmission in a wireless local area network can be used to account for hidden and/or exposed terminals. The method includes determining whether the packet is to be transmitted to a computing device through a wireless access point that is in ...