Brian zill microsoft




















Download Audio. Skip to main content. Conferences Students Sign in. Help Promote! Diamond Sponsor. Gold Sponsor. Silver Sponsor. Bronze Sponsor. General Sponsor. Media Sponsor. Industry Partner. Thursday, August 7, - pm. Chris Hawblitzel, Microsoft Research. Jon Howell, Microsoft Research.

Jacob R. Lorch, Microsoft Research. Arjun Narayan, University of Pennsylvania. The method also includes re-querying the system neighbor table to determine whether the target computing device is reachable and, if the target computing device is unreachable, determining whether the target computing device has been determined to be unreachable at least a specified number of times in a row.

The method further includes determining that the target computing device is manageable if the target computing device has been determined to be unreachable at least the specified number of times in a row. Type: Application. Filed: May 8, Publication date: November 13, Applicant: Microsoft Corporation. Publication date: August 8, Kernel interface with categorized kernel objects. Abstract: Described herein are one or more implementations that separate kernel interfaces functions into those that act on kernel objects owned by a process and accessed exclusively by that process—described herein as local kernel objects—from access to kernel objects owned by a process and accessible by other active processes.

Filed: June 30, Date of Patent: October 4, Inventors: Galen C. Hunt, James R. Tarditi, Brian Zill. System and method for link quality source routing. Abstract: Systems and methods for routing packets by nodes in an ad hoc network in accordance with a link quality source routing protocol are disclosed. Route discovery, route maintenance, and metric maintenance are designed to propagate and keep current link quality measurements.

Metric maintenance includes a reactive approach for links that a node is currently using to route packets, and a proactive mechanism for all links.

Nodes are configured to include a send buffer, a maintenance buffer, a request table, link quality metric modules, and preferably a neighbor cache and a link cache. The invention allows for asymmetric links in the network. The invention may be implemented within a virtual protocol interlayer between the link and network layers. The invention may employ any particular link quality metrics, including metrics based on probing techniques as well as metrics based on knowledge gained in other ways.

Filed: October 2, Publication date: February 7, Kernel Interface with Categorized Kernel Objects. Publication date: January 3, Larus, Manuel A. Fahndrich, Bjarne Steensgaard, David R. Abstract: Described herein are one or more implementations of an operating system that provides for statically verifiable inter-process communication between isolated processes.

Also, described herein are one or more implementations of programming tools that facilitate the development of statically verifiable isolated processes having inter-process communication. Publication date: April 26, Methods and Systems for Unilateral Authentication of Messages. Abstract: Disclosed is an authentication mechanism that enables an information recipient to ascertain that the information comes from the sender it purports to be from.

The sender derives its address from its public key, for example, by using a hash of the key. The recipient verifies the association between the address and the sender's private key. The recipient may retrieve the key from an insecure resource and know that it has the correct key because only that key can produce the sender's address in the message.



0コメント

  • 1000 / 1000