Patents by Inventor Lili Qiu

Lili Qiu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20060240835
    Abstract: Disclosed is a general model and method for computing performance bounds in multi-hop wireless networks. Rather than focusing on computing asymptotic performance bounds under assumptions of homogeneity or randomness in the network topology and/or workload, the present invention accommodates any given network, technology, interference model, routing paradigm, and workload. Using a conflict graph to formally characterize the impact of wireless interference on the performance of multi-hop wireless networks, methods for computing upper and lower bounds on the capacity of a given wireless network are detailed. Besides computing network capacity, the model and method disclosed can also enable or benefit other applications including maximizing fairness and minimizing maximum link utilization.
    Type: Application
    Filed: June 26, 2006
    Publication date: October 26, 2006
    Applicant: Microsoft Corporation
    Inventors: Kamal Jain, Jitendra Padhye, Venkata Padmanabhan, Lili Qiu
  • Patent number: 7096200
    Abstract: A system and method is provided for evaluating the effectiveness of data encryption for hiding the identity of the source of Web traffic. A signature is constructed from encrypted Web traffic for a Web page sent by a target Web site, and the signature is compared with archived traffic signatures obtained by accessing various Web pages of interest in advance. If the signature of the detected encrypted Web traffic matches a stored traffic signature beyond a pre-set statistical threshold, a positive match is found, and the source of the traffic is identified. Countermeasures for reducing the reliability of source identification based on traffic signature matching are provided.
    Type: Grant
    Filed: April 23, 2002
    Date of Patent: August 22, 2006
    Assignee: Microsoft Corporation
    Inventors: Yi-Min Wang, Qixiang Sun, Daniel R. Simon, Wilfred Russell, Lili Qiu, Venkata N. Padmanabhan
  • Publication number: 20060068811
    Abstract: Methods are described for using collaboration of neighboring wireless devices to enable location of disconnected wireless devices and rogue wireless access points. A central server computes the locations of the neighboring clients and uses those locations to estimate the location of a disconnected client. These techniques may take advantage of the beaconing and probing mechanisms of IEEE 802.11 to ensure that connected clients do not pay unnecessary overheads for detecting disconnected clients. Methods are also described for detecting and locating rogue devices by collaboratively collecting information from neighboring devices and comparing the information to a database.
    Type: Application
    Filed: January 31, 2005
    Publication date: March 30, 2006
    Applicant: Microsoft Corporation
    Inventors: Atul Adya, Paramvir Bahl, Ranveer Chandra, Lili Qiu
  • Publication number: 20060068769
    Abstract: Systems and methods are described for detecting and diagnosing performance problems in wireless communications networks. Diagnostic programs execute on a wireless device, neighboring devices, and a wireless access point to collaborate in diagnosing network problems. The neighboring devices eavesdrop on a diagnostic session between the device and the access point to determine problems at the device, the access point, and in the wireless medium. Data from the eavesdropping devices can be summarized and sent to a network administrator for further action. The diagnostic programs are described to contain a passive component for detecting problems, and an active component for running the diagnostic techniques.
    Type: Application
    Filed: January 31, 2005
    Publication date: March 30, 2006
    Applicant: Microsoft Corporation
    Inventors: Atul Adya, Paramvir Bahl, Ranveer Chandra, Lili Qiu
  • Publication number: 20060059091
    Abstract: A system and method is provided for evaluating the effectiveness of data encryption for hiding the identity of the source of Web traffic. A signature is constructed from encrypted Web traffic for a Web page sent by a target Web site, and the signature is compared with archived traffic signatures obtained by accessing various Web pages of interest in advance. If the signature of the detected encrypted Web traffic matches a stored traffic signature beyond a pre-set statistical threshold, a positive match is found, and the source of the traffic is identified. Countermeasures for reducing the reliability of source identification based on traffic signature matching are provided.
    Type: Application
    Filed: October 31, 2005
    Publication date: March 16, 2006
    Applicant: Microsoft Corporation
    Inventors: Yi-Min Wang, Qixiang Sun, Daniel Simon, Wilfred Russell, Lili Qiu, Venkata Padmanabhan
  • Publication number: 20060020700
    Abstract: An improved method and system for optimizing the allocation of bandwidth within a network system is presented. When a client device is engaged in communication with a remote computing device, an access point measures the throughput of the connection between the client device and the network. If the throughput is less than the amount of bandwidth reserved for usage by the client device, the access point adjusts the amount of bandwidth allocated for the client device to an amount equivalent to the measured throughput multiplied by an error variance factor. This process is then repeated periodically for the duration of the communication between the client device and the remote computing device in order to continually adapt the bandwidth allocation of the client device.
    Type: Application
    Filed: September 21, 2005
    Publication date: January 26, 2006
    Applicant: Microsoft Corporation
    Inventors: Lili Qiu, Paramvir Bahl, Atul Adya
  • Publication number: 20050204028
    Abstract: A network troubleshooting framework is described. In an implementation, a method includes forming a plurality of reports by a plurality of nodes in a network, wherein each of the reports is formed by a respective one of the nodes and includes trace data obtained from the respective node and another of the nodes. An inconsistency is detected in the trace data in one of the reports when compared with corresponding trace data in another of the reports. A set of the nodes is found that formed one or more of the reports having the inconsistency in the trace data.
    Type: Application
    Filed: June 30, 2004
    Publication date: September 15, 2005
    Applicant: Microsoft Corporation
    Inventors: Paramvir Bahl, Lidong Zhou, Lili Qiu, Ananth Rao
  • Publication number: 20050180329
    Abstract: Disclosed is a method for determining the placement of ITAPs in wireless neighborhood networks. The method disclosed provides for efficient integration of multi-hop wireless networks with the Internet by placing ITAPs at strategic locations. Initially the method provides for the formulation of the ITAP placement problem under three wireless models. For each model, methods are developed to efficiently place ITAPs in the networks. The methods aim to minimize the number of required ITAPs while guaranteeing users' bandwidth requirements. Next, a fault tolerance version of the placement method is presented that provides bandwidth guarantees in the presence of failures. Finally the methods are extended to take into account variable traffic demands by developing an approximation algorithm to simultaneously optimize ITAP placement based on demands over multiple periods.
    Type: Application
    Filed: February 17, 2004
    Publication date: August 18, 2005
    Applicant: Microsoft Corporation
    Inventors: Lili Qiu, Kamal Jain, Ranveer Chandra, Mohammad Mahdian
  • Publication number: 20050169186
    Abstract: A network troubleshooting framework is described. In an implementation, a method includes generating a first estimation of network performance by a simulator based on network settings obtained from a network, estimating the new performance under an alternative setting by providing the alternative setting to the network simulation and observing the simulation output, repeating the procedure for other alternative settings, and suggesting the alternative setting that improves network performance.
    Type: Application
    Filed: June 30, 2004
    Publication date: August 4, 2005
    Applicant: Microsoft Corporation
    Inventors: Lili Qiu, Paramvir Bahl, Lidong Zhou, Ananth Rao
  • Publication number: 20050169185
    Abstract: A network troubleshooting framework is described. In an implementation, a method includes detecting discrepancy in operation of a network by supplying data that describes the network to a network simulation so that the network simulation provides an estimation of network performance. A determination is made as to whether the estimation of network performance differs from observed network performance of the network. A root cause of the discrepancy id diagnosed by injecting one or more of a plurality of faults into the network simulation until the estimation of network performance approximates the observed network performance.
    Type: Application
    Filed: June 30, 2004
    Publication date: August 4, 2005
    Applicant: Microsoft Corporation
    Inventors: Lili Qiu, Paramvir Bahl, Lidong Zhou, Ananth Rao
  • Publication number: 20050157706
    Abstract: A system and method is provided for evaluating the effectiveness of data encryption for hiding the identity of the source of Web traffic. A signature is constructed from encrypted Web traffic for a Web page sent by a target Web site, and the signature is compared with archived traffic signatures obtained by accessing various Web pages of interest in advance. If the signature of the detected encrypted Web traffic matches a stored traffic signature beyond a pre-set statistical threshold, a positive match is found, and the source of the traffic is identified. Countermeasures for reducing the reliability of source identification based on traffic signature matching are provided.
    Type: Application
    Filed: February 24, 2005
    Publication date: July 21, 2005
    Applicant: Microsoft Corporation
    Inventors: Yi-Min Wang, Oixiang Sun, Daniel Simon, Wilfred Russell, Lili Qiu, Venkata Padmanabhan
  • Publication number: 20050075104
    Abstract: Disclosed is a general model and method for computing performance bounds in multi-hop wireless networks. Rather than focusing on computing asymptotic performance bounds under assumptions of homogeneity or randomness in the network topology and/or workload, the present invention accommodates any given network, technology, interference model, routing paradigm, and workload. Using a conflict graph to formally characterize the impact of wireless interference on the performance of multi-hop wireless networks, methods for computing upper and lower bounds on the capacity of a given wireless network are detailed. Besides computing network capacity, the model and method disclosed can also enable or benefit other applications including maximizing fairness and minimizing maximum link utilization.
    Type: Application
    Filed: October 7, 2003
    Publication date: April 7, 2005
    Applicant: Microsoft Corporation
    Inventors: Kamal Jain, Jitendra Padhye, Venkata Padmanabhan, Lili Qiu
  • Publication number: 20040181588
    Abstract: A system and method for enabling highly scalable multi-node event distribution networks through the use of summary-based routing, particularly event distribution networks using a content-based publish/subscribe model to distribute information. By allowing event routers to use imprecise summaries of the subscriptions hosted by matcher nodes, an event router can eliminate itself as a bottleneck thus improving overall event distribution network throughput even though the use of imprecise summaries results in some false positive event traffic. False positive event traffic is reduced by using a filter set partitioning that provides for good subscription set locality at each matcher node, while at the same time avoiding overloading any one matcher node. Good subscription set locality is maintained by routing new subscriptions to a matcher node with a subscription summary that best covers the new subscription.
    Type: Application
    Filed: March 13, 2003
    Publication date: September 16, 2004
    Applicant: Microsoft Corporation
    Inventors: Yi-Min Wang, Lili Qiu, Chad E. Verbowski, Demetrios Achlioptas, Gautam Das, Per-Ake Larson
  • Publication number: 20040044759
    Abstract: A computer network has links for carrying data among computers, including one or more client computers. Packet loss rates are determined for the client computers and, a system of equations is set up expressing the relationship between the loss rates at the client computers and the loss rates at the links. The system of equations is then solved using one or more linear programming techniques, and optimized by making an effort to find the most parsimonious solution.
    Type: Application
    Filed: February 7, 2003
    Publication date: March 4, 2004
    Applicant: Microsoft Corporation
    Inventors: Venkata N. Padmanabhan, Lili Qiu
  • Publication number: 20040044764
    Abstract: A computer network has links for carrying data among computers, including one or more client computers. Packet loss rates are determined for the client computers and, based on the loss rates, a number of possible sets of solutions for the loss rates at each of the links are generated. The sets of possible solutions are subjected to a statistical analysis. Based on the results of the analysis, a determination is made regarding which of the links are excessively lossy.
    Type: Application
    Filed: January 31, 2003
    Publication date: March 4, 2004
    Applicant: Microsoft Corporation
    Inventors: Venkata N. Padmanabhan, Lili Qiu
  • Publication number: 20040044765
    Abstract: A computer network has links for carrying data among computers, including one or more client computers. Packet loss rates are determined for the client computers. Probability distributions for the loss rates of each of the client computers are then developed using various mathematical techniques. Based on an analysis of these probability distributions, a determination is made regarding which of the links are excessively lossy.
    Type: Application
    Filed: March 3, 2003
    Publication date: March 4, 2004
    Applicant: Microsoft Corporation
    Inventors: Christopher A. Meek, Venkata N. Padmanabhan, Lili Qiu, Jiahe Wang, David B. Wilson, Christian H. Borgs, Jennifer T. Chayes, David E. Heckerman
  • Publication number: 20030212787
    Abstract: An improved method and system for optimizing the allocation of bandwidth within a network system is presented. When a client device is engaged in communication with a remote computing device, an access point measures the throughput of the connection between the client device and the network. If the throughput is less than the amount of bandwidth reserved for usage by the client device, the access point adjusts the amount of bandwidth allocated for the client device to an amount equivalent to the measured throughput multiplied by an error variance factor. This process is then repeated periodically for the duration of the communication between the client device and the remote computing device in order to continually adapt the bandwidth allocation of the client device.
    Type: Application
    Filed: May 13, 2002
    Publication date: November 13, 2003
    Applicant: Microsoft Corporation
    Inventors: Lili Qiu, Paramvir Bahl, Atul Adya
  • Publication number: 20030200175
    Abstract: A system and method is provided for evaluating the effectiveness of data encryption for hiding the identity of the source of Web traffic. A signature is constructed from encrypted Web traffic for a Web page sent by a target Web site, and the signature is compared with archived traffic signatures obtained by accessing various Web pages of interest in advance. If the signature of the detected encrypted Web traffic matches a stored traffic signature beyond a pre-set statistical threshold, a positive match is found, and the source of the traffic is identified. Countermeasures for reducing the reliability of source identification based on traffic signature matching are provided.
    Type: Application
    Filed: April 23, 2002
    Publication date: October 23, 2003
    Applicant: Microsoft Corporation
    Inventors: Yi-Min Wang, Qixiang Sun, Daniel R. Simon, Wilfred Russell, Lili Qiu, Venkata N. Padmanabhan