Patents by Inventor Jeffrey van Gogh
Jeffrey van Gogh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20100131743Abstract: Event-based processing is employed in conjunction with lazy and stateless events. Addition of any handlers is deferred until a user-specified handler is identified. Furthermore, event handlers can be composed at this time including the same properties as underlying events. More specifically, handlers specified on composite events can be composed and propagated up to a one or more related source events. As a result, handlers are not accumulated on composite events thereby making them stateless while allowing equivalent functionality upon invocation of the composed top-level handler.Type: ApplicationFiled: November 25, 2008Publication date: May 27, 2010Applicant: MICROSOFT CORPORATIONInventors: Henricus Johannes Maria Meijer, John Wesley Dyer, Jeffrey Van Gogh, Mark Brian Shields
-
Publication number: 20100131745Abstract: An event-driven system enables handlers to be specified for success and failure, among other things. In other words, events can be explicitly encoded with an option of returning either a success or a failure result. In this manner, asynchronous programming and events can be unified. Multiple event streams can be employed to represent success and/or exceptional values. Alternatively, a disjoint union of regular and exceptional values can be employed with respect to a single event stream.Type: ApplicationFiled: November 25, 2008Publication date: May 27, 2010Applicant: MICROSOFT CORPORATIONInventors: Henricus Johannes Maria Meijer, John Wesley Dyer, Jeffrey Van Gogh
-
Publication number: 20100131556Abstract: Event processing is transformed into query processing. Furthermore, asynchronous computation can be modeled as an event processing. Moreover, any computation that is or can be represented as push-based can be unified under an event-based processing approach subject to processing with query operators. Query processing can be performed with respect to one or more streams of events, wherein events identify a response to a raised value, among other things.Type: ApplicationFiled: November 25, 2008Publication date: May 27, 2010Applicant: MICROSOFT CORPORATIONInventors: Henricus Johannes Maria Meijer, John Wesley Dyer, Jeffrey Van Gogh
-
Publication number: 20100131921Abstract: Conversions can be applied to various asynchronous and/or concurrent mechanisms. In particular, such mechanism can be transformed into first-class events to facilitate processing with respect to first-class events including but not limited to querying. Both conventional events and asynchronous computations can be transformed to these events, for example by generating and linking a proxy event thereto.Type: ApplicationFiled: November 25, 2008Publication date: May 27, 2010Applicant: MICROSOFT CORPORATIONInventors: John Wesley Dyer, Henricus Johannes Maria Meijer, Danny Van Velzen, Jeffrey Van Gogh, Mark Brian Shields
-
Publication number: 20100106767Abstract: A processing system for distributed multi-tier applications is provided. The system includes a server component that executes a replica of a client-side application, where a client component executes the client-side application. The client component captures events from the client-side application and transmits the events to the replica to validate the computational integrity security of the application.Type: ApplicationFiled: October 24, 2008Publication date: April 29, 2010Applicant: MICROSOFT CORPORATIONInventors: Benjamin Livshits, Henricus Johannes Maria Meijer, Cedric Fournet, Jeffrey Van Gogh, Danny Van Velzen, Krishnaprasad Vikram, Abhishek Prateek
-
Publication number: 20090276795Abstract: Computer-based machines can be modeled after a virtual automaton. The virtual automaton defines processes that are not bound statically to particular behavior but rather perform a lookup at runtime to bind behavior to a specific process mechanism. In accordance with one aspect, binding can be dependent upon runtime context information such as object type. Instances of virtual automaton are provided in the context of graph processing including serialization of object graphs and scanning/parsing, among others.Type: ApplicationFiled: April 30, 2008Publication date: November 5, 2009Applicant: MICROSOFT CORPORATIONInventors: John Wesley Dyer, Brian C. Beckman, Henricus Johannes Maria Meijer, Jeffrey Van Gogh
-
Publication number: 20090265719Abstract: Method interception is utilized to generate macros. A recorder is injected within application code. The recorder intercepts a call to a method, captures information, and calls the original method. A macro can be generated subsequently as a function of the captured information. In one instance, macros can be utilized to test the application code. Additionally, information capture and ultimately macro generation can be combined with a tier splitting mechanism.Type: ApplicationFiled: April 18, 2008Publication date: October 22, 2009Applicant: MICROSOFT CORPORATIONInventors: Henricus Johannes Maria Meijer, Jeffrey Van Gogh, John Wesley Dyer
-
Publication number: 20090249282Abstract: Mechanisms are afforded for supporting cross platform widgets. A generic widget can be converted into a specialized widget of a corresponding platform. Dually, a specialized widget can be generalized to a generic widget for subsequent deployment on the same or different host. Furthermore, support is provided for compositional widgets across platforms.Type: ApplicationFiled: March 31, 2008Publication date: October 1, 2009Applicant: MICROSOFT CORPORATIONInventors: Henricus Johannes Maria Meijer, Danny Van Velzen, Jeffrey Van Gogh, Brian C. Beckman
-
Publication number: 20090249489Abstract: Secure distributed Web applications are produced by default upon construction. Mechanisms are provided to address distributed application vulnerabilities (e.g., cross-site scripting, cross-site request forgery, replay attacks . . . automatically. These mechanisms are provided in conjunction with a tier-splitting component that breaks up an application for execution across multiple contexts or tiers. As a result, any application that is tier split is protected from security vulnerabilities by default without any intervention on the part of a developer.Type: ApplicationFiled: March 31, 2008Publication date: October 1, 2009Applicant: MICROSOFT CORPORATIONInventors: Benjamin Livshits, Henricus Johannes Maria Meijer, Brian Beckman, Jeffrey Van Gogh, Danny Van Velzen, Dragos A. Manolescu, Bryan Sullivan
-
Publication number: 20090235282Abstract: Application remote control is affected across execution contexts. In one instance, input can be acquired from controlled applications and employed by other applications. Additionally or alternatively, remote control can be employed to test applications while minimizing unintended changes to applications under test caused by observation.Type: ApplicationFiled: March 12, 2008Publication date: September 17, 2009Applicant: MICROSOFT CORPORATIONInventors: Erik Meijer, Jeffrey Van Gogh, John Wesley Dyer
-
Publication number: 20090228896Abstract: Differing implementations associated with components of dissimilar execution environments are mediated to facilitate component integration. A host is provided to facilitate native interaction with foreign components by translating between native and foreign communications. Policies can be specified by either or both of a native and foreign component that control interaction.Type: ApplicationFiled: March 4, 2008Publication date: September 10, 2009Applicant: MICROSOFT CORPORATIONInventors: Henricus Johannes Maria Meijer, Jeffrey Van Gogh
-
Publication number: 20090228904Abstract: Asynchronous methods and calls are produced automatically as a function of a declarative indication of intent. A method annotated with an asynchronous attribute or method call including a special asynchronous function can be identified. Subsequently, an asynchronous version of an identified synchronous method or call is generated automatically. Assistance is also provided for specifying intent.Type: ApplicationFiled: March 4, 2008Publication date: September 10, 2009Applicant: MICROSOFT CORPORATIONInventors: Henricus Johannes Maria Meijer, John Wesley Dyer, Jeffrey Van Gogh, Danny Van Velzen, Harish Kantamneni, Dragos A. Manolescu, Brian Beckman, Benjamin Livshits
-
Publication number: 20090228987Abstract: Real user input targeting an application under test is blocked to prevent interference with the test. A shield window can be placed in front of an application under test window to intercept input destined for the application. Users can be notified of interception or a failed attempt to access the application. Furthermore, the shield window can be employed to provide feedback about the test including pointer movement and area focus.Type: ApplicationFiled: March 4, 2008Publication date: September 10, 2009Applicant: MICROSOFT CORPORATIONInventor: Jeffrey Van Gogh
-
Publication number: 20090199159Abstract: Various technologies and techniques are disclosed for enabling code to be executed on one or more execution contexts based upon declarative annotations contained in the code or other locations. An annotation associated with a region of code is located. The annotation specifies information about an execution context where the region of code should be executed. A caller proxy is generated that is responsible for calling a callee adapter to execute the region of code. The callee adapter is generated that is responsible for receiving a call from the caller proxy and for dispatching a call to the region of code at the execution context. At runtime, the caller proxy receives a request to call the region of code and sends an execution request to the callee adapter. The callee adapter receives the execution request and dispatches a call to an executable version of the region of code.Type: ApplicationFiled: January 31, 2008Publication date: August 6, 2009Applicant: Microsoft CorporationInventors: Henricus Johannes Maria Meijer, Brian Beckman, John Wesley Dyer, Jeffrey van Gogh, Benjamin Livshits, Dragos A. Manolescu, Danny van Velzen, Harish V. Kantamneni
-
Publication number: 20090150422Abstract: An arrangement by which pointers may be represented in a restricted software execution environment that provides access to only reference types but not pointers is realized by modeling both pointers and value type boxing using a set of boxes (i.e., containers) which describe how to retrieve the value associated with the pointer, and emitting code for accessing the set of boxes. A decompiling and recompiling process is utilized in which code arranged to run in an execution environment that supports pointers is scanned to reveal pointer and boxing usage. In one illustrative example, code is responsively emitted to create one or more specific boxes. At runtime in the restricted execution environment, an instance of a box class is created to thus emulate a pointer to the value.Type: ApplicationFiled: December 5, 2007Publication date: June 11, 2009Applicant: MICROSOFT CORPORATIONInventors: Erik Meijer, Jeffrey van Gogh
-
Publication number: 20090132998Abstract: A framework is provided that allows for debugging of applications/systems that execute in multiple execution environments. Instead of using the native application programming interface to interact with an execution environment, an alternative implementation of at least some of the application programming interface of the native execution environment is employed to facilitate debugging in a disparate execution environment.Type: ApplicationFiled: November 16, 2007Publication date: May 21, 2009Applicant: MICROSOFT CORPORATIONInventors: Henricus Johannes Maria Meijer, Brian C. Beckman, Jeffrey van Gogh, Bruno S. Bozza, Wei Zhu
-
Publication number: 20090125919Abstract: A first computing device receives (over a network) from at least a second computing device a container that includes information relating to types of software code that are potentially invoked by a program executing on the first computing device. A determination is made according to an on-demand basis, during execution of the program, whether a particular type of software code is to be loaded from the at least second computing device to the first computing device.Type: ApplicationFiled: October 16, 2007Publication date: May 14, 2009Applicant: Microsoft CorporationInventors: Henricus Johannes Maria Meijer, Jeffrey Van Gogh
-
Publication number: 20090112975Abstract: Client-side performance is optimized through server-side pushing of content. Portions of content are requested and retrieved as required by a client-side application. Moreover, content likely to be needed in the near future is pre-fetched and pushed to the client. This is beneficial from an overhead standpoint since all content need not be provided to the client at once. Rather, content provisioning is throttled based on need, and wait time is mitigated by pre-fetching.Type: ApplicationFiled: October 31, 2007Publication date: April 30, 2009Applicant: MICROSOFT CORPORATIONInventors: Brian C. Beckman, Henricus Johannes Maria Meijer, Jeffrey Van Gogh, Danny Van Velzen
-
Publication number: 20090049421Abstract: Functions are memoized automatically and transparently. Memoized code can be injected automatically within a program to facilitate efficient and/or expeditious execution thereof, among other things. The memoized code can intercept calls to an original function and return values in accordance with the code. Accordingly, callers of the function need not do anything special and can invoke the function without knowledge of it being memoized.Type: ApplicationFiled: August 15, 2007Publication date: February 19, 2009Applicant: MICROSOFT CORPORATIONInventors: Henricus Johannes Maria Meijer, Jeffrey van Gogh, Brian C. Beckman
-
Publication number: 20090024986Abstract: Source languages are translated to target dynamic programming languages. Runtime functionality including reflection and/or dynamic code modification exposed by a source language is mapped to a dynamic language implementation such as that of a script language. Target language dynamism is leveraged to efficiently support runtime functionality in a source language that is more static, for example.Type: ApplicationFiled: July 19, 2007Publication date: January 22, 2009Applicant: MICROSOFT CORPORATIONInventors: Henricus Johannes Maria Meijer, Brian C. Beckman, Bruno S. Bozza, Jeffrey van Gogh, Wei Zhu