Patents by Inventor Ranjita Bhagwan
Ranjita Bhagwan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240370781Abstract: Computer-assisted configuration of compute resource to perform tasks of a given inference task type. For each of multiple model combinations, the computing system estimates 1) a compute level that can perform tasks of the given inference type using the model combination, and 2) an accuracy of the model combination in performing tasks of the given inference task type. The computing system then selects a model combination for the given inference task type based on the estimated compute level of the model combination and the estimated accuracy of the model combination. In response to the selection, an inference component is configured to respond to task requests of the given inference task type by using the selected model combination. Scheduling using batch size and input size may further improve accuracy and efficiency of the model combination.Type: ApplicationFiled: June 9, 2023Publication date: November 7, 2024Inventors: Anand PADMANABHA IYER, Jayashree MOHAN, Ranjita BHAGWAN, Nagarajan NATARAJAN, Venkata N. PADMANABHAN, Rohit MALLIKARJUNA PUSHPA, Divyam ANSHUMAAN
-
Patent number: 12095610Abstract: The techniques disclosed herein provision inter-DC WAN capacity based on network failure statistics and bandwidth demands of a cloud-hosted application. Network capacity is provisioned based on an assumption of runtime cooperation between the application and the network. For example, if the network detects that a link has failed, the application may cooperate with the network to pause a deferrable transfer, reserving bandwidth for non-deferrable transfers. With knowledge that deferrable transfers will be dynamically paused when a primary link fails, backup links may be provisioned with less capacity than the primary link. The ability to dynamically defer transfers also enables a greater degree of bandwidth smoothing, e.g. reducing peak demand by scheduling deferrable transfers for off-peak hours. This allows network links to be provisioned with less capacity than if all transfers were performed immediately.Type: GrantFiled: February 17, 2022Date of Patent: September 17, 2024Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Ranjita Bhagwan, Harsha Sharma, Parth Dhaval Thakkar, Sagar Bharadwaj Kalasibail Seetharam, Venkata N. Padmanabhan, Kathleen Voelbel, Vijay Rajeshkumar, Yogesh Bansal
-
Patent number: 11977606Abstract: A computer implemented method includes obtaining multiple configuration files that include configuration commit histories, detecting patterns in parameter values in the configuration files to generate file-based rules for configuration parameters, detecting patterns in parameter values in the configuration files to generate history-based rules using commit histories for the configuration parameters, and exposing the rules to calling programs.Type: GrantFiled: August 31, 2021Date of Patent: May 7, 2024Assignee: Microsoft Technology Licensing, LLCInventors: Ranjita Bhagwan, Sonu Mehta, Arjun Radhakrishna, Sahil Garg
-
Publication number: 20230267178Abstract: A computer implemented method includes obtaining multiple configuration files that include configuration commit histories, detecting patterns in parameter values in the configuration files to generate file-based rules for configuration parameters, detecting patterns in parameter values in the configuration files to generate history-based rules using commit histories for the configuration parameters, and exposing the rules to calling programs.Type: ApplicationFiled: August 31, 2021Publication date: August 24, 2023Inventors: Ranjita Bhagwan, Sonu MEHTA, Arjun RADHAKRISHNA, Sahil GARG
-
Publication number: 20230261935Abstract: The techniques disclosed herein provision inter-DC WAN capacity based on network failure statistics and bandwidth demands of a cloud-hosted application. Network capacity is provisioned based on an assumption of runtime cooperation between the application and the network. For example, if the network detects that a link has failed, the application may cooperate with the network to pause a deferrable transfer, reserving bandwidth for non-deferrable transfers. With knowledge that deferrable transfers will be dynamically paused when a primary link fails, backup links may be provisioned with less capacity than the primary link. The ability to dynamically defer transfers also enables a greater degree of bandwidth smoothing, e.g. reducing peak demand by scheduling deferrable transfers for off-peak hours. This allows network links to be provisioned with less capacity than if all transfers were performed immediately.Type: ApplicationFiled: February 17, 2022Publication date: August 17, 2023Inventors: Ranjita BHAGWAN, Harsha SHARMA, Parth Dhaval THAKKAR, Sagar Bharadwaj KALASIBAIL SEETHARAM, Venkata N. PADMANABHAN, Kathleen VOELBEL, Vijay RAJESHKUMAR, Yogesh BANSAL
-
Patent number: 11599354Abstract: Described herein is a system and method for detecting correlated changes (e.g., between code files and configuration files). For a plurality of code files and a plurality of configuration files, a correlated change model is trained to identify correlated changes across the code files and the configuration files using a machine learning algorithm that discovers change rules using a support parameter, and, a confidence parameter, and, a refinement algorithm that refines the discovered change rules. The correlated change model comprising the change rules is stored. The correlated change model can be used to identify potential issue(s) regarding a particular file (e.g., changed code or configuration file(s)). Information regarding the identified potential issue(s) can be provided to a user.Type: GrantFiled: July 18, 2019Date of Patent: March 7, 2023Assignee: Microsoft Technology Licensing, LLCInventors: Ranjita Bhagwan, Chandra Sekhar Maddila, Aditya Kumar, Sumit Asthana, Rahul Kumar, Sonu Mehta, Chetan Bansal, Balasubramanyan Ashok, Christian Alma Bird
-
Publication number: 20210019142Abstract: Described herein is a system and method for detecting correlated changes (e.g., between code files and configuration files). For a plurality of code files and a plurality of configuration files, a correlated change model is trained to identify correlated changes across the code files and the configuration files using a machine learning algorithm that discovers change rules using a support parameter, and, a confidence parameter, and, a refinement algorithm that refines the discovered change rules. The correlated change model comprising the change rules is stored. The correlated change model can be used to identify potential issue(s) regarding a particular file (e.g., changed code or configuration file(s)). Information regarding the identified potential issue(s) can be provided to a user.Type: ApplicationFiled: July 18, 2019Publication date: January 21, 2021Applicant: Microsoft Technology Licensing, LLCInventors: Ranjita BHAGWAN, Chandra Sekhar MADDILA, Aditya KUMAR, Sumit ASTHANA, Rahul KUMAR, Sonu MEHTA, Chetan BANSAL, Balasubramanyan ASHOK, Christian Alma BIRD
-
Patent number: 10554384Abstract: In some embodiments, an encryption system secures data using a homomorphic encryption. The encryption system encrypts a number by encrypting a number identifier of the number and combining the number and the encrypted number identifier using a mathematical operation to generate an encrypted number. The encrypted numbers may be stored at a server system along with their number identifiers. The server system can then generate an aggregation (e.g., sum) of the encrypted numbers and provide the aggregation, the encrypted numbers, and the number identifiers. The encryption system can then separate the aggregation of the numbers from the aggregation of the encrypted numbers using an inverse of the mathematical operation used in the encryption to effect removal of an aggregation of the encrypted number identifiers of the numbers from the aggregation of the encrypted numbers. The separated aggregation of the numbers is an aggregation of the plurality of the numbers.Type: GrantFiled: January 13, 2017Date of Patent: February 4, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Ranjita Bhagwan, Nishanth Chandran, Ramachandran Ramjee, Harmeet Singh, Antonios Papadimitriou, Saikrishna Badrinarayanan
-
Patent number: 10187199Abstract: An encryption system stores encrypted values for aggregation is provided. The encryption system accesses an input set with input values. For each distinct value in the input set of input values, the encryption system generates an output set with an encrypted output value corresponding to each input value. The encryption system sets the encrypted output value for a corresponding input value to an encryption of an indicator of a match when the corresponding input value is the same as that distinct value. Otherwise, the encryption sets the encrypted output value for the corresponding input value to an encryption of an indicator of no match. The encrypted output values can then be aggregated to generate an encrypted aggregation based on input values that match, and the encrypted aggregation can be decrypted to generated a decrypted aggregation based on the input values that match.Type: GrantFiled: October 21, 2016Date of Patent: January 22, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Ranjita Bhagwan, Nishanth Chandran, Ramachandran Ramjee
-
Publication number: 20180076951Abstract: An encryption system stores encrypted values for aggregation is provided. The encryption system accesses an input set with input values. For each distinct value in the input set of input values, the encryption system generates an output set with an encrypted output value corresponding to each input value. The encryption system sets the encrypted output value for a corresponding input value to an encryption of an indicator of a match when the corresponding input value is the same as that distinct value. Otherwise, the encryption sets the encrypted output value for the corresponding input value to an encryption of an indicator of no match. The encrypted output values can then be aggregated to generate an encrypted aggregation based on input values that match, and the encrypted aggregation can be decrypted to generated a decrypted aggregation based on the input values that match.Type: ApplicationFiled: October 21, 2016Publication date: March 15, 2018Inventors: Ranjita Bhagwan, Nishanth Chandran, Ramachandran Ramjee
-
Publication number: 20170272235Abstract: In some embodiments, an encryption system secures data using a homomorphic encryption. The encryption system encrypts a number by encrypting a number identifier of the number and combining the number and the encrypted number identifier using a mathematical operation to generate an encrypted number. The encrypted numbers may be stored at a server system along with their number identifiers. The server system can then generate an aggregation (e.g., sum) of the encrypted numbers and provide the aggregation, the encrypted numbers, and the number identifiers. The encryption system can then separate the aggregation of the numbers from the aggregation of the encrypted numbers using an inverse of the mathematical operation used in the encryption to effect removal of an aggregation of the encrypted number identifiers of the numbers from the aggregation of the encrypted numbers. The separated aggregation of the numbers is an aggregation of the plurality of the numbers.Type: ApplicationFiled: January 13, 2017Publication date: September 21, 2017Inventors: Ranjita Bhagwan, Nishanth Chandran, Ramachandran Ramjee, Harmeet Singh, Antonios Papadimitriou, Saikrishna Badrinarayanan
-
Patent number: 9753778Abstract: A resource allocation framework is described herein which allocates items (conceptualized as balls) to item-receiving slots (conceptualized as bins) in a domain-agnostic manner. A user instantiates the resource allocation framework to a particular allocation problem by generating a specification that describes the allocation problem in a declarative fashion. Among other features, the specification maps real-world entities to the balls and bins, and describes the constraints associated with the allocation problem. The specification also provides a utilization function that computes the consumption of resources for a proposed assignment of a particular ball to a particular bin. According to another aspect, the resource allocation framework uses many processing elements (e.g., GPU threads, CPU threads, etc.), operating in parallel, to attempt to find a solution to the allocation problem.Type: GrantFiled: July 20, 2012Date of Patent: September 5, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Saikat Guha, Ranjita Bhagwan, Anshul Rai
-
Patent number: 8880933Abstract: The problem signature extraction technique extracts problem signatures from trace data collected from an application. The technique condenses the manifestation of a network, software or hardware problem into a compact signature, which could then be used to identify instances of the same problem in other trace data. For a network configuration, the technique uses as input a network-level packet trace of an application's communication and extracts from it a set of features. During the training phase, each application run is manually labeled as GOOD or BAD, depending on whether the run was successful or not. The technique then employs a learning technique to build a classification tree not only to distinguish between GOOD and BAD runs but to also sub-classify the BAD runs into different classes of failures. Once a classification tree has been learned, problem signatures are extracted by walking the tree, from the root to each leaf.Type: GrantFiled: April 5, 2011Date of Patent: November 4, 2014Assignee: Microsoft CorporationInventors: Ranjita Bhagwan, Venkata N. Padmanabhan, Bhavish Aggarwal, Lorenzo De Carli
-
Publication number: 20140025822Abstract: A resource allocation framework is described herein which allocates items (conceptualized as balls) to item-receiving slots (conceptualized as bins) in a domain-agnostic manner. A user instantiates the resource allocation framework to a particular allocation problem by generating a specification that describes the allocation problem in a declarative fashion. Among other features, the specification maps real-world entities to the balls and bins, and describes the constraints associated with the allocation problem. The specification also provides a utilization function that computes the consumption of resources for a proposed assignment of a particular ball to a particular bin. According to another aspect, the resource allocation framework uses many processing elements (e.g., GPU threads, CPU threads, etc.), operating in parallel, to attempt to find a solution to the allocation problem.Type: ApplicationFiled: July 20, 2012Publication date: January 23, 2014Applicant: MICROSOFT CORPORATIONInventors: Saikat Guha, Ranjita Bhagwan, Anshul Rai
-
Patent number: 8359652Abstract: An access control anomaly detection system and method to detect potential anomalies in access control permissions and report those potential anomalies in real time to an administrator for possible action. Embodiments of the system and method input access control lists and semantic groups (or any dataset having binary matrices) to perform automated anomaly detection. This input is processed in three broad phases. First, policy statements are extracted from the access control lists. Next, object-level anomaly detection is performed using thresholds by categorizing outliers in the policies discovered in the first phase as potential anomalies. This object-level anomaly detection can yield object-level security anomalies and object-level accessibility anomalies. Group-level anomaly detection is performed in the third phase by using semantic groups and user sets extracted in first phase to find maximal overlaps using group mapping.Type: GrantFiled: October 31, 2009Date of Patent: January 22, 2013Assignee: Microsoft CorporationInventors: Ranjita Bhagwan, Tathagata Das, Prasad G. Naldurg
-
Publication number: 20120260141Abstract: The problem signature extraction technique extracts problem signatures from trace data collected from an application. The technique condenses the manifestation of a network, software or hardware problem into a compact signature, which could then be used to identify instances of the same problem in other trace data. For a network configuration, the technique uses as input a network-level packet trace of an application's communication and extracts from it a set of features. During the training phase, each application run is manually labeled as GOOD or BAD, depending on whether the run was successful or not. The technique then employs a learning technique to build a classification tree not only to distinguish between GOOD and BAD runs but to also sub-classify the BAD runs into different classes of failures. Once a classification tree has been learned, problem signatures are extracted by walking the tree, from the root to each leaf.Type: ApplicationFiled: April 5, 2011Publication date: October 11, 2012Applicant: MICROSOFT CORPORATIONInventors: Ranjita Bhagwan, Venkata N. Padmanabhan, Bhavish Aggarwal, Lorenzo De Carli
-
Patent number: 8219657Abstract: Application service requests received by an application hosting framework are automatically differentiated and categorized, and resource usage patterns associated with the requests are predicted. Resource usage data points are successively extracted from the hosting framework. Elements of an initial resource usage pattern matrix are computed from the data points. An estimate for the number of categories of requests is computed from the initial resource usage pattern matrix, where the requests in each category have similar resource usage patterns. Elements of a resource usage signature matrix and request categorization matrix are computed from the estimate for the number of categories of requests and the initial resource usage pattern matrix.Type: GrantFiled: June 13, 2008Date of Patent: July 10, 2012Assignee: Microsoft CorporationInventors: Ranjita Bhagwan, Monojit Choudhury, Ravindran Kannan, Venkata N. Padmanabhan, Abhishek Sharma, Geoffrey Voelker
-
Patent number: 8122281Abstract: A system and method for allocating distributed processing systems includes inputting component descriptions in a distributed processing system and determining importance of each component. Capacity and failure characteristics of resource groups representing units of available processing capacity are also input. Components are assigned to a plurality of resource groups based on the capacity. Each resource group includes components where the failure characteristics permit simultaneous failures, such that in the event of such failures, an output value of the application is maximized.Type: GrantFiled: April 13, 2007Date of Patent: February 21, 2012Assignee: International Business Machines CorporationInventors: Nikhil Bansal, Ranjita Bhagwan, Yoonho Park, Chitra Venkatramani
-
Patent number: 7975071Abstract: Described is transparently compressing content for network transmission, including end-to-end compression. An end host or middlebox device sender sends compressed packets to an end host or middlebox device receiver, which decompresses the packets to recover the original packet. The sender constructs compressed packets including references to information maintained at the receiver, which the receiver uses to access the information to recreate actual original packet content. The receiver may include a dictionary corresponding to the sender, e.g., synchronized with the sender's dictionary. Alternatively, in speculative compression, the sender does not maintain a dictionary, and instead sends a fingerprint (hash value) by which the receiver looks up corresponding content in its dictionary; if not found, the receiver requests actual content.Type: GrantFiled: January 18, 2008Date of Patent: July 5, 2011Assignee: Microsoft CorporationInventors: Ramachandran Ramjee, Ranjita Bhagwan, Venkata N. Padmanabhan, Manveer Singh Chawla
-
Publication number: 20110107418Abstract: An access control anomaly detection system and method to detect potential anomalies in access control permissions and report those potential anomalies in real time to an administrator for possible action. Embodiments of the system and method input access control lists and semantic groups (or any dataset having binary matrices) to perform automated anomaly detection. This input is processed in three broad phases. First, policy statements are extracted from the access control lists. Next, object-level anomaly detection is performed using thresholds by categorizing outliers in the policies discovered in the first phase as potential anomalies. This object-level anomaly detection can yield object-level security anomalies and object-level accessibility anomalies. Group-level anomaly detection is performed in the third phase by using semantic groups and user sets extracted in first phase to find maximal overlaps using group mapping.Type: ApplicationFiled: October 31, 2009Publication date: May 5, 2011Applicant: Microsoft CorporationInventors: Ranjita Bhagwan, Tathagata Das, Prasad G. Naldurg