Patents by Inventor Zhengwen Zhu

Zhengwen Zhu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210232911
    Abstract: Techniques performed by a data processing system for analyzing training data for a machine learning model and identifying outliers in the training data herein include obtaining training data for the model from a memory of the data processing system; analyzing the training data using a Siamese Neural Network to determine within-label similarities and cross-label similarities associated with a plurality of data elements within the training data, the within-label representing similarities between a respective data element and a first set of data elements similarly labeled in the training data, the cross-label similarities representing similarities between the respective data element and a second set of data elements dissimilarly labeled in the training data; identifying outlier data elements in the plurality of data elements based on the within-label and cross-label similarities; and processing the training data comprising the outlier data elements.
    Type: Application
    Filed: January 28, 2020
    Publication date: July 29, 2021
    Inventors: Nishant VELAGAPUDI, Zhengwen ZHU, Venkatasatya Premnath AYYALASOMAYAJULA
  • Publication number: 20210232980
    Abstract: Techniques performed by a data processing system for analyzing the impact of training data changes on a machine learning model herein include training a first instance of a machine learning model with a first set of training data; modifying the first set of training data to produce a second set of training data; training a second instance of the model with the second set of training data; comparing the first instance of the model to the second instance of the model to determine features that differ between the first instance and the second instance of the model; identifying a subset of historical data associated with the features that differ between the first instance and the second instance of the model; and scoring the subset of the historical data to produce a report identifying differences in the output of the first instance and the second instance of the machine learning model.
    Type: Application
    Filed: January 28, 2020
    Publication date: July 29, 2021
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Nishant VELAGAPUDI, Zhengwen ZHU, Venkatasatya Premnath AYYALASOMAYAJULA, Rajkumar RAMASAMY
  • Patent number: 10904210
    Abstract: A method for dynamically generating a bookmark suggestion within a user interface of a computing device. The method includes accessing a target URL, receiving a request to bookmark the target URL, and determining if the target URL was accessed via a URL redirection function. The method also includes generating a prompt for display on the user interface. The prompt includes a user selectable option to save one of the target URL or a redirection URL associated with the target URL as a desired bookmark target address, based on the target URL being determined to have been accessed via the URL redirection function. The method further includes receiving an indication via the user interface of the desired bookmark target address, and saving the target URL or the redirection URL as the desired bookmark target address based on the received indication.
    Type: Grant
    Filed: November 21, 2018
    Date of Patent: January 26, 2021
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventor: Zhengwen Zhu
  • Publication number: 20200162423
    Abstract: A method for dynamically generating a bookmark suggestion within a user interface of a computing device. The method includes accessing a target URL, receiving a request to bookmark the target URL, and determining if the target URL was accessed via a URL redirection function. The method also includes generating a prompt for display on the user interface. The prompt includes a user selectable option to save one of the target URL or a redirection URL associated with the target URL as a desired bookmark target address, based on the target URL being determined to have been accessed via the URL redirection function. The method further includes receiving an indication via the user interface of the desired bookmark target address, and saving the target URL or the redirection URL as the desired bookmark target address based on the received indication.
    Type: Application
    Filed: November 21, 2018
    Publication date: May 21, 2020
    Inventor: Zhengwen ZHU
  • Patent number: 9544207
    Abstract: Connectivity is tested using different locations and contexts selected from different possible failure zones. The failure zones may include: client failure zones; Internet failure zones; and online service failure zones. The results relating to different connectivity tests performed using the different failure zones are correlated and analyzed in an attempt to determine a root cause of the connectivity issue. For example, the root cause may be determined to be a configuration problem of the client, a problem with the client's networking equipment, an ISP problem, an Internet backbone problem; a problem of the online service, and the like. Different contexts may also be used when performing the tests. These results may be compared to the other connectivity test results. The results from the tests may be provided to the client experiencing the problem. Aggregated test results may also be used to detect service wide issues and trigger an alert.
    Type: Grant
    Filed: June 21, 2013
    Date of Patent: January 10, 2017
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Nicole Allen, Zhipeng Zhao, Zhengwen Zhu, Bradley Hughes, Dionicio Avila, Shawn McGrath, Jason Nelson, John Tait, Aaron Whitney
  • Publication number: 20160350763
    Abstract: Concepts and technologies are described herein for providing contextually-aware discovery of solutions. In some configurations, a computing device may receive a request from a tenant. A request may be any type of request, including a service request or any other type of request for information. To process the request, the computing device may also obtain data that associates characteristics with the tenant. For example, one or more resources may maintain a database that includes a tenant identifier, data indicating the size of the tenant, the length of time a tenant has been in service, or any other type of characteristic of the tenant.
    Type: Application
    Filed: May 29, 2015
    Publication date: December 1, 2016
    Inventors: Dionicio A. Avila, Yang Sun, Erik P. Gunvaldson, Pamela Bhattacharya, Mohamed Farouk AbdelHady, Ganesh Pandey, Zhengwen Zhu, John Vijay Sena Devide
  • Patent number: 9122524
    Abstract: The described implementations relate to processing of electronic data. One implementation is manifest as a system that can include logic and at least one processing device configured to execute the logic. The logic can be configured to receive a first task request to execute a first task that uses a resource when performed. The first task can have an associated first level of interactivity. The logic can also be configured to receive a second task request to execute a second task that also uses the resource when performed. The second task can have an associated second level of interactivity. The logic can also be configured to selectively throttle the first task and the second task based upon the first level of interactivity and the second level of interactivity.
    Type: Grant
    Filed: January 8, 2013
    Date of Patent: September 1, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Siddhartha Mathur, David A. Sterling, Lu Yang, Zhengwen Zhu, David Nunez Tejerina, Ozan Ozhan, Michael Butler
  • Publication number: 20140379894
    Abstract: Connectivity is tested using different locations and contexts selected from different possible failure zones. The failure zones may include: client failure zones; Internet failure zones; and online service failure zones. The results relating to different connectivity tests performed using the different failure zones are correlated and analyzed in an attempt to determine a root cause of the connectivity issue. For example, the root cause may be determined to be a configuration problem of the client, a problem with the client's networking equipment, an ISP problem, an Internet backbone problem; a problem of the online service, and the like. Different contexts may also be used when performing the tests. These results may be compared to the other connectivity test results. The results from the tests may be provided to the client experiencing the problem. Aggregated test results may also be used to detect service wide issues and trigger an alert.
    Type: Application
    Filed: June 21, 2013
    Publication date: December 25, 2014
    Inventors: Nicole Allen, Zhipeng Zhao, Zhengwen Zhu, Bradley Hughes, Dionicio Avila, Shawn McGrath, Jason Nelson, John Tait, Aaron Whitney
  • Publication number: 20140196048
    Abstract: The described implementations relate to processing of electronic data. One implementation is manifest as a system that can include logic and at least one processing device configured to execute the logic. The logic can be configured to receive a first task request to execute a first task that uses a resource when performed. The first task can have an associated first level of interactivity. The logic can also be configured to receive a second task request to execute a second task that also uses the resource when performed. The second task can have an associated second level of interactivity. The logic can also be configured to selectively throttle the first task and the second task based upon the first level of interactivity and the second level of interactivity.
    Type: Application
    Filed: January 8, 2013
    Publication date: July 10, 2014
    Applicant: MICROSOFT CORPORATION
    Inventors: Siddhartha Mathur, David A. Sterling, Lu Yang, Zhengwen Zhu, David Nunez Tejerina, Ozan Ozhan, Michael Butler
  • Publication number: 20130159497
    Abstract: A computing system includes an authentication layer, the authentication layer being programmed to receive a request for resources of the computing system and to authenticate an identity of a user requesting the resources, and a command layer, the command layer being programmed to execute one or more commands from the request for resources, wherein the command layer logs characteristics associated with one or more of the commands, wherein the computing system monitors each logged command to determine when a threshold is met, and wherein the computing system blocks a subsequent request for resources from the user when the threshold is met.
    Type: Application
    Filed: December 16, 2011
    Publication date: June 20, 2013
    Applicant: MICROSOFT CORPORATION
    Inventors: Michael Gene Butler, Huangjian Guo, Gleb Kholodov, Siddhartha Mathur, David Sterling, Zhengwen Zhu