YW

Yi-Min Wang

Microsoft: 61 patents #223 of 40,388Top 1%
IBM: 16 patents #6,952 of 70,183Top 10%
AT AT&T: 16 patents #1,052 of 18,772Top 6%
SC Sprint Communications: 3 patents #587 of 2,085Top 30%
CM Chartered Semiconductor Manufacturing: 3 patents #194 of 840Top 25%
NU Nanjing University: 1 patents #249 of 887Top 30%
HC High Tech Computer: 1 patents #52 of 140Top 40%
Oracle: 1 patents #8,282 of 14,854Top 60%
📍 Shanghai, WA: #3 of 129 inventorsTop 3%
Overall (All Time): #13,974 of 4,157,543Top 1%
102
Patents All Time

Issued Patents All Time

Showing 51–75 of 102 patents

Patent #TitleCo-InventorsDate
8126894 Click chain model Chao Liu, Fan Guo 2012-02-28
8078691 Web page load time prediction and simulation Ming Zhang, Albert Greenberg, Zhichun Li 2011-12-13
8041710 Automatic diagnosis of search relevance failures Li-wei He, Wenzhao Tan, Jinliang Fan, Xiaoxin Yin 2011-10-18
8024815 Isolation environment-based information access Jacob R. Lorch, Chad Verbowski, Helen Wang, Samuel John Edward King 2011-09-20
7962571 Method and system for collecting information from computer systems based on a trusted relationship Chun Yuan, Jiahe Helen Wang, Zheng Zhang 2011-06-14
7873635 Search ranger system and double-funnel model for search spam analyses and browser protection Ming Ma 2011-01-18
7874001 Detecting user-mode rootkits Douglas Beck 2011-01-18
7784101 Identifying dependencies of an application upon a given security context Chad Verbowski, John D. Dungan, Shuo Chen 2010-08-24
7779480 Identifying dependencies of an application upon a given security context Chad Verbowski, John Dunagan, Shuo Chen 2010-08-17
7774459 Honey monkey network exploration Douglas Beck 2010-08-10
7765592 Changed file identification, software conflict resolution and unwanted file removal Aaron R. Johnson, David Ladd, Roussi Roussev, Chad Verbowski 2010-07-27
7756987 Cybersquatter patrol Douglas Beck, Chad Verbowski, Bradford Daniels, Ming Ma 2010-07-13
7698305 Program modification and loading times in computing devices Chad Verbowski, Juhan Lee, Xiaogang Liu, Roussi Roussev 2010-04-13
7669049 System and method for protecting privacy and anonymity of parties of network communications Qixiang Sun, Daniel R. Simon, Wilfred Russell 2010-02-23
7640215 System and method for evaluating and enhancing source anonymity for encrypted web traffic Qixiang Sun, Daniel R. Simon, Wilfred Russell, Lili Qiu, Venkata N. Padmanabhan 2009-12-29
7627898 Method and system for detecting infection of an operating system Douglas Beck, Aaron R. Johnson, Roussi Roussev, Chad Verbowski, Binh Dou Vo 2009-12-01
7624398 Accelerating a distributed component architecture over a network using a modified RPC communication Galen C. Hunt, Alessandro Florin 2009-11-24
7620995 Identifying dependencies of an application upon a given security context Chad Verbowski, John Dunagan, Shuo Chen 2009-11-17
7614046 Method and system for analyzing the impact of a software update Bradford Daniels, John Dunagan, Roussi Roussev, Chad Verbowski 2009-11-03
7571482 Automated rootkit detector Alexey Polyakov, Gretchen L. Loihle, Mihai Costea, Robert John Hensing, Scott A. Field +2 more 2009-08-04
7392295 Method and system for collecting information from computer systems based on a trusted relationship Chun Yuan, Jiahe Helen Wang, Zheng Zhang 2008-06-24
7389444 Method and system for troubleshooting a misconfiguration of a computer system based on product support services information Wei-Ying Ma, Ji-Rong Wen 2008-06-17
7337092 Event-based automated diagnosis of known problems Chun Yuan, Ji-Rong Wen, Wei-Ying Ma, Zheng Zhang 2008-02-26
7200675 Summary-based routing for content-based event distribution networks Lili Qiu, Chad Verbowski, Demetrios Achlioptas, Gautam Das, Per-Ake Larson 2007-04-03
7171337 Event-based automated diagnosis of known problems Chun Yuan, Ji-Rong Wen, Wei-Ying Ma, Zheng Zhang 2007-01-30