Dr. Huang graduated from the Albert Einstein College of Medicine at Yeshiva University in 1982. She works in Bronx, NY and specializes in Internal Medicine. Dr. Huang is affiliated with Montefiore Medical Center.
A technique for accessing a shared resource of a computerized system involves running a first portion of a first thread within the computerized system, the first portion (i) requesting a lock on the shared resource and (ii) directing the computerized system to make operations of a second thread visible in a correct order. The technique further involves making operations of the second thread visible in the correct order in response to the first portion of the first thread running within the computerized system, and running a second portion of the first thread within the computerized system to determine whether the first thread has obtained the lock on the shared resource. Such a technique alleviates the need for using a MEMBAR instruction in the second thread.
Real-Time Identification Of An Asset Model And Categorization Of An Asset To Assist In Computer Network Security
Ankur Lahoti - Lucknow, IN Hui Huang - Sunnyvale CA, US Christian F. Beedgen - Cupertino CA, US
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
G06F 15/16 G06F 15/173
US Classification:
709238, 709245, 707E17032
Abstract:
A unique identifier is assigned to a network node and is used to obtain an “asset model” corresponding to the node and to determine whether the node is a member of a particular category. An asset model is a set of information about a node (e. g. , the node's role within the enterprise, software installed on the node, and known vulnerabilities/weaknesses of the node). An identifier lookup module determines a node's identifier based on characteristics of the node (such as IP address, host name, network zone, and/or MAC address), which are used as keys into lookup data structures. A category lookup module determines whether a particular node is a member of (i. e. , within) a particular category using a transitive closure to model the categories (properties) that can be attached to an asset model. A transitive closure for a particular asset category is stored as a bitmap, similar to bitmap indexing.
Representing And Storing An Optimized File System Using A System Of Symlinks, Hardlinks And File Archives
Eric Brueggemann - Cupertino CA, US Goutham Rao - San Jose CA, US Mark Taylor - San Jose CA, US Murali Bashyam - Fremont CA, US Hui Huang - Sunnyvale CA, US
Assignee:
Dell Products L.P. - Round Rock TX
International Classification:
G06F 7/00 G06F 17/00
US Classification:
707692, 707609
Abstract:
A data de-duplication system is used with network attached storage and serves to reduce data duplication and file storage costs. Techniques utilizing both symlinks and hardlinks ensure efficient deletion file/data cleanup and avoid data loss in the event of crashes.
Octavian T. Ureche - Renton WA, US Alex M. Semenko - Issaquah WA, US Hui Huang - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
H04L 9/32
US Classification:
713168, 713190, 713193
Abstract:
In accordance with one or more aspects, a storage volume is transformed into an encrypted storage volume or an unencrypted storage volume using a multi-phase process. One or more parts of the storage volume that have not yet been transformed are identified, and one or more parts of the storage volume that are allocated for use are identified. In a first phase of the multi-phase process, one or more parts of the storage volume that have not yet been transformed and that are allocated for use are transformed. In a second phase of the multi-phase process, after the first phase is finished, one or more parts of the storage volume that have not yet been transformed and are not allocated for use are transformed.
Anand B. Iyer - Sammamish WA, US Michael H. Krause - Redmond WA, US Haseeb Ahmed - Redmond WA, US Yunfei Shang - Bothell WA, US Kumneger T. Zelalem - Bellevue WA, US Zinaida A. Pozen - Seattle WA, US Hui Huang - Redmond WA, US Yau N. Chin - Bellevue WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 9/22
US Classification:
719318, 718103, 718104, 710110
Abstract:
In a computing device running multiple applications, a check is made as to whether a threshold value of multiple threshold values has been met. Each of the multiple threshold values is associated with a characteristic of one of the multiple applications or a characteristic of a resource of the computing device. If the threshold value has not been met, then the multiple applications are allowed to continue running on the computing device. However, if the threshold value has been met, then one or more of the multiple applications to shut down is selected based at least in part on the characteristic associated with the threshold value that has been met, and the selected application is shut down.
- Mountain View CA, US Hui Huang - Palo Alto CA, US
International Classification:
G06F 9/50 G06N 20/00 G06N 3/04
Abstract:
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, are described for scheduling tasks of ML workloads. A system receives requests to perform the workloads and determines, based on the requests, resource requirements to perform the workloads. The system includes multiple hosts and each host includes multiple accelerators. The system determines a quantity of hosts assigned to execute tasks of the workload based on the resource requirement and the accelerators for each host. For each host in the quantity of hosts, the system generates a task specification based on a memory access topology of the host. The specification specifies the task to be executed at the host using resources of the host that include the multiple accelerators. The system provides the task specifications to the hosts and performs the workloads when each host executes assigned tasks specified in the task specifications for the host.
Guidance And Navigation Control Proteins And Method Of Making And Using Thereof
- Redmond WA, US - Chengdu, Sichuan, CN Dong XIA - Redmond WA, US David JELLYMAN - Duvall WA, US Katrina BYKOVA - Seattle WA, US Anne-Marie ROUSSEAU - Seattle WA, US Bill BRADY - Bothell WA, US Blair RENSHAW - Renton WA, US Brian KOVACEVICH - Snohomish WA, US Yu LIANG - Redmond WA, US Camilla WANG - Sammamish WA, US Zeren GAO - Redmond WA, US Hui Huang - Redmond WA, US
International Classification:
C07K 16/28 A61P 35/02 C12N 5/0783 C12N 5/09
Abstract:
The application provides guidance and navigation control (GNC) proteins. In one embodiment, the guidance and navigation control (GNC) protein, comprising a binding domain for a T cell activating receptor, a binding domain for a tumor associated antigen, a bind domain for an immune checkpoint receptor, and a binding domain for a T cell co-stimulating receptor. The binding domain for the tumor associated antigen is not adjacent to the binding domain for the T cell co-stimulating receptor. In one embodiment, the binding domain for the T cell activating receptor is adjacent to the binding domain for the tumor associated antigen (TAA).
Methods Of Making And Using Guidance And Navigation Control Proteins
- Redmond WA, US - Chengdu, Sichuan, CN Jahan KHALILI - Everett WA, US Dong XIA - Redmond WA, US David JELLYMAN - Duvall WA, US Katrina BYKOVA - Seattle WA, US Anne-Marie ROUSSEAU - Seattle WA, US Camilla WANG - Sammamish WA, US Zeren GAO - Redmond WA, US Hui HUANG - Redmond WA, US Steven K. LUNDY - Woodinville WA, US
The application provides methods for generating a therapeutic composition. The method includes the steps of providing a cell material comprising a cytotoxic cell, incubating the cell material with a first GNC protein to provide an activated cell composition, wherein the activated cell composition comprises a first therapeutic cell, and formulating the activated cell composition to provide a therapeutic composition, wherein the therapeutic composition is substantially free of exogenous viral and non-viral DNA or RNA. The first GNC protein comprises a first cytotoxic binding moiety and a first cancer targeting moiety, wherein the first cytotoxic binding moiety has a specificity to a first cytotoxic cell receptor and is configured to activate the first cytotoxic cell, and wherein the first cancer targeting moiety has a specificity to a first cancer cell receptor. The first therapeutic cell comprises the first GNC protein bound to the cytotoxic cell through the first cytotoxic cell receptor.
Name / Title
Company / Classification
Phones & Addresses
Hui Huang
Vanfo United Enterprises Recycling Services
2428 W 13 Ave, Vancouver, BC V6K 2S8 (604)7168618
Hui Yi Huang President
Lux Health Care and Acupuncture, Inc
10580 S De Anza Blvd, Cupertino, CA 95014
Hui Chan Huang President
STANLEY TRAVEL SERVICES, INC
654 Pacific Ave #6, San Francisco, CA 94133
Hui Huang Director, Vice President
Sinocoking Coal and Coke Chemical Industries, Inc
Hui Huang Principal
Dan Cleaner Repair Services · Dry Cleaning
299 Gates St, San Francisco, CA 94110 (415)2060668