scispace - formally typeset
Search or ask a question
Author

Bimal Mehta

Bio: Bimal Mehta is an academic researcher from Microsoft. The author has contributed to research in topics: Server farm & Failover. The author has an hindex of 14, co-authored 32 publications receiving 847 citations.

Papers
More filters
Patent•
David G. Green1, Bimal Mehta1, Satish R. Thatte1, Dharma Shukla1, Abhay Parasnis1 •
31 Jan 2005
TL;DR: In this paper, a flow-based and constraint-based region is designed and executed by a user to select one or more activities to be part of a constraintbased region and each constraint has a constraint associated therewith.
Abstract: Designing and executing a workflow having flow-based and constraint-based regions. A user selects one or more activities to be part of a constraint-based region. Each constraint-based region has a constraint associated therewith. The workflow is executed by executing the flow-based region and the constraint-based region. The flow-based region executes sequentially. The constraint is evaluated, and the constraint-based region executes responsive to the evaluated constraint.

135 citations

Patent•
Lucius Gregory Meredith1, Amit Mital1, Marc Levy1, Brian C. Beckman1, Anthony D. Andrews1, Bimal Mehta1 •
28 Apr 2000
TL;DR: In this article, a hierarchical transaction commit rule allowing access to the data associated with an action in the schedule according to a transaction boundary and the state of the action is provided. And the method comprises selectively compensating at least one action according to the compensation parameter and at least 1 transaction boundary after abortion of another action, and selectively monitoring the schedule execution based on the schedule information obtained from the storage medium.
Abstract: A method for executing a schedule in a workflow application is provided. The method comprises a hierarchical transaction commit rule allowing access to the data associated with an action in the schedule according to a transaction boundary and the state of the action. The invention further comprises selectively compensating at least one action according to a compensation parameter and at least one transaction boundary after abortion of another action. The invention further provides storing schedule state information to a storage medium based on a transaction boundary within the schedule. In addition, the invention provides for selectively obtaining at least a portion of the schedule state information from the storage medium, and selectively monitoring the schedule execution based on at least a portion of the schedule information obtained from the storage medium. Further provided, is a computer-readable medium having computer-executable instructions for performing the steps of the above methods.

115 citations

Patent•
05 Sep 2007
TL;DR: In this paper, a centralized policy and control conferencing component allows the seamless plug-in of different distributed media components (e.g., data, audio/video, messaging) to accommodate client participation in a conference session.
Abstract: Architecture for a scalable, pluggable multi-party, and distributed multimedia conferencing. A centralized policy and control conferencing component allows the seamless plug-in of different distributed media components (e.g., data, audio/video, messaging) to accommodate client participation in a conference session. The centralized conference control component includes the following: a conference notification service for accepting subscriptions to the conference state and notifying subscribers about changes to that state; a conference policy and roster control service for storing and manipulating conference policy and rosters; a security service for user authorization/authentication based on user identity information; a scheduling service for conference scheduling; an allocation service for allocating the most available media component(s) for a conference session; and, an MCU management service for conference policy and roster management of the distributed media components.

97 citations

Patent•
30 Mar 2005
TL;DR: In this paper, an error-handling framework for business process transactions is presented, which facilitates coordination of the invocation of exception and compensation handlers in response to errors, including custom ordering of compensation actions, data flow into and out of compensation action, and management of the process state visible to compensation actions.
Abstract: An error-handling framework is provided for business process transactions. The error-handling framework facilitates coordination of the invocation of exception and compensation handlers in response to errors. The error-handling framework includes support for custom ordering of compensation actions, data flow into and out of compensation actions, and management of the process state visible to compensation actions.

86 citations

Patent•
08 May 2002
TL;DR: In this paper, the authors describe a system and methodologies for routing messages in a communications framework, which can include one or more computers, and determine whether and where to route messages based at least in part upon the content of messages.
Abstract: Systems and methodologies are disclosed to facilitate for routing messages in a communications framework, which can include one or more computers. Determinations as to whether and where to route messages are based at least in part upon the content of messages. Services interested in receiving messages specify one or more subscriptions, which are employed to make routing decisions for messages. The subscriptions are evaluated relative to messages, and more particularly content based message properties of respective messages, to determine whether and where to route messages.

67 citations


Cited by
More filters
Patent•
14 Jun 2005
TL;DR: In this article, a system and method to detect and prevent fraud in a system is described, which may uniquely identify physical devices connecting to a network, register unique devices, track end-user logins, associate enduser accounts with specific devices, and share information with multiple network service providers.
Abstract: A system and method to detect and prevent fraud in a system is provided. The system may uniquely identify physical devices connecting to a network, register unique devices, track end-user logins, associate end-user accounts with specific devices, and share information with multiple network service providers is described.

295 citations

Patent•
28 Mar 2008
TL;DR: In this article, a storage access control system leverages a preexisting security infrastructure of a system to inform the proper access control that should be applied to data stored outside of its original location, such as a data backup.
Abstract: A method and system for controlling access to stored data is provided. The storage access control system leverages a preexisting security infrastructure of a system to inform the proper access control that should be applied to data stored outside of its original location, such as a data backup. The storage access control system may place similar access control restrictions on the backup files that existed on the original files. In this way, the backed up data is given similar protection as that of the original data.

249 citations

Patent•
16 Apr 2013
TL;DR: A cloud-based infrastructure facilitates gathering, transmitting, and remote storage of control and automation data using an agent-based communication channel as mentioned in this paper, which collects the industrial data from an industrial enterprise and intelligently sorts and organizes the acquired data based on selected criteria.
Abstract: A cloud-based infrastructure facilitates gathering, transmitting, and remote storage of control and automation data using an agent-based communication channel. The infrastructure collects the industrial data from an industrial enterprise and intelligently sorts and organizes the acquired data based on selected criteria. Message queues can be configured on the cloud platform to segregate the industrial data according to priority, data type, or other criteria. Behavior assemblies stored in customer-specific manifests on the cloud platform define customer-specific preferences for processing data stored in the respective message queues. An agent-based analytics framework in the cloud platform performs desired analytics on the data using distributed parallel processing.

249 citations

Patent•
16 Sep 2003
TL;DR: In this paper, the authors present a system and method for transferring data in a library storage system, where a plurality of storage media and a data source are connected to the media agent.
Abstract: A system and method for transferring data in a library storage system. The library storage system comprises a management server including a storage policy. A media agent is connected to the management server. A plurality of storage media and a data source are connected to the media agent. The data source is divided into at least a first and a second portion of data. The portions of data are transferred from the data source to a first and second primary storage medium using a first and a second data stream respectively. The media agent then causes the first and second portion of data to be transferred from the first and second storage medium to a third auxiliary storage medium using a third combined data stream. Auxiliary copying is performed in chunks and multiple streams are copied in parallel.

236 citations

Patent•
25 Feb 2009
TL;DR: In this article, the authors enable desktop and/or application sharing in enhanced communication systems using Session Initiation Protocol (SIP) and Remote Desktop Protocol (RDP) protocols by tunneling RDP packets through an Interactive Connection Establishment (ICE) channel built-in within the RTP, thus allowing RDP sessions to traverse Network Address Translators (NATs) or firewalls.
Abstract: Endpoints are enabled to facilitate desktop and/or application sharing in enhanced communication systems using Session Initiation Protocol (SIP) and Remote Desktop Protocol (RDP) protocols by tunneling RDP packets through an Interactive Connection Establishment (ICE) channel built-in within the Real-time Transport Protocol (RTP), thus allowing RDP sessions to traverse Network Address Translators (NATs) or firewalls.

170 citations