`____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________
`
`EMC CORPORATION, EMC INTERNATIONAL US. HOLDINGS, INC. and
`VMWARE, INC.
`Petitioners
`
`v.
`
`CLOUDING CORP.
`Patent Owner
`
`____________
`
`Case IPR2014-01218
`
`Patent 7,254,621 B1
`
`REPLY DECLARATION OF DR. BENJAMIN GOLDBERG
`
`1
`
`EMC 1022
`EMC Corp. v. Clouding Corp.
`IPR2014-01218
`
`
`
`
`
`
`
`
`
`
`
`Table of Contents
`
`I. Qualifications .....................................................................................................3
`II. Subject Matter of this Declaration ..................................................................4
`III. Materials Considered ......................................................................................5
`IV. I Agree with the PTAB’s Claim Construction ..............................................6
`V. Schilit Anticipates the Challenged Claims of the ’621 Patent Under
`Patent Owners’s Claim Construction ....................................................................8
`VI. The Dependent Claims ..................................................................................14
`VII. Schilit Addresses the Same Problems as the ’621 Patent .........................17
`VIII. Conclusion ...................................................................................................21
`
`
`
`
`
`
`
`2
`
`
`
`
`
`I.
`
`Qualifications
`
`1.
`
`I am a tenured Associate Professor in the Department of Computer
`
`Science of the Courant Institute of Mathematical Sciences, New York University
`
`(“NYU”), in New York, NY. I have held this position since September 1994.
`
`From 1987 to 1994, I was an Assistant Professor in the Department of Computer
`
`Science at NYU. Since September 1, 2014, I have served as the Director of
`
`Graduate Studies for the MS program for the Department of Computer Science,
`
`having previously served in the capacity from September 2009 throught August
`
`2012. I served as the Director of Undergraduate Studies for the Department of
`
`Computer Science from September 1995 through August 1998 and from
`
`September 2003 through August 2006. In addition, I have held a one-year visiting
`
`professorship at the Institut National de Recherche en informatique et en
`
`Automatique (INRIA), a national laboratory in France, and was twice appointed to
`
`a month-long position as an invited professor at the Ecole Normale Supérieur, a
`
`university in Paris.
`
`2.
`
`I received my Doctoral degree in Computer Science from Yale
`
`University, New Haven, Connecticut in 1988, having previously received Master
`
`of Science and Master of Philosophy degrees in Computer Science from Yale in
`
`1984. My undergraduate degree from Williams College in 1982 was a Bachelor of
`
`Arts degree with highest honors in Mathematical Sciences.
`
`
`
`3
`
`
`
`
`
`3.
`
`I have taught courses at the undergraduate and graduate level in
`
`programming languages, embedded systems (including mobile devices), operating
`
`systems, hardware design, and other areas related to the technology of the ’621
`
`patent. Additional information concerning the computer science courses that I
`
`have taught, my professional publications and presentations in the field of
`
`computer science, and cases in which I have testified as an expert at trial or
`
`deposition in the past four years are set forth in my current Curriculum Vitae, a
`
`copy of which is attached as Exhibit A.
`
`4.
`
`I am being compensated at a rate of $450 per hour for my work in this
`
`matter. My compensation is in no way conditioned on the outcome of this matter.
`
`II.
`
`Subject Matter of this Declaration
`
`5.
`
`I have been asked to consider and formulate responses to the
`
`arguments set forth in the March 23, 2015 Patent Owner Response to Petition for
`
`Inter Partes Review Of U.S. Patent No. 7,254,621 (“the PO response”) and to the
`
`opinions expressed in the March 23, 2015 Declaration Of Scott M. Nettles, Ph.D.
`
`(“the Nettles declaration”) regarding the validity of US Patent 7,254,621 (“the ’621
`
`patent”).
`
`6.
`
`In the July 29, 2014 Declaration of Dr. Benjamin Goldberg (“my
`
`opening declaration”), I expressed opinions regarding the meaning of certain terms
`
`of the challenged claims of the ’621 patent as well as opinions regarding the
`
`
`
`4
`
`
`
`
`
`anticipation of the challenged claims of the ’621 patent by US Patent 6,670,968
`
`(“Schilit”).
`
`7.
`
`After considering the PO response and the Nettles declaration, as well
`
`as the PTAB’s Institution of Inter Partes Review decision (“PTAB decision”), my
`
`opinions regarding the anticipation of the ’621 patent have not changed. That is,
`
`under the claim construction set forth in the PTAB decision, which is consistent
`
`with the opinions I expressed in my opening declaration, it is still my opinion that
`
`Schilit anticipates the challenged claims of the ’621 patent.
`
`8.
`
`Finally, as discussed in detail below, even if the PTAB were to
`
`ultimately adopt the claim construction proposed by the patent owner in the PO
`
`response and supported by Dr. Nettles in the Nettles declaration, it would still be
`
`my opinion that Schilit anticipates the challenged claims of the ’621 patent.
`
`III. Materials Considered
`
`9.
`
`In formulating the opinions expressed in this declaration, I have
`
`considered the PTAB decision, the PO response, the Nettles Declaration, the ’621
`
`patent, the Schilit patent, and the transcript of the May 11, 2015 deposition of Scott
`
`Nettles. I had previously also considered those materials listed in my opening
`
`declaration.
`
`
`
`5
`
`
`
`
`
`IV.
`
`I Agree with the PTAB’s Claim Construction
`
`10. The PTAB decision states, “although independent claims 1, 9, and 17
`
`do require that the steps and elements recited therein, other than the receiving step
`
`and the receive step, be responsive to the same data access request, they do not
`
`preclude either receiving additional data access requests or having steps performed
`
`in response to another request.” (PTAB Decision, p. 8). I agree with this
`
`construction, since one of skill would understand that the claims can be satisfied
`
`even if the references to the data manipulation operations for the data that was
`
`obtained (e.g. by a proxy) in response to the original data request are returned to
`
`the pervasive device after a subsequent request.
`
`11. The patent owner writes (PO response, p. 8),
`
`From the standpoint of the person of ordinary skill in the art, the claims of the
`’621 patent recite methods, systems, and computer-readable media
`embodying computer program instructions that provide for the return of
`references to the determined data manipulation operations in response to the
`same data access request from a pervasive device. Ex. 2001 at ¶ 30, 38-40.
`The “requested data” is synonymous with the “obtained data;” indeed, it is the
`only “data” found in the claims. Id. at ¶ 40. The Board acknowledges this by
`stating its agreement that “all recitations of ‘data’ referenced in independent
`claim 1 are to the same data access request.” Paper 10 at 7.
`
`The cited paragraphs of the Nettles declaration, at ¶ 30, 38-40, echo the patent
`
`owner’s argument. I disagree with the patent owner and Dr. Nettles. There is no
`
`
`
`6
`
`
`
`
`
`dispute that the obtained data refers to the data requested in the original data access
`
`request, and that the data manipulation operations are determined for that same
`
`obtained data. However, contrary to the position of the patent owner and Dr.
`
`Nettles, in my opinion one of skill would understand that claims 1, 9 and 17 do not
`
`dictate when the “obtaining”, “determining” and “providing” steps occur. That is,
`
`although all three steps could occur in response to the original data access request
`
`and without any intervening requests, the claims do not mandate it. One of skill
`
`would understand that a method or system in which the “obtaining”, “determining”
`
`and/or “providing” steps occur in response to additional access requests – as long
`
`as the obtained data is the requested data of the original request and the data
`
`manipulation operations are determined for the same obtained data – would fall
`
`within the scope of claims 1, 9, and 17 of the ’621 patent.
`
`12. Furthermore, the ’621 patent specification states, “changes may be
`
`made to the logic that is illustrated therein (for example, by altering the order of
`
`operations shown in some cases, by combining operations, etc.) without deviating
`
`from the inventive concepts disclosed herein” (’621 patent, 4:57-60), supporting
`
`the position that the embodiment in the specification is not the only possible
`
`embodiment satisfying the claim limitations.
`
`
`
`7
`
`
`
`
`
`V.
`
`Schilit Anticipates the Challenged Claims of the ’621
`
`Patent Under Patent Owner’s Claim Construction
`
`13. As explained in my opening declaration, it is my opinion that Schilit
`
`anticipates the challenged claims of the ’621 patent under the claim constructions
`
`that were adopted by the PTAB in this proceeding and in prior proceedings. I see
`
`nothing in the patent owner’s response or the Nettles declaration that disputes that
`
`Schilit anticipates independent claims 1, 9, and 17 (and various dependent claims)
`
`of the ’621 patent under the PTAB’s constructions, thus I do not discuss it further
`
`here.
`
`14. Even if the PTAB were to adopt the patent owner’s proposed
`
`constructions, it is still my opinion that Schilit anticipates the challenged claims of
`
`the ’621 patent. The PO response and the Nettles declaration consider one of the
`
`scenarios disclosed in Schilit, starting at the user’s request for the FXPAL web
`
`page and ending with services for a publication entitled “Interaction Revisited”
`
`being provided to the pervasive device after the user has clicked on the
`
`“publications” link and the “Hypertext Interact...” link. However, as I discuss
`
`below, what the patent owner and Dr. Nettles don’t consider is that part of this
`
`scenario discloses the claim limitations of the independent claims without any
`
`additional data access requests after a first data access request.
`
`15. Dr. Nettles writes (Nettles declaration, ¶ 56),
`
`
`
`8
`
`
`
`
`
`As explained above, Schilit describes a process in which a user of a mobile
`device must engage in a series of request-response operations with an m-link
`browser in order to obtain access to data manipulation operations available for
`the obtained data. See for example Ex. 1006 at 8:60-65 and Figs. 6A-6C
`(showing access to “the services made available by m-link for the document”
`only after the user clicks through two menus). Each click/selection of a menu
`constitutes a data access request across the network because the m-link
`browser is not local to the device. Thus the method disclosed in Schilit
`requires multiple data access requests (even after obtaiing [sic] the requested
`data) from the pervasive device before allowing the pervasive device to
`receive access to any data manipulation operations.
`
`That is, the scenario that the patent owner and Dr. Nettles consider is the
`
`following, illustrated by figures 6A-C from Schilit along with my annotations.
`
`
`
`16. However, within the above scenario in Schilit is a disclosure of a first
`
`data access request that results in the obtaining of the requested data, the
`
`
`
`9
`
`
`
`
`
`determining what data manipulation operations are available for the obtained data,
`
`and the providing of references to the determined data manipulation operations to
`
`the pervasive device – without any additional data access requests. This disclosure
`
`in Schilit is illustrated below by figures 6B-C of Schilit along with my annotations.
`
`
`That is, when the data access request of the “receiving” step of claims 1, 9, and 17
`
`
`
`of the ’621 patent is considered to be the request sent to the m-link browser as a
`
`result of the user clicking on the “Hypertext interact...” link shown in Schilit Fig.
`
`6B, above, the services (references to data manipulation operations) for the
`
`“Hypertext interaction revisited” publication – such as “read”, “print”, “fax”, etc. –
`
`are provided to the pervasive device without any further data access requests.
`
`17. A corresponding disclosure within the Schilit specification is the
`
`following (Schilit, 8:51-65).
`
`
`
`10
`
`
`
`
`
`
`
`
`
`The above passage discloses that when a link (such as the “hypertext interact...”
`
`link of Fig. 6B) is selected, the m-link browser uses the URL to access (obtain) the
`
`requested content from a Web server, fetches the services for that content from a
`
`database, and returns the services to the pervasive device to be displayed as shown
`
`in Fig. 6C.
`
`18. There are several additional disclosures in Schilit in which, in
`
`response to a single data request from the pervasive device and with no subsequent
`
`data requests, the m-link browser performs all the steps of claims 1, 9 and 17 and
`
`provides references to the data manipulation operators to the pervasive device. For
`
`example, a disclosure in Schilit is the following (Schilit, 8:4-21).
`
`
`
`11
`
`
`
`
`
`
`The above passage discloses that, in response to a single request from the
`
`
`
`pervasive device for the FXPAL web page, the m-link browser returns to the
`
`pervasive device the telephone number (requested data) from the FXPAL web
`
`page, together with a link (reference to a data manipulation operation) such that, if
`
`the user clicks on the phone number, the mobile phone will dial the number. This
`
`scenario can be illustrated as follows.
`
`
`
`12
`
`
`
`
`
`
`
`
`19. Yet another disclosure in Schilit which anticipates claims 1, 9 and 17
`
`of the ’621 patent – even under patent owner’s proposed claim constructions – is
`
`the following (id., 8:22-36).
`
`
`The above passage discloses that, in response to the user clicking “FX Palo Alto
`
`
`
`Labor...” (data access request), the m-link browser returns to the mobile phone the
`
`address (requested data) from the FXPAL web page, together with links to services
`
`(references to data manipulation operations) for that address, such as a providing a
`
`map locating the address. This scenario can be illustrated as follows.
`
`
`
`13
`
`
`
`
`
`VI.
`
`The Dependent Claims
`
`
`
`20. Regarding claims 8, 16, and 24 of the ’621 patent, the patent owner
`
`writes (PO response, pp. 14-15),
`
`Claims 8, 16, and 24 each depend on independent claims 1, 9, and 17,
`respectively, and recite the additional steps of:
`
`perform[ing] one or more data manipulation operations on the obtained data,
`thereby creating transformed data;
`
`determin[e/ing] what data manipulation operations are available for the
`transformed data; and
`
`provid[e/ing] references to the determined data manipulation operations for
`the transformed data to the pervasive device.
`
`Ex. 1001 at 19:22-29, 20:14-26, and 20:53-61.
`
`The “transformed data” recited in these claims is data that has been created by
`performing one of the recited data manipulation operations on the “obtained
`data” (i.e., the data obtained in response to the original data access request).
`Schilit does not describe any corresponding process. For example, while
`Schilit does disclose providing a list of links extracted from a web page in
`response to a request from a pervasive device, see Ex. 1006 at Figs. 6A-C, a
`person of ordinary skill in the art would not consider merely extracting links
`from a document to constitute performing one of the data manipulation
`operations. Ex. 2001 at ¶ 58. Indeed, the links are extracted before the data
`manipulation operations even become available for selection. Ex. 1006 at
`5:34-37; 8:50-51. Thus, claims 8, 16 and 24 cannot be anticipated by Schilit.
`
`
`
`14
`
`
`
`
`
`In support, Dr. Nettles states, “a person of ordinary skill in the art would not
`
`consider merely extracting links from a document to constitute performing one of
`
`the data manipulation operations. For example, the links are extracted and
`
`provided to the pervasive device before the data manipulation operations available
`
`for the subject web page are even determined.” (Nettles declaration, ¶ 58).
`
`21.
`
`I disagree with the patent owner and Dr. Nettles because they appear
`
`to have misread the claim language. The “performing” step of the dependent
`
`claims applies data manipulation operations to the obtained data to create the
`
`transformed data and the “determining” and “providing” steps recite data
`
`manipulation operations for the transformed data – but there is no relationship
`
`between (1) the “data manipulation” operations performed on the “obtained” data
`
`to create the “transformed data” and (2) the data manipulation operations for the
`
`transformed data. The “data manipulations” in the steps of the dependent claims
`
`requiring “performing one or more data manipulations on the obtained data” to
`
`create “transformed data” have no antecedent basis in the independent claims, and
`
`hence are not “recited.” (’621 patent, claims 8, 16 and 24). They are not the
`
`“determined data manipulation operations” of the independent claims. (’621
`
`patent, claims 1, 9 and 17). Instead, these are independent “data manipulation
`
`operations” which create “transformed data” from the obtained data. It is this
`
`“transformed data” of the dependent claims which is then further made subject to
`
`
`
`15
`
`
`
`
`
`the step “determining what data manipulations are available.” If the determined
`
`data manipulation operations in the independent claims and the “one or more data
`
`manipulations” of the dependent claims were intended to be the same, then the
`
`“performing” step would recite “the data manipulation operations” or “said data
`
`manipulation operations”. With no definite article before “data manipulation
`
`operations” in the “performing” step of the dependent claims, the data
`
`manipulation operations have no antecedent in the independent claims.
`
`22. Given this correct reading of the claims, one of skill would certainly
`
`understand that extracting links from a document and creating new links from
`
`certain data in the document (e.g. phone numbers and addresses), as Schilit
`
`discloses, are data manipulation operations that create transformed data as recited
`
`in the “performing” step. Furthermore, the argument set forth by Dr. Nettles that
`
`“the links are extracted and provided to the pervasive device before the data
`
`manipulation operations available for the subject web page are even determined”
`
`(Nettles declaration, ¶ 58) doesn’t hold because the data manipulation operations to
`
`extract the links have nothing to do with the data manipulation operations available
`
`for the subject web page. Thus, it is still my opinion that Schilit anticipates
`
`dependent claims 8, 16, and 24 for the reasons stated in my opening declaration
`
`and the claim chart cited therein.
`
`
`
`16
`
`
`
`
`
`VII.
`
`Schilit Addresses the Same Problems as the ’621 Patent
`
`23. As part of his argument that Schilit does not anticipate the challenged
`
`claims of the ’621 patent, Dr. Nettles asserts that Schilit and the ’621 patent sought
`
`to solve different problems – and thus the inventions of Schilit and ’621 patent are
`
`different. I disagree with this position, since Schilit and the ’621 patent are
`
`directed at precisely the same problems – namely allowing users of pervasive
`
`devices with limited capabilities to access data, such as web pages or documents,
`
`and to utilize services, such as printing, on that data1. Furthermore, as described in
`
`my opening declaration, Schilit and the ’621 patent disclose the same solution to
`
`these problems – namely providing a proxy (which Schilit refers to as the m-link
`
`browser) that performs much of the necessary computation that the pervasive
`
`devices are not capable of.
`
`
`1 I understand that “big picture” arguments, such as those presented by the patent
`
`owner and Dr. Nettles, are not necessarily germane to a claim anticipation analysis
`
`and, rather, it is the recited limitations of the claims themselves that are the focus
`
`of such an analysis. However, I have been asked to respond to these “big picture”
`
`arguments to the extent that they mischaracterize the disclosure of the Schilit
`
`patent.
`
`
`
`17
`
`
`
`
`
`24. For example, Dr. Nettles states (Nettles declaration, ¶¶ 60-61),
`
`“Looking at the ’481/’621 patents we see that the goal was to allow potentially
`
`very limited capacity pervasive nodes [to] access and manipulate complex data that
`
`they could not otherwise handle. [...] In contrast, Schilit focuses on browsing
`
`using some of the same kinds of devices. However, the key resource that is limited
`
`is screen space and the activity not general data access and manipulation, but rather
`
`browsing by a human.” I disagree with Dr. Nettles for several reasons. First,
`
`Schilit discloses many of the same constraints on pervasive devices that the ’621
`
`patent does, not just limited screen space. For example, in describing the WML
`
`protocol used to allow mobile devices to access web pages, Schilit states that
`
`WML is “intended for use in specifying content and user interface for narrowband
`
`devices, including cellular telephones and pagers, to allow users mobile access to
`
`the resources of the Internet.” (Schilit, 2:31-34). One of skill would understand a
`
`“narrowband device” to be a device with limited (low data-rate) communication
`
`capabilities. Furthermore, Schilit recites additional constraints on mobile devices,
`
`including “limits of transmission bandwidth, storage requirements, screen size and
`
`resolution on mobile handheld devices.” (id., 2:53-55).
`
`25. Second, the operations disclosed by Schilit are not limited to
`
`browsing. For example, just as in the ’621 patent, Schilit discloses printing of the
`
`obtained data – as well as reading, faxing, and emailing (Schilit, Fig. 6C).
`
`
`
`18
`
`
`
`
`
`
`For these reasons, I disagree with Dr. Nettles’ characterization of Schilit, that “the
`
`key resource that is limited is screen space and the activity not general data access
`
`and manipulation, but rather browsing by a human.” (Nettles declaration, ¶61.) In
`
`my opinion, the resource limitations and the supported activities disclosed in the
`
`’621 patent and in Schilit are essentially the same.
`
`26. Dr. Nettles also attempts to distinguish the ’621 patent from Schilit in
`
`terms of the number of messages exchanged between the pervasive device and the
`
`proxy in their respective preferred embodiments – particularly that by always
`
`sending the data manipulation operations to the pervasive device after the initial
`
`request, the ’621 proxy is able to minimize the communication overhead. I
`
`disagree with Dr. Nettles, since the Schilit patent discloses the scenario discussed
`
`above where the m-link browser sends the data manipulation operations (services)
`
`to the pervasive device after a single data access request.
`
`
`
`19
`
`
`
`
`
`27. To differentiate the ’621 patent from Schilit, Dr. Nettles writes, “it is
`
`evident that how these two systems handle requests and responses is very different.
`
`The ’481/’621 patents use a minimal message exchange optimizing the limited
`
`resources of the pervasive device, while Schilit uses a more costly iterative
`
`approach that is deemed to best facilitate the browsing process.” (Nettles
`
`declaration, ¶ 62). I disagree, since in the Schilit system – once a user issues a
`
`request for data (e.g. the “Hypertext interaction revisited” document) – the services
`
`for the data (e.g. “read”, “print”, “fax”, etc.) are provided to the pervasive device
`
`without any additional requests. Further, although Dr. Nettles is correct that
`
`distributed algorithms are often evaluated in terms of the number of message sent,
`
`this is an oversimplification which is often useful for analytical purposes. In
`
`practice, one of skill would understand that given a substantial amount of data (e.g.
`
`a large web page), it may be more efficient to send a short message representing
`
`some information extracted from the data, in order to preserve the possibility that
`
`the rest of the data won’t have to be sent. In fact, Schilit discloses that the very
`
`purpose for extracting links from a web page for sending to the pervasive device is
`
`to reduce communication overhead, saying (Schilit, 11:11-13), “To minimize
`
`transmissions over relatively low-bandwidth wireless connections, the m-link
`
`browser typically separates and transmits links to mobile-devices, as indicated
`
`above.” (emphasis added). Similarly, there may be scenarios in which it is more
`
`
`
`20
`
`
`
`
`
`efficient for the proxy to receive multiple data access requests before returning the
`
`references to the data manipulation operations to the pervasive device, such as (1)
`
`allowing the user to specify a subset of the possible data manipulation operations
`
`that he or she is interested in using (e.g., if there are too many possible data
`
`manipulation operations to be displayed on the screen), and (2) allowing the user to
`
`specify which part of the requested data he or she is interested in, which may
`
`determine what data manipulation operations to return.
`
`28. For the reasons given above, I disagree with Dr. Nettles about the
`
`differences in the “big picture” between the ’621 patent and Schilit. They both
`
`sought to solve the same problems and disclosed essentially the same mechanisms
`
`for doing so.
`
`VIII. Conclusion
`
`I hereby declare that all statements made herein of my own knowledge are true and
`
`that all statements made on information and belief are believed to be true, and
`
`further that these statements were made with the knowledge that willful false
`
`statements and the like so made are punishable by fine or imprisonment, or both,
`
`under Section 1001 of Title 18 of the United States Code.
`
`Dated: June 22, 2015
`
`
`
`
`Dr. Benjamin Goldberg
`
`
`
`21
`
`
`
`EXHIBIT A
`Curriculum Vitae
`BENJAMIN F. GOLDBERG
`Courant Institute of Mathematical Sciences
`Department of Computer Science
`New York University
`251 Mercer Street
`New York, New York 10012
`Phone: (212) 998-3495
`Fax: (212) 995-4121
`Email: goldberg@cs.nyu.edu
`http://cs.nyu.edu/goldberg
`
`
`Personal
`Born January 31, 1961, Las Cruces, New Mexico.
`U.S. Citizen.
`
`Education
`Ph.D. in Computer Science, Yale University, 1988. Dissertation: "Multiprocessor Execution of
`Functional Programs."
`M.S. and M.Phil in Computer Science, Yale University, 1984.
`B.A. with Highest Honors in Mathematical Sciences, Williams College, Cum Laude, Phi Beta
`Kappa, Sigma Xi, June 1982. Honors Thesis: "Theory and Implementation of an Automatic
`Program Verifier."
`
`Employment
`Associate Professor (Tenured), Courant Institute of Mathematical Sciences, Department of
`Computer Science, New York University. September 1994 – Present.
`Invited Professor, Ecole Normale Supérieur, Paris, France. June 2007 – July 2007 and
`June 2003 – July 2003.
`Director of Graduate Studies (for the MS programs), Department of Computer Science, New York
`University. September 2009 – August 2012 and September 2014 – present.
`Director of Undergraduate Studies, Department of Computer Science, New York University.
`September 1995 – August 1998 and September 2003 – August 2006.
`Visiting Professor, Institute National de Recherche en Informatique et en Automatique (INRIA),
`Rocquencourt, France. September 1994 – August 1995.
`Assistant Professor, Courant Institute of Mathematical Sciences, Department of Computer
`Science, New York University. September 1987 - August 1994.
`
`
`
`Expert Testimony at Trial or Deposition in the Past Four Years
`Retained by Orrick on behalf of EMC and VMware in the matter of Clouding v. EMC et al. (Inter
`Partes Review before the PTO), June 2014 – present.
`Retained by Quinn Emanuel and Perkins Coie on behalf of Samsung, Google, and HTC in the
`matter of Smartflash v. Samsung et al. April 2014 – present.
`Retained by Kenyon & Kenyon on behalf of Advanced Ground Information Systems (AGIS) in the
`matter of AGIS v. Life360 (Patent Litigation). August 2014 – present.
`Retained by Milbank Tweed on behalf of Apple in the matter of Wi-LAN v. Apple, February 2014 –
`September 2014.
`Retained by Boies Schiller on behalf of InfoSpan in the matter of InfoSpan v. Emirates NBD Bank,
`September 2013 – present.
`Retained by Boies Schiller on behalf of Apple in the matter of Apple v. Personal Web
`Communications (Inter Partes Review before the PTO), August 2013 – present.
`Retained by Cooley on behalf of Apple in the matter of GBT v. Apple, October 2013 – June 2014.
`Retained by Quinn Emanuel on behalf of Toshiba in the matter of Certain Digital Media Devices,
`Including Televisions, Blu-Ray Disc Players, Home Theater Systems, Tablets and Mobile Phones,
`Components Thereof and Associated Software (Black Hills Media v. Toshiba et al). International
`Trade Commission. September 2013 – February 2014.
`Retained by Wilson Sonsini on behalf of Sasken in the matter of Sasken v. Spreadtrum. American
`Arbitration Association. July 2013 – January 2014.
`Retained by Sheppard Mullin on behalf of HTC and Apple in the matter of Wi-LAN v. HTC et al.
`June 2013 – October 2013.
`Retained by Bingham McCutchen on behalf of Oracle America in the matter of Oracle America v.
`Service Key et al. March 2013 – September 2013.
`Retained by Latham & Watkins on behalf of InterDigital Communications, Inc. in the matter of
`Certain Wireless Devices with 3G Capabilities and Components Thereof (InterDigital v. Huawei et
`al). International Trade Commission, December 2011 – February 2013.
`Retained by Ballard Spahr on behalf of Go Daddy in the matter of WhitServe v. Go Daddy. August
`2011 – June 2013.
`Retained by Kenyon & Kenyon on behalf of Barnes & Noble in the matter of Deep9 v. Barnes &
`Noble. February 2012 – August 2012.
`Retained by Gibson Dunn & Crutcher on behalf of Lawson Software in the matter of ePlus v
`Lawson Software. October 2011 – April 2013.
`Retained by Kenyon & Kenyon on behalf of Barnes & Noble in the matter of Certain Handheld
`Electronic Computing Devices, Related Software, and Components Thereof (Microsoft v. Barnes &
`Noble), International Trade Commission. August 2011 – February 2012.
`Retained by Morrison & Foerster on behalf of Oracle America in the matter of Oracle America v.
`Google. August 2011 – May 2012.
`
`
`
`2
`
`
`
`Retained by Jones Day on behalf of Nielsen in the matter of comScore v. Nielsen et al. May 2011
`– November 2011.
`Retained by Kellogg Huber on behalf of Verizon in the matter of ActiveVideo Networks v. Verizon
`Communications. February 2011 – July 2011.
`Retained by Hughes Hubbard & Reed on behalf of SyncSort in the matter of SyncSort v. IRI.
`September 2005 – March 2011.
`
`Teaching Awards
`New York University "Golden Dozen" Award, 1992. Awarded to twelve faculty members in the
`entire College of Arts and Sciences for excellence in teaching.
`
`Professional Activities
`Editorial Board, The Computer Journal. Published by Oxford University Press on behalf of the
`British Computer Society. 2007 – 2009.
`Program Committee member: 2007 Symposium on Principles of Programming Languages (POPL)
`External Review Committee member: 2013 Symposium on Principles of Programming Languages
`(POPL)
`Program Committee member: 2001 Workshop on Practical Applications of Declarative Languages
`(PADL'01), ACM SIGPLAN'95 Conference on Programming Language Design and
`Implementation, 1995 ACM SIGPLAN Symposium on Partial Evaluation and Semantics-Based
`Program Manipulation (PEPM '95), 1995 International Workshop on Memory Management
`(IWMM'95), ACM SIGPLAN'93 Conference on Programming Language Design and
`Implementation.
`Review Panel Member, National Science Foundation, January 1998 and January 2000.
`Official Collaborator, Los Alamos National Laboratory, Computing and Communications Division.
`Member, Association for Computing Machinery and ACM Special Interest Group on Programming
`Languages (SIGPLAN).
`Referee for: ACM TOPLAS, IEEE Computer, International Journal of Parallel Programming,
`Software Practice and Experience, Computational Intelligence, ACM TOCS, ACM Computing
`Surveys, etc.
`Referee for a variety of ACM and IEEE conferences.
`
`Journal Papers
`"Translation and Run Time Validation of Optimized Code'', with L. Zuck, A. Pnueli, C. Barrett, Y.
`Fang, and Y. Hu, Formal Methods in System Design. 27(3): 335-360, November 2005
`"VOC: A Methodology for Translation Validaton of Optimizing Compilers'', with L. Zuck, A. Pnueli,
`and Y. Fang. Journal of Universal Computer Science, March 2003.
`"A Syntactic Method for Finding Least Fixed Points o