throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________
`
`EMC CORPORATION, EMC INTERNATIONAL US. HOLDINGS, INC. and
`VMWARE, INC.
`Petitioners
`
`v.
`
`CLOUDING CORP.
`Patent Owner
`
`____________
`
`Case IPR2014-01218
`
`Patent 7,254,621 B1
`
`REPLY DECLARATION OF DR. BENJAMIN GOLDBERG
`
`1
`
`EMC 1022
`EMC Corp. v. Clouding Corp.
`IPR2014-01218
`
`
`
`
`
`
`
`

`
`
`
`Table of Contents
`
`I.   Qualifications .....................................................................................................3  
`II.   Subject Matter of this Declaration ..................................................................4  
`III.   Materials Considered ......................................................................................5  
`IV.   I Agree with the PTAB’s Claim Construction ..............................................6  
`V.   Schilit Anticipates the Challenged Claims of the ’621 Patent Under
`Patent Owners’s Claim Construction ....................................................................8  
`VI.   The Dependent Claims ..................................................................................14  
`VII.   Schilit Addresses the Same Problems as the ’621 Patent .........................17  
`VIII.   Conclusion ...................................................................................................21  
`
`
`
`
`
`
`
`2
`
`

`
`
`
`I.
`
`Qualifications
`
`1.
`
`I am a tenured Associate Professor in the Department of Computer
`
`Science of the Courant Institute of Mathematical Sciences, New York University
`
`(“NYU”), in New York, NY. I have held this position since September 1994.
`
`From 1987 to 1994, I was an Assistant Professor in the Department of Computer
`
`Science at NYU. Since September 1, 2014, I have served as the Director of
`
`Graduate Studies for the MS program for the Department of Computer Science,
`
`having previously served in the capacity from September 2009 throught August
`
`2012. I served as the Director of Undergraduate Studies for the Department of
`
`Computer Science from September 1995 through August 1998 and from
`
`September 2003 through August 2006. In addition, I have held a one-year visiting
`
`professorship at the Institut National de Recherche en informatique et en
`
`Automatique (INRIA), a national laboratory in France, and was twice appointed to
`
`a month-long position as an invited professor at the Ecole Normale Supérieur, a
`
`university in Paris.
`
`2.
`
`I received my Doctoral degree in Computer Science from Yale
`
`University, New Haven, Connecticut in 1988, having previously received Master
`
`of Science and Master of Philosophy degrees in Computer Science from Yale in
`
`1984. My undergraduate degree from Williams College in 1982 was a Bachelor of
`
`Arts degree with highest honors in Mathematical Sciences.
`
`
`
`3
`
`

`
`
`
`3.
`
`I have taught courses at the undergraduate and graduate level in
`
`programming languages, embedded systems (including mobile devices), operating
`
`systems, hardware design, and other areas related to the technology of the ’621
`
`patent. Additional information concerning the computer science courses that I
`
`have taught, my professional publications and presentations in the field of
`
`computer science, and cases in which I have testified as an expert at trial or
`
`deposition in the past four years are set forth in my current Curriculum Vitae, a
`
`copy of which is attached as Exhibit A.
`
`4.
`
`I am being compensated at a rate of $450 per hour for my work in this
`
`matter. My compensation is in no way conditioned on the outcome of this matter.
`
`II.
`
`Subject Matter of this Declaration
`
`5.
`
`I have been asked to consider and formulate responses to the
`
`arguments set forth in the March 23, 2015 Patent Owner Response to Petition for
`
`Inter Partes Review Of U.S. Patent No. 7,254,621 (“the PO response”) and to the
`
`opinions expressed in the March 23, 2015 Declaration Of Scott M. Nettles, Ph.D.
`
`(“the Nettles declaration”) regarding the validity of US Patent 7,254,621 (“the ’621
`
`patent”).
`
`6.
`
`In the July 29, 2014 Declaration of Dr. Benjamin Goldberg (“my
`
`opening declaration”), I expressed opinions regarding the meaning of certain terms
`
`of the challenged claims of the ’621 patent as well as opinions regarding the
`
`
`
`4
`
`

`
`
`
`anticipation of the challenged claims of the ’621 patent by US Patent 6,670,968
`
`(“Schilit”).
`
`7.
`
`After considering the PO response and the Nettles declaration, as well
`
`as the PTAB’s Institution of Inter Partes Review decision (“PTAB decision”), my
`
`opinions regarding the anticipation of the ’621 patent have not changed. That is,
`
`under the claim construction set forth in the PTAB decision, which is consistent
`
`with the opinions I expressed in my opening declaration, it is still my opinion that
`
`Schilit anticipates the challenged claims of the ’621 patent.
`
`8.
`
`Finally, as discussed in detail below, even if the PTAB were to
`
`ultimately adopt the claim construction proposed by the patent owner in the PO
`
`response and supported by Dr. Nettles in the Nettles declaration, it would still be
`
`my opinion that Schilit anticipates the challenged claims of the ’621 patent.
`
`III. Materials Considered
`
`9.
`
`In formulating the opinions expressed in this declaration, I have
`
`considered the PTAB decision, the PO response, the Nettles Declaration, the ’621
`
`patent, the Schilit patent, and the transcript of the May 11, 2015 deposition of Scott
`
`Nettles. I had previously also considered those materials listed in my opening
`
`declaration.
`
`
`
`5
`
`

`
`
`
`IV.
`
`I Agree with the PTAB’s Claim Construction
`
`10. The PTAB decision states, “although independent claims 1, 9, and 17
`
`do require that the steps and elements recited therein, other than the receiving step
`
`and the receive step, be responsive to the same data access request, they do not
`
`preclude either receiving additional data access requests or having steps performed
`
`in response to another request.” (PTAB Decision, p. 8). I agree with this
`
`construction, since one of skill would understand that the claims can be satisfied
`
`even if the references to the data manipulation operations for the data that was
`
`obtained (e.g. by a proxy) in response to the original data request are returned to
`
`the pervasive device after a subsequent request.
`
`11. The patent owner writes (PO response, p. 8),
`
`From the standpoint of the person of ordinary skill in the art, the claims of the
`’621 patent recite methods, systems, and computer-readable media
`embodying computer program instructions that provide for the return of
`references to the determined data manipulation operations in response to the
`same data access request from a pervasive device. Ex. 2001 at ¶ 30, 38-40.
`The “requested data” is synonymous with the “obtained data;” indeed, it is the
`only “data” found in the claims. Id. at ¶ 40. The Board acknowledges this by
`stating its agreement that “all recitations of ‘data’ referenced in independent
`claim 1 are to the same data access request.” Paper 10 at 7.
`
`The cited paragraphs of the Nettles declaration, at ¶ 30, 38-40, echo the patent
`
`owner’s argument. I disagree with the patent owner and Dr. Nettles. There is no
`
`
`
`6
`
`

`
`
`
`dispute that the obtained data refers to the data requested in the original data access
`
`request, and that the data manipulation operations are determined for that same
`
`obtained data. However, contrary to the position of the patent owner and Dr.
`
`Nettles, in my opinion one of skill would understand that claims 1, 9 and 17 do not
`
`dictate when the “obtaining”, “determining” and “providing” steps occur. That is,
`
`although all three steps could occur in response to the original data access request
`
`and without any intervening requests, the claims do not mandate it. One of skill
`
`would understand that a method or system in which the “obtaining”, “determining”
`
`and/or “providing” steps occur in response to additional access requests – as long
`
`as the obtained data is the requested data of the original request and the data
`
`manipulation operations are determined for the same obtained data – would fall
`
`within the scope of claims 1, 9, and 17 of the ’621 patent.
`
`12. Furthermore, the ’621 patent specification states, “changes may be
`
`made to the logic that is illustrated therein (for example, by altering the order of
`
`operations shown in some cases, by combining operations, etc.) without deviating
`
`from the inventive concepts disclosed herein” (’621 patent, 4:57-60), supporting
`
`the position that the embodiment in the specification is not the only possible
`
`embodiment satisfying the claim limitations.
`
`
`
`7
`
`

`
`
`
`V.
`
`Schilit Anticipates the Challenged Claims of the ’621
`
`Patent Under Patent Owner’s Claim Construction
`
`13. As explained in my opening declaration, it is my opinion that Schilit
`
`anticipates the challenged claims of the ’621 patent under the claim constructions
`
`that were adopted by the PTAB in this proceeding and in prior proceedings. I see
`
`nothing in the patent owner’s response or the Nettles declaration that disputes that
`
`Schilit anticipates independent claims 1, 9, and 17 (and various dependent claims)
`
`of the ’621 patent under the PTAB’s constructions, thus I do not discuss it further
`
`here.
`
`14. Even if the PTAB were to adopt the patent owner’s proposed
`
`constructions, it is still my opinion that Schilit anticipates the challenged claims of
`
`the ’621 patent. The PO response and the Nettles declaration consider one of the
`
`scenarios disclosed in Schilit, starting at the user’s request for the FXPAL web
`
`page and ending with services for a publication entitled “Interaction Revisited”
`
`being provided to the pervasive device after the user has clicked on the
`
`“publications” link and the “Hypertext Interact...” link. However, as I discuss
`
`below, what the patent owner and Dr. Nettles don’t consider is that part of this
`
`scenario discloses the claim limitations of the independent claims without any
`
`additional data access requests after a first data access request.
`
`15. Dr. Nettles writes (Nettles declaration, ¶ 56),
`
`
`
`8
`
`

`
`
`
`As explained above, Schilit describes a process in which a user of a mobile
`device must engage in a series of request-response operations with an m-link
`browser in order to obtain access to data manipulation operations available for
`the obtained data. See for example Ex. 1006 at 8:60-65 and Figs. 6A-6C
`(showing access to “the services made available by m-link for the document”
`only after the user clicks through two menus). Each click/selection of a menu
`constitutes a data access request across the network because the m-link
`browser is not local to the device. Thus the method disclosed in Schilit
`requires multiple data access requests (even after obtaiing [sic] the requested
`data) from the pervasive device before allowing the pervasive device to
`receive access to any data manipulation operations.
`
`That is, the scenario that the patent owner and Dr. Nettles consider is the
`
`following, illustrated by figures 6A-C from Schilit along with my annotations.
`
`
`
`16. However, within the above scenario in Schilit is a disclosure of a first
`
`data access request that results in the obtaining of the requested data, the
`
`
`
`9
`
`

`
`
`
`determining what data manipulation operations are available for the obtained data,
`
`and the providing of references to the determined data manipulation operations to
`
`the pervasive device – without any additional data access requests. This disclosure
`
`in Schilit is illustrated below by figures 6B-C of Schilit along with my annotations.
`
`
`That is, when the data access request of the “receiving” step of claims 1, 9, and 17
`
`
`
`of the ’621 patent is considered to be the request sent to the m-link browser as a
`
`result of the user clicking on the “Hypertext interact...” link shown in Schilit Fig.
`
`6B, above, the services (references to data manipulation operations) for the
`
`“Hypertext interaction revisited” publication – such as “read”, “print”, “fax”, etc. –
`
`are provided to the pervasive device without any further data access requests.
`
`17. A corresponding disclosure within the Schilit specification is the
`
`following (Schilit, 8:51-65).
`
`
`
`10
`
`

`
`
`
`
`
`
`
`The above passage discloses that when a link (such as the “hypertext interact...”
`
`link of Fig. 6B) is selected, the m-link browser uses the URL to access (obtain) the
`
`requested content from a Web server, fetches the services for that content from a
`
`database, and returns the services to the pervasive device to be displayed as shown
`
`in Fig. 6C.
`
`18. There are several additional disclosures in Schilit in which, in
`
`response to a single data request from the pervasive device and with no subsequent
`
`data requests, the m-link browser performs all the steps of claims 1, 9 and 17 and
`
`provides references to the data manipulation operators to the pervasive device. For
`
`example, a disclosure in Schilit is the following (Schilit, 8:4-21).
`
`
`
`11
`
`

`
`
`
`
`The above passage discloses that, in response to a single request from the
`
`
`
`pervasive device for the FXPAL web page, the m-link browser returns to the
`
`pervasive device the telephone number (requested data) from the FXPAL web
`
`page, together with a link (reference to a data manipulation operation) such that, if
`
`the user clicks on the phone number, the mobile phone will dial the number. This
`
`scenario can be illustrated as follows.
`
`
`
`12
`
`
`
`

`
`
`
`
`19. Yet another disclosure in Schilit which anticipates claims 1, 9 and 17
`
`of the ’621 patent – even under patent owner’s proposed claim constructions – is
`
`the following (id., 8:22-36).
`
`
`The above passage discloses that, in response to the user clicking “FX Palo Alto
`
`
`
`Labor...” (data access request), the m-link browser returns to the mobile phone the
`
`address (requested data) from the FXPAL web page, together with links to services
`
`(references to data manipulation operations) for that address, such as a providing a
`
`map locating the address. This scenario can be illustrated as follows.
`
`
`
`13
`
`
`
`

`
`VI.
`
`The Dependent Claims
`
`
`
`20. Regarding claims 8, 16, and 24 of the ’621 patent, the patent owner
`
`writes (PO response, pp. 14-15),
`
`Claims 8, 16, and 24 each depend on independent claims 1, 9, and 17,
`respectively, and recite the additional steps of:
`
`perform[ing] one or more data manipulation operations on the obtained data,
`thereby creating transformed data;
`
`determin[e/ing] what data manipulation operations are available for the
`transformed data; and
`
`provid[e/ing] references to the determined data manipulation operations for
`the transformed data to the pervasive device.
`
`Ex. 1001 at 19:22-29, 20:14-26, and 20:53-61.
`
`The “transformed data” recited in these claims is data that has been created by
`performing one of the recited data manipulation operations on the “obtained
`data” (i.e., the data obtained in response to the original data access request).
`Schilit does not describe any corresponding process. For example, while
`Schilit does disclose providing a list of links extracted from a web page in
`response to a request from a pervasive device, see Ex. 1006 at Figs. 6A-C, a
`person of ordinary skill in the art would not consider merely extracting links
`from a document to constitute performing one of the data manipulation
`operations. Ex. 2001 at ¶ 58. Indeed, the links are extracted before the data
`manipulation operations even become available for selection. Ex. 1006 at
`5:34-37; 8:50-51. Thus, claims 8, 16 and 24 cannot be anticipated by Schilit.
`
`
`
`14
`
`

`
`
`
`In support, Dr. Nettles states, “a person of ordinary skill in the art would not
`
`consider merely extracting links from a document to constitute performing one of
`
`the data manipulation operations. For example, the links are extracted and
`
`provided to the pervasive device before the data manipulation operations available
`
`for the subject web page are even determined.” (Nettles declaration, ¶ 58).
`
`21.
`
`I disagree with the patent owner and Dr. Nettles because they appear
`
`to have misread the claim language. The “performing” step of the dependent
`
`claims applies data manipulation operations to the obtained data to create the
`
`transformed data and the “determining” and “providing” steps recite data
`
`manipulation operations for the transformed data – but there is no relationship
`
`between (1) the “data manipulation” operations performed on the “obtained” data
`
`to create the “transformed data” and (2) the data manipulation operations for the
`
`transformed data. The “data manipulations” in the steps of the dependent claims
`
`requiring “performing one or more data manipulations on the obtained data” to
`
`create “transformed data” have no antecedent basis in the independent claims, and
`
`hence are not “recited.” (’621 patent, claims 8, 16 and 24). They are not the
`
`“determined data manipulation operations” of the independent claims. (’621
`
`patent, claims 1, 9 and 17). Instead, these are independent “data manipulation
`
`operations” which create “transformed data” from the obtained data. It is this
`
`“transformed data” of the dependent claims which is then further made subject to
`
`
`
`15
`
`

`
`
`
`the step “determining what data manipulations are available.” If the determined
`
`data manipulation operations in the independent claims and the “one or more data
`
`manipulations” of the dependent claims were intended to be the same, then the
`
`“performing” step would recite “the data manipulation operations” or “said data
`
`manipulation operations”. With no definite article before “data manipulation
`
`operations” in the “performing” step of the dependent claims, the data
`
`manipulation operations have no antecedent in the independent claims.
`
`22. Given this correct reading of the claims, one of skill would certainly
`
`understand that extracting links from a document and creating new links from
`
`certain data in the document (e.g. phone numbers and addresses), as Schilit
`
`discloses, are data manipulation operations that create transformed data as recited
`
`in the “performing” step. Furthermore, the argument set forth by Dr. Nettles that
`
`“the links are extracted and provided to the pervasive device before the data
`
`manipulation operations available for the subject web page are even determined”
`
`(Nettles declaration, ¶ 58) doesn’t hold because the data manipulation operations to
`
`extract the links have nothing to do with the data manipulation operations available
`
`for the subject web page. Thus, it is still my opinion that Schilit anticipates
`
`dependent claims 8, 16, and 24 for the reasons stated in my opening declaration
`
`and the claim chart cited therein.
`
`
`
`16
`
`

`
`
`
`VII.
`
`Schilit Addresses the Same Problems as the ’621 Patent
`
`23. As part of his argument that Schilit does not anticipate the challenged
`
`claims of the ’621 patent, Dr. Nettles asserts that Schilit and the ’621 patent sought
`
`to solve different problems – and thus the inventions of Schilit and ’621 patent are
`
`different. I disagree with this position, since Schilit and the ’621 patent are
`
`directed at precisely the same problems – namely allowing users of pervasive
`
`devices with limited capabilities to access data, such as web pages or documents,
`
`and to utilize services, such as printing, on that data1. Furthermore, as described in
`
`my opening declaration, Schilit and the ’621 patent disclose the same solution to
`
`these problems – namely providing a proxy (which Schilit refers to as the m-link
`
`browser) that performs much of the necessary computation that the pervasive
`
`devices are not capable of.
`
`
`1 I understand that “big picture” arguments, such as those presented by the patent
`
`owner and Dr. Nettles, are not necessarily germane to a claim anticipation analysis
`
`and, rather, it is the recited limitations of the claims themselves that are the focus
`
`of such an analysis. However, I have been asked to respond to these “big picture”
`
`arguments to the extent that they mischaracterize the disclosure of the Schilit
`
`patent.
`
`
`
`17
`
`

`
`
`
`24. For example, Dr. Nettles states (Nettles declaration, ¶¶ 60-61),
`
`“Looking at the ’481/’621 patents we see that the goal was to allow potentially
`
`very limited capacity pervasive nodes [to] access and manipulate complex data that
`
`they could not otherwise handle. [...] In contrast, Schilit focuses on browsing
`
`using some of the same kinds of devices. However, the key resource that is limited
`
`is screen space and the activity not general data access and manipulation, but rather
`
`browsing by a human.” I disagree with Dr. Nettles for several reasons. First,
`
`Schilit discloses many of the same constraints on pervasive devices that the ’621
`
`patent does, not just limited screen space. For example, in describing the WML
`
`protocol used to allow mobile devices to access web pages, Schilit states that
`
`WML is “intended for use in specifying content and user interface for narrowband
`
`devices, including cellular telephones and pagers, to allow users mobile access to
`
`the resources of the Internet.” (Schilit, 2:31-34). One of skill would understand a
`
`“narrowband device” to be a device with limited (low data-rate) communication
`
`capabilities. Furthermore, Schilit recites additional constraints on mobile devices,
`
`including “limits of transmission bandwidth, storage requirements, screen size and
`
`resolution on mobile handheld devices.” (id., 2:53-55).
`
`25. Second, the operations disclosed by Schilit are not limited to
`
`browsing. For example, just as in the ’621 patent, Schilit discloses printing of the
`
`obtained data – as well as reading, faxing, and emailing (Schilit, Fig. 6C).
`
`
`
`18
`
`

`
`
`
`
`For these reasons, I disagree with Dr. Nettles’ characterization of Schilit, that “the
`
`key resource that is limited is screen space and the activity not general data access
`
`and manipulation, but rather browsing by a human.” (Nettles declaration, ¶61.) In
`
`my opinion, the resource limitations and the supported activities disclosed in the
`
`’621 patent and in Schilit are essentially the same.
`
`26. Dr. Nettles also attempts to distinguish the ’621 patent from Schilit in
`
`terms of the number of messages exchanged between the pervasive device and the
`
`proxy in their respective preferred embodiments – particularly that by always
`
`sending the data manipulation operations to the pervasive device after the initial
`
`request, the ’621 proxy is able to minimize the communication overhead. I
`
`disagree with Dr. Nettles, since the Schilit patent discloses the scenario discussed
`
`above where the m-link browser sends the data manipulation operations (services)
`
`to the pervasive device after a single data access request.
`
`
`
`19
`
`

`
`
`
`27. To differentiate the ’621 patent from Schilit, Dr. Nettles writes, “it is
`
`evident that how these two systems handle requests and responses is very different.
`
`The ’481/’621 patents use a minimal message exchange optimizing the limited
`
`resources of the pervasive device, while Schilit uses a more costly iterative
`
`approach that is deemed to best facilitate the browsing process.” (Nettles
`
`declaration, ¶ 62). I disagree, since in the Schilit system – once a user issues a
`
`request for data (e.g. the “Hypertext interaction revisited” document) – the services
`
`for the data (e.g. “read”, “print”, “fax”, etc.) are provided to the pervasive device
`
`without any additional requests. Further, although Dr. Nettles is correct that
`
`distributed algorithms are often evaluated in terms of the number of message sent,
`
`this is an oversimplification which is often useful for analytical purposes. In
`
`practice, one of skill would understand that given a substantial amount of data (e.g.
`
`a large web page), it may be more efficient to send a short message representing
`
`some information extracted from the data, in order to preserve the possibility that
`
`the rest of the data won’t have to be sent. In fact, Schilit discloses that the very
`
`purpose for extracting links from a web page for sending to the pervasive device is
`
`to reduce communication overhead, saying (Schilit, 11:11-13), “To minimize
`
`transmissions over relatively low-bandwidth wireless connections, the m-link
`
`browser typically separates and transmits links to mobile-devices, as indicated
`
`above.” (emphasis added). Similarly, there may be scenarios in which it is more
`
`
`
`20
`
`

`
`
`
`efficient for the proxy to receive multiple data access requests before returning the
`
`references to the data manipulation operations to the pervasive device, such as (1)
`
`allowing the user to specify a subset of the possible data manipulation operations
`
`that he or she is interested in using (e.g., if there are too many possible data
`
`manipulation operations to be displayed on the screen), and (2) allowing the user to
`
`specify which part of the requested data he or she is interested in, which may
`
`determine what data manipulation operations to return.
`
`28. For the reasons given above, I disagree with Dr. Nettles about the
`
`differences in the “big picture” between the ’621 patent and Schilit. They both
`
`sought to solve the same problems and disclosed essentially the same mechanisms
`
`for doing so.
`
`VIII. Conclusion
`
`I hereby declare that all statements made herein of my own knowledge are true and
`
`that all statements made on information and belief are believed to be true, and
`
`further that these statements were made with the knowledge that willful false
`
`statements and the like so made are punishable by fine or imprisonment, or both,
`
`under Section 1001 of Title 18 of the United States Code.
`
`Dated: June 22, 2015
`
`
`
`
`Dr. Benjamin Goldberg
`
`
`
`21
`
`

`
`EXHIBIT A
`Curriculum Vitae
`BENJAMIN F. GOLDBERG
`Courant Institute of Mathematical Sciences
`Department of Computer Science
`New York University
`251 Mercer Street
`New York, New York 10012
`Phone: (212) 998-3495
`Fax: (212) 995-4121
`Email: goldberg@cs.nyu.edu
`http://cs.nyu.edu/goldberg
`
`
`Personal
`Born January 31, 1961, Las Cruces, New Mexico.
`U.S. Citizen.
`
`Education
`Ph.D. in Computer Science, Yale University, 1988. Dissertation: "Multiprocessor Execution of
`Functional Programs."
`M.S. and M.Phil in Computer Science, Yale University, 1984.
`B.A. with Highest Honors in Mathematical Sciences, Williams College, Cum Laude, Phi Beta
`Kappa, Sigma Xi, June 1982. Honors Thesis: "Theory and Implementation of an Automatic
`Program Verifier."
`
`Employment
`Associate Professor (Tenured), Courant Institute of Mathematical Sciences, Department of
`Computer Science, New York University. September 1994 – Present.
`Invited Professor, Ecole Normale Supérieur, Paris, France. June 2007 – July 2007 and
`June 2003 – July 2003.
`Director of Graduate Studies (for the MS programs), Department of Computer Science, New York
`University. September 2009 – August 2012 and September 2014 – present.
`Director of Undergraduate Studies, Department of Computer Science, New York University.
`September 1995 – August 1998 and September 2003 – August 2006.
`Visiting Professor, Institute National de Recherche en Informatique et en Automatique (INRIA),
`Rocquencourt, France. September 1994 – August 1995.
`Assistant Professor, Courant Institute of Mathematical Sciences, Department of Computer
`Science, New York University. September 1987 - August 1994.
`
`

`
`Expert Testimony at Trial or Deposition in the Past Four Years
`Retained by Orrick on behalf of EMC and VMware in the matter of Clouding v. EMC et al. (Inter
`Partes Review before the PTO), June 2014 – present.
`Retained by Quinn Emanuel and Perkins Coie on behalf of Samsung, Google, and HTC in the
`matter of Smartflash v. Samsung et al. April 2014 – present.
`Retained by Kenyon & Kenyon on behalf of Advanced Ground Information Systems (AGIS) in the
`matter of AGIS v. Life360 (Patent Litigation). August 2014 – present.
`Retained by Milbank Tweed on behalf of Apple in the matter of Wi-LAN v. Apple, February 2014 –
`September 2014.
`Retained by Boies Schiller on behalf of InfoSpan in the matter of InfoSpan v. Emirates NBD Bank,
`September 2013 – present.
`Retained by Boies Schiller on behalf of Apple in the matter of Apple v. Personal Web
`Communications (Inter Partes Review before the PTO), August 2013 – present.
`Retained by Cooley on behalf of Apple in the matter of GBT v. Apple, October 2013 – June 2014.
`Retained by Quinn Emanuel on behalf of Toshiba in the matter of Certain Digital Media Devices,
`Including Televisions, Blu-Ray Disc Players, Home Theater Systems, Tablets and Mobile Phones,
`Components Thereof and Associated Software (Black Hills Media v. Toshiba et al). International
`Trade Commission. September 2013 – February 2014.
`Retained by Wilson Sonsini on behalf of Sasken in the matter of Sasken v. Spreadtrum. American
`Arbitration Association. July 2013 – January 2014.
`Retained by Sheppard Mullin on behalf of HTC and Apple in the matter of Wi-LAN v. HTC et al.
`June 2013 – October 2013.
`Retained by Bingham McCutchen on behalf of Oracle America in the matter of Oracle America v.
`Service Key et al. March 2013 – September 2013.
`Retained by Latham & Watkins on behalf of InterDigital Communications, Inc. in the matter of
`Certain Wireless Devices with 3G Capabilities and Components Thereof (InterDigital v. Huawei et
`al). International Trade Commission, December 2011 – February 2013.
`Retained by Ballard Spahr on behalf of Go Daddy in the matter of WhitServe v. Go Daddy. August
`2011 – June 2013.
`Retained by Kenyon & Kenyon on behalf of Barnes & Noble in the matter of Deep9 v. Barnes &
`Noble. February 2012 – August 2012.
`Retained by Gibson Dunn & Crutcher on behalf of Lawson Software in the matter of ePlus v
`Lawson Software. October 2011 – April 2013.
`Retained by Kenyon & Kenyon on behalf of Barnes & Noble in the matter of Certain Handheld
`Electronic Computing Devices, Related Software, and Components Thereof (Microsoft v. Barnes &
`Noble), International Trade Commission. August 2011 – February 2012.
`Retained by Morrison & Foerster on behalf of Oracle America in the matter of Oracle America v.
`Google. August 2011 – May 2012.
`
`
`
`2
`
`

`
`Retained by Jones Day on behalf of Nielsen in the matter of comScore v. Nielsen et al. May 2011
`– November 2011.
`Retained by Kellogg Huber on behalf of Verizon in the matter of ActiveVideo Networks v. Verizon
`Communications. February 2011 – July 2011.
`Retained by Hughes Hubbard & Reed on behalf of SyncSort in the matter of SyncSort v. IRI.
`September 2005 – March 2011.
`
`Teaching Awards
`New York University "Golden Dozen" Award, 1992. Awarded to twelve faculty members in the
`entire College of Arts and Sciences for excellence in teaching.
`
`Professional Activities
`Editorial Board, The Computer Journal. Published by Oxford University Press on behalf of the
`British Computer Society. 2007 – 2009.
`Program Committee member: 2007 Symposium on Principles of Programming Languages (POPL)
`External Review Committee member: 2013 Symposium on Principles of Programming Languages
`(POPL)
`Program Committee member: 2001 Workshop on Practical Applications of Declarative Languages
`(PADL'01), ACM SIGPLAN'95 Conference on Programming Language Design and
`Implementation, 1995 ACM SIGPLAN Symposium on Partial Evaluation and Semantics-Based
`Program Manipulation (PEPM '95), 1995 International Workshop on Memory Management
`(IWMM'95), ACM SIGPLAN'93 Conference on Programming Language Design and
`Implementation.
`Review Panel Member, National Science Foundation, January 1998 and January 2000.
`Official Collaborator, Los Alamos National Laboratory, Computing and Communications Division.
`Member, Association for Computing Machinery and ACM Special Interest Group on Programming
`Languages (SIGPLAN).
`Referee for: ACM TOPLAS, IEEE Computer, International Journal of Parallel Programming,
`Software Practice and Experience, Computational Intelligence, ACM TOCS, ACM Computing
`Surveys, etc.
`Referee for a variety of ACM and IEEE conferences.
`
`Journal Papers
`"Translation and Run Time Validation of Optimized Code'', with L. Zuck, A. Pnueli, C. Barrett, Y.
`Fang, and Y. Hu, Formal Methods in System Design. 27(3): 335-360, November 2005
`"VOC: A Methodology for Translation Validaton of Optimizing Compilers'', with L. Zuck, A. Pnueli,
`and Y. Fang. Journal of Universal Computer Science, March 2003.
`"A Syntactic Method for Finding Least Fixed Points o

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket