Montefiore Medical Center Physical Medicine 111 E 210 St STE G78, Bronx, NY 10467 7189204133 (phone), 7189202289 (fax)
Childrens Physicians Of Westchester 4350 Van Cortlandt Park E, Bronx, NY 10470 3472266437 (phone), 3472266438 (fax)
John A Coleman School 317 North St, White Plains, NY 10605 9145974071 (phone), 9143971765 (fax)
Education:
Medical School China Med Univ, Shenyang City, Liaoning, China Graduated: 1988
Procedures:
Neurological Testing Physical Medicine and Rehabilitation, Tests and Measurements Physical Therapy Evaluation
Languages:
English Spanish
Description:
Dr. Chen graduated from the China Med Univ, Shenyang City, Liaoning, China in 1988. She works in White Plains, NY and 2 other locations and specializes in Physical Medicine & Rehabilitation. Dr. Chen is affiliated with Montefiore Medical Center and Westchester Medical Center.
Dr. Chen graduated from the Taipei Med Coll, Taipei, Taiwan (385 04 Prior 1/71) in 1979. He works in Anaheim, CA and specializes in Family Medicine. Dr. Chen is affiliated with Kaiser Permanente Orange County Anaheim Medical Center.
Rush University Cancer Center 1725 W Harrison St STE 1010, Chicago, IL 60612 3129425904 (phone), 3129423192 (fax)
Education:
Medical School Albert Einstein College of Medicine at Yeshiva University Graduated: 2010
Languages:
English Polish Spanish
Description:
Dr. Chen graduated from the Albert Einstein College of Medicine at Yeshiva University in 2010. She works in Chicago, IL and specializes in Radiation Oncology. Dr. Chen is affiliated with Rush University Medical Center.
Michael Raymond - Kenmore WA, US Yu Chen - Redmond WA, US Wei Wang - Issaquah WA, US Mark T. Hanson - Woodinville WA, US Jonathan David Schwartz - Redmond WA, US Kenneth W. Sykes - Oakton VA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
H04L 9/32
US Classification:
726 19, 726 17
Abstract:
An arrangement is provided for programmatically responding to a privilege request on behalf of a user by pre-configuring a trusted entity with a list of processes requiring elevated user credentials and a set of user's credentials having such privilege. The trusted entity determines if a requested process is included in the list of processes, and responds to the privilege requests generated by the kernel of the operating system for such processes, eliminating the need for the user to manually authenticate using some type of input mechanism.
Kuansan Wang - Bellevue WA, US Toby H. Walker - Wayne PA, US Zijian Zheng - Shoreline WA, US Yu Chen - Redmond WA, US Robert C. Wang - Redmond WA, US
Assignee:
MICROSOFT CORPORATION - Redmond WA
International Classification:
G06F 17/30
US Classification:
707705, 707E17014, 707E17017
Abstract:
The ranking quality of a ranked list may be evaluated. In an example embodiment, a method is implemented by a system to access log data, ascertain which entries of a ranked list are skipped, and determine a ranking quality metric from the skipped entries. More specifically, log data that reflects user interactions with a ranked list having multiple entries is accessed. The user interactions include at least indications of which of the multiple entries are selected entries. It is ascertained which entries of the multiple entries of the ranked list are skipped entries based on the selected entries. The ranking quality metric for the ranked list is determined responsive to the skipped entries.
Shengquan Yan - Issaquah WA, US Zhenghao Wang - Redmond WA, US Xiao Huang - Seattle WA, US Yu Chen - Sammamish WA, US An Yan - Sammamish WA, US Jeffrey Eric Larsson - Kirkland WA, US Michael Kiogora Kinoti - Seattle WA, US Peng Yu - Bellevue WA, US Zijian Zheng - Bellevue WA, US
Assignee:
MICROSOFT CORPORATION - Redmond WA
International Classification:
G06F 17/30
US Classification:
707769, 707E17014
Abstract:
Systems, methods, and computer media for efficiently processing user log data are provided. A received user log data analysis request specifies: target user log features that identify users in a target user group, analysis user log features that identify data associated with the users in the target user group, and an analysis to perform on the identified data associated with the users in the target user group. Occurrences of specified features are extracted from user logs and stored. Users associated with an occurrence of each of the extracted and stored target user log features are identified as users in the target user group. Occurrences of the analysis user log features that are associated with a user in the target user group are extracted and reformatted for the analysis specified in the analysis request.
Selectively Processing An Event Published Responsive To An Operation On A Database Record That Relates To Consent
- San Francisco CA, US Yvonne Zhou - San Francisco CA, US Yu Chen - Bellevue WA, US Shivan Kaul Sahib - Vancouver, CA
Assignee:
salesforce.com, inc. - San Francisco US
International Classification:
G06F 16/23 G06Q 10/10
Abstract:
Implementations retrieve a first event that published to a first source of events responsive to updating, deleting, or inserting a first record in a database object that stores records relating to consent. The first event is processed. Processing the first event includes storing in an attribute of a second event an identifier for a second record that relates to the first record and that is in a second database object that stores records relating to consent. If the first record was inserted or updated, processing the first event includes storing in an attribute of the second event one or more identifiers and respective values of fields of the first record based on attributes of the first event.
Updating Of A Denormalized Database Object After Updating, Deleting, Or Inserting A Record In A Source Database Object
- San Francisco CA, US Yvonne Zhou - San Francisco CA, US Yu Chen - Bellevue WA, US Michael Allan Friedman - Bellevue WA, US Shivan Kaul Sahib - Vancouver, CA
Assignee:
salesforce.com, inc. - San Francisco US
International Classification:
G06F 16/2453 G06F 16/23 G06F 16/2455
Abstract:
Methods and apparatus for updating a denormalized database object after updating, deleting, or inserting a record in a source database object are described. A first operation on a source database object that involves a record of the source database object being updated, deleted, or inserted is performed. A first part of a corresponding second operation involving a respective record of the denormalized database object being updated, deleted, or inserted is performed. A query result that references an aggregate field of a set of records in the denormalized database object is altered. The altering includes an aggregation operation using values in the query result being performed and altering that part of the query result that includes the aggregate field of the set of records. A second part is optionally performed to complete the corresponding second operation and update the denormalized database object.
Aggregating Consent Across Records For Responding To Consent Requests
- San Francisco CA, US Yu Chen - Bellevue WA, US Yvonne Zhou - San Francisco CA, US Michael Allan Friedman - Bellevue WA, US Shivan Kaul Sahib - Vancouver, CA
International Classification:
G06Q 10/10
Abstract:
A method for responding to a consent request for an action based on a set of records is described. The method includes receiving the consent request, including a set of identifiers and the action for obtaining consent; locating a first record of a first object type and a second record of a second data type, wherein the first record corresponds to a first identifier in the set of identifiers, the second record corresponds to a second identifier of the set of identifiers, and one or more of the first and second records includes consent information for performing the action; determining a final response based on the first and second records, wherein the final response includes at least one proceed element that indicates whether consent exists for the action based on at least the first and second records; and returning the final response as a response.
Techniques And Architectures For Managing Privacy Information And Permissions Queries Across Disparate Database Tables
- San Francisco CA, US Yu Chen - Bellevue WA, US Michael Allan Friedman - San Francisco CA, US Yvonne Zhou - San Francisco CA, US Shivan Kaul Sahib - Vancouver, CA
International Classification:
G06F 17/30 G06F 21/62
Abstract:
At least one database table of denormalized values corresponding to selected values of field properties in records across multiple disparate tables of the database environment is maintained. A structured query is received through a structured query language application program interface (API). The structured query to request a listing of records across the multiple disparate tables of the database environment. The database table is searched for indications corresponding to records across the multiple disparate tables of the database environment corresponding to the selected values indicating communication with a specified party. A listing of records from across the multiple disparate tables that satisfy the selected values is returned through the structured query language API.
Method And System For Enabling Log Record Consumers To Comply With Regulations And Requirements Regarding Privacy And The Handling Of Personal Data
- San Francisco CA, US David HACKER - Moraga CA, US Yu CHEN - Bellevue WA, US Hui Fung Herman KWONG - San Francisco CA, US Wolfgang KRAUSE - Palo Alto CA, US
International Classification:
G06F 21/62 H04L 9/32
Abstract:
A method and a system for enabling multiple log record consumers to comply with regulations and requirements regarding privacy and handling of data are described. A determination, based on a log record format being of a first of the log record types, that a first field from a raw log record is to be tokenized based on a first tokenization strategy of multiple tokenization strategies in the first log record type, is performed. Each one of the tokenization strategies identifies a tokenization mechanism from tokenization mechanisms for generating a token from a raw value to enable compliance with a set of regulations and requirements regarding privacy and the handling of data. For a first raw value in the first field a first token is generated that is an anonymized representation of the first raw value using a tokenization mechanism identified by the first tokenization strategy in the log record type.
Sep 2014 to 2000 Mandarin Chinese TeacherSuder Montessori Magnet
Mar 2014 to May 2014Saint Sylvester
Sep 2013 to Mar 2014Multilingual Connections Chicago, IL Jun 2013 to Mar 2014 Mandarin Chinese TeacherMandarin Chinese Center Chicago, IL Jun 2013 to Mar 2014 Mandarin Chinese TeacherAfter School Programs at Saint John Berchmans
Sep 2013 to Nov 2013Mandarin Garden
Sep 2011 to Nov 2011 Mandarin Chinese Teacher
Education:
Kent State University Kent, OH Jun 2011 Master of ArtsShanghai International Studies University Jun 2010 Bachelor of Arts in International Business ManagementInternational Summer Institute for Business Management Jun 2008University of Victoria Victoria, BC
XtraMedium Communications Group Chicago, IL Jan 2013 to Apr 2013 Project AssistantStandard Chartered Bank Shenzhen, CN Sep 2011 to Oct 2011 InternShenzhen Development Bank Shenzhen, CN Jul 2011 to Aug 2011 Intern
Education:
Illinois Institute of Technology, Stuart School of Business Chicago, IL 2012 to 2014 Masters of Science in Finance - Financial Engineering & ProgrammingShenzhen University Shenzhen, CN 2008 to 2012 B.S. in Finance
Skills:
C++, C#, Python, Matlab, VBA, SQL, XML, ADO.net, Microsoft Word, Excel, Access, Linux;
DePaul University Chicago, IL 2014 to 2015 Master of Science in FinanceUniversity of Fraser valley Abbotsford, BC 2009 to 2013 Bachelor of Business Administration in Finance,Accounting
May 2009 to Present Research AssistantUniversity of Illinois at Chicago
Aug 2012 to Dec 2012 Student InstructorIntermediate Macroeconomics
Aug 2012 to Dec 2012 Teaching Assistant, UICBMO Harris Bank Chicago, IL May 2012 to Aug 2012 InternThe Chicago Project for Violence Prevention, Center for the Advancement of Distance Education, UIC School of Public Health
Jun 2011 to Aug 2011 Research AssistantUIC
Jan 2008 to Jul 2008 Research Assistant for Prof. Lawrence OfficerInvestment Banking Zhejiang Business Headquarters, Guangfa Securities Co., Ltd.
Nov 2005 to May 2006 Intern
Education:
Zhejiang University Jun 2006 M.A. in FinanceZhejiang University Jun 2004 B.A. in FinanceUniversity of Illinois at Chicago Chicago, IL Ph.D. in Economics
Skills:
SAS, STATA, Eviews, RATS, SQL, AQT, Microsoft Word, Excel, Power Point, Outlook, Mandarin