At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Interactive scrollbars for unknown data size
Scrollbar control is utilized for manually scanning for displayed/available information while controlling the amount of information that is actually...
Portal for submitting business metadata for services
A user interface display provides access to an analysis portal that receives customized code for a business data system. The code is provided through the user...
Content gestures are described. In implementations, one or more controls are output to control output of content and for display in a user interface by a...
Population of lists and tasks from captured voice and audio content
Automatic capture and population of task and list items in an electronic task or list surface via voice or audio input through an audio recording-capable mobile...
User-specified phrase input learning
Architecture that enables a user to perform manual word-breaking by phrase input. Phrase input is where the user inserts a phrase-key (or separator) as a...
Creating cross-tabular reports
Cross-tabular reports may be automatically created by a computer from received source data. After receiving the source data, the computer may determine...
Virtual machine memory management in systems with asymmetric memory
A system is described herein that includes a predictor component that predicts accesses to portions of asymmetric memory pools in a computing system by a...
Platform for enabling terminal services virtualization
Disclosed are techniques for providing a platform and application program interface (API) that leverages a terminal services session broker infrastructure to...
Offline resource allocation algorithms
Various embodiments provide offline algorithms for resource allocation. A known set of "offline" requests may be matched to available resources using an online...
Dynamic control of an electronic message system
Methods of dynamic control of an electronic message system are described. In an embodiment, a system which is separate from a messaging service within the...
Generating activities based upon social data
A method described herein includes acts of receiving data from a social networking application, wherein the data is generated by a first individual, and...
Discovery and client routing to database nodes
Aspects of the subject matter described herein relate to database access. In aspects, a request for access to a database is received at a node of a database...
Transformation of a system change set from machine-consumable form to a
form that is readily consumable by a human
A telemetry system can parse and transform one or more change sets from a format intended to be processed by a computer to a form that is readily consumable by...
Recommending points of interests in a region
Techniques for searching and providing geographical regions are described. The process searches and recommends points of interests based on a user-specified...
Population and/or animation of spatial visualization(s)
One or more techniques and/or systems are provided for populating and/or animating a spatial visualization, such as a map, a timeline, and/or other 2D and/or 3D...
Clickthrough-based latent semantic model
There is provided a computer-implemented method and system for ranking documents. The method includes identifying a number of query-document pairs based on...
Use of off-page content to enhance captions with additional relevant
Architecture that uses content from off-page data sources such as feeds (e.g., yellow pages, coupons, social networks, commerce, etc.) to present additional,...
Query model over information as a networked service
Data is published by publishers to an information service configured to receive data sets and allow consumers to consume the data sets via queries. Structural...
Methods and systems for enhancing metadata
A method and system for utilizing metadata to search for media, such as multimedia and streaming media, includes searching for the media, receiving results,...
Named entity recognition in query
Named Entity Recognition in Query (NERQ) involves detection of a named entity in a given query and classification of the named entity into one or more...
Presenting search results annotated with domain endorsements
Systems, methods, and computer-readable storage media for presenting results of search queries with indications that at least a portion of such results has been...
Compression aware physical database design
A plurality of indicators representing a plurality of respective candidate database configurations may be obtained, each of the candidate database...
Reorganization of data under continuous workload
Architecture that provides the capability to automatically (e.g., dynamically) reorganize (repartition) an existing partition by dividing (splitting) or...
Minimal extensions required for multi-master offline and collaboration for
devices and web services
The claimed subject matter provides a system and/or a method that facilitates managing data consistency in connection with a plurality of devices. A collection...
Fingerprint-based, intelligent, content pre-fetching
Example apparatus and methods concern fingerprint-based, intelligent, content pre-fetching. An example apparatus may have a memory that is configured to store...
Creating variations when transforming data into consumable content
Concepts and technologies are described herein for creating variations when transforming data into consumable content. In accordance with the concepts and...
Over-the-air delivery of metering certificates and data
Metering is enabled through an arrangement in which a metering certificate is communicated to a mobile device using an over-the-air protocol. A metering trigger...
Mobile expense capture and reporting
A mobile computing device based expense capture and reporting system is provided. A mobile expense capture application is an integral part of a networked...
Noise adaptive training for speech recognition
Technologies are described herein for noise adaptive training to achieve robust automatic speech recognition. Through the use of these technologies, a noise...
A computing device receives acceleration information from an accelerometer mechanically coupled to a wireless controller, magnetic bearing information from a...
Computation of travel routes, durations, and plans over multiple contexts
A route planning system comprises a receiver component that receives a request for directions between a beginning point and a destination point. An analysis...
Navigation instructions using low-bandwidth signaling
Navigation instructions using low-bandwidth signaling are supported in an alternative user interface that may be utilized as either a full replacement or as an...
Centralized context awareness through network association
A user's context is determined based on the wireless network to which the user is connected. Targeted information, based on the determined context, is then...
Controlling audio of a device
Techniques and tools are described for controlling an audio signal of a mobile device. For example, information indicative of acceleration of the mobile device...
Operating system supporting cost aware applications
A mobile computing device that supports cost-aware application components for operation over a metered network. A current basis for computing usage charges over...
Interactive concept learning in image search
An interactive concept learning image search technique that allows end-users to quickly create their own rules for re-ranking images based on the image...
Automatic depth camera aiming
Automatic depth camera aiming is provided by a method which includes receiving from the depth camera one or more observed depth images of a scene. The method...
Role-based distributed key management
Implementations for providing role-based distributed key management (DKM) replication are described. A server node receives a request from a requester node to...
Catching up with an ongoing conference call
Various technologies described herein pertain to retaining content of a conference call for accelerated replay. The content of the conference call can be...
Communication signal decoding and soft demapping
Symbol detection and soft demapping methods and systems are provided. Individual subset symbol detection according to one or more embodiments involves...
A method of generating a compressed video stream, comprising: providing a plurality of display commands which represents a display; generating a plurality of...
Data packet routing
Among other things, one or more techniques and/or system are provided for routing a data packet. Because the data packet may correspond to a source device...
One-to-many and many-to-one communications on a network
Some implementations include routing and/or delivering communications within a network system. In one example, a packet source may be configured to recursively...
Updating old media with configurable entities
The claimed subject matter relates to an architecture that can provide configurable entities in connection with electronic archival of print-based media. In...
A depth image of a scene may be received, observed, or captured by a device. The depth image may then be analyzed to determine whether the depth image includes...
Transparent display assembly
In embodiments of a transparent display assembly, a display device includes a display panel system that is located between a first display surface and a second...
Physical characteristics based user identification for matchmaking
One or more physical characteristics of each of multiple users are detected. These physical characteristics of a user can include physical attributes of the...
Providing a security boundary
In order to enable potentially conflicting applications to execute on the same computer, application programming interface (API) calls are intercepted when an...
Isolation and presentation of untrusted data
Architecture that provides a secure environment in which data (e.g., code, instructions, files, images, etc.) can be opened and run by a client application....
Secure push and status communication between client and server
Systems and methods of authentication and authorization between a client, a server, and a gateway to facilitate communicating a message between a client and a...