At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
A system and method for accessing closure variables from a lambda expression in certain program configurations, in which the closure variable is accessed while...
Navigating between views of a graph using placemarkers
A method includes transmitting an interface to a display device, where the interface represents a view of at least a portion of a graph. The graph is based on a...
Multi-lingual word hyphenation using inductive machine learning on
Tools and techniques are described for providing multi-lingual word hyphenation using inductive machine learning on training data. Methods provided by these...
Hyperlink destination visibility
Various embodiments utilize page scripting and parsing to identify the target destination of a hyperlink and provide a visual indication of the destination to...
Cloud management using a component health model
Embodiments are directed to establishing a model for testing cloud components and to preventing cascading failures in cloud components. In one scenario, a...
Modeling distribution and failover database connectivity behavior
Aspects of the subject matter described herein relate to database connectivity behavior. In aspects, an entity seeking to access data that is replicated via...
Unobtrusive assurance of authentic user intent
Computer-executable instructions that are directed to the performance of consequential actions and automatically elevate to execute at a higher privilege level...
Consistency without ordering dependency
Aspects of the subject matter described herein relate to maintaining consistency in a storage system. In aspects, one or more objects may be updated in the...
System and method for providing stealth memory
The described implementations relate to computer memory. One implementation provides a technique that can include providing stealth memory to an application....
ISP-aware peer-to-peer content exchange
An Internet Service Provider (ISP)-aware peer-to-peer (P2P) content exchange system and method for exchanging content over a P2P network using the Internet. The...
Data center without structural bottlenecks
A method of networking a plurality of servers together within a data center is disclosed. The method includes the step of addressing a data packet for delivery...
Automatically instrumenting a set of web documents
Embodiments of the invention provide a method and system for automatically instrumenting a set of web documents, such as web pages, as well as embedding...
Social networking feed extensibility based on data types
Social networking feed extensibility based on data types is described. An apparatus may comprise a custom feed system that when executed by a processor is...
Parallel serialization of request processing
A plurality of servers configured to receive a plurality of requests associated with a plurality of byte sequences are described herein. The requests for each...
System and method for deploying logic in data files
One particular technique includes storing logic expressions in a data file. This particular technique also includes executing application code. The executing...
Query and matching for content recognition
Various embodiments enable audio data, such as music data, to be captured, by a device, from a background environment and processed to formulate a query that...
Parallel processing of an ordered data stream
A method of parallel processing an ordered input data stream that includes a plurality of input data elements and a corresponding plurality of order keys for...
Recommending data based on user and data attributes
The present invention extends to methods, systems, and computer program products for recommending data based on user and data attributes. User information and...
Dynamic fragmentation of digital media
Media fragmentation may be provided. First, a request for a manifest may be received from a client. Then, in response to the received request for the manifest,...
Composing text and structured databases
A framework is provided for composing texts about objects with structured information about these objects, and thus disclosed are methodologies for linking...
Consistent phrase relevance measures
Two methods for measuring keyword-document relevance are described. The methods receive a keyword and a document as input and output a probability value for the...
Providing an interface to access website actions
Providing an interface to request actions of a website includes various elements. For example, website instructions of the website are provided to a search...
Comparing and selecting data cleansing service providers
The present invention extends to methods, systems, and computer program products for exploring and selecting data cleansing service providers. Embodiments of...
Method and apparatus for providing help content corresponding to the
occurrence of an event within a computer
A method and apparatus are provided for displaying help content corresponding to the occurrence of an event occurring within a computer. An alert help data file...
Efficient partitioning techniques for massively distributed computation
A repartitioning optimizer identifies alternative repartitioning strategies and selects optimal ones, accounting for network transfer utilization and partition...
Authentication for a commercial transaction using a mobile module
Current embodiments provide for authorization and payment of an online commercial transaction between a purchaser and a merchant including verification of an...
Search engine segmentation
The claimed subject matter can provide a mechanism that facilitates market segmentation among search engines. A segmentation mechanism is provided that displays...
Blending recorded speech with text-to-speech output for specific domains
A text-to-speech (TTS) engine combines recorded speech with synthesized speech from a TTS synthesizer based on text input. The TTS engine receives the text...
Transferring data via audio link
Transferring data via audio link is described. In an example a short sequence of data can be transferred between two devices by encoding the sequence of data as...
Synchronizing an abstract model and source code
A software synchronization system detects a change that modifies an element of the abstract model. The software synchronization system globally modifies...
Efficient collaging of a large image
Embodiments of the present invention relate to collaging image data to form a large image using high-performance computing in a parallel computing environment....
Source imagery selection for planar panorama comprising curve
Among other things, one or more techniques and/or systems are disclosed for selecting source imagery for a planar panorama comprising a curved path. The curved...
Real-time face detection using pixel pairs
The subject disclosure is directed towards a face detection technology in which image data is classified as being a non-face image or a face image. Image data...
Identification of duplicates within an image space
Implementations for identifying duplicate images in an image space are described. An image space is partitioned into a plurality of coarse clusters based on...
Unified and consistent user experience for server and client-based
Described is a technology by which a storage at a telephone device (e.g., a client telephone) is synchronized with information corresponding to actions...
Clock synchronization using correlation events
Two clocks may be synchronized by calculating skew and offset values that may be determined from several correlation events. A correlation event may be the...
Integration of sketch-based interaction and computer data analysis
Architecture that integrates the benefits of natural user interaction such as freeform sketch with computer-aided charting. The architecture integrates natural...
Skeletal control of three-dimensional virtual world
A virtual skeleton includes a plurality of joints and provides a machine readable representation of a human target observed with a three-dimensional depth...
Detecting gestures involving intentional movement of a computing device
A computing device is described herein which accommodates gestures that involve intentional movement of the computing device, either by establishing an...
Metal alloy injection molding protrusions
Metal alloy injection molding techniques are described. In one or more implementations, these techniques may also include adjustment of injection pressure,...
Display screen with graphical user interface
Display screen with graphical user interface
Display screen with graphical user interface
Manipulable human interactive proofs
A manipulable human interactive proof (HIP) displays at most a portion of verification information. A user performs at least one manipulation on the HIP display...
Software distribution service federation
Software update distribution techniques are disclosed. Authentication information is received, from a content source authenticator, by an update agent included...
Aspects of the subject matter described herein relate to a mechanism for assessing security. In aspects, an analytics engine is provided that manages execution,...
Code property analysis for security mitigations
Attempts to make code secure often are associated with performance penalties. To facilitate striking an acceptable balance between performance and security,...
Managing security credentials for scaled-out services
Embodiments are directed to establishing separate security identities for a shared service and shared service instances, and to managing shared and service...
Client authentication during network boot
A secure mechanism for performing a network boot sequence and provisioning a remote device may use a private key of a public key/private key encryption...
Extensible mechanism for securing objects using claims
An extensible mechanism for providing access control for logical objects in a network environment. A security broker is able to dynamically register one or more...