At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Travelogue locating mining for travel suggestion
A location extraction component analyzes a set of travelogues to identify all of the locations mentioned therein. A co-occurrence extraction component computes...
Methods, systems, and media are provided for facilitating generation of an inference index. In embodiments, a canonical entity is referenced. The canonical...
Enhancing search-result relevance ranking using uniform resource locators
for queries containing non-encoding...
Computer-readable media, computer systems, and computing devices facilitate enhancing a web index with uniform resource locator (URL)/non-encoding character...
Synchronization framework that restores a node from backup
Architecture for restoring nodes. After restoring a node, fix-up occurs to make the node appear as a different node than before the restore operation. The node...
Hierarchical models for language modeling
The described implementations relate to natural language processing, and more particularly to training a language prior model using a model structure. The...
Estimating time remaining for an operation
Techniques for estimating time remaining for an operation are described. Examples operations include file operations, such as file move operations, file copy...
Extensible phone application
The present invention provides an extensible phone application that uses extensions to interact with other applications executing in a mobile communication...
Tracking data usage under a schematized data plan
Embodiments provide a schema for representing data usage plans and data usage statistics. The data usage plan describes threshold values associated with network...
Transform space difference compression
An invention is disclosed for performing differencing of graphical data in post-transform space for a remote presentation session. Graphical data is transformed...
Motion stabilization and detection of articulated objects
The techniques and systems described herein are directed to isolating part-centric motion in a visual scene and stabilizing (e.g., removing) motion in the...
Rotation-free recognition of handwritten characters
A character recognition system receives an unknown character and recognizes the character based on a pre-trained recognition model. Prior to recognizing the...
Volume adjustment based on listener position
Volume adjustment based on listener position is disclosed. A position of one or more speakers is identified, and a position of a listener is tracked. For each...
Quality-based video compression
Various embodiments are disclosed herein that relate to quality-based video encoding. For example, one disclosed embodiment provides a video compression system...
Gateway advertisement in a wireless mesh
A computing environment containing a mesh network that is adapted to provide a reliable transport mechanism over which services may be delivered. Nodes of the...
Controlled three-dimensional communication endpoint
A controlled three-dimensional (3D) communication endpoint system and method for simulating an in-person communication between participants in an online meeting...
Drawing operations using multiple graphics interfaces
Various embodiments provide techniques for enabling multiple graphics interfaces to be accessed to perform graphics-related operations. In at least some...
Mesh generation from depth images
Systems and methods for mesh generation from depth images are provided. According to one aspect, a method executable by a compression device for sending...
Ad-hoc user and device engagement platform
A local engagement system is described herein that leverages devices people commonly carry with them to dynamically engage them based on their locations and/or...
Trust level activation
An isolation execution environment provides an application with limited resources to execute an application. The application may require access to secured...
Selectively scanning objects for infection by malware
Techniques are described herein that are capable of selectively scanning objects for infection by malware (i.e., to determine whether one or more of the objects...
Search result presentation
A data presentation system for a search engine may use classified or tagged elements in a resulting document to create a search result document that has...
Aspects of the subject matter described herein relate to identity technology. In aspects, a user device requests access to a service provided by a relying...
Integrating account selectors with passive authentication protocols
Described is using a client-side account selector in a passive authentication protocol environment (such as OpenID) in which a relying party website trusts the...
Work item processing in distributed applications
A system for organizing messages related to tasks in a distributed application is disclosed. The system includes a work-list creator to create a work list of...
Systems and methods for exposing processor topology for virtual machines
The present invention is directed to making a guest operating system aware of the topology of the subset of host resources currently assigned to it. At virtual...
Systems and methods for providing seamless software compatibility using
Certain embodiments of the present invention are directed to a system for and method of providing seamless software compatibility by using virtual machines to...
Firmware update discovery and distribution
A firmware update system is described that collectively handles firmware updates for hardware resources of a computing device. The firmware update system may be...
Application packages using block maps
Deploying applications to a device often involves generating an application package for installing the application anew, and application patches for updating...
Reducing network trips for remote expression evaluation
An expression can be evaluated in a remote debugging environment with one single round trip across the network. An expression evaluator on a local machine can...
Generating text manipulation programs using input-output examples
A program creation system is described which generates a data manipulation program based on input-output examples. The created program may include a collection...
Notification area that persistently rearranges elements
Embodiments described herein are directed to managing elements within a notification area of a graphical operating system. The elements may include any graphic,...
Website list navigation
Embodiments are disclosed that relate to facilitating navigation through a predefined list of websites, such as a list of favorite websites. One embodiment...
Standard schema and user interface for website maps
Various embodiments provide a standardized schema that can be used by site developers to define a site map and its associated hierarchy. In at least some...
Graphical creation of a document conversion template
The template creation system enables a graphical selection of one or more fields from within a database system. The template creation system identifies a source...
Wireless access point mapping
Techniques for wireless access point mapping are described. In at least some embodiments, various characteristics of a wireless access point are detected....
Dynamic collection of instrumentation data
A flexible system for collecting and reporting instrumentation metrics relating to performance of a software product. Computing devices that execute the...
Offline data access using trusted hardware
A cryptographically-secure component provides access-undeniability and verifiable revocation for clients with respect to downloaded content items from a server....
A system and method for maintaining a pagefile of a computer system using a technique of reserving portions of the pagefile for related memory pages. Pages near...
Automatic allocation of data replicas
Embodiments described herein are directed to providing scalability to software applications. A computer system partitions a portion of data stored in a...
Writing memory blocks using codewords
A generator matrix is provided to generate codewords from messages of write operations. Rather than generate a codeword using the entire generator matrix, some...
Relative timestamp when real time clock is unavailable
An operating system or other software resident on an electronic processing device employs aggregated timestamps. In this way timestamps can be generated and...
Flyways in data centers
Described is a technology by which additional network communications capacity is provided to an oversubscribed base network where needed, through the use of...
Media mix wiring protocol for media control
Protocol architecture for wiring media streams and specifying mixing behavior in a multipoint control unit. The protocol provides the capability to expose the...
Master data management system for monitoring cloud computing
An application provides cloud computing master data management. The application determines a rank associated with received server information from a server. The...
Shaping virtual machine communication traffic
Cloud computing platforms having computer-readable media that perform methods to shape virtual machine communication traffic. The cloud computing platform...
Consistency-based service-level agreements in cloud storage environments
An application programming interface is provided that allows applications to assign multiple service-level agreements to their data transactions. The...
Evidence-based virtual world visualization
When evidence is received, a determination is made as to whether the evidence is sufficient to determine whether to block transmission of virtual world data to...
File handling for naming conflicts
A file operations engine is provided that manages many user interactions with their files via a computer system. The operation engine may provide a user with...
Display of temporal data over multiple orders of magnitude
Described herein are technologies that facilitate representing instances in time over 62 orders of magnitude as well as graphically depicting events over...