At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Techniques for managing persistent document collections
Various technologies and techniques are disclosed for creating and managing persistent document collections. A data store is used for storing one or more...
Assisted filtering of multi-dimensional data
Interactive and dynamic exploring of filter criteria for large amounts of numerical data having multiple dimensions is described. Exploration occurs without...
Automatic selection of media representations
Technologies for selecting a media representation out of a plurality of representations of the same media offered by a media provider wherein the selected...
Unique join data caching method
Enterprise systems, methods and computer program products are disclosed for providing caching of data retrieved from joined tables and an inheritance table...
Identifying query formulation suggestions for low-match queries
Systems, methods and computer-storage media are provided for identifying low-match search queries and determining comparable item matches to suggest to the user...
Current file systems may implement opportunistic locks on files that allow clients to locally cache file data, while promoting data consistency when multiple...
Automatic synchronization conflict resolution
A determination is made at a first computing device of whether there is a synchronization conflict between a change to a first synchronized item at the first...
Structured models of repetition for speech recognition
Described is a technology by which a structured model of repetition is used to determine the words spoken by a user, and/or a corresponding database entry,...
Providing multi-lingual translation for third party content feed
Multi-lingual translation for third party content feed applications is provided in social network and similar environments in an independent manner from the...
Context aware surface scanning and reconstruction
A system for generating and updating a 3D model of a structure as the structure is being constructed or modified is described. The structure may comprise a...
Analyzing power consumption in mobile computing devices
Techniques pertaining to analyzing power consumed by a processing unit in a mobile computing device caused by execution of certain modules are described herein....
Split billing for a mobile device
The claimed subject matter provides a method for split billing. The method includes receiving a requested token. The requested token specifies conditions under...
A system for updating a network accessible address book for a user is disclosed. The system includes a network address reference detection agent that detects a...
Incremental valuation based network capacity allocation
A bid-based network sells network capacity on a transaction-by-transaction basis in accordance with bids placed on transactions. A transaction is the...
Uplink MIMO transmission from mobile communications devices
Uplink transmission from a mobile device having multiple antennas to a base station having multiple antennas includes transmitting in an open-loop single-user...
Motion-compensated prediction of inter-layer residuals
Techniques and tools are described for scalable video encoding and decoding. In some embodiments, an encoding tool encodes base layer video and outputs encoded...
Merge mode for motion information prediction
In one embodiment, for a current block of a first frame of digital image data, a list of motion vector prediction information for the current block is populated...
Techniques to perform fast motion estimation
Techniques to perform fast motion estimation are described. An apparatus may comprise a motion estimator operative to receive as input a current frame and a...
Network assisted power management
Embodiments of the claimed subject matter provide an approach to managing the power state of wireless network devices in a wireless network. Embodiments include...
Wireless synchronization testing
A testing sequence is disclosed for testing a wireless media synchronization connection between a computing device and a mobile device. A first test message...
Switchable magnetic lock
This document describes techniques using, and apparatuses including, switchable magnetic locks. These techniques and apparatuses can enable low or no power...
Video display modification based on sensor input for a see-through
This disclosure concerns a near field communication (NFC) device which includes a wrist-worn NFC-enabled electronics device, wherein the wrist-worn NFC enabled...
Image blur detection
Among other things, one or more techniques and/or systems are provided for quantifying blur of an image. Blur may result due to motion of a camera while the...
Volumetric video presentation
Various embodiments are disclosed that relate to the presentation of video images in a presentation space via a head-mounted display. For example, one disclosed...
Non-linguistic signal detection and feedback
Non-linguistic signal information relating to one or more participants to an interaction may be determined using communication data received from the one or...
Location based skins for mixed reality displays
The technology provides embodiments for providing a location-based skin for a see-through, mixed reality display device system. In many embodiments, a...
Vertex-baked three-dimensional animation augmentation
A method for controlling presentation of three dimensional (3D) animation includes rendering a 3D animation sequence including a 3D vertex-baked model which is...
Ray tracing on graphics hardware using kd-trees
Described is a technology by which a ray tracer incorporates a GPU-based kd-tree builder for rendering arbitrary dynamic scenes. For each frame, the ray tracer...
Methods and systems for determining and tracking extremities of a target
An image such as a depth image of a scene may be received, observed, or captured by a device. A grid of voxels may then be generated based on the depth image...
Executable virtual objects associated with real objects
Embodiments for interacting with an executable virtual object associated with a real object are disclosed. In one example, a method for interacting with an...
Crowd-sourced parking advisory
Architecture that employs crowd-sourced parking-related information to compute the probability of finding parking spots at specific road segments, parking lots,...
Management of gaming data
Systems and methods for managing gaming data are provided. The system may include at least one computing device coupled to a gaming service. The computing...
Embodiments of the present invention allow players to instantly access and begin playing games through an online service. To make the games instantly available,...
Display screen with animated graphical user interface
Display screen with color graphical user interface
Display screen with graphical user interface
Display screen with graphical user interface
Runtime security and exception handler protection
In various embodiments, redirection techniques can be utilized to protect against insecure functionality, to mitigate scripting vulnerabilities, and to protect...
Use of popularity information to reduce risk posed by guessing attacks
A popularity determination module (PDM) is described which reduces the effectiveness of statistical guessing attacks. The PDM operates by receiving a password...
Traffic segmentation in prevention of DDoS attacks
Systems, methods, and computer storage media for traffic segmentation in prevention of DDoS attacks are provided. Data associated with one or more users of a...
One-time password validation in a multi-entity environment
A single passcode can be used for validation by a user of several entities in a system without compromising security. The source of the entity providing...
Enterprise security assessment sharing
An enterprise-wide sharing arrangement uses a semantic abstraction, called a security assessment, to share security-related information between different...
Determining a future portion of a currently presented media program
This document describes techniques and apparatuses for determining a future portion of a currently presented media program. The techniques and apparatuses can...
Scheduling execution of complementary jobs based on resource usage
The subject disclosure is directed towards executing jobs based on resource usage. When a plurality of jobs is received, one or more jobs are mapped to one or...
Cancellation mechanism for cancellable tasks including stolen task and
descendent of stolen tasks from the...
A scheduler in a process of a computer system schedules tasks of a task group for concurrent execution by multiple execution contexts. The scheduler provides a...
Template virtual machines
There is provided a method of providing a template virtual machine. An exemplary method comprises creating a template virtual machine comprising an image of an...
Mitigating user interruption for partially downloaded streamed and
Technologies are described herein for mitigating user interruption for partially downloaded or streamed virtual applications from a network, such as the...
Bookmarks and performance history for network software deployment
Described are automatically generated software deployment bookmarks that maintain information regarding events and/or triggers with respect to a network...