At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Call-handling rules may be provided. A user interface may access a plurality of information associated with a user and provide functionality for creating a...
Multiview coding with geometry-based disparity prediction
Described herein is technology for, among other things, multiview coding with geometry-based disparity prediction. The geometry-based disparity prediction...
Scalable video coding and decoding with sample bit depth and chroma
high-pass residual layers
Techniques and tools are described for scalable video encoding and decoding. In some embodiments, an input frame is downsampled in terms of sample depth and...
Telemetry data routing
Among other things, one or more techniques and/or systems are provided for routing telemetry data to one or more receivers. That is, telemetry data, such as...
CMOS three-dimensional image sensor detectors having reduced inter-gate
capacitance, and enhanced modulation...
A CMOS detector with pairs of interdigitated elongated finger-like collection gates includes p+ implanted regions that create charge barrier regions that can...
Obtaining spatially varying bidirectional reflectance distribution
A system for reflectance acquisition of a target includes a light source, an image capture device, and a reflectance reference chart. The reflectance reference...
Subpixel compositing on transparent backgrounds
A method is presented for displaying a rendered image on an electronic computing device. The method comprises rendering a first image on the electronic...
Single page soft input panels for larger character sets
Embodiments of a soft input panel (SIP) for an electronic device are disclosed. The SIP can be configured for entering text in a non-English language that uses...
Computer vision-based multi-touch sensing using infrared lasers
The claimed subject matter provides a system and/or a method that facilitates detecting a plurality of inputs simultaneously. A laser component can be coupled...
Input location correction tables for input panels
One or more input location correction tables are used to compensate for interference introduced into input panels and generate a corrected location based on a...
Chassis slots accepting battery modules and other module types
A chassis includes a component interconnect board having multiple multi-function slots coupled thereto. Each of the multi-function slots is configured to accept...
Personal training with physical activity monitoring device
A physical activity monitoring device receives a workout regimen including a plurality of exercises. For each of the plurality of exercises, the physical...
Extending gameplay with physical activity monitoring device
A physical activity monitoring device receives an indication of one or more physical activities to be performed as an extension of a game being played on a game...
Display screen with icon set
Hosted network device user interface
A system and method of hosting a user interface of a network device are provided. A particular method includes receiving a request at a server to display a user...
Value provider subscriptions for sparsely populated data objects
A calling routine may identify portions of a data object that may be populated by other executable routines by creating a property requested event. An event may...
Using stages to handle dependencies in parallel tasks
Technologies are described herein for using stages for managing dependencies between tasks executed in parallel. A request for permission to execute a task from...
Driver installation for targeted and non-present devices
A computer-implemented method for managing device drivers includes requesting a device driver update set for a plurality of devices connectable to a computing...
Custom compound types in declarative programs
The present invention extends to methods, systems, and computer program products for creating and manipulating custom compound data types in declarative...
Type system for declarative data scripting language
An efficient, logical and expressive type system is provided for flexibly defining types of a declarative programming language so that efficient and...
Generated object model for test automation
A generated object model engine abstracts actions, used in test cases, in a manner to produce new object model types that are independent of an underlying code...
Media files including programming code and description
The description relates to media files and more particularly to media files that include a program and a human-understandable description of the program. One...
Spatial layout of hierarchical shared resources
A hierarchical shared resources spatial visualization system and method including a visualization runtime user interface that quickly and efficiently displays a...
Creating and maintaining images of browsed documents
Embodiments automatically create dynamic thumbnail images corresponding to accessed web pages. Thumbnails, snapshots, or other images are generated for each of...
Sequential layout builder
Layout processing techniques have been described that allow processing of structured documents to be conducted, and for associated layout to be accomplished in...
Error report processing using call stack similarity
Techniques for error report processing are described herein. Error reports, received by a developer due to program crashes, may be organized into a plurality of...
Controlling access to software component state
A request is received from a software component of a software product to access a value of a public setting of the software component. A check is made as to...
Management of ownership control and data movement in shared-memory systems
A method to exchange data in a shared memory system includes the use of a buffer in communication with a producer processor and a consumer processor. The cache...
Accessory device architecture
An accessory device architecture is described. In one or more implementations, data is received from an accessory device at an intermediate processor of a...
Automatically provisioning a WWAN device
Network connection information is requested by a wireless wide area network device via the internet. Such information may include configuration information,...
Determining whether a device is inside a network
A network address of a computing device is obtained, and an unencrypted request is sent to a resource access manager of a particular network. If both a response...
Session monitoring of virtual desktops in a virtual machine farm
Disclosed are techniques for determining the status of virtual machine sessions on a computing device for a user by reading from a memory location written to by...
Capturing a computing experience
The described implementations relate to capturing a computing experience. In one case, a user session capture tool can launch a remote user session where a...
Providing a witness service
Described are embodiments directed at providing a witness service that sends notifications with a resource state to clients. Embodiments provide a protocol that...
Document sharing through browser
Presenters are enabled to broadcast a document to remote viewers from one browser to another. While viewing a document in the web browser, a user can share the...
Asynchronous queued messaging for web applications
Various embodiments enable local web applications to communicate asynchronously with web based services and applications based on a local device's current state...
Email confirmation page for social network notifications
A communication confirmation message provides social networking events in combination with information regarding addresses to a member. The message can be used...
Among other things, one or more techniques and/or systems are provided for pushing a recommendation to a user. That is, a recommendation may be pushed to a...
Building large scale infrastructure using hybrid clusters
A distributed computing system. The system separates management and worker functionality into different clusters thus relieving the worker clusters of...
Automatically matching data sets with storage components
An administrator of an enterprise storage set may be tasked with storing a large number and variety of data sets on a large number and variety of storage...
Techniques to manage file conversions
Techniques to manage file conversions are described. File conversion requests to convert files between different file formats are received. A determination is...
Method for dynamic updating of an index, and a search engine implementing
In a method for a dynamic updating of an index of a search engine, wherein the index is an inverted index comprising a dictionary, a posting file with a posting...
Enhanced views of tagged items in a gallery
Disclosed herein are systems, methods, and software for facilitating gallery environments and views. In at least one implementation an initial view is presented...
Detecting overlapping clusters
A technique for identifying overlapping clusters of items in a data set. The technique may be used in connection with a social network or other on-line...
Social network recommended content and recommending members for
personalized search results
Architecture that provides a data structure to facilitate personalized ranking over recommended content (e.g., documents). The data structure approximates the...
GUI based web search
An exemplary computer implemented graphics-based Web search system includes a search input control and a results presentation control where the search input...
Analysis stack for complex event flows
Methods, systems, and computer-readable media to analyze a CEP query are disclosed. A particular analysis module is configured to receive data associated with...
A data collector may monitor a data source and identify updated data, which may be processed and prepared for inclusion into a search database. The data...
Protecting privacy of personally identifying information when delivering
Techniques are disclosed herein for protecting personally identifying information (PII) and behavioral data while delivering targeted assets. In one aspect, a...
Program code simulator
A system and method for facilitating simulation of a computer program. A program representation is generated from a computer program. A simulation of the...