At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Semantic advertising selection from lateral concepts and topics
Advertisements are selected for presentation on search result pages and web pages based on phrases generated from lateral concepts and topics identified for the...
Health-related opportunistic networking
A wireless opportunistic network that can facilitate data transfer by way of interconnected devices is disclosed. In accordance with this opportunistic network,...
In differential and non-differential analyses, composite images derived from replicates of liquid-chromatography/mass-spectrometry processes can provide...
The disclosure relates to communication devices which monitor an audio environment at a remote location and convey to a user a representation of that audio...
Computing modular polynomials modulo large primes
Systems and methods for computing modular polynomials modulo large primes are described. In one aspect, the systems and methods generate l-isogenous elliptic...
Method and apparatus for reducing timestamp noise in audio echo
A communication end device of a two-way communication system is shown. The device includes an audio signal capture device for capturing local audio to be...
Multimedia stream compression
A computer may be remotely accessed. At a first location, display commands are generated. The display commands are covered into a compressed video data stream....
Data-driven model implemented with spreadsheets
Visual items may each be constructed and placed in position using logic defined by a view component corresponding to each visual item, where that logic may...
Dynamic search result highlighting
A dynamic highlighting system initially applies a high-level highlight to occurrences of one or more keywords in a search result that fades to a low-level...
Display screen with graphical user interface
Display screen with animated graphical user interface
Providing access to a data item using access graphs
An approach is described for controlling access to a data item using one or more access graphs. The approach entails distributing a compact package of...
Real-time network malware protection
A Network State Database (NSD) can comprise information regarding the network-centric state of one or more computing devices connected to a network. The...
One or more techniques and/or systems are disclosed for providing recommendations for an add-on to a base program operating on a computing device, thus allowing...
Anti-virus scanning of partially available content
A client device transmits requests via a gateway to a server in a network environment. The requests indicate specific portions of a file on a server to be...
Direct peripheral communication for restricted mode operation
A computer that self-administers operating in restricted and unrestricted operating modes boots from a main processor and operates normally in the unrestricted...
Communication abuse prevention
Communication abuse prevention techniques are described. In an implementation, a reputation level for a communication is determined based on relation...
In a virtualization environment, there is often a need for an application to access different resources (e.g., files, configuration settings, etc.) on a...
Multi-threaded processes for opening and saving documents
Tools and techniques are described for multi-threaded processing for opening and saving documents. These tools may provide load processes for reading documents...
Translating late bound LINQ expressions into database queries
There is alteration of a late-bound expression produced by a compiler into an early-bound structure. Alteration of the late-bound expression can occur at...
Handling external content in web applications
A media and method for detecting third-party content in web pages is provided. Computer software operates on a server or a client-side computer to identify and...
Command user interface for displaying selectable software functionality
An improved user interface is provided for displaying selectable software functionality controls and for presenting logical groupings of particular ...
Dynamic feature presentation based on vision detection
Computer-readable media, computerized methods, and graphical user interfaces (GUI's) for interactively presenting features within the panes of a display area...
Content aware adaptive display
Content aware adaptive display is described. In embodiment(s), a media image can be displayed on an integrated display of a media device. The media device can...
Incorporated handwriting input experience for textboxes
Textboxes are provided to support both standard textbox operations and handwriting input. A textbox may be displayed as a standard textbox, receive input from a...
XML based form modification with import/export capability
A form user interface modification engine for use in customizing forms of an application is provided. The modification engine includes an export component which...
Dynamically mediating multimedia content and devices
Embodiments of the invention provide a communication network having a plurality of communication devices capable of transferring content wirelessly. The...
Dynamically replicated memory
Dynamically replicated memory is usable to allocate new memory space from failed memory pages by pairing compatible failed memory pages to reuse otherwise...
One-time password access to password-protected accounts
Systems and methods facilitate secure one-time-password access to an account in a remote server from an untrusted client. The system consists of an intermediary...
Non-volatile memory cache performance improvement
In order to provide a more efficient persistent storage device, one or more long-term storage media are included along with a non-volatile memory. In one...
Modifying delete notifications in a storage stack
A filter between a filesystem and a storage device in a storage stack can be configured to modify a delete notification, such as by modifying an existing delete...
Preventing access to a device from an external interface
Prior to customer use of a device, communication with the device is allowed via multiple pins of an external interface of the device. One or more pins of the...
Methods and systems for compressing data packets
Systems and methods for providing network access, e.g. Internet access, are described. An architecture includes a host organization network through which...
Peer name resolution protocol simple application program interface
An application program interface (API) for sending and receiving endpoint registration data and peer-to-peer network cloud data has a registration call for...
Bandwidth and latency controller
Systems and methods described relate to controlling bandwidth and latency in a remote computing environment. A controller establishes a remote session between a...
Tracking of electronic mail messages
Electronic mail messages are tracked for the sender by allowing the sender to flag the electronic mail messages. Flagging the electronic mail messages allows...
Email management based on user behavior
Methods for assisting email users manage email messages received in an email account. An event is triggered by an action performed by an email user with respect...
Systems and methods for conducting internet content usage experiments
A system and method for efficiently executing a plurality of live parallel Internet content usage experiments using a large pool of randomly selected...
Adaptive content load balancing
Adaptive content load balancing is described. In an embodiment, client requests for media content are received and service node(s) are determined that can...
Technologies for detecting erroneous resumptions in a continuation based
Technologies for enabling a continuation based runtime to accept or reject external stimulus and, in addition, to determine if an external stimulus may be valid...
Highly reliable and scalable architecture for data centers
The present invention provides a highly reliable and scalable architecture for data centers. Work to be performed is divided into discrete work units. The work...
Exclusive scope model for role-based access control administration
Architecture that creates a class of role-based scopes that can be declared "exclusive", which automatically means that no user can access the scope unless the...
Boosting algorithm for ranking model adaptation
Model adaptation may be performed to take a general model trained with a set of training data (possibly large), and adapt the model using a set of ...
Translating queries to representational state transfer (REST)
Query expressions, such as LINQ (language integrated queries) queries, are enabled to be translated to URIs (uniform resource indicators) that may be used to...
A document classifier may analyze documents for a search engine and tag the documents. A document classifier system may have several different classifiers, each...
Systems and methods for modeling partitioned tables as logical indexes
Technologies for forming logical indexes and utilizing such indexes so as to abstract many of the complexities resulting from referencing partitioned database...
Adaptive crawl rates based on publication frequency
Methods and systems for determining an adaptive crawl rate for a Web crawler based on historical publication data from a Web source are provided. A frequency of...
Custom local search
A method described herein includes receiving a query that is configured by an issuer of the query to be utilized to retrieve a portion of local search content,...
Atomic multiple modification of data in a distributed storage system
Atomic multiple modifications of streams is provided. Streams are selected for the application of an atomic multiple modification. A lock is acquired on the...
Quantization and inverse quantization for audio
An audio encoder and decoder use architectures and techniques that improve the efficiency of quantization (e.g., weighting) and inverse quantization (e.g.,...