At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Storage or removal actions based on priority
Techniques for providing content management services are described. Managing content services includes determining a value of content and determining storage...
Generating implicit labels and training a tagging model using such labels
A training module is described for training a conditional random field (CRF) tagging model. The training module trains the tagging model based on an...
Computationally efficient probabilistic linear regression
A computationally efficient method of performing probabilistic linear regression is described. In an embodiment, the method involves adding a white noise term...
Channel extension coding for multi-channel source
A multi-channel audio decoder reconstructs multi-channel audio of more than two physical channels from a reduced set of coded channels based on correlation...
Word clustering for input data
A clustering tool to generate word clusters. In embodiments described, the clustering tool includes a clustering component that generates word clusters for...
Identifying parallel bilingual data over a network
A set of candidate documents, each of which may be part of a bilingual, parallel set of documents, are identified. The set of documents illustratively includes...
Integrated native language translation
A method and apparatus provide for performing language translation by obtaining a selection of a language preference for presentation of text and/or speech on...
Playback of digital images
A method of displaying digital images is described in which a display length indicator is received and digital images are accessed. A set of digital images are...
Identifying portions of an image for cropping
Cropping images while retaining the relevant portions of the images. The images are cropped based on an orientation of the images. For the images having a...
Multi-label multi-instance learning for image classification
Described is a technology by which an image is classified (e.g., grouped and/or labeled), based on multi-label multi-instance data learning-based classification...
Labeling image elements
An image processing system is described which automatically labels image elements of a digital image. In an embodiment an energy function describing the quality...
Grammatical parsing of document visual structures
A two-dimensional representation of a document is leveraged to extract a hierarchical structure that facilitates recognition of the document. The visual...
Learning string transformations from examples
Techniques are described to leverage a set of sample or example matched pairs of strings to learn string transformation rules, which may be used to match data...
Segmenting image elements
A method of segmenting image elements into a foreground and background is described, such that only the foreground elements are part of a volume of interest for...
Method and system for automatically generating world environment
reverberation from a game geometry
Reverberation parameters for one or more positions of interest are derived from graphics data used for displaying a computer-generated environment. For each...
Estimating sample-domain distortion in the transform domain with rounding
Techniques and tools are described for compensating for rounding when estimating sample-domain distortion in the transform domain. For example, a video encoder...
Metadata schema for interpersonal communications management systems
A system and method for generating, managing and accessing a schema that facilitates maximizing utility of a managed communication is provided. The system...
Wireless support for portable media player devices
A portable media player device is capable of operating in a wireless network. The wireless portable media player device can bootstrap and synchronize with an ad...
Selectively disabling reliability mechanisms on a network connection
Computerized methods, systems, and computer-storage media for establishing and managing a transmission control protocol (TCP)-based tunnel ("tunnel") are...
Capturing reflected light from a sampling surface
A mechanism is disclosed for capturing reflected rays from a surface. A first and second lens aligned along a same optical center axis are configured so that a...
Strategies for processing media information using a plug-in processing
module in a path-agnostic manner
A media processing framework includes multiple media processing paths. At least one of the media processing paths includes a media processing pipeline which is...
Efficient buffering of data frames for multiple clients
The efficient buffering of image data for a plurality of clients is disclosed. One disclosed embodiment comprises an optical touch-sensitive device configured...
Contextual control of dynamic input device
A computing system includes one or more input-device user-interface runtime applications to dynamically display images on a dynamic input device. The one or...
System and method for acquiring a target with intelligent pointer movement
The present invention is generally directed to assisting users to position a pointer on a target. Embodiments of the present invention provide a system, method,...
Advanced inductive charging pad for portable devices
Systems and methodologies for efficient inductive charging of electronic devices are provided herein. A charging device as described herein can utilize a...
Application-centric user interface techniques
Various application-centric user interface techniques are described. A user can easily launch, add, or update applications. An application-centric activity...
Display screen with set of icons
Controlling access to multiple pieces of content of a presentation
In one or more embodiments, a license associated with a first piece of content can grant rights with respect to a second and/or additional pieces of content....
Using trusted third parties to perform DRM operations
Various embodiments utilize a third party, such as a trusted third-party, to perform DRM operations such as "move" operations. In at least some embodiments, the...
Extensible network discovery
A computer system that can configure itself to establish a network connection. Configuration is performed by identifying a connection profile with information...
Resource based dynamic security authorization
Access to a resource by sandboxed code is dynamically authorized by a client security system based on a resource based policy. A sandboxed application running...
Software-configurable and stall-time fair memory access scheduling
mechanism for shared memory systems
Systems and methodologies for stall-time fair memory access scheduling for shared memory systems are provided herein. A stall-time fairness policy can be...
Temporal batching of I/O jobs
Batching techniques are provided to maximize the throughput of a hardware device based on the saturation point of the hardware device. A balancer can determine...
Offline migration from prior operating system installation
Migration of data relevant to, or associated with, one or more users from a prior operating system installation to a new operating system installation can be...
Networked deployment of multi-application customizations
A user node receives a multi-project solution which includes customizations that collectively extend installed applications. The customizations are installed on...
Content formatting and installation techniques
Content formatting and installation techniques are described. In an implementation, a method includes receiving one or more inputs for initiating an...
Standardized mechanism for firmware upgrades of RFID devices
The claimed subject matter provides a system and/or a method that facilitates managing a device within a radio frequency identification (RFID) network. A radio...
Application programming interface for administering the distribution of
software updates in an update...
An application programming interface (API) for administering the distribution of software updates on an update service node is presented. The API provides a...
Management of software and operating system updates required for the
process of creating a virtual machine...
Disclosed are techniques for using known update technologies to automatically identify the updates installed on a physical machine prior to facsimile creation,...
Building call tree branches and utilizing break points
The claimed subject matter provides systems and mechanisms that create frame accurate call trees for threads. The system can include devices that determine the...
Compile-time context for dynamically bound operations
Compile-time context information is captured and provided to a runtime binder for dynamic features in programming languages. For example, a C# run-time binder...
System and method for sharing objects between applications in a virtual
The techniques and mechanisms described herein are directed at sharing objects between applications executing in a virtual runtime environment. The techniques...
Mapping breakpoints between web based documents
The present invention extends to methods, systems, and computer program products for mapping breakpoints between Web based documents. Embodiments of the...
Techniques for offering and applying code modifications
Various technologies and techniques are disclosed for offering and applying source code modifications based upon a context of a user in a development...
Object model for a user interface
Various embodiments provide techniques and processes for defining elements of a user interface (UI) using a tree of objects created based on a markup language....
Memory object relocation for power savings
A computer system may manage objects in memory to consolidate less frequently accessed objects into memory regions that may be operated in a low power state...
Extensible account authentication system
Systems and methods directed at enhancing the capability of a federated authentication system by configuring the system with extensibility points for adding new...
Method and system for validating access to a group of related elements
A method and system for validating access to a group of related elements are described. The elements within the group access a security context associated with...
Audio start service for Ad-hoc meetings
An audio start service method for enabling and scheduling ad hoc distributed meetings. Only a short (in some embodiments less than or equal to about 32 bits)...
Merging registry keys
Two or more separate physical Registry directories are presented as a single (virtual) Registry directory to an application running in a controlled execution...