At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Building call tree branches and utilizing break points
The claimed subject matter provides systems and mechanisms that create frame accurate call trees for threads. The system can include devices that determine the...
Compile-time context for dynamically bound operations
Compile-time context information is captured and provided to a runtime binder for dynamic features in programming languages. For example, a C# run-time binder...
System and method for sharing objects between applications in a virtual
The techniques and mechanisms described herein are directed at sharing objects between applications executing in a virtual runtime environment. The techniques...
Mapping breakpoints between web based documents
The present invention extends to methods, systems, and computer program products for mapping breakpoints between Web based documents. Embodiments of the...
Techniques for offering and applying code modifications
Various technologies and techniques are disclosed for offering and applying source code modifications based upon a context of a user in a development...
Object model for a user interface
Various embodiments provide techniques and processes for defining elements of a user interface (UI) using a tree of objects created based on a markup language....
Memory object relocation for power savings
A computer system may manage objects in memory to consolidate less frequently accessed objects into memory regions that may be operated in a low power state...
Extensible account authentication system
Systems and methods directed at enhancing the capability of a federated authentication system by configuring the system with extensibility points for adding new...
Method and system for validating access to a group of related elements
A method and system for validating access to a group of related elements are described. The elements within the group access a security context associated with...
Audio start service for Ad-hoc meetings
An audio start service method for enabling and scheduling ad hoc distributed meetings. Only a short (in some embodiments less than or equal to about 32 bits)...
Merging registry keys
Two or more separate physical Registry directories are presented as a single (virtual) Registry directory to an application running in a controlled execution...
Method and system for unified audio control on a personal computer
A system and method for improved audio controls on a personal computer is provided. The system and method provide a unified architecture for audio controls...
Probabilistic object relocation
Object relocation often involves a multi-word copy of the object from a source memory to a destination memory, followed by updating the references (e.g.,...
User experience for multiple simultaneous connections on an instant
Methods, computer-readable storage media, and systems for establishing multiple simultaneous connections on an instant messaging program to enhance the user...
Educational adaptive provider architecture
The educational adaptive provider architecture described herein provides a way for an educational services framework to be built on varying underlying existing...
Transparent migration of TCP based connections within a network load
A method and system for enhancing a network load balancing system's ability to distribute connection information and data amongst the plurality of nodes within...
Monitoring network performance to identify sources of network performance
A method of measuring, for communication paths between a networked computer and at least one other networked computer connected via a network performance,...
Network event notification and delivery
Described are a main host system of the client computer, and a network event notification system, including a networking subsystem that communicates with a...
Method and system for implementing group policy operations
A system and method for performing various operations on group policy objects, by manipulating group policy objects as a single entity to perform backup,...
E-mail tool management shell command set
A method to execute verb-noun cmdlets to retrieve mailbox information or receive connector information from an e-mail server includes opening an e-mail...
Outsourcing of email hosting services
A system, a method and computer-readable media for initiating the hosting of email for an Internet domain name. A secure communication channel is established...
Integrated network and application session establishment
A session manager recognizes the creation of a new collaboration session and creates a new network connection to host the collaboration session using...
Applying a model of a persona to search results
A data search and retrieval system that, in response to a search query, applies a model to search results to generate information to be returned to a user. The...
Stashing of locally persisted data to network accessible storage
Techniques are disclosed for identifying and stashing all or portions of application data to a network accessible storage device or location. Identifying and...
Segmentation and profiling of users
The formulation of a profile group of users by defining segments using a function as applied to a single attribute, and combining them with set operations. The...
Facet-based interface for mobile search
Various technologies and techniques are disclosed that improve data searching on mobile devices. A facet-based search application is provided that has a filter...
Classifying search query traffic
A method for classifying search query traffic can involve receiving a plurality of labeled sample search query traffic and generating a feature set partitioned...
Related search queries for a webpage and their applications
An inversion of the basic format of searching is provided herein. Instead of receiving a search query and providing web page results, a search engine receives a...
Providing suggested sites associated with target sites
Systems, methods, and computer storage media having computer-executable instructions embodied thereon that facilitate providing suggested sites in accordance...
Ranking documents based on a series of document graphs
Ranking documents based on a series of web graphs collected over time is provided. A ranking system provides multiple transition probability distributions...
Using related users data to enhance web search
The claimed subject matter provides a system and/or a method that facilitates generating a personalized query result for a specific user. An interface can...
Using behavior data to quickly improve search ranking
Systems and methods for applying user behavior data to improve search query result ranking are provided. Upon receiving an update file indicating that recent,...
Rapid update of index metadata
Systems and methods for performing an updating process to an in-memory index are provided. Upon receiving notice of document modifications covered by an...
Replica placement and repair strategies in multinode storage systems
A multimode storage system uses a global-placement and local-repair strategy for replica placement and repair of data objects. The data objects are initially...
The claimed subject matter provides systems and/or methods that facilitate generating an inference about events that may not have yet been observed. Open-world...
Packet schema for pay-as-you-go service provisioning
Methods and a program of instruction provide a packet schema framework for communication between elements of a pay-as-you-go business model including a...
Method and system for protecting game related content in a centralized
A processor implemented method, system and computer readable medium for performing transactions of user generated content in a centralized marketplace is...
Sequence of algorithms to compute equilibrium prices in networks
The claimed subject matter provides an architecture for facilitating equilibrium solutions for resource allocation markets. One particular example of such...
Cloud computing resource broker
Embodiments for interacting with cloud computing providers are disclosed. In accordance with at least one embodiment, a resource broker receives a request for a...
Dialog repair based on discrepancies between user model predictions and
speech recognition results
An architecture is presented that leverages discrepancies between user model predictions and speech recognition results by identifying discrepancies between the...
HMM-based bilingual (Mandarin-English) TTS techniques
An exemplary method for generating speech based on text in one or more languages includes providing a phone set for two or more languages, training multilingual...
Paraphrasing the web by search-based data collection
String-oriented web queries are utilized as a tool to examine the fabric of how words, phrases and/or n-grams alternate in a language. This fabric is exploited...
Determining velocity using multiple sensors
A system described herein includes a receiver component that receives first velocity data that is indicative of a velocity of a vehicle over a period of time,...
Queries as data for revising and extending a sensor-based location service
The claimed subject matter provides systems and/or methods that facilitate automatically maintaining a database of base stations. A location component can...
Digital video segment identification
An entertainment system, having a capability to playback a stored digital video record that includes frames of video data received from a television broadcast...
Non-dyadic spatial scalable wavelet transform
A non-dyadic spatial scalable wavelet transform may scale an original digital video frame or digital image at a non-dyadic ratio. The digital video frame or...
Removal of image artifacts from sensor dust
Removal of the effects of dust or other impurities on image data is described. In one example, a model of artifact formation from sensor dust is determined....
Efficient encoding of alternative graphic sets
Embodiments provide for efficient encoding and rendering of remote graphic displays by applying one or more of the following: (1) field encoding for identifying...
Feature selection and extraction
Image feature selection and extraction (e.g., for image classifier training) is accomplished in an integrated manner, such that higher-order features are merely...
Graphically encoded data copy and paste
In accordance with one or more aspects, at a first device both an indication of data to be copied and a request to perform graphical copying of the data is...