At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Use of scientific models in environmental simulation
Use of scientific models to generate graphical virtual environments is described. In an embodiment at least two different scientific models are used. Input data...
Protective shroud for handheld device
An apparatus for communicating with a handheld device (e.g., a cellular telephone) is provided herein. A protective shroud is configured to enclose the handheld...
Image processing using masked restricted boltzmann machines
Image processing using masked restricted Boltzmann machines is described. In an embodiment restricted Boltzmann machines based on beta distributions are...
Multi-view video coding based on temporal and view decomposition
A method and system for coding a multi-view video having multiple views based on temporal decomposition and view decomposition is provided. A multi-view video...
Path discovery and message transfer in partially connected mobile ad hoc
A method and system is presented for path discovery and asynchronous message transfer in a partially connected middleware communication space comprising mobile...
VoIP contextual information processing
A method and system for processing contextual information relating to an exchange of a conversation over a communication channel is provided. Several users,...
Optimized transport protocol for delay-sensitive data
Transmission delays are minimized when packets are transmitted from a source computer over a network to a destination computer. The source computer measures the...
Display screen with user interface
Users with mobile computing devices author skywriting and submit them to a virtual skywriting service. A mobile computing device having wireless network access...
Displaying a security element to help detect spoofing
A security element is displayed that provides information to a user to help ensure that they are not confused or misled into believing that content originates...
Immunizing HTML browsers and extensions from known vulnerabilities
An exemplary computer-implementable method (300) transforms or "immunizes" information to reduce or eliminate risk of exploitation of a known vulnerabilty of a...
Licensing protected content to application sets
The present invention extends to methods, systems, and computer program products for licensing protected content to application sets. Embodiments of the...
Multiple security token transactions
Embodiments of multiple security token transactions are described herein. One or more of the described techniques may be utilized to provide, in a single...
Auditing authorization decisions
The auditing of authorization decisions is facilitated by integrating or coupling an audit policy to access control decisions. In an example implementation, an...
Systems and methods for dynamic conversion of web content to an
interactive walled garden program
Systems and methods to dynamically convert Web content to an interactive program for display on resource constrained television clients are described. In...
Merging electronic program guide information
Techniques are disclosed herein for merging EPG data associated with a variety of program sources. In one aspect, EPG data is accessed for different program...
Processing files from a mobile device
The presently described subject matter allows the user to interactively browse a collection of electronic files, such as a digital photo collection, remotely...
On-the-fly replacement of physical hardware with emulation
Various aspects are disclosed herein for replacing the hardware backing the memory locations associated with a virtual machine with a backing mechanism. The...
POS hardware abstraction
A framework for point of sale system is discussed. The framework includes an application program stored on a tangible computer medium. When executed by a...
Managing software lifecycle
The present invention extends to methods, systems, and computer program products for managing software lifecycle. Based on declarative models and knowledge of...
Cache metadata identifiers for isolation and sharing
Various technologies and techniques are disclosed for providing software accessible metadata on a cache of a central processing unit. A multiprocessor has at...
Method for testing a system
In a method for testing a system, the technology initially accesses a database having a plurality of stand-alone pieces-of-code. Each piece-of-code includes a...
Debugging interpreted input
A method and system to implement debugging interpreted input is described herein. One or more Intermediate Language (IL) islands are generated. Each IL island...
Dynamic configuration of unified messaging state changes
The subject invention relates to systems and methods that enable dynamic programming and execution of an electronic communications dialog. In one aspect, a...
Aggregation of PC settings
Systems and methods for enabling users to roam between networking environments are disclosed. In one embodiment, different machine settings may be stored in a...
Managing display of user interfaces
Managing a display of a user interface. In one implementation, a first user interface and an option to change the first user interface to a second user...
Computer desktop use via scaling of displayed objects with shifts to the
The present invention relates to facilitating multi-tasking in a computing environment. A focus area component defines a focus area within a display space--the...
Method and apparatus for constructing representations of objects and
A method of constructing a representation of an object having at least one property includes identifying at least one property group associated with the object...
Identifying unique content in electronic mail messages
Unique content in interrelated email messages is identified and duplicate content filtered out for user friendly display of a flow of exchange within the...
Method and system for displaying information on a user interface
A method and system for displaying information in a user interface of a computer program uses documents, such as mark-up language documents and style-sheet...
Supplying enhanced computer user's context data
Techniques are described for providing information about a current state that is modeled with multiple state attributes. In some situations, the providing of...
Connected templates in connection with a content management server system
or the like
A data system has a data structure with a posting corresponding to a set of pieces of content to be served. The posting includes a description of each piece of...
Dynamic web page behavior
In some embodiments, code can be encapsulated in an external behavior component for affecting the behavior of an element inserted into an HTML document. A...
Extensible cache-safe links to files in a web page
Linking content and functionality files in a cached client-side web page to a corresponding server-side web page is provided so that a client-side browsing...
Monitoring service endpoints
Today, data networks are ever increasing in size and complexity. For example, a datacenter may comprise hundreds of thousands of service endpoints configured to...
Energy-aware server management
The described implementations relate to energy-aware server management. One implementation involves an adaptive control unit configured to manage energy usage...
Hierarchical scalable memory allocator
Aspects of the subject matter described herein relate to memory management. In aspects, a hierarchical, customized memory allocator may be created that...
Controlling memory visibility
Embodiments are disclosed herein that are related to controlling the visibility of a portion of memory in a hardware device. For example, one disclosed...
Mechanism to verify physical proximity
Two participants may observe periodic data sources available only in the vicinity of physical trust (i.e. a wifi beacon). If an initial test of whether each...
Managing stored data on a computer network
A method and system for managing stored data on a computer network organizes data into logical volumes, and each logical volume has a friendly name associated...
Strategies for compressing information using bloom filters
A strategy is described for constructing bloom filter information and exception information. The bloom filter information is constructed to express a set of...
Spam filtration utilizing sender activity data
Spam is identified by computing sender reputation derived from historical activity data across counts for various categories. A spam filter or machine learning...
Missed instant message notification
A method and system for capturing missed communications is provided. An enhanced real-time communication system receives a communication from an initiating...
Relevance-based expiration of data
Technologies are described herein for relevance-based expiration of data. An initial expiration time for the data is computed based upon an expiration duration...
Automatically sharing a user's personal message
Described techniques enable a particular user to automatically share a piece of content with a group of users. To share the content, the particular user...
Object similarity search in high-dimensional vector spaces
An object search system generates a hierarchical clustering of objects of a collection based on similarity of the objects. The object search system generates a...
Relevant individual searching using managed property and ranking features
Embodiments are configured to provide information relevant to individuals of interest to a searching user. In an embodiment, a method includes identifying...
Dynamic update of a web index
Systems and methods are provided for regularly updating a web index with new or updated content, such as meta words or meta streams, for a particular web page...
Search query extension
Methods, systems, and computer-readable media for search query extension are disclosed. A particular method retrieves a set of queries related to a search query...
Graph-processing techniques for a MapReduce engine
Systems, methods, and devices for sorting and processing various types of graph data are described herein. Partitioning graph data into master data and...