At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Tier splitting support for distributed execution environments
A spectrum of tier-splitting mechanisms facilitates distributed programming. A rich application model and associated tools enable programmers to write rich...
High level programming extensions for distributed data parallel processing
General-purpose distributed data-parallel computing using high-level computing languages is described. Data parallel portions of a sequential program that is...
Various technologies and techniques are disclosed for retargeting applications to different types. A development environment is provided for writing software....
Context pane with semantic zoom
Technologies are described herein for providing a context pane with semantic zoom. A content interface including a content pane and a context pane is provided....
Virtual address bar user interface control
A virtual address bar user interface control is presented. The virtual address bar includes a plurality of interactive segments, each segment corresponding to a...
Summarization of attached, linked or related materials
A summarization system and method. The summarization method includes utilizing a first body of information to obtain a second body of information, which is...
Mathematical expression buildup and builddown
Systems and methods for manipulating mathematical expressions in a computer system. A system can include a builddown module programmed to builddown a...
Maintaining undo and redo capability across metadata merges
A method is presented for preserving metadata during an undo operation at a client computer. A first section of a document is modified on a word processing...
Optimizing XOR-based codes
A "code optimizer" provides various techniques for optimizing arbitrary XOR-based codes for encoding and/or decoding of data. Further, the optimization...
Capturing and loading operating system states
Operating system states capture and loading technique embodiments are presented that involve the capture and loading of baseline system states. This is...
Offline device-side logical unit number controller
Described is a technology by which a single physical storage device such as a USB flash memory device is able to boot different computing devices via...
A device identifier (ID) is used across enterprise boundaries. A user can use the device ID to publish a device for sharing with other remote users. The remote...
Web feed presence
Web feed presence techniques are described herein. In an implementation, a method includes obtaining a web feed describing content of the user and presence data...
Bitmap transfer-based display remoting
A bitmap transfer-based display remoting by a server coupled to a client is described. Specifically, an application executing on the server implements...
Automatic user interface generation for entity interaction
Architecture that allows a developer to create an application quicker by providing an engine that automatically creates pieces of an application user interface...
Efficient functional representation of result shaping
A result shaping methodology is part of a bridge (translation layer) between an entity provider and an underlying store provider. The bridge accepts command...
Emphasizing search results according to conceptual meaning
Computer-readable media, computerized methods, and computer systems for conducting semantic processes to present search results that include highlighted regions...
Providing suggestions of related videos
Methods are provided for identifying media files that are related to a user-selected media file. Initially, a first set of media files that have previously been...
Incremental update scheme for hyperlink database
A database of hyperlinks, stored in a hyperlink store or distributed across multiple machines such as a scalable hyperlink store, may be incrementally updated....
Measurement-only topological quantum computation
Measurement-only topological quantum computation using both projective and interferometrical measurement of topological charge is described. Various issues that...
Online services offer management
Online services offer modeling is provided. A system for managing online offers for products and services includes a components module, an offer module, a...
Personal audio-video recorder for live meetings
A unique recording system and method that facilitates recording live meetings, discussions or conversations whereby such recordings are available for immediate...
Uncertainty interval content sensing within communications
Repetition of content words in a communication is used to increase the certainty, or, alternatively, reduce the uncertainty, that the content words were actual...
Grammatical element generation in machine translation
Grammatical element prediction is used in the context of machine translation. Features from both the source language and the target language sentences (or other...
Machine translation split between front end and back end processors
A method of translation includes uploading a source text portion to a back end processor. The back end processor identifies a subset of translation knowledge...
Providing secret information in a multiplayer game
A system and methods for conveying private information to a player in a multiplayer game being viewed by multiple players on a single screen. Each player is...
Discovering an event using a personal preference list and presenting
matching events to a user on a display
A user profile is used to assist a user in identifying events of interest and to provide context to users regarding events that matches user preferences. The...
Image descriptor quantization
Image descriptor quantization technique embodiments are presented which quantize an image descriptor defined by a vector of number elements. This is generally...
Migration of computer secrets
Described is a technology by which computer data secrets sealed by a trusted platform module (TPM) or like device may be securely migrated from a physical...
Video coding using spatio-temporal texture synthesis
Systems and methods for video coding using spatio-temporal texture synthesis are described. In one aspect, a video data coding pipeline portion of the codec...
Quantization and differential coding of alpha image data
Alpha images are efficiently encoded for inclusion in video bitstreams. During encoding, alpha image data is quantized as a first step before differential...
Rating effort input device
A rating mechanism may calculate a rating based on a user's effort and duration of input to an input mechanism. The more effort and time a user exerts, the more...
Selective filtering of network traffic requests
Several approaches to selectively filtering network traffic are described. One approach involves a system for selectively filtering network traffic. The system...
Method, device and system for imaging
There is provided a novel method, device and system for imaging. According to some embodiments of the present invention, a visible light image sensor array...
Embodiments that provide multi-video synthesis are disclosed. In accordance with one embodiment, multi-video synthesis includes breaking a main video into a...
Support for batching of events, and shredding of batched events in the
RFID infrastructure platform
The claimed subject matter provides a system and/or a method that facilitates receiving data from at least one device. A radio frequency identification (RFID)...
Display screen with user interface
Network accountability among autonomous systems
Accountability among Autonomous Systems (ASs) in a network ensures reliable identification of various customers within the ASs and provides defensibility...
Detection of hardware-based virtual machine environment
A method and a processing device are provided for detecting a hardware-based virtual machine environment. An execution time of a privileged instruction may be...
Automated event correlation
Events captured at an application are compared to event correlation instances, wherein an event correlation instance represents a relationship between events of...
Browser elements for communicating with other browser elements and with
A method includes executing a web script by a browser element to access a web service executing on a web server and providing access to a web application,...
Updating offline virtual machines or VM images
Methods and systems for updating a virtual machine image. The virtual machine image may be stored as a collection of one or more virtual hard disk files. The...
Graphical web browser history toolbar
The present subject matter describes a graphical web browser toolbar the stores visual representations of user-selected web pages. A saved page is included in...
Graphical user interface for multi-frame presentation
A computing device configured to execute computer code to generate a graphical user interface (GUI) for creating a multi-frame presentation is provided. The...
Enhanced find and replace for electronic documents
An enhanced find and replace feature for a spreadsheet program module is disclosed. The enhanced find and replace feature allows users to search for terms and...
Secure and usable protection of a roamable credentials store
A tool which facilitates a balancing of security with usability enabling secure user access to multiple secure sites and locations from several computing...
Secure recovery in a serverless distributed file system
Systems and methods for secure file writes after a catastrophic event are allowed over an unauthenticated channel in a serverless distributed file system if an...
Tool for digitally signing multiple documents
A software tool for digitally signing multiple documents is disclosed. When a user wishes to sign multiple documents containing embedded executable code for...
Over the air communication authentication using a device token
A system and method are described for securing over the air communications between a service and a communication device. For example, one embodiment of a method...
Efficient size optimization of visual information or auditory information
A file, including visual information or auditory information may be uploaded to a processing device. Respective portions of content of the file may be...