At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Speaker recognition via voice sample based on multiple nearest neighbor
A speaker recognition system generates a codebook store with codebooks representing voice samples of speaker, referred to as trainers. The speaker recognition...
Noise suppressor for robust speech recognition
Described is noise reduction technology generally for speech input in which a noise-suppression related gain value for the frame is determined based upon a...
Diagnostic evaluation of machine translators
A system for evaluating translation quality of a machine translator is discussed. The system includes a bilingual data generator configured to intermittently...
Identifying language origin of words
The language of origin of a word is determined by analyzing non-uniform letter sequence portions of the word.
Slot-cache for caching aggregates of data with different expiry times
Techniques for collecting and displaying sensor data captured by a spatially and temporally representative sample of sensors requested in a search query are...
Determining computer system usage from logged events
Described is a technology by which logged events such as in a security event log (e.g., within a defined timeframe) are processed to determine logon times and...
Environment customization with extensible environment-settings data
Environment customization includes downloading extensible environment-settings data from a data-storage device and adjusting one or more environmental...
Smart interface system for mobile communications devices
A universal smart interface and peripheral management system for portable devices such as mobile phones. The smart system includes a connector interface that...
The claimed subject matter relates to a first architecture that can create an intensity map based upon intensity scores, and to a second architecture that can...
WiFi and GSM landmarks and neighborhoods for location based services
A system for capturing and delivering location-based information and services captures wireless landmark information sent by mobile devices to build a map of...
Cellular service with improved service availability
A cellular communication system in which overload of a base station is averted by offering users the option to communicate using a spectrum outside of the...
Image deblurring with blurred/noisy image pairs
Image deblurring with blurred/noisy image pairs is described. In one implementation, a system combines a blurred image with a corresponding noisy image of the...
Clustering videos by location
Described is a technology in which video shots are clustered based upon the location at which the shots were captured. A global energy function is optimized,...
Flexible matching with combinational similarity
Computer-readable media, systems, and methods for flexible matching with combinational similarity are described. In embodiments, an object image is received, a...
Microphone array signal enhancement
A system and method facilitating signal enhancement utilizing an adaptive filter is provided. The invention includes an adaptive filter that filters an input...
Adaptive truncation of transform coefficient data in a transform-based
digital media codec
A block transform-based digital media codec has a signaling scheme and bitstream syntax to flexibly signal that truncation of less significant information bits...
Harmonic quantizer scale
A digital media encoder/decoder performs quantization/dequantization based on quantization parameters taken from a harmonic quantizer scale. The harmonic...
Control channel negotiated intermittent wireless communication
A dual mode communication device utilizes a control channel to exploit diversity, history, and context in advance of establishing a broadband data exchange...
Detecting touch on a surface via a scanning laser
The detection of touch on an optical touch-sensitive device is disclosed. For example, one disclosed embodiment comprises a touch-sensitive device including a...
An indirect calorimeter estimates nutritional caloric intake by periodically monitoring weight and sensing physical exercise (i.e., physiological data and/or...
Secure machine counting
A method and computer-readable medium for deterring software piracy in a volume license environment. An activation bypass message is generated and sent....
Personalized honeypot for detecting information leaks and security
A honeypot in a computer network is configured for use with a wide variety of computing resources that are defined by a network administrator or user which may...
Proxy-based malware scan
A system that employs out-of-process (`out-of-proc`) architectures with respect to malware scanning related to network services applications is provided. The...
Access authorization having embedded policies
A facility for receiving an embedded policy is provided. The facility checks an application program image for the presence of an embedded policy. If an embedded...
Monitoring presentation timestamps
Techniques to monitor presentation timestamps for content are described, which may be used to render content at a client. In an implementation, content is...
Anonymous aggregated data collection
An anonymous aggregated data collection system aggregates media access information in an anonymous data collection component without associating the media...
Version resiliency for a host application and managed code
A method and architecture for increasing version resiliency between a host application that is unmanaged code and managed code is provided. A version resiliency...
Program synthesis and debugging using machine learning techniques
One embodiment is directed to synthesizing code fragments in a software routine using known inputs and corresponding expected outputs. A computer system...
Test automation using virtual machines
Techniques are described that perform software testing using virtual machines on dedicated or underutilized available computing devices. One or more virtual...
Unified expression and location framework
Allowing a continuation based runtime to resolve different types of location expressions, value expressions, and/or locations. This may be accomplished using a...
Modeling and managing heterogeneous applications
The present invention extends to methods, systems, and computer program products for modeling and managing heterogeneous applications. Application intent can be...
Managing virtual port associations to users in a gesture-based computing
Techniques for managing virtual ports are disclosed herein. Each such virtual port may have different associated features such as, for example, privileges,...
Display of predicted storage state of target computing device during media
A system and method for synchronizing media files stored on a plurality of computing devices. The system includes a source computing device configured to...
Mediating conflicts in computer users context data
Techniques are described providing mediated information about a current state that is modeled with multiple state attributes. In some situations, the providing...
Use of overriding templates associated with customizable elements when
editing a web page
A method is presented for editing and saving a web page at a client based web-page editor. A rendered web page is received from a server computer and displayed...
Annotation detection and anchoring on ink notes
Systems and methods for detecting annotation digital ink strokes and further associating annotation digital ink strokes with word digital ink strokes are...
Automatically managing system downtime in a computer network
Embodiments are provided to automatically managing system downtime in a computer network. In one embodiment, an event is created in an application server to...
Memory management and recovery for datacenters
A system including a plurality of servers, a client, and a metadata server is described herein. The servers each store tracts of data, a plurality of the tracts...
Disc drive counterfeiting countermeasure
Counterfeiting of optical disc drives used with game systems is prevented by storing an obfuscated authentication key in firmware of the disc drive. Each disc...
Memory conflict detection via mapping of the physical heap to control
access permissions to the memory
A transactional memory system is described for reporting memory access violations which occur when memory accesses made from instructions within a transaction...
Controlling interference in shared memory systems using parallelism-aware
A "request scheduler" provides techniques for batching and scheduling buffered thread requests for access to shared memory in a general-purpose computer system....
Efficiently synchronizing with separated disk caches
In a method of synchronizing with a separated disk cache, the separated cache is configured to transfer cache data to a staging area of a storage device. An...
Dynamic call handling from multiple attached devices wherein devices
advertize its capabililes before...
Multiple peripheral devices are used for various modes of communication in a unified communication application. Employing standard or custom protocols,...
User-mode based remote desktop protocol (RDP) encoding architecture
Techniques are disclosed for a user-mode based remote desktop protocol (RDP) encoding architecture. A user mode desktop application and user mode virtual...
Geolocation mapping of network devices
A geographic location of a network device is determined using response delay times from internet servers used as landmarks. A coordination server provides to a...
Efficiently managing modular data storage systems
The management of a data storage system. The system may store data objects that are subject to change in container sets. The data storage system uses location...
Managing working set in an extensible message transfer system
Within a mail transfer agent of a message transfer system, a message is received and if the recipient entity resolves to a number of recipients exceeding a...
Media sharing and authoring on the web
Exemplary media browsing, searching and authoring tools allow for media interaction over a web. An exemplary method includes acquiring digital video data,...
Templates for configuring file shares
Aspects of the subject matter described herein relate to configuring file shares. In aspects, a template is created that includes policies to apply to one or...
Search macro suggestions relevant to search queries
Search macros suggestions are provided to refine a user's search. When a search query is received from an end user, one or more search macros are determined to...