At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Communication across domains
Communication across domains is described. In at least one implementation, a determination is made that an amount of data to be communicated via an Iframe...
Cache-line aware collection for runtime environments
Target data is allocated into caches of a shared-memory multiprocessor system during a runtime environment. The target data includes a plurality of data items...
Transport system for instant messaging
An exemplary method involves creating a master session over a first connection through a server; and creating a virtual channel over the connection, the virtual...
System and method for sharing information based on proximity
A method and system are provided for facilitating interaction between a device and a device environment. The system may include a detection module for...
Host accountability using unreliable identifiers
An IP (Internet Protocol) address is a directly observable identifier of host network traffic in the Internet and a host's IP address can dynamically change....
Programming techniques for distributed multi-party networks
Architecture for programming in a distributed computing environment where different components of a system are owned or controlled by different entities and...
System and method for replicating offline scheduling transactions from a
client to a server
A facility for replicating offline scheduling transactions directed to a server is provided. The facility is implemented as a client-side application that...
Presenting and manipulating electronic mail conversations
The present invention extends to methods, systems, data structures, and computer program products for organizing electronic mail messages into conversations....
Client-based caching of remote files
A lease system is described herein that allows clients to request a lease to a remote file, wherein the lease permits access to the file across multiple...
Dynamic keyword suggestion and image-search re-ranking
A content-based re-ranking (CBR) process may be performed on query results based on a selected keyword that is extracted from previous query results, and...
Techniques for exact cardinality query optimization
An exact cardinality query optimization system and method for optimizing a query having a plurality of expressions to obtain a cardinality-optimal query...
Representation of qualitative object changes in a knowledge based
framework for a multi-master synchronization...
The subject disclosure relates to synchronizing among network nodes in a multi-master synchronization environment that extend a knowledge based synchronization...
Synchronization is bound to data and optionally a set of synchronization behaviors as opposed to a particular application and/or endpoint. As a result,...
Predicting and using search engine switching behavior
Aspects of the subject matter described herein relate to predicting and using search engine switching behavior. In aspects, switching components receive a...
Modeling semantic and structure of threaded discussions
A simultaneous semantic and structure threaded discussion modeling system and method for generating a model of a discussion thread and using the model to mine...
Digital rights management system protecting consumer privacy
Technologies for a Consumer Privacy Digital Rights Management system based on stable partially blind signatures that enable a license server to provide licenses...
Speaker recognition via voice sample based on multiple nearest neighbor
A speaker recognition system generates a codebook store with codebooks representing voice samples of speaker, referred to as trainers. The speaker recognition...
Noise suppressor for robust speech recognition
Described is noise reduction technology generally for speech input in which a noise-suppression related gain value for the frame is determined based upon a...
Diagnostic evaluation of machine translators
A system for evaluating translation quality of a machine translator is discussed. The system includes a bilingual data generator configured to intermittently...
Identifying language origin of words
The language of origin of a word is determined by analyzing non-uniform letter sequence portions of the word.
Slot-cache for caching aggregates of data with different expiry times
Techniques for collecting and displaying sensor data captured by a spatially and temporally representative sample of sensors requested in a search query are...
Determining computer system usage from logged events
Described is a technology by which logged events such as in a security event log (e.g., within a defined timeframe) are processed to determine logon times and...
Environment customization with extensible environment-settings data
Environment customization includes downloading extensible environment-settings data from a data-storage device and adjusting one or more environmental...
Smart interface system for mobile communications devices
A universal smart interface and peripheral management system for portable devices such as mobile phones. The smart system includes a connector interface that...
The claimed subject matter relates to a first architecture that can create an intensity map based upon intensity scores, and to a second architecture that can...
WiFi and GSM landmarks and neighborhoods for location based services
A system for capturing and delivering location-based information and services captures wireless landmark information sent by mobile devices to build a map of...
Cellular service with improved service availability
A cellular communication system in which overload of a base station is averted by offering users the option to communicate using a spectrum outside of the...
Image deblurring with blurred/noisy image pairs
Image deblurring with blurred/noisy image pairs is described. In one implementation, a system combines a blurred image with a corresponding noisy image of the...
Clustering videos by location
Described is a technology in which video shots are clustered based upon the location at which the shots were captured. A global energy function is optimized,...
Flexible matching with combinational similarity
Computer-readable media, systems, and methods for flexible matching with combinational similarity are described. In embodiments, an object image is received, a...
Microphone array signal enhancement
A system and method facilitating signal enhancement utilizing an adaptive filter is provided. The invention includes an adaptive filter that filters an input...
Adaptive truncation of transform coefficient data in a transform-based
digital media codec
A block transform-based digital media codec has a signaling scheme and bitstream syntax to flexibly signal that truncation of less significant information bits...
Harmonic quantizer scale
A digital media encoder/decoder performs quantization/dequantization based on quantization parameters taken from a harmonic quantizer scale. The harmonic...
Control channel negotiated intermittent wireless communication
A dual mode communication device utilizes a control channel to exploit diversity, history, and context in advance of establishing a broadband data exchange...
Detecting touch on a surface via a scanning laser
The detection of touch on an optical touch-sensitive device is disclosed. For example, one disclosed embodiment comprises a touch-sensitive device including a...
An indirect calorimeter estimates nutritional caloric intake by periodically monitoring weight and sensing physical exercise (i.e., physiological data and/or...
Secure machine counting
A method and computer-readable medium for deterring software piracy in a volume license environment. An activation bypass message is generated and sent....
Personalized honeypot for detecting information leaks and security
A honeypot in a computer network is configured for use with a wide variety of computing resources that are defined by a network administrator or user which may...
Proxy-based malware scan
A system that employs out-of-process (`out-of-proc`) architectures with respect to malware scanning related to network services applications is provided. The...
Access authorization having embedded policies
A facility for receiving an embedded policy is provided. The facility checks an application program image for the presence of an embedded policy. If an embedded...
Monitoring presentation timestamps
Techniques to monitor presentation timestamps for content are described, which may be used to render content at a client. In an implementation, content is...
Anonymous aggregated data collection
An anonymous aggregated data collection system aggregates media access information in an anonymous data collection component without associating the media...
Version resiliency for a host application and managed code
A method and architecture for increasing version resiliency between a host application that is unmanaged code and managed code is provided. A version resiliency...
Program synthesis and debugging using machine learning techniques
One embodiment is directed to synthesizing code fragments in a software routine using known inputs and corresponding expected outputs. A computer system...
Test automation using virtual machines
Techniques are described that perform software testing using virtual machines on dedicated or underutilized available computing devices. One or more virtual...
Unified expression and location framework
Allowing a continuation based runtime to resolve different types of location expressions, value expressions, and/or locations. This may be accomplished using a...
Modeling and managing heterogeneous applications
The present invention extends to methods, systems, and computer program products for modeling and managing heterogeneous applications. Application intent can be...
Managing virtual port associations to users in a gesture-based computing
Techniques for managing virtual ports are disclosed herein. Each such virtual port may have different associated features such as, for example, privileges,...
Display of predicted storage state of target computing device during media
A system and method for synchronizing media files stored on a plurality of computing devices. The system includes a source computing device configured to...
Mediating conflicts in computer users context data
Techniques are described providing mediated information about a current state that is modeled with multiple state attributes. In some situations, the providing...