At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Sharing and collaboration of search findings
Sharing of search histories is facilitated with a computer based system and method that allow a searcher to share search results generated without prior...
Period to date functions for time intelligence functionality
A system for extending a Time Intelligence language to provide support for period-to-date functions and for generating member sets in response to data queries...
Domain expertise determination
A user's domain expertise may be estimated through several factors by monitoring different aspects of a user's interaction with a web browser. Based on the...
Multi-ranker for search
Systems and methods for processing user queries and identifying a set of documents relevant to the user query from a database using multi ranker search are...
Extensible data provider querying and scheduling system
Embodiments provide an independent layer between an application user interface and various data sources so that both the user interface and data sources can be...
Database snapshot management
Technologies are described herein for managing database snapshots. One user interface is provided for managing the automated creation and deletion of database...
Transactional record manager
Transactional record management methods and systems enabling multiple independent servers (such as database servers) using shared storage to initiate...
Updating an engine using a description language
Functionality is described for sending updated engine logic to a user device. The engine logic is expressed in a description language, such as the extensible...
Method and apparatus for estimation of component gating and shortage risk
in manufacturing operations
A method for estimation of component gating risk in manufacturing operations is disclosed. The method includes generating an altered component plan by altering...
Audio output of a document from mobile device
Architecture for playing a document converted into an audio format to a user of an audio-output capable device. The user can interact with the device to control...
Predicate checking for distributed systems
Predicate checking in conjunction with distributed systems can enable an investigating user to check predicates in the context of instance states and/or...
T-cell epitope prediction
Epitope prediction models are described herein. By way of example, a system for predicting epitope information relating to a epitope can include a...
Wireless broadcasting of drive-times data
Either vehicle traffic or financial markets data is regularly broadcast in a fixed size packet over a wireless network in a push manner to one or more wireless...
Dual module portable devices
A dual module portable device may be provided. A motion of a first module of the dual module portable device may be detected. Based at least in part on the...
Multi-pass image resampling
Multi-pass image resampling technique embodiments are presented that employ a series of one-dimensional filtering, resampling, and shearing stages to achieve...
Accelerated image rendering
Systems and methods are presented for accelerated image rendering. In one implementation, the systems and methods receive digital image data and derive...
Remote user interface raster segment motion detection and encoding
Raster segment commands are generated by a delta encoder and are encoded for raster segments detected to have moved in the current frame with respect to a...
Recognition of tabular structures
A number of regions and partitions may be created based on input handwritten atoms and a grammar parsing framework. Productions for tabular structures may be...
Identification of objects in a 3D video using non/over reflective clothing
A method includes generating a depth map from at least one image, detecting objects in the depth map, and identifying anomalies in the objects from the depth...
Embedding content-based searchable indexes in multimedia files
Content-based analysis is performed on multimedia content prior to encoding the multimedia content in the rendering chain of processing. A content-based index...
Video decoding using created reference pictures
Reference pictures can be created to assist with video decoding. For example, a method for decoding video can comprise receiving an encoded video bit stream,...
Efficient file management through granular opportunistic locking
Improved methods and systems for granular opportunistic locking mechanisms (oplocks) are provided for increasing file caching efficiency. Oplocks can be...
Pseudo-overwriting data on write-once discs
A file system which is enabled to use a Metadata Partition instead of VAT for write-once discs, is provided by a pseudo-overwrite method. On applying this...
Method and apparatus using multiple sensors in a device with a display
In a device having a display, a change in focus for an application is used with a requested usage of a context attribute to change the amount of information...
Proxy direct 3-D device and remote rendering
Systems, methods and computer readable media are disclosed for an overlaying requester to send graphics commands to a game connected to the overlaying requester...
Color conversion with many input channels
A method and apparatus for color conversion useful for color devices having a large number of input channels, for example CMYK color printers having additional...
Extended and editable gamer profile
A user profile for an online gaming service is created. The user profile contains user gaming information received from a first location. The user profile is...
Taking cover in a simulated environment
An approach is described for instructing a player character to automatically take cover in a region of a simulated environment without receiving express...
Uniformly lighting a cylindrical cavity via a prism
Systems and methods are disclosed for substantially uniformly lighting a substantially cylindrical cavity using a minimal amount of light sources. The primary...
Display screen with user interface
Display screen with animated image
File system operation and digital rights management (DRM)
File system interaction with digital rights management (DRM) is facilitated by enabling one or more file system components to be DRM-aware. These one or more...
Radio-type interface for tuning into content associated with projects
A user can receive content relating to a common topic, such as a project, through a radio-type interface. A frequency or other indicator associated with the...
Secure control flows by monitoring control transfers
A cross-module detection system and method for detecting and monitoring control flow transfers between software modules in a computer system. The system and...
Malicious code infection cause-and-effect analysis
A malware analysis system for automating cause and effect analysis of malware infections is provided. The malware analysis system monitors and records computer...
Module interrogation techniques are described in which modules configured to rely upon one or more operating system features are interrogated to determine which...
Client application independent extensibility model
Information describing a type registration regarding which an action is being requested by the client application is received as one or more parameters of an...
Optimized virtual machine migration mechanism
A virtual machine management system may perform a three phase migration analysis to move virtual machines off of less efficient hosts to more efficient hosts....
Enterprise device driver management for operating system deployment
Enterprise driver management and image installation are described. In an implementation, a computer-implemented method is performed in which a determination is...
Internal test and manipulation of an application
System(s) and method(s) facilitate testing and manipulating an application internally within a client-server configuration coordinated by a communicator object....
Method for updating data in accordance with rights management policy
Disclosed is a method for dynamically applying a rights management policy to a message by allowing an administrator to associate certain rights management...
Metadata driven API development
The described method and system synchronizes source code with byproducts or artifacts of an application creation process. In one embodiment, a generation tool...
Runtime modification of data presented in a graphical element
The present invention provides ways for application programs to allow users to dynamically update data that is presented in a GUI element. In one aspect of the...
Incrementally designing electronic forms and hierarchical schemas
A system and method that enables a designer to build electronic forms and corresponding hierarchical schemas are described. Displays of hierarchical schemas,...
Environment-interactive context-aware devices and methods
Location-aware methods and systems are described. In one embodiment, a portable computing device determines its location by accessing one or more hierarchical...
User interface for displaying selectable software functionality controls
that are contextually relevant to a...
An improved user interface is provided for displaying selectable functionality controls that identifies the context of the object to which the user interface is...
Resource exhaustion prediction, detection, diagnosis and correction
Resource exhaustion is anticipated, a cause of the resource exhaustion is identified and options are identified to address the resource exhaustion.
Personal identification information schemas
A digital identity system includes a principal including an identity selector programmed to receive a security policy from a relying party, review a plurality...