At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Transactional debugger for a transactional memory system and detecting
Various technologies and techniques are disclosed for providing a debugger for programs running under a transactional memory system. When running a particular...
Implementing desired business logic functionality. The desired business logic functionality may include a number of individual functions. A number of computer...
Dynamic determination of actions on selected items on a report
Various technologies for processing a selection on an item on a report. In one implementation, a request to perform an action on the item may be received....
Dynamic help user interface control with secured customization
A method and system is disclosed for generating a help interface to present static help content and customized help content for an application. Help content...
Controlling access to data streams
Access to one or more data streams can be controlled by encrypting a description of how segments of the data streams can be assembled, for example, to produce...
Power efficient media playback on general purpose portable devices
A portable multifunction computing device optimizes cache storage when processing media files and the like. During a playback operation, the device caches as...
Aggregating connection maintenance to optimize resource consumption
Combining network connection maintenance operations that use a resource to extend battery life. Each of the network connections has a timer and a defined...
Methods and systems for providing secure access to a hosted service via a
The present invention discloses methods and systems for providing secure user access to services offered by a service provider to a client application over a...
Policy service system architecture for sessions created using STUN
Described herein are embodiments for setting, managing, and monitoring connection policies for a plurality of network paths from a first endpoint to a second...
Probabilistic mesh routing
Routing messages using unreliable routing data. A method includes receiving a message from a computer readable communication medium. Characteristic properties...
Tuning and optimizing distributed systems with declarative models
A system for automatically adjusting operation of a distributed application program includes analytics means having a monitoring component. The monitoring...
Method and apparatus for providing an instant message notification
An instant messaging client application is provided that receives requests to initiate instant messaging conversations and, in response to the requests,...
Content feedback for authors of web syndications
Transmit user feedback from a user to a web syndication author. A first communication link is opened. Content data from the web syndication author is received....
Workgroup application with contextual clues
A workgroup application with contextual clues. The workgroup application allows any one of multiple participants to provide input, such as commands to edit a...
Application programming interface for implementing directory service
access using directory service markup language
A set of DSML application programming interface (DSML API) functions is provided to facilitate the implementation of DSML-based directory service access. The...
Event stream conditioning
A distributed event processing system that can organize (e.g., order) input streams regardless of actual time of receipt is provided. This order may simply be...
Efficient paging of search query results
Methods and computer-readable media provide for efficient paging of search results in accordance with the access rights of a user. According to various...
Relational linking among resoures
Systems and methods that integrate user assigned association among a plurality of resources or entities. The subject innovation employs an association component...
Semi-supervised part-of-speech tagging
Relevant search results for a given query may be determined using click data for the query and the number of times the query is issued to a search engine. The...
Web forum crawling using skeletal links
A method and system for identifying informative links of a web site for use in crawling the web site is provided. A forum crawler analyzes sample web pages of a...
Object detector trained using a working set of training data
An object detector that includes a number of weak classifiers can be trained using a subset (a "working set") of training data instead of all of the training...
System for financial documentation conversion
A method to prepare an Extensible Business Reporting Language (XBRL) document in a web-hosted server includes authenticating a user, uploading financial...
Extended data collection for multi-merchant purchasing environment for
A multi-merchant purchasing system is configured to identify downloadable products selected by a user for purchase. The identified downloadable products are...
Securely providing advertising subsidized computer usage
A method and apparatus for assuring delivery of paid advertising to a user may involve asking a question about an advertisement or requiring data about the...
Multi-channel audio encoding and decoding
An audio encoder and decoder use architectures and techniques that improve the efficiency of multi-channel audio coding and decoding. The described strategies...
Text-dependent speaker verification
A text-dependent speaker verification technique that uses a generic speaker-independent speech recognizer for robust speaker verification, and uses the...
Interactive clustering method for identifying problems in speech
A method of aiding a speech recognition program developer by grouping calls passing through an identified question-answer (QA) state or transition into clusters...
Raw image processing
A system, a method and computer-readable media for processing raw image data with a graphics processing unit (GPU). Raw image data generated by an imaging...
Robust online face tracking
Systems and methods are described for robust online face tracking. In one implementation, a system derives multiple resolutions of each video frame of a video...
Enhanced beamforming for arrays of directional microphones
A novel enhanced beamforming technique that improves beamforming operations by incorporating a model for the directional gains of the sensors, such as...
Visual feedback in electronic entertainment system
The presentation of visual feedback in an electronic entertainment system is disclosed. One disclosed embodiment relates to a method of providing user feedback...
Generating a motion attention model
Systems and methods to generate a motion attention model of a video data sequence are described. In one aspect, a motion saliency map B is generated to...
Compressing and decompressing multiple, layered, video streams employing
multi-directional spatial encoding
A process for compressing and decompressing non-keyframes in sequential sets of contemporaneous video frames making up multiple video streams where the video...
Multi-level interconnection network
A method and system for providing a multi-level interconnection network is provided. A multi-level interconnection network comprises basic cells that are...
Optimization of traffic routing for data center services
Techniques and systems for providing optimization of traffic routing for data centers are disclosed herein. In some embodiments, a method may include...
Smart navigation for 3D maps
An interest center-point and a start point are created in an image. A potential function is created where the potential function creates a potential field and...
RFID server internals design
The subject invention provides a system and/or a method that facilitates implementing an RFID process by providing creation and/or execution of the RFID process...
Protecting against incorrect battery polarity
Embodiments of battery holders with dual-contact assemblies are disclosed. One embodiment comprises a battery holder with a substrate and a spring dual-contact...
Software anti-piracy protection
Licensing aspects of vendor software packages can be protected with reduced user interaction and effort by automating licensing exploit identification, and if...
Protected media path and refusal response enabler
In a protected media path for delivering content from a source to a sink, a source authority (SOTA) on behalf of the source decides with regard to a policy...
Analysis of event information to perform contextual audit
Analysis of audit information that takes into account a wide context allows for a rich picture from which system conditions may be assessed. Event information...
Secure PIN transmission
A secure channel is established between a processor and a smart card such that authentication can be achieved without transmitting a Personal Identification...
Dynamically associating attribute values with objects
Dynamically associating an attribute and an associated value to an object includes dynamically associating attribute-value sets to an object, but is not so...
Security assertion revocation
Security assertion revocation enables a revocation granularity in a security scheme down to the level of individual assertions. In an example implementation, a...
Securing resource stores with claims-based security
The present invention extends to methods, systems, and computer program products for securing resource stores with claims-based security. From policy...
Adapting message delivery assignments with hashing and mapping techniques
A system for efficiently distributing messages to a server farm uses a hashing function and a map-based function, or combinations thereof, to distribute...
System and method for priority-based selection of applications for
A computer application program executing on a computer, such as a portable computer, is selected for termination by first identifying computer application...
Debugger for virtual intermediate language operations
Various technologies and techniques are disclosed for testing intermediate language operations. A debugger harness is provided that instruments an intermediate...
Testing a context-free language compiler
Systems and methods for testing a context-free language compiler. Given a description of a context-free grammar including a set of production rules, a test...
Interruptible client-side scripts
Various technologies and techniques are disclosed for creating interruptible client-side scripts. Input is received from a developer to write original code for...