At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Market design for a resource exchange system
Providing a market design for a peer-to-peer resource exchange system. Prices for a plurality of resources such as storage space, upload bandwidth, and download...
Mixed lossless audio compression
A mixed lossless audio compression has application to a unified lossy and lossless audio compression scheme that combines lossy and lossless audio compression...
Leveraging back-off grammars for authoring context-free grammars
A system and method of refining context-free grammars (CFGs). The method includes deriving back-off grammar (BOG) rules from an initially developed CFG and...
Software defined radio architecture
A computing device with a software defined radio. The software defined radio has an architecture with separate components to provide control functions and data...
Block based image processing
Block based image processing techniques are described in which one or more processing filters are applied to an image block by block. One or more filters are...
Script detection service
Script detection service techniques are described. In an implementation, a determination is made as to which human writing system is associated with individual...
Spatial noise suppression for a microphone array
A noise reduction system and a method of noise reduction includes a microphone array comprising a first microphone, a second microphone, and a third microphone....
Parameterized filters and signaling techniques
Filter taps for filters are specified by filter coefficient parameters. The filter taps are greater in number than the coefficient parameters from which the...
Signaling and repeat padding for skip frames
A video codec efficiently signals that a frame is identical to its reference frame, such that separate coding of its picture content is skipped. Information...
Enabling routing of data on a network based on a portion of data accessed
from a non-network enabled device
A system and method for enabling routing of data on a network based on a portion of data accessed from a non-network enabled device is disclosed. The technology...
Common key frame caching for a remote user interface
Common key frames are provided to a client during initialization to provide more efficient remoting of user interface graphical information. By storing the...
Display screen with an icon
Trusted operating environment for malware detection
Techniques and apparatuses for scanning a computing device for malware are described. In one implementation, a trusted operating environment, which includes a...
Universal schema for representing management policy
A computer-readable storage medium has a data structure stored thereon for constructing expressions representing software configurations to be applied to...
Identity providers in digital identity system
A digital identity system includes a principal including an identity selector programmed to receive a security policy from a relying party, review a plurality...
Interest aligned manual image categorization for human interactive proofs
A system and method that facilitates and effectuates distinguishing a human from a non-human user. A human interactive proof (HIP) employs images from a large...
System and method for dynamic cooperative distributed execution of
computer tasks without a centralized controller
A system and method is provided for cooperative execution of distributed tasks by networked computers without the use of a centralized controller to coordinate...
Systems and methods for extensible metadata are described. In one aspect, source code is compiled to generate an assembly. During assembly generating...
Verifiable integrity guarantees for machine code programs
A verifier performs static checks of machine code to ensure that the code will execute safely. After verification is performed, the code is executed. The code...
Debugging in an operating system with multiple subsystems
A facility for debugging in an operating system with native and non-native subsystems is described. The facility employs a debugger designed for use with the...
Generating and organizing references to online content
Systems, methods, and computer storage media for generating a virtual workspace that references online media content of interest, facilitates re-visitation of...
Detecting and recovering from process failures
A service is used to process files. The processing of the files is performed by worker services that are assigned to process a portion of the files. Each worker...
Storage virtual containers
A controller of a Solid State Device (SSD) defines a mapping from memory devices, such as flash packages, that make up the SSD to one or more storage virtual...
Host initiated background formatting of optical medium
A method and a host processing device are provided for background formatting, or de-icing, an optical medium with no de-icing assistance from an optical drive...
Lazy handling of end of interrupt messages in a virtualized environment
Techniques enable reducing a number of intercepts performed by a hypervisor by reducing a number of End Of Interrupt (EOI) messages sent from a virtual central...
Message redirection within a messaging infrastructure
The present invention extends to methods, systems, and computer program products for redirecting client messages between hosts within a messaging ...
Distributing membership information for multi-party application layer
Membership information for participating computer systems participating in a multi-party conferencing session is distributed by intermittently exchanging link...
Communication using delegates
A facility allows for automatic delegation of incoming real-time communications based on a delegation scheme. The delegation scheme may be rules-based and may...
Apparatus and computer-readable media for processing HTTP requests
Various embodiments of the invention are directed to closely integrating functionality between an internet server and a WebDAV tool. Areas of specific focus in...
Content discovery and transfer between mobile communications nodes
Content discovery and content transfer between mobile communications nodes is often required, for example, to synchronize maps, traffic hot spot information and...
Nondeferred reference-counting garbage collection using overlooking roots
A reference-counting garbage collection system utilizing overlooking roots injects eager reference-counting updates into the program. An overlooking roots...
Selecting member sets for generating asymmetric queries
Tools and techniques are described for selecting member sets for generating asymmetric queries. User interfaces provided by this description may include...
Extracting similar entities from lists/tables
Large numbers of lists of entities may be mined for similar entities to related searches. A representation for each list may be determined to provide for a...
Abstract pipeline component connection
The subject disclosure pertains to systems and methods for connecting pipeline components such as data flow pipeline components. Pipeline components are wrapped...
E-matching for SMT solvers
Embodiments are introduced which provide for creation of an E-matching code tree index which works on E-graphs to make E-matching more efficient. Use of the...
Search control and authoring environment
A technique for adding a search control by a user to a file, webpage, desktop, or mobile device, for example. The control lets the end user create documents,...
Ranking results of multiple intent queries
Techniques and systems are disclosed providing improved ranking of results to an online search-based query. One or more user types are identified for a...
Soliciting information based on a computer user's context
A user search request is received and context information for the user is identified. The user search request and the context information are then combined to...
Indexing explicitly-specified quick-link data for web pages
Systems, methods, and computer storage media having computer-executable instructions embodied thereon for permitting webmasters to explicitly specify links or...
Automatic tagging of content based on a corpus of previously tagged and
An automated mechanism of automatically tagging media files such as podcasts, blog entries, and videos, for example, with meaningful taxonomy tags. The...
Data access layer class generator
Systems and methods that that automatically generate a data access layer for a middle tier of a relational data store with stored procedures, via a data access...
Partitioning of contended synchronization objects
Methods, systems, and computer-readable media are disclosed for partitioning contended synchronization objects. A particular method determines a contention-free...
Self-contained partial database backups
Methods and computer readable media for restoring a database. In a method, a backup of a subset of a database is created, where the subset includes a filegroup...
Bi-directional data modification with synchronization
Systems and methods for synchronizing data between endpoints, including the modification of data on an endpoint without necessarily modifying data that is...
Reference model for data-driven analytics
A taxonomy reference model for use in an analytical modeling component. The analytical modeling component defines analytical relationships between the model...
Calculating web page importance based on web behavior model
Method for determining a webpage importance, including receiving web browsing behavior data of one or more users; creating a model of the web browsing behavior...
Compiler for probabilistic programs
A compiler for probabilistic programs is described. The inputs to the compiler are a definition of a model and a set of inference queries. The model definition...
First computer process and second computer process proxy-executing code on
behalf of first process
Upon a first process encountering a triggering device, a second process chooses whether to proxy-execute code corresponding to the triggering device of the...
Logocons: AD product for brand advertisers
Logocons provide a new online advertising product for brand advertisers. During a computing session especially with consumer-generated content, brand names may...
Decision theoretic approach to targeted solicitation by maximizing
expected profit increases
A decision theoretic approach to targeted solicitation, by maximizing expected profit increases, is disclosed. A decision theoretic model is used to identify a...