At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Isolating, managing and communicating with user interface elements
Various technologies and techniques are disclosed that allow a user interface in a managed runtime environment to display content from two or more different...
Method and apparatus for creating, sending, and using self-descriptive
objects as messages over a message...
An invention for creating, sending, and using self-descriptive objects as messages over a network is disclosed. In an embodiment of the present invention,...
Method and system for structured DMA transactions
Disclosed is a structured model for developing DMA code and for performing DMA transactions. This model of structured DMA transactions provides a framework with...
Typed intermediate language support for existing compilers
Described is a technology by which a compiler's intermediate representation is generated in a way that includes type checking to ensure safe execution. Typed...
Preferential path profiling
This paper describes preferential path profiling, which enables profiling a specified subset of all possible program paths with very low overhead. Preferential...
Test impact feedback system for software developers
Various technologies and techniques are disclosed for facilitating a feedback process regarding the impact that changes to source code will have on tests....
Rendering a customized list of controls
Form controls can be reused so that the control can be bound to large volumes of data without adverse performance issues because of a large number of controls....
Virtual keyboard text replication
The present invention extends to methods, systems, and computer program products for replicating text at a virtual keyboard. Characters submitted to, displayed...
Web page editor with element selection mechanism
A web page editor displays a web page including at least two elements that are at least partially overlapping. The web page editor includes an element selection...
Relating web page change with revisitation patterns
Web page change may be related to revisitation patterns to support web interaction. In an example embodiment, a method involves analyzing change and...
Automatic switching fonts on multilingual text runs
Automatic switching of fonts on multilingual text runs in one action is provided. After an indication that a new font scheme is to be applied to a multilingual...
Rendering an HTML electronic form by applying XSLT to XML using a solution
Instructions are received to open an eXtensible Markup Language (XML) document. The XML document is searched to locate a processing instruction (PI) containing...
Document synchronization over stateless protocols
Example systems, methods, and data structures are directed at synchronizing documents. One example data structure includes receiving a request from a first...
Math calculation in word processors
Architecture for a word processing application that facilitates operating on mathematical symbols, expressions, and/or equations input to a word processing...
A site redirection system and corresponding methods for redirecting a user from a requested site to a target site is provided. When a user navigates to a site...
Open error-handling system
The embodiments disclosed herein extend to methods, systems, and computer program products for error resolution in a computing system that includes a health...
Automated identification of performance crisis
Methods for automatically identifying and classifying a crisis state occurring in a system having a plurality of computer resources. Signals are received from a...
Error recovery for application-level intermediaries
Error handling in the intermediation of one-way transacted messages. Rather than receiving an inbound message under a transaction, the intermediary performs a...
Portable personal identity information
A user interacts with a client containing personal identity information operable to identify the user to a relying party when the relying party is presented...
A system and method for authenticating an HTTP message. A relying party may respond to a request from a requester by sending an HTTP message with authentication...
Digital asset format transformation
A method for providing a digital asset to a remote recipient via a network. An unmodified digital asset is received in a native format, transformed into a...
Synchronization of multidimensional data in a multimaster synchronization
environment with prediction
Various embodiments are provided for synchronizing with multidimensional data in a knowledge based synchronization framework for a multi-master synchronization...
Running internet applications with low rights
In various embodiments, applications that are configured to interact with the Internet in some way are executed in a restricted process with a reduced privilege...
Inserting a multimedia file through a web-based desktop productivity
Technologies are described herein for inserting a multimedia file through a web-based desktop productivity application. A request for the multimedia file is...
Web page load time prediction and simulation
Web page load time production and simulation includes determining an original page load time (PLT) of a webpage and timing information of each web object of the...
Generation of database deltas and restoration
A checkpoint system is provided to quickly identify differences or deltas between a baseline version and a modified version of a database and to quickly restore...
Parsing unstructured resources
Systems and methods of processing an unstructured resource which contains one or more data portions are described. The method comprises reading the unstructured...
Data structure for supporting a single access operation
A data structure is formatted that supports a single access operation while enabling data structure verification, data integrity verification, and data...
File system filters and transactions
Aspects of the subject matter described herein relate to file system filters and transactions. In aspects, a filter may enlist to receive notification of events...
Providing data based on language choice
Data may be provided in a language chosen by a user. A data record may be stored in a database using symbols to represent data. These symbols may be converted...
Identifying executable scenarios in response to search queries
Systems, methods, and computer-readable media for identifying executable scenario solutions relevant to a user query and returning such executable scenario...
Configuring a data protection system
A computer-implemented system configured to describe the relationship between a first Namespace and a second Namespace is provided. The system includes a...
Data change ordering in multi-log based replication
Aspects of the subject matter described herein relate to data change ordering in multi-log based replication. In aspects, local seeds are maintained for...
Controlling forward chaining execution in a rules system
Detailed herein is a technology which, among other things, provides for forward chaining in a ruleset. In one approach to this technology, a first rule is...
Decoupling static program data and execution data
Persisting execution state of a continuation based runtime program. The continuation based runtime program includes static program data defining activities...
Two-pass hash extraction of text strings
Data compression and key word recognition may be provided. A first pass may walk a text string, generate terms, and calculate a hash value for each generated...
Interface and methods for collecting aligned editorial corrections into a
A method for providing aligned editorial corrections to a database is discussed. The method includes receiving a first text in a language and organizing the...
Indexing large-scale GPS tracks
Described is a technology by which uploaded GPS data is indexed according to spatio-temporal relationships to facilitate efficient insertion and retrieval. The...
Low latency real-time audio streaming
Systems and methods for audio streaming in a computing device are described. In one aspect an interface to an adapter driver is provided. The adapter driver is...
Multi-radio unification protocol
An invention is disclosed whereby a wireless network node, equipped with two or more radio transceivers statically tuned to non-interfering frequency channels,...
Matte-based video restoration
Matte-based video restoration technique embodiments are presented which model spatio-temporally varying film wear artifacts found in digitized copies of film...
Compression of MQDF classifier using flexible sub-vector grouping
Systems and methods to compress MQDF data are disclosed herein. A plurality of eigenvectors is identified. Each eigenvector in the plurality of eigenvectors can...
Handwriting symbol recognition accuracy using speech input
Described is a bimodal data input technology by which handwriting recognition results are combined with speech recognition results to improve overall...
Positioning audio output for users surrounding an interactive display
For use with an interactive display system having a generally horizontal interactive display surface, four speakers that are disposed at spaced-apart locations...
Enhanced addressing for fax recipients
A rich, robust fax addressing experience is provided for users. In some embodiments, multiple different ways of addressing a fax and related functionality are...
Distributed network management
Hosts or end-systems residing at the edges of a network gather data about the traffic they transmit into and receive from the network. The network's routing...
Independent message stores and message transport agents
Multiple independent MTAs transmit messages such that if one of the MTAs fails, the other MTAs may continue to transmit messages. Multiple independent message...
Packet forwarding in multi-radio multi-hop wireless networks
A packet forwarding technique is presented that forwards data packets through a multi-hop wireless network employing multi-radio nodes. In each multi-radio...
Echo cancellation for channels with unknown time-varying gain
After an initial training session, a "Dynamic Echo Canceller" (DEC) provides echo cancellation where only access to an input signal and a composite output...
Modularization of data center functions
In one example, a data center may be built in modular components that may be pre-manufactured and separately deployable. Each modular component may provide...