At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
System using backward inter-procedural analysis for determining
alternative coarser grained lock when finer...
Locks which protect data structures used within atomic sections of concurrent programs are inferred from atomic sections and acquired in a manner to avoid...
Servicing software through versioning
Software typically changes over its useful lifetime. New versions of software are created to change or improve functionality, to add functionality, to correct...
Fully capturing outer variables as data objects
Providing for read/write access to captured free variables expressed as environment data objects is disclosed herein. By way of example, free variables can be...
Build-time enforcement of architectural partitioning in computer
A computer software construct has a plurality of components and is built based on an architecture designed for the construct. The architecture includes a number...
Core object-oriented type system for semi-structured data
A type system employing structural subtyping is disclosed herein. A core type system supports several structural types, such as stream, choice, intersection and...
Artifact sharing from a development environment
An identification of a multi-component development artifact to be shared is obtained in a development environment. A remote receiver with whom to share...
Orientation free user interface
Generation and display of a dynamically orientable graphical user interface (GUI) is described. The GUI can include user input controls that are configured to...
User interface visual cue for use with literal and non-literal values
A property value associated with a property of a graphical object is retrieved. A visual cue associated with the property value is displayed, wherein the visual...
System and method for creation of an object within an object hierarchy
A system and method relating to creation of object(s) in an object hierarchy structure is provided. An object generator that in response to a command to expand...
Web page error reporting
An error in a web page displayed on a device is detected. The error is assigned to a bucket to indicate a type of the error, and a record describing the current...
Root cause problem identification through event correlation
Correlating activity events to identify a root cause of a process failure. Activity event data is received from a process executing on a computing device. The...
Digital signatures for embedded code
Generating a digital signature of an entire embedded code project while maintaining certain exclusion areas so that a productivity application can incorporate...
Interface protocol and API for a wireless transceiver
A wireless protocol may be implemented in a smart transceiver device that contains the physical (PHY) and media access control (MAC) layers of the wireless...
Combining SIP requests with SIP responses
A method and system for combining SIP requests with SIP responses is provided. When a server receives a request from a client, a message combining system of the...
Profile deployment using a generic format
A network enabled computer receives connection profile information in a generic form and creates one or more native mode profiles to establish connections. By...
Streaming operator placement for distributed stream processing
A streaming operator assignment system and method for determining a streaming operator assignment that minimizes overload in a data processing system....
Dynamic web service deployment and integration
A computer system receives registration information from a service provider registering web services with the dynamic web service configuration store. The...
Dynamic email directory harvest attack detection and mitigation
Dynamic directory harvest attack detection and mitigation system is accomplished by altering the logic surrounding how a receiving email server enforces its...
Real time update notification
Computer method and apparatus for communicating information between a plurality of client computers by means of a communications network. A data server computer...
Data relationship visualizer
Data having express or implied relationships may be displayed by selecting a starting entity in a data structure, building a relationship tree, and building and...
History answer for re-finding search results
A system, method, and medium are provided for providing a personalized answer to a user-defined search query by utilizing the user's search history. A search...
Indexing and searching audio using text indexers
A full-text lattice indexing and searching system and method for indexing word lattices using a text indexer to enable enhance searching of audio content. The...
Methods and systems provide a tool for searching and analyzing XPS files. In accordance with the described embodiments, a user can search and analyze XPS files...
Training a search result ranker with automatically-generated samples
A search result ranker may be trained with automatically-generated samples. In an example embodiment, user interests are inferred from user interactions with...
Date effective quantity on hand and adjusted unit cost calculation
An accounting method can insert changes that affect average cost calculations after the initial average cost calculations. The method can go back in time and...
Predictive geo-temporal advertisement targeting
A method, system, and medium are provided for targeting advertisements to users of mobile devices based on geo-temporal models. Time-stamped location...
Word-dependent transition models in HMM based word alignment for
statistical machine translation
A word alignment modeler uses probabilistic learning techniques to train "word-dependent transition models" for use in constructing phrase level Hidden Markov...
HMM alignment for combining translation systems
A computing system configured to produce an optimized translation hypothesis of text input into the computing system. The computing system includes a plurality...
Visual assessment of landmarks
Visual images may be used to detect, or verify the existence of, landmarks. In one example, the landmarks may be used to provide driving or walking directions....
Multiple directions to a destination without providing a specific origin
The automatic generation of multiple sets of directions for navigating geographically to a specific destination without specification of an origin. Based on the...
Route transfer between devices
A user can intend to travel between different locations and employ different traveling manners to reach an intended travel destination. At different points,...
Producing a locally optimal path through a lattice by overlapping search
A system and computer-implemented method for the creation of a structure using Lego building blocks is disclosed. Aspects of the methods are equally appropriate...
System and method for optimizing network communication in response to
A system and method for facilitating communications between a mobile device and a network application are provided. A mobile device transmits a request for data...
Semi-automatic plane extrusion for 3D modeling
In accordance with one or more aspects, a plane in a 3D coordinate system in which a 3D model is to be generated based on one or more 2D images is identified. A...
Multi-factor content protection
Protecting content. A recipient receives content from a publisher. Some content is managed by an access server. The access server controls the recipient's use...
Estimating sample-domain distortion in the transform domain with rounding
Techniques and tools are described for compensating for rounding when estimating sample-domain distortion in the transform domain. For example, a video encoder...
End-host based network management system
An end-host based network management system and methods are described. The methods are performed independently at each end-host within the network based on data...
Compositing desktop window manager
A method and system for rendering a desktop on a computer using a composited desktop model operating system are disclosed. A composited desktop window manager,...
Correcting GPS through secondary sensors and signal strength
Systems and methods that mitigate errors in positioning systems, by employing signal strength(s) of signal sources (e.g., towers adjacent to a mobile unit.)...
Quantum computational systems
Apparatus and methods for performing quantum computations are disclosed. Such quantum computational systems may include quantum computers, quantum cryptography...
Display screen with a user interface
Display screen with animated user interface
Automatically generating rules for connection security
A method and system for creating security policies for firewall and connection policies in an integrated manner is provided. The security system provides a user...
The technology is a system and method for selecting a television lineup. The available television lineups capable of being viewed on a digital device are...
Controlling memory usage in systems having limited physical memory
Described herein is a method of controlling memory usage in a computer system having limited physical memory, wherein one or more application programs execute...
Rebootless display driver upgrades
Systems and methods for rebootless updating of a IHV display driver are disclosed. According to such a method, first, the operating system stops the driver from...
Programming interface for a computer platform
A programming interface for a computer platform can include various functionality. In certain embodiments, the programming interface includes one or more of the...
Message based network transmission for selection and auditing of internet
A computer communicates with a referral server according to a web service definition to select and audit performance of an internet service. The computer sends...
Cluster-based friend suggestion aggregator
Techniques are described to generate a list of suggested friends for a client of a social networking service. In an implementation, a cluster of clients is...
The claimed subject matter provides a system and/or method that detect watermarks incorporated within analog and/or digital signals associated with multimedia...