At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Various embodiments provide a method for processing encoded data bits transmitted over a lossy communication channel. In some embodiments, the method receives...
Device camera angle
Techniques for device camera angle are described. In one or more implementations, a camera is mounted in a computing device at an angle based on an orientation...
Viewer-centric user interface for stereoscopic cinema
Described is a user interface that displays a representation of a stereo scene, and includes interactive mechanisms for changing parameter values that determine...
Taskbar media player
A system and method for controlling media through a user interface integrated within a taskbar is described. This system and method enable a user to control...
Crowd-sourcing pronunciation corrections in text-to-speech engines
Technologies are described herein for providing validated text-to-speech correction hints from aggregated pronunciation corrections received from text-to-speech...
Encoding of line pattern representation
The encoding of a line pattern representation. The line pattern representation has a changing value in a first dimension as a function of a value in a second...
Managing rich presence collections in a single request
A method and system for increasing the computational and network efficiency of presence servers having collections of publications is provided. The presence...
Related URLs for task-oriented query results
Methods, computer-storage media, and graphical user interfaces are provided for identifying and presenting rich related sites for task-oriented search queries....
Trending topic identification from social communications
Systems and methods for identifying trending topics from social communications are presented. Social communications from one or more social networking sites are...
Expressing and executing semantic queries within a relational database
Semantic queries are expressed and executed within a relational database. This can be done by defining semantic rules applied to execute the semantic queries...
Filtering views with predefined query
An application, such as a data store application, provides a filter query to manage access to a view of a data store. The application uses the filter query to...
Private views of data and local calculations during real time
Techniques for performing a process during a real time collaboration by multiple users or clients on a spreadsheet file are disclosed herein which may permit...
Data analysis expressions
Methods and systems are disclosed for receiving and processing data analysis expressions. A particular method includes receiving a data analysis expression at a...
Fast quantum and classical phase estimation
A quantum phase estimator may include at least one phase gate, at least one controlled unitary gate, and at least one measurement device. The quantum phase...
Debugging system using static analysis
A debugging system for compiled code may include static analysis of the compiled code to determine current values for variables at a paused location within the...
Implementing failover processes between storage stamps
Embodiments of the present invention relate to invoking and managing a failover of a storage account between partitions within a distributed computing...
Detecting memory hazards in parallel computing
A computer-implemented method, computer-readable media, and a computerized system to track and detect data hazards are provided. The computerized system...
Resource management platform
In client-server architectures, systems and methods for implementing an extensible resource management platform at a server are described. The extensible...
Priority-based management of system load level
Systems, methods, and computer program products are described herein for managing computer system resources. A plurality of modules (e.g., virtual machines or...
Flexible and safe monitoring of computers
Described is a server monitoring technology that is scalable to large numbers of servers, e.g., in a datacenter. Agents on servers run queries to monitor data...
Virtualization gateway between virtualized and non-virtualized networks
Methods and apparatus are provided for controlling communication between a virtualized network and non-virtualized entities using a virtualization gateway. A...
Translating programming language patterns into database schema patterns
Techniques are described herein that are capable of translating programming language patterns into database schema patterns. Examples of a programming language...
Compact type layouts
A precompiled form of information derived from CIL metadata is created in a compact type layout (CTL) format. Information in CTL format for each data type in a...
Runtime code hooking for print driver and functionality testing
Runtime code hooking techniques are described in which a place holder instruction within a compiled module is used as an entry point to enable code hooking. A...
Natural user input for driving interactive stories
A system and method are disclosed for combining interactive gaming aspects into a linear story. A user may interact with the linear story via a NUI system to...
Supporting different event models using a single input source
In at least some embodiments, input provided by a single source generates events representing multiple source types through a mapping process, e.g. a touch...
Off-screen gestures to create on-screen input
Bezel gestures for touch displays are described. In at least some embodiments, the bezel of a device is used to extend functionality that is accessible through...
Live companion user interface
An apparatus and method provide a companion application via a companion application corresponding to a host window provided by a host application, the companion...
Acceleration-based interaction for multi-pointer indirect input devices
An indirect interaction input device, such as but not limited to a touch sensor, can provide multiple points of input. These multiple points are in turn mapped...
Targeting in a stylus-based user interface
Aspects of the invention provide virtual hover zones. When a user lowers a hovering stylus while remaining within a hover zone, cursor control is modified to be...
Device specific data in a unified pointer message
In one embodiment, a unified pointer message 300 may describe in a single type of pointer message a coordinate input from a user via multiple types of pointer...
NUI video conference controls
A system and method providing gesture controlled video conferencing includes a local capture device detecting movements of a user in a local environment and an...
Cloud-based personal trait profile data
A system and method is disclosed for sensing, storing and using personal trait profile data. Once sensed and stored, this personal trait profile data may be...
Increasing field of view of reflective waveguide
A near-eye display system includes an image former and a waveguide. The image former is configured to form a display image and to release the display image...
Adjustable destination icon in a map navigation tool
A map navigation tool presents directions using a map navigation user interface that simplifies navigation in various ways. In particular, the map navigation...
Display screen with graphical user interface
Display screen with graphical user interface
Input device for an electronic tablet
Location determination for white space utilization
A technique for a wireless device to obtain white space information from a component configured for cellular communication, such as a cellular phone. The...
Indoor localization using commercial frequency-modulated signals
A commercial frequency-modulated (FM) radio signal indoor localization system and method for finding a location of a mobile embedded device (such as a...
Detecting key roles and their relationships from video
Tools and techniques for acquiring key roles and their relationships from a video independent of metadata, such as cast lists and scripts, are described herein....
Calibration between depth and color sensors for depth cameras
A system described herein includes a receiver component that receives a first digital image from a color camera, wherein the first digital image comprises a...
Functionality for indicating direction of attention
A communication system is described herein which provides an indicator that helps hub participants of a meeting (or other environmental setting) determine a...
Enhanced data protection for message volumes
In a message replication environment, instances of a message volume are hosted by message systems. Each message system exchanges condition information with the...
Security protocols for mobile operator networks
Security protocols for mobile operator networks are described. In embodiments, mobile communication link is established between a mobile phone and a media...
Network access and profile control
A method and apparatus for managing network profiles and/or access to a network. Network profiles stored in a computer may be deleted and/or a connection to a...
Utilizing X.509 authentication for single sign-on between disparate
An authentication scheme may be utilized for a single sign-on operation between servers. One or more servers receive a data request directed to a disparate...
Configuring third party solutions to operate with virtual machines and virtual switches in a distributed network environment. The method includes receiving...