At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Extensions for modifying a graphical object to display data
A graphical manipulation tool to create and/or make modifications to a graphical object suitable for visually representing data. The graphical manipulation tool...
Target independent rasterization
Methods, systems, and computer-storage media for target independent rasterization of an image. The target is the memory allocated for a rendered image within a...
Data point calculations on a chart
Data point calculations on a chart are provided. A user control may be displayed adjacent to a chart by a computing device. A selection of data points on the...
Automatic generation of trend charts
Automatic trend analysis is provided on a dataset. Upon selection of a data cell or chart point within a data representation, a trend chart is automatically...
Advertising targeting based on image-derived metrics
Advertising targeting metrics for individuals can be derived from images associated with those individuals. Such advertising targeting metrics can include...
System and method for replicating offline scheduling transactions from a
client to a server
A facility for replicating offline scheduling transactions directed to a server is provided. The facility is implemented as a client-side application that...
Generating a compliance data model for IT control
Techniques are described herein that are capable of generating a compliance data model for information technology (IT) control. The compliance data model is...
Context based inference of save location
A user may store content in a data store that includes multiple repositories corresponding to one or more categories, where each of the repositories may include...
Some examples of a sketch-based image segmentation system may segment a hand-drawn sketch based on proximity, intuitive clues and semantic information. For...
Data difference guided image capturing
Methods and apparatuses are disclosed. Previously stored images of one or more geographic areas may be viewed by online users. A new low-resolution image may be...
Matching text to images
Text in web pages or other text documents may be classified based on the images or other objects within the webpage. A system for identifying and classifying...
Regulating access using information regarding a host machine of a portable
Described herein are techniques for regulating access to a portable storage drive, that stores an operating system securely, using information regarding a host...
Permission based query processing
A technique for protecting the privacy of a query is provided using permissions that may be derived from an analysis of the context of the query. A monitoring...
Saving and retrieving data based on public key encryption
In accordance with certain aspects, data is received from a calling program. Ciphertext that includes the data is generated, using public key encryption, in a...
Request-specific authentication for accessing Web service resources
Requests for access to Web service resources are evaluated based on the type of request that is received. Requests are not granted unless sufficient proof of...
Resource access authorization
Techniques for resource access authorization are described. In one or more implementations, an application identifier is used to control access to user...
Disambiguating intents within search engine result pages
Systems, computer-readable media, and methods for generating search engine results pages are provided. A user provides a search engine with one or more query...
Automated selection of appropriate information based on a computer user's
A system filters received messages (e.g., unsolicited advertisements) to determine if they are appropriate for a user based on the non-static, constantly...
Several local databases may be linked together to form a large database. Each database may share a common type definition, but may contain only a portion of the...
File system with per-file selectable integrity
A file system uses data integrity techniques that are a selectable attribute of a file system object. Some file system objects have integrity on for various...
Language processing resources for automated mobile language translation
Automated language translation often involves language translation resources of significant size (e.g., 50-gigabyte phrase tables) and significant computational...
Conversion tool for XPS and OpenXPS documents
A conversion tool enables XPS documents to be automatically converted into the Open XPS format and for Open XPS-formatted documents to be automatically...
Learning element weighting for similarity measures
Described is a technology for measuring the similarity between two objects (e.g., documents), via a framework that learns the term-weighting function from...
Automatically allocating clients for software program testing
Techniques are described herein that are capable of automatically allocating clients for testing a software program. For instance, a number of the clients that...
Call chain interval resource impact aggregation differencing
Embodiments profile usage of memory and other resources. Stack traces have lifespans, resource impacts, and constituent call chains. Aggregation unifies shared...
Methods and computer program products for collecting storage resource
performance data using file system hooks
Provided are methods and computer program products for collecting storage resource performance data using file system hooks. Methods may include determining a...
Logical grouping of profile data
Profile data can be ascribed to groups as a function of an organizational scheme that defines groups and relationships between groups. The groups can be...
Virtual processor allocation techniques
One or more virtual processors can be added or removed from a virtual machine based on CPU pressure measured within the virtual machine. In addition to the...
Adaptive rendering based on runtime capability check
A runtime capability check determines functionality supported by a client application (e.g. a browser) on a computing device. During the runtime capability...
Simulation of static members and parameterized constructors on an
Embodiments are directed to providing a simulation of a type-level construct on an interface instance and to maintaining a token-based event handling system. In...
Expansion and reduction of source code for code refactoring
An automated programming tool can receive program source code and can expand portions of the program source code to make to make identifiers explicit, insert...
Application configuration using binary large objects
Embodiments provide rule-based application configuration using a network service. A configuration parameter associated with an application includes a rule that...
Data-dependent control flow reduction
A transformation of software control flow to reduce the number of successor blocks in the control flow as well as the number of flow control elements. The...
Web browser having user-configurable address bar button
A web browser has a user interface that includes a content rendering area within the web browser user interface and a control layout area adjacent the content...
Printer driver and application decoupling using event centric registration
Some embodiments of the invention provide a printer user interface (UI) component configured to handle presentation of information to a user during printing...
System and method for multi-touch interactions with a touch sensitive
Embodiments of the invention are directed to interacting with a touch sensitive display screen. A method may include detecting a plurality of interactions with...
Depth camera-based relative gesture detection
The subject disclosure is directed towards using timing and/or relative depth data to reduce false positives in gesture detection within a depth-sensed region....
Making static printed content dynamic with virtual data
The technology provides embodiments for making static printed content being viewed through a see-through, mixed reality display device system more dynamic with...
Systems and methods for estimating a non-visible or occluded body part
A depth image of a scene may be received, observed, or captured by a device. The depth image may include a human target that may have, for example, a portion...
See-through near-eye display glasses with the optical assembly including
absorptive polarizers or...
This disclosure concerns an interactive head-mounted eyepiece with an integrated processor for handling content for display and an integrated image source for...
Display screen with transitional graphical user interface
Display screen with icon
Display screen with graphical user interface
Filtering and clustering crowd-sourced data for determining beacon
Embodiments analyze crowd-sourced data to identify a moved or moving beacon. The crowd-sourced data involving a particular beacon is filtered based on a cluster...
Location determination for white space utilization
A technique for a wireless device to obtain white space information from a component configured for cellular communication, such as a cellular phone. The...
Creation and management of RFID device versions
The claimed subject matter provides a system and/or method that creates, manages, or maintains multiple device versions in a network of Radio Frequency...
Place-specific buddy list services
An information service provides search and notifications to inform when certain people (e.g., friends, family, business contacts, etc.) are nearby so as to...
Searching electronic program guide data
Searching electronic program guide (EPG) data is described. The EPG data may be compartmentalized into channel metadata that describes characteristics of one or...
Proximity and connection based photo sharing
Photos are shared among devices that are in close proximity to one another and for which there is a connection among the devices. The photos can be shared...