Real Time Touch

new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)

Real Time Touch

Filing Names

Microsoft Corporation
Microsoft Corporation One Microsoft Way
Microsoft Corporation Way
Microsoft Corporation Inc
Microsoft Corporation_20100107
Microsoft Corporation Microsoft Patent Group
Microsoft Corporation_20100114
Microsoft Corporation_20131212
Microsoft Corporation_20100128
Microsoft Corporation_20100121
Microsoft Corporationi

Microsoft Corporation patents (2010 archive)

Recent patent applications related to Microsoft Corporation. Microsoft Corporation is listed as an Agent/Assignee. Note: Microsoft Corporation may have other listings under different names/spellings. We're not affiliated with Microsoft Corporation, we're just tracking patents.

ARCHIVE: New 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "M" | Microsoft Corporation-related inventors

Date Microsoft Corporation patents (2010 archive) (updated weekly) - BOOKMARK this page
12/30/10Tactile feedback display screen overlay
12/30/10Removable module for a console
12/30/10Multi-view video compression and streaming
12/30/10Automatic detection of wireless network type
12/30/10Boosted face verification
12/30/10Using game play elements to motivate learning
12/30/10Using game elements to motivate learning
12/30/10Method and apparatus for associating data with online game ratings
12/30/10Routing, alerting, and transportation guidance based on preferences and learned or inferred risks and desirabilities
12/30/10Decentralized account digest using signed electronic receipts
12/30/10Collaborative plan generation based on varying preferences and constraints
12/30/10Cloud computing resource broker
12/30/10Task allocation mechanisms and markets for acquiring and harnessing sets of human and computational resources for sensing, effecting, and problem solving
12/30/10User selectable advertising networks
12/30/10Generation of impression plans for presenting and sequencing advertisement and sales opportunities along potential routes
12/30/10System and method for delivering payloads such as ads
12/30/10Portal services based on interactions with points of interest discovered via directional device information
12/30/10Automated investment alerts from multiple data sources
12/30/10Generalized active learning
12/30/10Surrogate key generation and utilization
12/30/10Web graph compression through scalable pattern mining
12/30/10Referral-based sponsorship of access to content item sets
12/30/10Implicit product placement leveraging identified user ambitions
12/30/10Presenting an assembled sequence of preview videos
12/30/10Presenting multiple document summarization with search results
12/30/10Cache and index refreshing strategies for variably dynamic items and accesses
12/30/10Mapping of metadata between a web service and a line-of-business system
12/30/10Islands of data
12/30/10Batched transfer of arbitrarily distributed data
12/30/10Hardware accelerated transactional memory system with open nested transactions
12/30/10Databases from models
12/30/10Recipes for rebuilding files
12/30/10Platform for configurable logging instrumentation
12/30/10Xml schema collection objects and corresponding systems and methods
12/30/10Efficient method for clustering nodes
12/30/10Proximity guided data discovery
12/30/10Role based server installation and configuration
12/30/10Computational models for supporting situated interactions in multi-user scenarios
12/30/10Metaphysically addressed cache metadata
12/30/10Operating system virtual memory management for hardware transactional memory
12/30/10Wait loss synchronization
12/30/10Flexible read- and write-monitored and buffered memory blocks
12/30/10Private memory regions and coherence optimizations
12/30/10Performing escape actions in transactions
12/30/10Minimizing code duplication in an unbounded transactional memory system
12/30/10Reducing power consumption of computing devices by forecasting computing performance needs
12/30/10Deriving accurate media position information
12/30/10Mobile media device user interface
12/30/10Synonym and similar word page search
12/30/10Method and system for managing software issues
12/30/10Streaming optimized virtual application images
12/30/10Using task sequences to manage devices
12/30/10Service-based endpoint discovery for client-side load balancing
12/30/10Precomputation for data center load balancing
12/30/10Lock-free barrier with dynamic updating of participant count
12/30/10Compliance interface for compliant applications
12/30/10Two-way authentication using a combined code
12/30/10Portable parameter-based licensing
12/23/10Multiple display computing device with position-based operating modes
12/23/10Composing shapes and data series in geometries
12/23/10Data-driven model implemented with spreadsheets
12/23/10Using distributed timers in an overlay network
12/23/10Endpoint echo detection
12/23/10Advanced call routing using linked identities
12/23/10Image labeling using multi-scale processing
12/23/10Employing artifacts for video indexing
12/23/10Controlling ad delivery to mobile clients
12/23/10Social graph playlist service
12/23/10Accuracy assessment for location estimation systems
12/23/10Data-driven visualization transformation
12/23/10Solver-based visualization framework
12/23/10Trans-lingual representation of text documents
12/23/10Mute control in audio endpoints
12/23/10Techniques to provide a standard interface to a speech recognition platform
12/23/10Managing event timelines
12/23/10Tag presence alerts for groups and meeting
12/23/10Leveraging social capital on a website
12/23/10Isolating changes in dynamic systems
12/23/10Managed system extensibility
12/23/10Eliding synchronization in a concurrent data structure
12/23/10Efficient method for clustering nodes
12/23/10Media seed suggestion
12/23/10Media recommendations
12/23/10Media asset interactive search
12/23/10Assigning relevance weights based on temporal dynamics
12/23/10Querying compressed time-series signals
12/23/10Determining a similarity measure between queries
12/23/10Error tolerant autocompletion
12/23/10Service provider management console
12/23/10Synchronized distributed media assets
12/23/10Model-based implied authorization
12/23/10Exclusive scope model for role-based access control administration
12/23/10Creating new charts and data visualizations
12/23/10Partitioning modeling platform data
12/23/10Using distributed queues in an overlay network
12/23/10Dynamic media asset delivery
12/23/10Data-driven visualization of pseudo-infinite scenes
12/23/10Event recommendation service
12/23/10Multi-tier, multi-state lookup
12/23/10Predictive collaboration
12/23/10Message requirements based routing of messages
12/23/10Adding configurable messaging functionality to an infrastructure
12/23/10Capturing a computing experience
12/23/10Using transport-independent resource status
12/23/10Migrating a virtual machine that owns a resource such as a hardware device
12/23/10Using hypertext transfer protocol as a transport for bi-directional data streams
12/23/10Tracing of data flow
12/23/10System and method for providing conditional access to server-based applications from remote access devices
12/23/10Hierarchical object caching based on object version
12/23/10System and method for a distributed object store
12/23/10Crc for error correction
12/23/10Filter and sort by format
12/23/10Overlay for digital annotations
12/23/10Resizing an editable area in a web page
12/23/10Application orchestrator
12/23/10Web based spell check
12/23/10Rich entity for contextually relevant advertisements
12/23/10Persistent media playback
12/23/10Meeting lobby for web conferencing
12/23/10Augmenting a field of view
12/23/10Charts in virtual environments
12/23/10Multiple mouse character entry
12/23/10Integrating digital book and zoom interface displays
12/23/10Presaging and surfacing interactivity within data visualizations
12/23/10Data object linking and browsing tool
12/23/10Incremental run-time layout composition
12/23/10Block view for geographic navigation
12/23/10Generating code meeting approved patterns
12/23/10Generation of parallel code representations
12/23/10Embedded annotation and program analysis
12/23/10Searching regular expressions with virtualized massively parallel programmable hardware
12/23/10Interface between a resource manager and a scheduler in a process
12/23/10Allocation of resources to a scheduler in a process
12/23/10Automatically re-starting services
12/23/10Role-based security for messaging administration and management
12/23/10Browser plug-in for secure credential submission
12/23/10Image-based unlock functionality on a computing device
12/23/10Security virtual machine for advanced auditing
12/23/10Remote access control of storage devices
12/16/10Automatic portable electronic device configuration
12/16/10Predictive interfaces with usability constraints
12/16/10Wireless communication enabled electronic device
12/16/10Pointing device with independently movable portions
12/16/10Pointing device using proximity sensing
12/16/10Computing transitions between captured driving runs
12/16/10Piecewise planar reconstruction of three-dimensional scenes
12/16/10Surface computer user interaction
12/16/10Object loading and unloading system
12/16/10Magnification engine
12/16/10Interest determination for auditory enhancement
12/16/10Implementing multiple dominant speaker video streams with manual override
12/16/10Action detection in video through sub-volume mutual information maximization
12/16/10Motion based dynamic resolution multiple bit rate video encoding
12/16/10Call routing and prioritization based on location context
12/16/10Spatial audio for audio conferencing
12/16/10Detection of objectionable videos
12/16/10Assessable natural interactions in formal course curriculums
12/16/10Rubric-based assessment with personalized learning recommendations
12/16/10Educational services and contracts
12/16/10Retrieving unique message parts on a mobile computing device
12/16/10Discovery and distribution of game session information
12/16/10Using a human computation game to improve search engine performance
12/16/10Retracing steps
12/16/10Applying a structured language model to information extraction
12/16/10Noise adaptive training for speech recognition
12/16/10Model training for automatic speech recognition from imperfect transcription data
12/16/10Application of user-specified transformations to automatic speech recognition results
12/16/10Application-dependent information for recognition processing
12/16/10Context-relevant images
12/16/10Touch anywhere to speak
12/16/10Quantization and inverse quantization for audio
12/16/10Message-passing protocol between entities having dissimilar capabilities
12/16/10Executing transactions as an atomic unit
12/16/10Determining capability interdependency/constraints and analyzing risk in business architectures
12/16/10Synchronizing delegation models between disparate servers
12/16/10Adaptive meeting management
12/16/10Compensating stores for consumer influence with automated tracking
12/16/10Advertising inventory prediction for frequency-capped lines
12/16/10Incentive compatible selection mechanism
12/16/10Function and constraint based service agreements
12/16/10Pii identification learning and inference algorithm
12/16/10Conversion of an application database to minimize time in single-user access mode
12/16/10Declarative framework for deduplication
12/16/10Backup and archival of selected items as a composite object
12/16/10Displaying key differentiators based on standard deviations within a distance metric
12/16/10Smoothing clickthrough data for web search ranking
12/16/10Providing search results to a computing device
12/16/10Providing knowledge content to users
12/16/10Labeling data samples using objective questions
12/16/10Identification of sample data items for re-judging
12/16/10Interactive physical design tuning
12/16/10Period to date functions for time intelligence functionality
12/16/10Synopsis of a search log that respects user privacy
12/16/10Content mesh searching
12/16/10Efficient database lookup operations
12/16/10Distributed computing management
12/16/10Storage or removal actions based on priority
12/16/10Distributed cache availability during garbage collection
12/16/10Educational entity architecture and object model
12/16/10Using a variable identity pipe for constrained delegation and connection pooling
12/16/10Adaptive streaming of conference media and data
12/16/10Bridging enterprise networks into cloud
12/16/10Social graphing for data handling and delivery
12/16/10Message redirection within a messaging infrastructure
12/16/10Local loop for mobile peer to peer messaging
12/16/10Development tools for transition-independent web features
12/16/10Publish/subscribe mashups for social networks
12/16/10Altering software behavior based on internet connectivity
12/16/10Leveraging remote server pools for client applications
12/16/10Byte range caching
12/16/10Dynamic time weighted network identification and fingerprinting for ip based networks based on collection
12/16/10Customer intelligence in a cloud operating environment
12/16/10Routing of pooled messages via an intermediary
12/16/10Concurrent processing with untrusted beings
12/16/10Educational adaptive provider architecture
12/16/10Datacenter execution templates
12/16/10Optimizing mobile device synchronization with multiple data sources
12/16/10Multi-channel communication
12/16/10efficient transform from xml to javascript objects
12/16/10Adaptive keyboard layout mapping
12/16/10Location enabled bookmark and profile
12/16/10Application-transparent hybridized caching for high-performance storage
12/16/10Dynamic screentip language translation
12/16/10Dynamic content caching and retrieval
12/16/10Distributed rdc chunk store
12/16/10Secure and private backup storage and processing for trusted computing and data services
12/16/10Trusted hardware component for distributed systems
12/16/10Discovery of secure network enclaves
12/16/10Key management in secure network enclaves
12/16/10Instruction cards for storage devices
12/16/10Secure and private backup storage and processing for trusted computing and data services
12/16/10Energy use profiling for workload transfer
12/16/10Hang recovery in software applications
12/16/10Monitoring and healing a computing system
12/16/10Failure-model-driven repair and backup
12/16/10Runtime behavior alteration using behavior injection harness
12/16/10Visualization tool for system tracing infrastructure events
12/16/10Automatic insertion of data from web forms into documents
12/16/10Architecture to expose internal business data on a website
12/16/10Identifying changes for online documents
12/16/10Modifications to editable elements of web pages rendered in word processor applications
12/16/10Viewer-centric user interface for stereoscopic cinema
12/16/10Media asset recommendation service
12/16/10Method and system for improved electronic task flagging and management
12/16/10Integrating updates into a social-networking service
12/16/10User interface for entering account dimension combinations
12/16/10Media asset pivot navigation
12/16/10Assisting user interface element use
12/16/10Association of display elements
12/16/10System and method for displaying full product functionality using minimal user interface footprint
12/16/10Source code semantic zoom and spatial layout
12/16/10Hypergraph implementation
12/16/10Software extension analysis
12/16/10Supplementary deployment actions
12/16/10Catalog-based software component management
12/16/10Language-based model for isolating shared state
12/16/10Static program reduction for complexity analysis
12/16/10Contextual discovery of value-added components
12/16/10Bootstrapping streamed and virtualized applications
12/16/10Mitigating user interruption for partially downloaded streamed and virtualized applications.
12/16/10Terminal services application virtualization for compatability
12/16/10Thread safe cancellable task groups
12/16/10Annotating virtual application processes
12/16/10Program partitioning across client and cloud
12/16/10Policy management for the cloud
12/16/10Persisting application state
12/16/10Media content rebroadcast
12/16/10Interactive television architecture
12/16/10Trusted agent for advertisement protection
12/16/10Controlling access to software component state
12/16/10Controlling access to resources by hosted entities
12/16/10Decreasing login latency
12/16/10Access control to secured application features using client trust levels
12/16/10Digital content acquisition system and techniques
12/16/10Generic protocol decoder for generic application-level protocol signatures.
12/16/10Hardware specific product license validation
12/09/10Rfid receiving process for use with enterprise resource planning systems
12/09/10Controlling touch input modes
12/09/10Graph scalability
12/09/10Asynchronous communication in an unstable network
12/09/10Conveying service invocation information within multimodal conversation systems
12/09/10Assisted face recognition tagging
12/09/10Geocoding by image matching
12/09/10Using combined answers in machine-based education
12/09/10Adaptive clicker technique
12/09/10Dual-barrel, connector jack and plug assemblies
12/09/10Nearby contact alert based on location and context
12/09/10Squad vs. squad video game
12/09/10Adaptive playlist onboard a vehicle
12/09/10Topological-based localization and navigation
12/09/10Scrubbing variable content paths
12/09/10Recognition using re-recognition and statistical classification
12/09/10Querying dialog prompts
12/09/10Local and remote aggregation of feedback data for speech recognition
12/09/10Progressive application of knowledge sources in multistage speech recognition
12/09/10Hidden markov model based text to speech systems employing rope-jumping algorithm
12/09/10Techniques to create a custom voice font
12/09/10Local and remote feedback loop for speech synthesis
12/09/10Interactive tts optimization tool
12/09/10Content advertisements for video
12/09/10Personalizing selection of advertisements utilizing digital image analysis
12/09/10Item advertisement profile
12/09/10Internet-based advertisement management
12/09/10Generating recommendations through use of a trusted network
12/09/10Truth revealing market equilibrium
12/09/10Verifiable advertisement presentation
12/09/10Method and system for performing searches and returning results based on weighted criteria
12/09/10Feature vector clustering
12/09/10Kind classification through emergent semantic analysis
12/09/10Multidimensional cube functions
12/09/10Scalable lookup service for distributed database
12/09/10Synchronizing file partitions utilizing a server storage model
12/09/10Associating information with an electronic document
12/09/10Partial-matching for web searches
12/09/10Presenting search results according to query domains
12/09/10Notification-based cache invalidation for complex database queries
12/09/10Parallel processing of an ordered data stream
12/09/10Geographic co-location service for cloud computing
12/09/10Utilizing server pre-processing to deploy renditions of electronic documents in a computer network
12/09/10Dedicated processor core request
12/09/10Batching of messages for mobile endpoint
12/09/10Traversing between electronic mail and real time communications
12/09/10Network application performance enhancement using speculative execution
12/09/10Intelligent processing of web service requests for backward compatibility
12/09/10Asynchronous update of virtualized applications
12/09/10Determining server utilization
12/09/10Host accountability using unreliable identifiers
12/09/10Utilizing affinity groups to allocate data items and computing resources
12/09/10Determining an efficient keep-alive interval for a network connection
12/09/10Preloading modules for performance improvements
12/09/10Transport pipeline decryption for content-scanning agents
12/09/10Add-ins dynamically extending display targets and business-logic programming model
12/09/10Storage array power management through i/o redirection
12/09/10Storage array power management using lifecycle information
12/09/10Differentiating connectivity issues from server failures
12/09/10Converting diagrams between formats
12/09/10Calibration and annotation of video content
12/09/10In-line dynamic text with variable formatting
12/09/10Audio and position control of user interface
12/09/10Aggregating dynamic visual content
12/09/10Separable displays and composable surfaces
12/09/10Representing data on configurable timeline with filter
12/09/10Performing character selection and entry
12/09/10Integrated work lists for engineering project change management
12/09/10Systems and methods for varying software build properties using primary and supplemental build files
12/09/10Application building
12/09/10Extensible user interface generation
12/09/10Language-based model for asynchronous operations
12/09/10Access to test-ready virtual environments
12/09/10Developer-managed debugger data records
12/09/10Method for preventing software reverse engineering, unauthorized modification, and runtime data interception
12/09/10Determining target types for generic pointers in source code
12/09/10Efficient virtual machine management
12/09/10Credentials phishing prevention protocol
12/09/10Identifying synonyms of entities using a document collection
12/09/10Blocking malicious activity using blacklist
12/09/10Web-based client for creating and accessing protected content
12/02/10Detecting beat information using a diverse set of correlations
12/02/10Making an optic with a cladding
12/02/10optic having a dichroic reflector
12/02/10Channel discovery and disconnection in networks over white spaces and other portions of the spectrum
12/02/10Systems and methods for immersive interaction with virtual objects
12/02/10Touch sensitive display apparatus using sensor input
12/02/10Methods and systems for defining or modifying a visual representation
12/02/10Creating a virtual mouse input device
12/02/10Virtual desktop coordinate transformation
12/02/10Virtual input devices created by touch input
12/02/10Touch pull-in gesture
12/02/10Ferromagnetic user interfaces
12/02/10Optic having a cladding
12/02/10Touch personalization for a display device
12/02/10Extensible map with pluggable modes
12/02/10Target digitization, extraction, and tracking
12/02/10Real time retargeting of skeletal data to game avatar
12/02/10Systems and methods for applying animations or motions to a character
12/02/10Fixed function pipeline application remoting through a shader pipeline conversion layer
12/02/10Generating voronoi treemaps
12/02/10Rendering aligned perspective images
12/02/10Establishing eye contact in video conferencing
12/02/10Depth image noise reduction
12/02/10Environment and/or target segmentation
12/02/10Virtual media input device
12/02/10Load balancing across layer-2 domains
12/02/10Spatialized audio over headphones
12/02/10Device for identifying and tracking multiple humans over time
12/02/10Systems and methods for tracking a model
12/02/10Virtual object
12/02/10Systems and methods for estimating an occluded body part
12/02/10Purple fringing artifact reduction
12/02/10Determining intensity similarity in low-light conditions using the poisson-quantization noise model
12/02/10Automatic dust removal in digital images
12/02/10End-loaded battery carriage
12/02/10Spectrum assignment for networks over white spaces and other portions of the spectrum
12/02/10In-call contact information display
12/02/10Location determination with geographic and bias tuning
12/02/10Protocol and format for communicating an image from a camera to a computing environment
12/02/10Adjusting difficulty level of a multiplayer game
12/02/10Image contrast enhancement in depth sensor
12/02/10Vehicle route representation creation
12/02/10Language translation using embeddable component
12/02/10Unified model for authoring and executing flow-based and constraint-based workflows
12/02/10Shared collaboration canvas
12/02/10Enterprise project types
12/02/10Extensible role-based access control model for services
12/02/10Special-ordered-set-based cost minimization
12/02/10Interactive map/diagram of erp code and model elements
12/02/10Personalized task recommendations
12/02/10Meeting state recall
12/02/10Digital content billing via multiple channels
12/02/10Boosting to determine indicative features from a training set
12/02/10Predicting whether strings identify a same subject
12/02/10Speeding up analysis of compressed web graphs
12/02/10Timeline experience for restore user interface
12/02/10Persistent query plans
12/02/10Abstract pipeline component connection
12/02/10Pattern matcher and its matching method
12/02/10Merging search results
12/02/10Identifying modifiers in web queries over structured data
12/02/10Ranking results of multiple intent queries
12/02/10Short paths in web graphs with small query time
12/02/10Extending random number summation as an order-preserving encryption scheme
12/02/10Cache-friendly b-tree accelerator
12/02/10Collaborative search tools
12/02/10Search and replay of experiences based on geographic locations
12/02/10Cache synchronization
12/02/10Hiding search box based on search provider settings
12/02/10Instance space based management pack infrastructure
12/02/10Menu searching of a hierarchical menu structure
12/02/10Localized gesture aggregation
12/02/10Generating a local copy of a virtualized application package from a local installation
12/02/10Xml data model for remote manipulation of directory data
12/02/10Swarm-based synchronization over a network of object stores
12/02/10hierarchial classification
12/02/10Sparse matrix padding
12/02/10Real-time directory groups
12/02/10Delivering messages using user-defined agents
12/02/10Detailed end-to-end latency tracking of messages
12/02/10Managing user accounts and groups in multiple forests
12/02/10Single-interface dynamic mtu control
12/02/10External access and partner delegation
12/02/10Agile data center network architecture
12/02/10Free-space reduction in cached database pages
12/02/10Heterogeneous storage array optimization through eviction
12/02/10Efficient distribution of computation in key agreement
12/02/10Business to business secure mail
12/02/10Secure computing environment in a transportable container
12/02/10Distributed key encryption in servers
12/02/10Automated identification of performance crisis
12/02/10Object templates for data-driven applications
12/02/10Force-feedback within telepresence
12/02/10Variable rate scrollbar
12/02/10Virtual inking using gesture recognition
12/02/10Avatar integrated shared media experience
12/02/10Progressively discovering and integrating services
12/02/10Automated content submission to a share site
12/02/10Intelligent backward resource navigation
12/02/10Asynchronous identity establishment through a web-based application
12/02/10Gesture-based document sharing manipulation
12/02/10Avatar integrated shared media selection
12/02/10User movement feedback via on-screen avatars
12/02/10System and method for customizing note flags
12/02/10Living cursor control mechanics
12/02/10Gesture coach
12/02/10Gesture tool
12/02/10Gesture shortcuts
12/02/10Gestures beyond skeletal
12/02/10Extending standard gestures
12/02/10Hierarchical view state storage
12/02/10Package design and generation
12/02/10Composite values for declarative language applications
12/02/10Role based delegated administration model
12/02/10Workflow message and activity correlation
12/02/10Locality-based scheduling in continuation-based runtimes
12/02/10Determining an imbalance among computer-component usage
12/02/10Delegation model for role-based access control administration
12/02/10Opaque quarantine and device discovery
12/02/10Managing potentially phishing messages in a non-web mail client context
12/02/10Identifying security properties of systems from application crash traffic
11/25/10Geographic reminders
11/25/10Control of display objects
11/25/10Method of visualizing an input location
11/25/10Two sided slate device
11/25/10Light-induced shape-memory polymer display screen
11/25/10Differential model analysis within a virtual world
11/25/10Data analysis and visualization system and techniques
11/25/10Automatic user viewing preference
11/25/10Composite video generation
11/25/10Optimized allocation of multi-core computation for video encoding
11/25/10Multimodal callback tagging
11/25/10Conserving call logic during handoff
11/25/10Timed location sharing
11/25/10Mining phrase pairs from an unstructured resource
11/25/10Contextual commentary of textual images
11/25/10Generating relevant keywords for monetization in an electronic map environment
11/25/10Stages, phases in a project workflow
11/25/10Summary tasks for top-down project planning
11/25/10Software with integrated advertising content
11/25/10Invitations with pre-populated profile information
11/25/10Runtime interpretation of declarative programs
11/25/10Programming element modification recommendation
11/25/10Disambiguating a search query
11/25/10Distributed contact information discovery and sharing
11/25/10Identifying task groups for organizing search results
11/25/10Database application navigation
11/25/10Reducing latency in returning online search results
11/25/10Click-through prediction for news queries
11/25/10Keyword searching on database views
11/25/10Automatic file conversion to a target format
11/25/10Selection and sorting protocol extensions to the ws-enumeration protocol
11/25/10Disk drive condition reporting and error correction
11/25/10Portable secure computing network
11/25/10Column selection, insertion and resizing in computer-generated tables
11/25/10Model for reusable user interface and logic for software wizards
11/25/10Large sets of data
11/25/10Directional focus navigation
11/25/10Systems and methods of providing rich user interface and animation to auxiliary display devices
11/25/10Tracking in a virtual world
11/25/10Approach for root causing regression bugs
11/25/10Compile-time context for dynamically bound operations
11/25/10Attribute based method redirection
11/25/10Dynamic binding directed by static types
11/25/10Resource aware programming
11/25/10Generation of a comparison task list of task items
11/25/10Virtualized thread scheduling for hardware thread optimization
11/25/10Dynamic event collection and structured storage
11/25/10Recorder vacation mode
11/25/10Media content search results ranked by popularity
11/25/10Media content retrieval system and personal virtual channel
11/25/10Personalized content in a unidirectional broadcast stream
11/25/10Model based multi-tier authentication
11/25/10Time window based canary solutions for browser security
11/25/10Claims-based authorization at an identity provider
11/18/10Metadata-based song creation and editing
11/18/10Antenna configured for bandwidth improvement on a small substrate.
11/18/10Adjusting organization of media content on display
11/18/10Interactive connector routing between obstacles
11/18/10Creation and manipulation of canvases based on ink strokes
11/18/10Video capture device providing multiple resolution video feeds
11/18/10Fax accounts
11/18/10Packet compression for network packet traffic analysis
11/18/10Resynchronization of call events after trigger event
11/18/10Multimodal conversation park and retrieval
11/18/10Secure outsourced aggregation with one-way chains
11/18/10Determination of unicode points from glyph elements
11/18/10Constraint-based scheduling for delivery of location information
11/18/10Proximity-based mobile message delivery
11/18/10Integrating energy budgets for power management
11/18/10Display ads testing tool for rich media developers
11/18/10Content activity feedback into a reputation system
11/18/10Method and apparatus for evaluating content
11/18/10Delivering contextual advertising to a vehicle
11/18/10Multi-variable product rank
11/18/10Tile space user interface for mobile devices
11/18/10Interaction model to migrate states and data
11/18/10Social networking updates for image display devices
11/18/10Controlled constraint sharing in parallel problem solvers
11/18/10Initialization of database for synchronization
11/18/10Query classification
11/18/10Range inclusive probe algorithm
11/18/10Providing tools for navigational search query results
11/18/10Identifying synonyms of entities using web search
11/18/10Identifying conceptually related terms in search query results
11/18/10Directory opportunistic locks using file system filters
11/18/10Synchronizing self-referencing fields during two-way synchronization
11/18/10Synchronizing tasks between servers
11/18/10Displaying transition images during a slide transition
11/18/10Cache enumeration and indexing
11/18/10Multiple cache directories
11/18/10Location updates for a distributed data store
11/18/10Cache cleanup and latching
11/18/10Converting luns into files or files into luns in real time
11/18/10Http-based authentication
11/18/10Method for expanding and collapsing data cells in a spreadsheet report
11/18/10Rendering to a device desktop of an adaptive input device
11/18/10Grid windows
11/18/10Computerized event tracking with ambient graphical indicator
11/18/10Architectural data metrics overlay
11/18/10Enhanced product functionality based on user identification
11/18/10Dynamic program updating in a continuation based runtime
11/18/10Recipe-based application conversion
11/18/10Client application independent extensibility model
11/18/10Social authentication for account recovery
11/18/10Interactive authentication challenge
11/18/10Linking web identity and access to devices
11/18/10Evidence-based dynamic scoring to limit guesses in knowledge-based authentication
11/18/10Runtime analysis of software privacy issues
11/18/10Availability of permission models in roaming environments
11/11/10Contact grouping and gesture recognition for surface computing
11/11/10Contextually adaptive input device
11/11/10Touch input to modulate changeable parameter
11/11/10Changing of list views on mobile device
11/11/10Optimizing conferencing performance
11/11/10Pose-variant face recognition using multiscale local descriptors
11/11/10Efficient image matching
11/11/10Computing visual and textual summaries for tagged image collections
11/11/10Deploying learning management systems to mobile communications devices
11/11/10Massively multiplayer game with shared gameplay experience
11/11/10Touch gesturing on multi-player game space
11/11/10Massively multiplayer game message scheduling
11/11/10Aligning hierarchial and sequential document trees to identify parallel data
11/11/10Integration of third-party business applications with hosted multi-tenant business software system
11/11/10Server farm management
11/11/10Collaborative view for a group participation plan
11/11/10Personal information management with location functionality
11/11/10Providing time-sensitive information for purchase determinations
11/11/10File stashing for storage media
11/11/10On-site search engine for the world wide web
11/11/10Instant answers and integrated results of a browser
11/11/10Model-based searching
11/11/10Sharing and collaboration of search findings
11/11/10Characteristic tagging
11/11/10Partitioning of contended synchronization objects
11/11/10Static analysis framework for database applications
11/11/10Dynamically encoding types and inhabitants in a relational database
11/11/10Templates for configuring file shares
11/11/10System and method for restricting data transfers and managing software components of distributed computers
11/11/10Mechanism to verify physical proximity
11/11/10Crisscross cancellation protocol
11/11/10Crisscross cancellation protocol
11/11/10Application virtualization
11/11/10Capturing and loading operating system states
11/11/10Root cause analysis for complex event processing
11/11/10Exception raised notification
11/11/10Reusable business logic across user interface containers
11/11/10Authoring of demonstration environments
11/11/10Mobile information services
11/11/10Correction of typographical errors on touch displays
11/11/10Multi-device gesture interactivity
11/11/10Extension through visual reflection
11/11/10Test case analysis and clustering
11/11/10Low-privilege debug channel
11/11/10Parental control for media playback
11/11/10Virtual media channels
11/11/10Broadcast social and media navigation system
11/11/10Security policy trigger for policy enforcement
11/11/10Flexible identity issuance system
11/11/10Sanitization of packets
11/11/10Executing native-code applications in a browser
11/04/10User tracking feedback
11/04/10Touchpad display
11/04/10Touch sensitive lcd panel
11/04/10Systems and methods for applying model tracking to motion capture
11/04/10Modeling anisotropic surface reflectance with microfacet synthesis
11/04/10Dynamic graphics pipeline and in-place rasterization
11/04/10Determine intended motions
11/04/10Data visualization platform performance optimization
11/04/10Display screen comprising photoluminescent material
11/04/10User-based authentication for realtime communications
11/04/10Tamper-resistant text stream watermarking
11/04/10Human body pose estimation
11/04/10Isolate extraneous motions
11/04/10Systems and methods for detecting a tilt angle from a depth image
11/04/10User interface for navigating through images
11/04/10Efficient encoding of alternative graphic sets
11/04/10Noise robust speech classifier ensemble
11/04/10Implicit rating of advertisements
11/04/10Domain classification and content delivery
11/04/10Provider-driven payment adapter plug-in to payment gateway
11/04/10Extensible media rights
11/04/10Metadata for data storage array
11/04/10Asynchronous database index maintenance
11/04/10Cross-channel coauthoring consistency
11/04/10Hierarchical conditional random fields for web extraction
11/04/10Automatic recommendation of vertical search engines
11/04/10Secondary index and indexed view maintenance for updates to complex types
11/04/10Estimating rank on graph streams
11/04/10Linear combination of rankers
11/04/10Ranking system
11/04/10Exploring attached and unattached content databases
11/04/10Fast merge support for legacy documents
11/04/10Distributed data reorganization for parallel execution engines
11/04/10Use of delete notifications by file systems and applications to release storage space
11/04/10System and apparatus for sending complete responses to truncated electronic mail messages on a mobile device
11/04/10Methods and systems for preparing extensible markup language (xml) documents and for responding to xml requests
11/04/10Delegated administration for remote management
11/04/10Storage optimization across media with differing capabilities
11/04/10Program code simulator
11/04/10Alternate authentication
11/04/10Issuing a publisher use license off-line in a digital rights management (drm) system
11/04/10Personalizing an adaptive input device
11/04/10File system recognition structure
11/04/10Maintaining undo and redo capability across metadata merges
11/04/10System and method for user modification of metadata in a shell browser
11/04/10Platform extensibility framework
11/04/10Configuring an adaptive input device with selected graphical images
11/04/10Providing a search-result filters toolbar
11/04/10Cursor adjustment in ambient light
11/04/10Binding users to a gesture based system and providing feedback to the users
11/04/10Managing virtual ports
11/04/10Altering a view perspective within a display environment
11/04/10Method to control perspective for a camera-controlled computer
11/04/10Whitebox trace fuzzing
11/04/10Automatic configuration of project system from project capabilities
11/04/10Automated software deployment triggered by state differences in distributed systems
11/04/10Multiphase virtual machine host capacity planning
11/04/10Application efficiency engine
11/04/10Shared job scheduling in electronic notebook
11/04/10Secure multi-principal web browser
10/28/10Multi-mode optical navigation
10/28/10Encoding and decoding adaptive input device inputs
10/28/10Shading using texture space lighting and non-linearly optimized mip-maps
10/28/10Light-field display
10/28/10Bidirectional dynamic offloading of tasks between a host and a mobile device
10/28/10Image processing using geodesic forests
10/28/10Data relevation and pattern or event recognition
10/28/10Apparatus and methods for medical patient role playing/simulation activity
10/28/10Systems and methods for enhancing the treatment of individuals
10/28/10Advertisement coordination
10/28/10Data classification pipeline including automatic classification rules
10/28/10Dynamic placement of replica data
10/28/10Method and system for synthetic backup and restore
10/28/10Distributed backup and versioning
10/28/10De-duplication and completeness in multi-log based replication
10/28/10Systems and methods for modeling partitioned tables as logical indexes
10/28/10Extensible framework for data import and export
10/28/10Schema matching using clicklogs
10/28/10Digital media transfer based on user behavior
10/28/10Proactive load balancing
10/28/10Hosted application sandbox model
10/28/10Adjustment of transmission data rate based on data errors and/or latency
10/28/10Providing lock-based access to nodes in a concurrent linked list
10/28/10Hybrid distributed and cloud backup architecture
10/28/10Intelligent tiers of backup data
10/28/10Efficient discovery, display, and autocompletion of links to wiki resources
10/28/10Click-through controller for mobile interaction
10/28/10Media timeline interaction
10/28/10Late loading rich media
10/28/10Opening network-enabled electronic documents
10/28/10Agenda and day hybrid calendar view
10/28/10Managing data across a semantic data view and a presentation data view
10/28/10System and method for generating suggested alternatives for visual or audible submissions
10/28/10Segmentation for static analysis
10/28/10Intermediate language representation and modification
10/28/10Concurrent mutation of isolated object graphs
10/28/10Gathering statistics in a process without synchronization
10/28/10Reduction of memory latencies using fine grained parallelism and fifo data structures
10/28/10Reader/writer lock with reduced cache contention
10/28/10Concurrent data processing in a distributed system
10/28/10Controlling access of application programs to an adaptive input device
10/28/10Switching an application, user, and security context based on device orientation
10/21/10Use of sack geometry to implement a single qubit phase gate
10/21/10Use of topological charge measurements to change between different qubit encodings
10/21/10Self-description of an adaptive input device
10/21/10Camera-based multi-touch mouse
10/21/10Context-based state change for an adaptive input device
10/21/10State changes for an adaptive device
10/21/10Character manipulation
10/21/10Independent information network
10/21/10Service-based key escrow and security for device data
10/21/10Image analysis through neural network using image average color
10/21/10Automated image cropping to include particular subjects
10/21/10Predictive determination
10/21/10Transcription, archiving and threading of voice communications
10/21/10Tracking user profile influence in a digital media system
10/21/10Selective enablement of runtime-based application behaviors
10/21/10Advisor referral
10/21/10System and method for customization of search results
10/21/10System and method for ranking search results using click distance
10/21/10Acquisition of semantic class lexicons for query tagging
10/21/10Online content service with catalog-based interaction
10/21/10Efficient creation, storage, and provision of web-viewable documents
10/21/10Network caching for multiple contemporaneous requests
10/21/10Method and system for semantically labeling strings and providing actions based on semantically labeled strings
10/21/10Distributed aggregation on an overlay network
10/21/10Sequenced transmission of digital content items
10/21/10Thin client session management
10/21/10Sliding-window multi-class striping
10/21/10Advanced text completion, such as for markup languages
10/21/10Taskbar media player
10/21/10Statistical models and methods to support the personalization of applications and services via consideration of preference encodings of a community of users
10/21/10Analysis of dynamic elements in bounded time
10/21/10Executing tasks through multiple processors consistently with dynamic assignments
10/21/10Meta data enhanced television programming
10/21/10Online service data management
10/14/10Sensing the amount of liquid in a vessel
10/14/10Keyboard gesturing
10/14/10Avoiding optical effects of touch on liquid crystal display
10/14/10View-dependent rendering of parametric surfaces
10/14/10Feature compensation approach to robust speech recognition
10/14/10Mobile content delivery on a mobile network
10/14/10User information brokering
10/14/10Scalable clustering
10/14/10Logging and analyzing computer user's context data
10/14/10Faster minimum error rate training for weighted linear models
10/14/10Content synchronization across multiple computers
10/14/10Method, system, and apparatus for creating an archive routine for protecting data in a data protection system
10/14/10Automated filtered index recommendations
10/14/10Re-ranking top search results
10/14/10Provision of applications to mobile devices
10/14/10Discovery of inaccessible computer resources
10/14/10Adaptive profile for directing graphical content in a computing system
10/14/10Data transfer from on-line to on-premise deployment
10/14/10Computing minimal polynomials
10/14/10Obtaining instrumentation data
10/14/10Granular data synchronization for editing multiple data objects
10/14/10Configuration of a single-purpose application via a web application
10/14/10Bottom-up analysis of network sites
10/14/10Optimizing access to federation infrastructure-based resources
10/14/10Storage virtual containers
10/14/10Type system support for memory isolation permissions
10/14/10Reclamation of thin provisioned disk storage
10/14/10Handling exceptions related to corrupt application state
10/14/10One time password key ring for mobile computing device
10/14/10Computational energy measurement without hardware support
10/14/10Schema based user interface mechanisms
10/14/10Visualized modeling language connector selection
10/14/10Synchronization of mobile device with application
10/14/10Revocation of application on mobile device
10/14/10Virtual machine packing method using scarcity
10/14/10Optimized virtual machine migration mechanism
10/14/10Vulnerability detection based on aggregated primitives
10/07/10Voice scratchpad
10/07/10Clustering videos by location
10/07/10Image compression acceleration using multiple processors
10/07/10System and method for managing electronic communications
10/07/10Mobile sensor network
10/07/10Location sensing selection for mobile devices
10/07/10Generating implicit labels and training a tagging model using such labels
10/07/10Maximum entropy model with continuous features
10/07/10Associating user-defined descriptions with objects
10/07/10User-targeted rebates
10/07/10Embedded content brokering and advertisement selection delegation
10/07/10Advertising bids based on user interactions
10/07/10Metric-based events for social networks
10/07/10Data change ordering in multi-log based replication
10/07/10Differential file and system restores from peers and the cloud
10/07/10Employing user-context in connection with backup or restore of data
10/07/10Search queries with shifting intent
10/07/10Learning to rank using query-dependent loss functions
10/07/10Data parallel query analysis
10/07/10Search query extension
10/07/10Retrieving data in batches from a line of business system
10/07/10Content-based information retrieval
10/07/10Providing access to a data item using access graphs
10/07/10Updating media-location data for media-playing entities
10/07/10Automated response to computer users context
10/07/10Augmented reality cloud computing
10/07/10Peer connections over alternative communication mechanisms
10/07/10Method and apparatus for detecting the type of interface to which a peripheral device is connected
10/07/10Bare metal machine recovery from the cloud
10/07/10Secure biometric identity broker module
10/07/10Obfuscated state store for rights management system and the like
10/07/10Input device with user balanced performance and power consumption
10/07/10Restoration of a system from a set of full and partial delta system snapshots across a distributed system
10/07/10Visual group interface for group connectivity
10/07/10Parallel programming and execution systems and techniques
10/07/10Communicating events or data between application components
10/07/10Continuous selection graphs
10/07/10Data access programming model for occasionally connected applications
10/07/10Honey monkey network exploration
10/07/10Updating an engine using a description language
10/07/10Security restrictions on binary behaviors
09/30/10Detecting touch on a curved surface
09/30/10Magnetic inductive charging with low far fields
09/30/10Mobile computer device binding feedback
09/30/10Mobile computer device display postures
09/30/10Detecting touch on a curved surface
09/30/10Dual screen portable touch sensitive computing system
09/30/10Annotating or editing three dimensional space
09/30/10Context-based management of markers
09/30/10Filter and surfacing virtual content in virtual worlds
09/30/10Ambulatory presence features
09/30/10Automatic utilization of resources in a realtime conference
09/30/10Session replacement using replaced session attributes
09/30/10Extensible realtime delegation for calls, conferences and collaboration
09/30/10Dc coefficient signaling at small quantization step sizes
09/30/10Mitigation of echo in voice communication using echo detection and adaptive non-linear processor
09/30/10User-specified sharing of data via policy and/or inference from a hierarchical cryptographic store
09/30/10Detection of objects in images
09/30/10Precision constrained gaussian model for handwriting recognition
09/30/10Tagging video using character recognition and propagation
09/30/10Computationally efficient local image descriptors
09/30/10Subscriber identity module (sim) for mobile stations
09/30/10Personalization using a hand-pressure signature
09/30/10Control of video game via microphone
09/30/10Business data display and position correction in street-side imagery
09/30/10Managing storage and delivery of navigation images
09/30/10Visual assessment of landmarks
09/30/10Tag ranking
09/30/10Cognitive agent
09/30/10Enlightenment for low overhead hardware access
09/30/10Text analysis using phrase definitions and containers
09/30/10Sharable distributed dictionary for applications
09/30/10Adaptation for statistical language model
09/30/10Providing local contextual information with contextual advertisements
09/30/10Evaluating the quality of web-based properties
09/30/10Optimizing cashback rates
09/30/10Platform or user sensitive advertising
09/30/10Merge real-world and virtual markers
09/30/10Relevancy of virtual markers
09/30/10Access to line-of-business databases in declarative workflow
09/30/10Dynamic integrated database index management
09/30/10Enumeration of a concurrent data structure
09/30/10Method and apparatus for web crawling
09/30/10Flexible query hints in a relational database
09/30/10Anticipating interests of an online user
09/30/10Calculating web page importance
09/30/10Translating a comprehension into code for execution on a single instruction, multiple data (simd) execution
09/30/10Sub-mailbox folder hierarchy to represent a separate physical mailbox to a user
09/30/10Query throttling during query translation
09/30/10Execution of semantic queries using rule expansion
09/30/10Modeling semantic and structure of threaded discussions
09/30/10Extending collaboration capabilities to external data
09/30/10Query processing using arrays
09/30/10Generic editor for databases
09/30/10Object-relational mapping with dynamic relational schemas
09/30/10Platform for societal networking
09/30/10Mechanism for geo distributing application data
09/30/10Scope-based extensibility for control surfaces
09/30/10Apparatus and computer-readable media for processing http requests
09/30/10Peer-to-peer aided live video sharing system
09/30/10Content channels for electronic messaging
09/30/10Automated license reconciliation for deployed applications
09/30/10Consistent cluster operational data in a server cluster using a quorum of replicas
09/30/10Smart routing
09/30/10Removable accessory for a computing device
09/30/10Hidden desktop director for an adaptive device
09/30/10Virtual non-uniform memory architecture for virtual machines
09/30/10Managing working set use of a cache via page coloring
09/30/10Input content to application via web browser
09/30/10Content and subfolder navigation control
09/30/10Dynamic thresholds for conditional formats
09/30/10Automated document formatting tool
09/30/10Inserting web content into a destination website
09/30/10Delivering client content on a webpage
09/30/10Bimodal touch sensitive digital notebook
09/30/10Flick gesture
09/30/10Controlling playback of media content
09/30/10Placeholder activities and in-lining of code editors in workflow designer
09/30/10Measurement and reporting of performance event rates
09/30/10Virtual keyboard with staggered keys
09/30/10Information-enhanced user interface presentation
09/30/10Automatic generation of markers based on social interaction
09/30/10Virtual keyboard with slider buttons
09/30/10Localized information-preserving levels in model visualization
09/30/10Generating and using code-based diagrams
09/30/10Version type traversal
09/30/10Using encoding to detect security bugs
09/30/10Dynamic collection of instrumentation data
09/30/10Combination may-must code analysis
09/30/10Binary resource format and compiler
09/30/10Device dependent on-demand compiling and deployment of mobile applications
09/30/10Virtual non-uniform memory architecture for virtual machines
09/30/10Timer access from user mode through a shared memory page
09/30/10In-process intermediary to create virtual processes
09/30/10Adaptable management in sync engines
09/30/10Lock-free scheduler with priority support
09/30/10Priority-based management of system load level
09/30/10Monitoring of distributed applications
09/30/10Operating system distributed over heterogeneous platforms
09/30/10Measurement and reporting of set top box inserted ad impressions
09/30/10Advertisement insertion decisions for set top box management of advertisements
09/30/10Model based security for cloud services
09/30/10Predictive http authentication mode negotiation
09/30/10Adaptive http authentication scheme selection
09/30/10Dynamic spam view settings
09/23/10Non-linguistic interaction with computer systems via surface stimulation
09/23/10Pressure-sensitive context menus
09/23/10Image stitching using partially overlapping views of a scene
09/23/10Chaining animations
09/23/10Generative models for constructing panoramas from an image sequence
09/23/10Error recovery in an audio-video multipoint control component
09/23/10Phone conferencing architecture with optimized services management
09/23/10Dynamic configuration of call controls for communication peripherals
09/23/10Memorable telephone number identification
09/23/10Centroid processing
09/23/10Semi-tied covariance modelling for handwriting recognition
09/23/10Dual module portable devices
09/23/10Smart card file system
09/23/10Computing a target speed in a virtual racing environment
09/23/10Projected way-finding
09/23/10Adaptive pattern learning for bilingual data mining
09/23/10Localized content
09/23/10Offline cashback advertisements
09/23/10Dynamic advertising platform
09/23/10Automated provision of user feedback
09/23/10Immersive virtual commerce
09/23/10Feed content presentation
09/23/10Interactive visualization for generating ensemble classifiers
09/23/10Policy processor for configuration management
09/23/10Notification-based forward chaining
09/23/10Mitigation of obsolescence for archival services
09/23/10Perpetual archival of data
09/23/10Virtual safe deposit box for perpetual digital archival
09/23/10Presenting search results ordered using user preferences
09/23/10Graph queries of information in relational database
09/23/10Context-aware query recommendations
09/23/10Retrieval of metadata for peripheral devices
09/23/10Providing content items selected based on context
09/23/10Local computer account management at domain level
09/23/10Updating data-consuming entities
09/23/10Database application including spilt views
09/23/10Breaking a circular reference between parent and child objects
09/23/10Oarchitectures for supporting diverse client types in transactional systems
09/23/10Client-centered usage classification
09/23/10Component and dependency discovery
09/23/10Mitigations for potentially compromised electronic devices
09/23/10Collaborative speed determination in distributed systems
09/23/10Permission model for feed content
09/23/10Web front-end throttling
09/23/10Min-repro framework for database systems
09/23/10Cache-line aware collection for runtime environments
09/23/10High level programming extensions for distributed data parallel processing
09/23/10General distributed reduction for data parallel computing
09/23/10Automated health model generation and refinement
09/23/10Annotating images with instructions
09/23/10Overriding xslt generation
09/23/10Method and system for deriving and matching local formatting in an electronic document
09/23/10Organization and manipulation of content items on a touch-sensitive display
09/23/10Method and system for creating temporary visual indicia
09/23/10Controlling malicious activity detection using behavioral models
09/23/10Online virtual safe deposit box user experience
09/23/10Tear-drop way-finding user interfaces
09/23/10Adjustable user interfaces with movable separators
09/23/10Re-usable declarative workflow templates
09/23/10Virtual object manipulation
09/23/10Canvas manipulation using 3d spatial gestures
09/23/10User code workflow activities
09/23/10Generating libraries for reflection without project compilation
09/23/10Inferring missing type information for reflection
09/23/10Identifying groups and subgroups
09/23/10Providing execution context in continuation based runtimes
09/23/10Network application versioning
09/23/10Distributing software products as an executable containing script logic with external resources
09/23/10Software deployment over a network
09/23/10Adaptable software resource managers based on intentions
09/23/10Remote procedure call chains
09/23/10System and method for document isolation
09/23/10Network video messaging
09/23/10Identification of telemetry data
09/23/10Biometric credential verification framework
09/16/10Image display via multiple light guide sections
09/16/10Adaptive cursor sizing
09/16/10Large scale data visualization with interactive chart
09/16/10Frame buffer management
09/16/10Inferring diagram structure through implicit shape relationships
09/16/10Seamlessly cycled video resources
09/16/10Full-duplex wireless communications
09/16/10Estimation of fuel consumption from gps trails
09/16/10Driving directions with maps and videos
09/16/10Integration of pre-meeting and post-meeting experience into a meeting lifecycle
09/16/10Endorsable entity presentation based upon parsed instant messages
09/16/10Registering media for configurable advertising
09/16/10Philanthropic advertising campaigns
09/16/10Question and answer search
09/16/10Programming model for synchronizing browser caches across devices and web services
09/16/10Storing lossless transforms of data
09/16/10Predicting interestingness of questions in community question answering
09/16/10Indirect database queries with large olap cubes
09/16/10Techniques for exact cardinality query optimization
09/16/10Organization of spatial sensor data
09/16/10Data file aggregation with respect to user specific temporal range
09/16/10Memory object sharing for just in time compiled data
09/16/10Object recognition and library
09/16/10Distributed data storage
09/16/10Datacenter synchronization
09/16/10Techniques to make meetings discoverable
09/16/10Email characterization
09/16/10Associating telemetry data from a group of entities
09/16/10Smooth, stateless client media streaming
09/16/10Flexible logging, such as for a web server
09/16/10Syndicated presence and activity feed federated via extended interoperable format
09/16/10Delivering cacheable streaming media presentations
09/16/10Offline device-side logical unit number controller
09/16/10Portable secure data files
09/16/10Selective display of elements of a schema set
09/16/10Consume-first mode text insertion
09/16/10Direct manipulation of content
09/16/10Virtual magnifying glass with on-the fly control functionalities
09/16/10Incorporating interactive media into a playlist
09/16/10Contact sidebar tile
09/16/10Smooth layout animation of continuous and non-continuous properties
09/16/10Favorites list sharing
09/16/10Rich web site authoring and design
09/16/10Debugging for runtime type systems
09/16/10Simultaneously displaying multiple call stacks in an interactive debugger
09/16/10Hosted application platform with extensible media format
09/16/10Programming model for installing and distributing occasionally connected applications
09/16/10Programming model for application and data access and synchronization within virtual environments
09/16/10Enabling sharing of mobile communication device
09/16/10Proactive exploit detection
09/09/10Touch discrimination
09/09/10Concurrent encoding/decoding of tiled data
09/09/10Map aggregation
09/09/10Three-dimensional (3d) imaging based on motionparallax
09/09/10Frame capture, encoding, and transmission management
09/09/10Augmenting a field of view in connection with vision-tracking
09/09/10Multi-modal tone-mapping of images
09/09/10Remote desktop protocol (rdp) tile image classification for improving compression efficiency and quality
09/09/10Scalable mutable tiled multi-resolution texture atlases
09/09/10Place-specific buddy list services
09/09/10Limited-rights local playback of digital content
09/09/10Awarding of avatar items in video game environment
09/09/10Path projection to facilitate engagement
09/09/10Techniques for enhanced automatic speech recognition
09/09/10Market design for a resource exchange system
09/09/10Device transaction model and services based on directional information of device
09/09/10Tracking ad unit performance
09/09/10Media tag recommendation technologies
09/09/10Data processing using restricted boltzmann machines
09/09/10Updating bloom filters
09/09/10File handling for naming conflicts
09/09/10Contextual query suggestion in result pages
09/09/10Enterprise search method and system
09/09/10Large graph measurement
09/09/10Domain-based ranking in document search
09/09/10Intelligent enhancement of a search result snippet
09/09/10Open types for distributed systems
09/09/10Multi-condition filtering of an interactive summary table
09/09/10Mapping from objects to data model
09/09/10Identifying a discussion topic based on user interest information
09/09/10Query-based notification architecture
09/09/10Non-privileged access to data independent of filesystem implementation
09/09/10Randomized signal transforms and their applications
09/09/10Systems and methods for conducting internet content usage experiments
09/09/10Smart meeting room
09/09/10Storage model for maintaining structured document fidelity
09/09/10Tear-free remote desktop protocal (rdp) display
09/09/10Protocol agnostic request response pattern
09/09/10Scalable dynamic content delivery and feedback system
09/09/10Stm with multiple global version counters
09/09/10Expedited completion of a transaction in stm
09/09/10Offloading cryptographic protection processing
09/09/10Fast-reconnection of negotiable authentication network clients
09/09/10Full-rights local playback of digital content
09/09/10Access control using identifiers in links
09/09/10Common troubleshooting framework
09/09/10Dynamically resolving recipients to retrieve public keys during send/receive
09/09/10Resolving asynchronous validation errors
09/09/10Content rendering on a computer
09/09/10Integrated experience of vogue system and method for shared integrated online social interaction
09/09/10Task sensitive methods and systems for displaying command sets
09/09/10Problem reporting system based on user interface interactions
09/09/10User interface for interaction with virtual machine
09/09/10Zoomable user interface data generation
09/09/10Floating action buttons
09/09/10Creating organizational containers on a graphical user interface
09/09/10Focal-control user interface
09/09/10Software test bed generation
09/09/10Extracting and collecting platform use data
09/09/10Quota management for network services
09/02/10Stereo image segmentation
09/02/10Protective shroud for handheld device
09/02/10Common controller
09/02/10Multigame multiplayer party session
09/02/10Machine language translation with transfer mappings having varying context
09/02/10Modularization of data center functions
09/02/10Task-related electronic coaching
09/02/10Dynamic aggregation of content based on a fallback definition
09/02/10Systems and methods for enhancing search query results
09/02/10Reporting including filling data gaps and handling uncategorized data
09/02/10Reviewing user-created content before website presentation
09/02/10Web server document library
09/02/10Features such as titles, transitions, and/or effects which vary according to positions
09/02/10Distributed routing of conferences using conference identifier
09/02/10Electronic messaging tailored to user interest
09/02/10Communications application having conversation and meeting environments
09/02/10Methods and systems for performing remote diagnostics
09/02/10Combined header processing for network packets
09/02/10Enabling trusted conferencing services
09/02/10Multi-protocol access to files and directories
09/02/10Contextual tracing
09/02/10Operating system-based application recovery
09/02/10Fingerprinting event logs for system management troubleshooting
09/02/10Techniques for integrating structured accounting data with unstructured data
09/02/10Multi-screen user interface
09/02/10User interface for providing task management and calendar information
09/02/10Visualization of participant relationships and sentiment for electronic messaging
09/02/10Thread execution analyzer
09/02/10Application tune manifests and tune state recovery
09/02/10Trusted entity based anti-cheating mechanism
09/02/10Toolbar dashboard functionality
08/26/10Dynamic rear-projected user interface
08/26/10Method for tessellation on graphics hardware
08/26/10Graphical manipulation of chart elements for interacting with chart data
08/26/10Vgpu: a real time gpu emulator
08/26/10Video sharing
08/26/10Optical medium with added descriptor to reduce counterfeiting
08/26/10Distributed overlay multi-channel media access control (mac) for wireless ad hoc networks
08/26/10Automatic network address assignment in a wireless mesh
08/26/10Gateway advertisement in a wireless mesh
08/26/10Rdp bitmap hash acceleration using simd instructions
08/26/10Triggers for launching applications
08/26/10Text messaging pipeline configuration
08/26/10Emulating legacy hardware using ieee 754 compliant hardware
08/26/10Choosing location or manner of storing data
08/26/10Services advertisement in a wireless mesh
08/26/10Identifying users for effective propagation of content
08/26/10Unbiased active learning
08/26/10Anonymous types for statically typed queries
08/26/10Service discovery and publication
08/26/10Storage system format for transaction safe file system
08/26/10Associating multiple physical mailboxes with same user object in messaging system
08/26/10Configuration and distribution of content at capture
08/26/10Supplying notifications related to supply and consumption of user context data
08/26/10Notification model over a server-to-server connection pool
08/26/10Tunneling of remote desktop sessions through firewalls
08/26/10Using server type to obtain network address
08/26/10Hybrid memory device with single interface
08/26/10Using external memory devices to improve system performance
08/26/10Visualization of trust in an address bar
08/26/10Energy-aware server management
08/26/10Web page error reporting
08/26/10Font handling for viewing documents on the web
08/26/10Second-person avatars
08/26/10Discovering, defining, and implementing computer application topologies
08/26/10Rich signaling feedback mechanism for group communication
08/26/10Asynchronously uploading and resizing content in web-based applications
08/26/10Multiple views of multi-dimensional warehouse layout
08/26/10Search-friendly templates
08/26/10Contract failure behavior with escalation policy
08/26/10Implicit line continuation
08/26/10Managed environment update selection
08/26/10Power-saving operating system for virtual environment
08/26/10Service access using a service address
08/26/10Redirection of secure data connection requests
08/26/10Authentication via a device
08/26/10Detection of artificially generated system load
08/26/10Provisions for validating content using a content registration authority
08/19/10Targeting in a stylus-based user interface
08/19/10Touch-sensitive device for scrolling a document on a display
08/19/10Defining simple and complex animations
08/19/10Personal media landscapes in mixed reality
08/19/10Detection of home network configuration problems
08/19/10Telecommunications device for the deaf (tdd) interface for interactive voice response (ivr) systems
08/19/10Two-party storage of encrypted sensitive information
08/19/10Managing group keys
08/19/10Evaluating related phrases
08/19/10Image-based advertisement platform
08/19/10Facilitating use of a device based on short-range wireless technology
08/19/10Management of gaming data
08/19/10Identifying interesting locations
08/19/10Determining velocity using multiple sensors
08/19/10Proxying external data and services into applications as native types
08/19/10Converting command units into workflow activities
08/19/10Extracting structured data from web forums
08/19/10Methods and systems for halting synchronization loops in a distributed system
08/19/10Synchronizing metadata and document content across client systems using different communication channels
08/19/10Context-aware management of shared composite data
08/19/10Tenant management of a hosted multi-tenant application
08/19/10Transactional record manager
08/19/10Providing representative samples within search result sets
08/19/10Application launching via indexed data
08/19/10Context-aware query suggestion by mining log data
08/19/10Personalized email filtering
08/19/10Dynamic firewall configuration
08/19/10Routing users to receive online services based on online behavior
08/19/10Shared composite data representations and interfaces
08/19/10Validating the origin of web content
08/19/10Trusted cloud computing and services framework
08/19/10Trusted cloud computing and services framework
08/19/10Communication channel access based on channel identifier and use policy
08/19/10Storage volume protection supporting legacy systems
08/19/10Creating and inserting links by drag and drop
08/19/10Facilitating spreadsheet and database views on common data store
08/19/10Action-based pre-population of user profiles
08/19/10Cross-browser page visualization generation
08/19/10Conversation grouping of electronic mail records
08/19/10Cross-browser page visualization presentation
08/19/10Web cam based user interaction
08/19/10Discovering and exploiting relationships in software repositories
08/19/10Website design pattern modeling
08/19/10Stm with global version overflow handling
08/19/10Input/output broker model
08/19/10Managing resources to display media content
08/19/10Constraining a login to a subset of access rights
08/19/10Identification security elevation
08/19/10Content protection interoperrability
08/19/10Generating human interactive proofs
08/12/10Manipulation of graphical elements on graphical user interface via multi-touch gestures
08/12/10Multi-mode digital graphics authoring
08/12/10Image editing consistent with scene geometry
08/12/10Shader-based finite state machine frame detection
08/12/10System and method for optimizing a graphics intensive software program for the user's graphics hardware
08/12/10Camera based motion sensing system
08/12/10Low-light imaging augmented with non-intrusive lighting
08/12/10Saturation contrast image enhancement
08/12/10Network coordinate systems using ip information
08/12/10Bufferless routing in on-chip interconnection networks
08/12/10Queue based mechanism to support multi-language chat rooms
08/12/10Travel market analysis tools
08/12/10Platform for learning based recognition research
08/12/10Local graph partitioning using evolving sets
08/12/10Updating an inverted index in a real time fashion
08/12/10Thread-based incremental web forum crawling
08/12/10Discovering city landmarks from online journals
08/12/10System and method for filtering and organizing items based on common elements
08/12/10Surface-based collaborative search
08/12/10Visual and textual query suggestion
08/12/10User interface and geo-parsing data structure
08/12/10Transport high availability via acknowledge management
08/12/10Email management based on user behavior
08/12/10Actionable email documents
08/12/10Direct computing experience
08/12/10Redundant data in storage medium
08/12/10Displaying multiple row and column header areas in a summary table
08/12/10Techniques for providing one-click access to virtual conference events
08/12/10social network driven indexing system for instantly clustering people with concurrent focus on same topic into on-topic chat rooms and/or for generating on-topic search results tailored to user preferences regarding topic
08/12/10User generated targeted advertisements
08/12/10General purpose distributed data parallel computing using a high level language
08/12/10Image-based software update
08/12/10Method and apparatus for selecting among multiple tuners
08/12/10Credential gathering with deferred instantiation
08/12/10Management of organizational boundaries in unified communications systems
08/12/10Code property analysis for security mitigations
08/12/10Monitoring system for heap spraying attacks
08/05/10Automatic accompaniment for vocal melodies
08/05/10Electrical connection between devices
08/05/10Mapping of physical controls for surface computing
08/05/10Concurrently displaying multiple characters for input field positions
08/05/10Depth map movement tracking via optical flow and velocity prediction
08/05/10Dynamic fragment coverage antialiasing
08/05/10Standard gestures
08/05/10Projecting data dimensions on a visualization data set
08/05/10Body scan
08/05/10Speaker detection and tracking using audiovisual data
08/05/10Automatically tagging images with nearby short range communication device information
08/05/10Full scale video with overlaid graphical user interface and scaled image
08/05/10Print rendering verification
08/05/10Diffusing screen
08/05/10Optimized transport protocol for delay-sensitive data
08/05/10Network assisted power management
08/05/10Local picture identifier and computation of co-located information
08/05/10Audio transforms in connection with multiparty communication
08/05/10Visual target tracking using model fitting and exemplar
08/05/10Visual target tracking
08/05/10Mobile communication device dynamic service application and dynamic service application scripting
08/05/10Pose tracking pipeline
08/05/10Visual target tracking
08/05/10Visual target tracking
08/05/10Visual target tracking
08/05/10Visual target tracking
08/05/10Visual target tracking
08/05/10Gaming console wireless protocol for peripheral devices
08/05/10Method and apparatus for thwarting traffic analysis in online games
08/05/10State mapping for cross-language speaker adaptation
08/05/10Universal translator
08/05/10Ecommerce marketplace integration techniques
08/05/10Predicting web advertisement click success by using head-to-head ratings
08/05/10Performance of a social network
08/05/10Visualization as input mechanism
08/05/10Managing add-ons
08/05/10Method and apparatus for information transformation and exchange in a relational database environment
08/05/10Computing minimal polynomials of radical expressions
08/05/10Dynamic web service deployment and integration
08/05/10Enhancing availability of remote applications
08/05/10Methods and mechanisms for proactive memory management
08/05/10Methods and mechanisms for proactive memory management
08/05/10Device enforced file level protection
08/05/10Abstracting programmatic represention of data storage systems
08/05/10Extensible font file loading
08/05/10Wizard for selecting visualization
08/05/10Common navigation mechanism for desktop and browser-based applications
08/05/10System and process for providing dynamic communication access and information awareness in an interactive peripheral display
08/05/10Layout of user interface elements
08/05/10System and process for presenting search results in a histogram/cluster format
08/05/10Navigation of a virtual plane using depth
08/05/10Gesture keyboarding
08/05/10Mapping a natural input device to a legacy system
08/05/10Gesture recognizer system architicture
08/05/10Predictive determination
08/05/10Program debugging with dynamically inserted instrumentation
08/05/10Multimodal escalation to endpoints in enhanced communication systems
08/05/10Account hijacking counter-measures
08/05/10Secure hosting for untrusted code
07/29/10Environmental gesture recognition
07/29/10Single-pass bounding box calculation
07/29/10Content based cache for graphics resource management
07/29/10Shared television sessions
07/29/10Self-contained and modular air-cooled containerized server cooling
07/29/10Video encoding using previously calculated motion information
07/29/10Multiple bit rate video encoding using variable bit rate and dynamic resolution for adaptive video streaming
07/29/10Peer communities
07/29/10Conversation rights management
07/29/10System and method providing improved head motion estimations for animation
07/29/10Refining hla data
07/29/10Tool and framework for creating consistent normalization maps and grammars
07/29/10Systems and methods for managing multiple grammars in a speech recognition system
07/29/10Icafe pre-ordering
07/29/10Linear-program formulation for optimizing inventory allocation
07/29/10Providing cashback offers
07/29/10Local targeting engine
07/29/10Device assisted ambient services
07/29/10Tax calculation extensibility techniques
07/29/10Answer ranking in community question-answering sites
07/29/10Segmenting sequential data with a finite state machine
07/29/10Techniques for facilitating copy creation
07/29/10Commit rate management with decoupled commit operations
07/29/10Unbundled storage transaction services
07/29/10Dynamic feature presentation based on vision detection
07/29/10Competitor analysis to facilitate keyword bidding
07/29/10Extracting patterns from sequential data
07/29/10Symbolic computation using tree-structured mathematical expressions
07/29/10Transport high availability for side effect messages
07/29/10Automatic grouping of electronic mail
07/29/10Cluster-based friend suggestion aggregator
07/29/10Append-based shared persistent storage
07/29/10Automatic region-based verification of garbage collectors
07/29/10Transactional memory compatibility management
07/29/10Authentication/authorization protocol for media processing components
07/29/10Digital rights management with persistently-unencrypted content
07/29/10Software application verification
07/29/10Privacy-preserving communication
07/29/10Apportioning and reducing data center environmental impacts, including a carbon footprint
07/29/10Availability and scalability in a messaging system in a manner transparent to the application
07/29/10Implementations of program runtime checks
07/29/10Pluggable margin extension
07/29/10Accelerators for capturing content
07/29/10Debugging remote files using a virtual project
07/29/10Source code wrapper generation
07/29/10Semantic subtyping for declarative data scripting language by calling a prover
07/29/10Automated verification of a type-safe operating system
07/29/10System and method for customized error reporting
07/29/10Mapping breakpoints between web based documents
07/29/10Consistent operating system servicing for distributed nodes
07/29/10Technique for conserving software application resources
07/29/10Lock free queue
07/29/10Ascertaining domain contexts
07/29/10Graphical user interface generation through use of a binary file
07/29/10Animated station identifier in program guides
07/29/10Security restriction techniques for browser-based applications
07/29/10Health-based access to network resources
07/29/10Passive security enforcement
07/29/10Revocable object access
07/29/10Automated device provisioning and activation
07/29/10Malware detection using multiple classifiers
07/29/10Offline extraction of configuration data
07/29/10Protecting transactions
07/22/10Surface puck
07/22/10Touch sensitive computing device and method
07/22/10Bi-modal multiscreen interactivity
07/22/10Data capture system
07/22/10Determining trigger rate for a digital camera
07/22/10Determining exposure time in a digital camera
07/22/10Synchronization of multi-time base data sources
07/22/10In-band signaling in interactive communications
07/22/10Media specific feature invocation signaling in enhanced communication systems
07/22/10Attribute and location based entity presentation in presence based communication systems
07/22/10Mobile device network selection
07/22/10Application-centric user interface techniques
07/22/10Use of online messaging to facilitate selection of participants in game play
07/22/10Markup language-based selection and utilization of recognizers for utterance processing
07/22/10Medication management system
07/22/10Document vault and application platform
07/22/10Milestone generation techniques
07/22/10Network service for modularly constructing a software defined radio
07/22/10Smart attribute classification (sac) for online reviews
07/22/10Object classification using taxonomies
07/22/10Web deployment functions and interfaces
07/22/10Message-based scalable data transport protocol
07/22/10Data movement with reduced service outage
07/22/10Techniques for specifying and collecting data aggregations
07/22/10Colorblind accessible image search
07/22/10Indexing and querying data stores using concatenated terms
07/22/10Morphing social networks based on user context
07/22/10Techniques for data aggregation, analysis, and distribution
07/22/10Substantially similar queries
07/22/10Indexing and searching dynamically changing search corpora
07/22/10Efficient incremental parsing of context sensitive programming languages
07/22/10Mining transliterations for out-of-vocabulary query terms
07/22/10Personalized media recommendation
07/22/10Aggregated subscriber profile based on static and dynamic information
07/22/10Selecting advertisements
07/22/10Enhancing keyword advertising using wikipedia semantics
07/22/10Client-based caching of remote files
07/22/10Distributed communications between database instances
07/22/10Extensibility for hosted messaging servers
07/22/10Interfacing distinct services for providing web based document manipulation access
07/22/10Presence capabilities and preferences
07/22/10Transient storage device configuration silo
07/22/10Propagating unobserved exceptions in a parallel system
07/22/10Hardware encrypting storage device with physically separable key storage device
07/22/10Multiple content protection systems in a file
07/22/10Stateless agent
07/22/10Anonymous key issuing for attribute-based encryption
07/22/10Power management for large memory subsystems
07/22/10Extensibility for web based diagram visualization
07/22/10Collaborative environment project extensibility with composition containers
07/22/10Signaling support for sharer switching in application sharing
07/22/10Flexible visualization for services
07/22/10Visual creation of computer-based workflows
07/22/10Context pane with semantic zoom
07/22/10Per group verification
07/22/10Parameterized installation packages
07/22/10Lecture capture and broadcast system
07/22/10Protecting content from third party using client-side security protection
07/22/10Remote access to private network resources from outside the network
07/22/10Web management authorization and delegation framework
07/22/10Method and system for gap based anti-piracy
07/15/10Pre-selection display of alerts in an order entry system
07/15/10Lift apparatus
07/15/10Easy-to-use soft keyboard that does not require a stylus
07/15/10Visual response to touch inputs
07/15/10Touch display rubber-band gesture
07/15/10End reflector for a flat panel lens
07/15/10Recovering from dropped frames in real-time transmission of video over ip networks
07/15/10Enhanced voicemail usage through automatic voicemail preview
07/15/10Echo presence determination in voice conversations
07/15/10Adaptive beamformer using a log domain optimization criterion
07/15/10Virtual object adjustment via physical object detection
07/15/10Address book remote access and extensibility
07/15/10Game controller that converts between wireless operation and wired operation
07/15/10Arrangement for building and operating human-computation and other games
07/15/10Estimating time of arrival
07/15/10Detecting spatial outliers in a location entity dataset
07/15/10System for finding queries aiming at tail urls
07/15/10Concurrent, lock-free object copying
07/15/10Message tracking between organizations
07/15/10Url based retrieval of portions of media content
07/15/10Performing configuration in a multimachine environment
07/15/10Policy service system architecture for sessions created using stun
07/15/10Incrementally changing the availability of a feature
07/15/10Service for policy rule specification evaluation and enforcement on multiple communication modes
07/15/10Simulcast flow-controlled data streams
07/15/10Server-centric high performance network architecture for modular data centers
07/15/10Multi-user multi-input desktop workspaces and applications
07/15/10Configuration creation for deployment and monitoring
07/15/10User interface for displaying selectable software functionality controls that are relevant to a selected object
07/15/10Graphical mashup
07/15/10Testing stm using non-stm code
07/15/10Handling multiple definition of types
07/15/10Multi level virtual function tables
07/15/10Offline migration from prior operating system installation
07/15/10Categorized electronic program guide
07/15/10Securing communications for web mashups
07/15/10Information protection applied by an intermediary device
07/15/10Communication abuse prevention
07/15/10Pluggable file-based digital rights management api layer for applications and engines
07/08/10User interface for stylus-based user input
07/08/10Motion desktop
07/08/10Converting digital ink to shapes and text
07/08/10Multi-layer image composition with intermediate blending resolutions
07/08/10Automatic capture modes
07/08/10Energy saving using cellular footprint for mobile device wi-fi access point discovery
07/08/10Energy efficient device discovery with short-range radios
07/08/10Dynamic network classification
07/08/10Quality of service support for a/v streams
07/08/10Computing isogenies between genus-2 curves for cryptography
07/08/10Combined image and text document
07/08/10Client-side ad insertion during trick mode playback
07/08/10Trick mode based advertisement portion selection
07/08/10Seamless data communication experience
07/08/10Speed-dependent suggested driving lines
07/08/10Relevance improvements for implicit local queries
07/08/10Concurrency object classification
07/08/10Expertise ranking using social distance
07/08/10Asynchronous database updates between collaborative applications and search utilities
07/08/10Synchronizing presentation states between multiple applications
07/08/10Honoring user preferences in email systems
07/08/10Network presence offloads to network interface
07/08/10Network isolation and identity management of cloned virtual machines
07/08/10Input service for client devices
07/08/10Unique account identification
07/08/10Device side host integrity validation
07/08/10Heirarchical erasure coding
07/08/10Dynamically creating and managing alternate contacts list
07/08/10Virtual page turn
07/08/10Data exploration tool including guided navigation and recommended insights
07/08/10Revealing of truncated content on scrollable grid
07/08/10Non-uniform scrolling
07/08/10Discovery of media content via user interface
07/08/10Architecture that extends types using extension methods
07/08/10Scope: a structured computations optimized for parallel execution script language
07/08/10Video ad delivery using configurable video ad policies
07/08/10Reactive throttling of inbound messages and ranges
07/08/10Reordering document content to avoid exploits
07/01/10Handwriting recognition system using multiple path recognition framework
07/01/10Remote control device with multiple active surfaces
07/01/10Correcting gps through secondary sensors and signal strength
07/01/10Dual-mode rotatable input device
07/01/10Leveraging graphics processors to optimize rendering 2-d objects
07/01/10Dynamic collage for visualizing large photograph collections
07/01/10Data-driven video stabilization
07/01/10Gapless audio playback
07/01/10Triggering animation actions and media object actions
07/01/10Wireless provisioning a device for a network using a soft access point
07/01/10Handling early media in voip communication with multiple endpoints
07/01/10Segment sequence-based handwritten expression recognition
07/01/10Kids personal health records fed into video games
07/01/10Distributed networks used for health-based data collection
07/01/10Centralized healthcare data management
07/01/10Fostering enterprise relationships
07/01/10User-adaptive recommended mobile content
07/01/10Advertising method for image search
07/01/10Pluggable health-related data user experience
07/01/10Wearing health on your sleeve
07/01/10Transparent parallelism among linear solvers
07/01/10Scalable parallel user clustering in discrete time window
07/01/10Ranking oriented query clustering and applications
07/01/10Product or service review summarization using attributes
07/01/10Contextual representations from data streams
07/01/10Query-dependent ranking using k-nearest neighbor
07/01/10Ranking documents with social tags
07/01/10Peer-to-peer web search using tagged resources
07/01/10Detecting and reordering fixed-length records to facilitate compression
07/01/10Roaming personal information items across multiple computing devices using an imap server
07/01/10Dynamic virtual machine memory management
07/01/10Arbitrary precision floating number processing
07/01/10Identifying concurrency control from a sequential proof
07/01/10Media portability and compatibility for different destination platforms
07/01/10Categorizing document elements based on display layout
07/01/10Generalized interactive narratives
07/01/10Scaling social networks
07/01/10Setting control using edges of a user interface
07/01/10Analysis of images located within three-dimensional environments
07/01/10Control function gestures
07/01/10Interface infrastructure for a continuation based runtime
07/01/10Unifying type checking and property checking for low level programs
07/01/10Structured search in source code
07/01/10User-annotated video markup
07/01/10Shared repository of malware data
07/01/10Extensible activation exploit scanner
06/24/10Bi-directional update of a grid and associated visualizations
06/24/10Implied analytical reasoning and computation
06/24/10Display surface tracking
06/24/10Triggering animation actions and media object actions
06/24/10Autonomous recall device
06/24/10Multi-region monitoring system
06/24/10Choosing the next document
06/24/10Load balancing
06/24/10Wireless access point supporting control by multiple applications
06/24/10Implicit iteration of keyed array symbol
06/24/10Image background removal
06/24/10Distance metric learning with feature decomposition
06/24/10Accelerated screen codec
06/24/10Interactively ranking image search results using color layout relevance
06/24/10Quick clean cloth
06/24/10Apparatus and method for heating fuel cells
06/24/10User-controlled routing of phone calls to voicemail
06/24/10Personalized cloud of mobile tasks
06/24/10Object model and api for game creation
06/24/10Scalable game primitives / distributed real-time aggregation of player data
06/24/10Framework for interoperability of solvers
06/24/10Use of scientific models in environmental simulation
06/24/10Utterance processing for network-based speech recognition utilizing a client-side cache
06/24/10Speech models generated using competitive training, asymmetric training, and data boosting
06/24/10Training wideband acoustic models in the cepstral domain using mixed-bandwidth training data for speech recognition
06/24/10Masterless distributed batch scheduling engine
06/24/10Scope based indexing prioritization
06/24/10Search macro suggestions relevant to search queries
06/24/10Learning latent semantic space for ranking
06/24/10Inverted index for contextual search
06/24/10Techniques to share information about tags and documents across a computer network
06/24/10Shared value resolution with multiple runtime containers
06/24/10Mining translations of web queries from web click-through data
06/24/10Visually manipulating instance collections
06/24/10Polynomial representation for symbolic computation
06/24/10Contact-specific and location-aware lexicon prediction
06/24/10Techniques to manage electronic mail personal archives
06/24/10Internet protocol (ip) address virtualization for terminal server sessions
06/24/10Lightweight input/output protocol
06/24/10Stored value accessors in shared memory regions
06/24/10Request authentication token
06/24/10Methods and systems for protecting media content
06/24/10Low privilege debugging pipeline
06/24/10Applying effects to a video in-place in a document
06/24/10Techniques to manage and display related communications
06/24/10User evaluation in a collaborative online forum
06/24/10Visually processing instance data
06/24/10Techniques for organizing information on a computing device using movable objects
06/24/10Data visualization interactivity architecture
06/24/10Smooth pixel-based scrolling in a user interface control
06/24/10Media aggregation and presentation
06/24/10Techniques for presenting and browsing hierarchical data
06/24/10Augmented list for searching large indexes
06/24/10Behavior-first event programming model
06/24/10Providing access to a dataset in a type-safe manner
06/24/10Debugging pipeline
06/24/10Debugging system using static analysis
06/24/10Relaxed and extended delegates
06/24/10Networked deployment of multi-application customizations
06/24/10Runtime task with inherited dependencies for batch processing
06/24/10Complex dependency graph with bottom-up constraint matching for batch processing
06/24/10Service virtualization container
06/24/10Ensuring thread affinity for interprocess communication in a managed code environment
06/24/10Content access
06/24/10Selecting security offerings
06/24/10Image-based human interactive proofs
06/24/10Replicating selected secrets to local domain controllers
06/24/10Enterprise management of public instant message communications
06/24/10Online risk mitigation
06/17/10System and method for encoding high density geometric symbol set
06/17/10Fabrication of optically smooth light guide
06/17/10Gestures, interactions, and common ground in a surface computing environment
06/17/10Volumetric display system enabling user interaction
06/17/10Snap to element analytical tool
06/17/10Video conferencing subscription using multiple bit rate streams
06/17/10Visual feedback for natural head positioning
06/17/10Multi-video synthesis
06/17/10Stateless, affinity-preserving load balancing
06/17/10Optimizing data traffic and power consumption in mobile unified communication applications
06/17/10Multiplexed communication for duplex applications
06/17/10Peer to multi-peer routing
06/17/10Sentiment classification using out of domain data
06/17/10Strategies for processing image information using a color information data structure
06/17/10Flat-panel optical projection apparatus
06/17/10Providing ubiquitous wireless connectivity and a marketplace for exchanging wireless connectivity using a connectivity exchange
06/17/10Security protocols for mobile operator networks
06/17/10Message forwarding and retrieval with a single messaging service
06/17/10Place-specific buddy list services
06/17/10Monitoring activity on a computer
06/17/10Creation and use of virtual device drivers on a serial bus
06/17/10User-specified phrase input learning
06/17/10Noise suppressor for robust speech recognition
06/17/10Audio output of a document from mobile device
06/17/10Human-assisted pronunciation generation
06/17/10Enhanced search result relevance using relationship information
06/17/10In-text embedded advertising
06/17/10Mobile phone billing for content payment
06/17/10Making friend and location recommendations based on location similarities
06/17/10Boosting algorithm for ranking model adaptation
06/17/10Synchronizing multiple classes with disparate schemas in the same collection
06/17/10System of ranking search results based on query specific position bias
06/17/10Methods and apparatus for result diversification
06/17/10Window grouping
06/17/10Techniques for managing persistent document collections
06/17/10Batch data synchronization with foreign key constraints
06/17/10Providing recent history with search results
06/17/10History answer for re-finding search results
06/17/10Framework for web services exposing line of business applications
06/17/10Contact entry population from call entity information
06/17/10Managing inverse references between objects in object-oriented software
06/17/10Creating ad hoc relationships between entities
06/17/10Techniques to automatically syndicate content over a network
06/17/10Non-disruptive, reliable live migration of virtual machines with network data reception directly into virtual machines' memory
06/17/10Scalable interconnection of data center servers using two ports
06/17/10Participating with and accessing a connectivity exchange
06/17/10Geolocation mapping of network devices
06/17/10Connection management in line-of-business
06/17/10Envelope attachment for message context
06/17/10Video conference rate matching
06/17/10Management of native memory usage
06/17/10Code execution with automated domain switching
06/17/10Data handling preferences and policies within security policy assertion language
06/17/10Tls key and cgi session id pairing
06/17/10Power settings in wireless ultra-wide band universal serial bus
06/17/10Power state dependent wake-up alarm
06/17/10Constructing forward error correction codes
06/17/10Constraint-based correction of shape positions in a diagram
06/17/10Rendering source content for display
06/17/10Rendering rss subscriptions on a calendar
06/17/10Shared space for communicating information
06/17/10Pressure based selection
06/17/10Transforming user script code for debugging
06/17/10Developing and maintaining high performance network services
06/17/10Customizable dynamic language expression interpreter
06/17/10Managing set membership
06/17/10Remapping debuggable code
06/17/10Persistent local storage for processor resources
06/17/10Communication interface selection on multi-homed devices
06/17/10Ultra-wideband radio controller driver (urcd)-pal interface
06/17/10User feedback based highlights of recorded programs
06/17/10Integrating policies from a plurality of disparate management agents
06/17/10Automated software restriction policy rule generation
06/17/10Transforming claim based identities to credential based identities
06/17/10Mesh platform utility computing portal
06/10/10High availability, high efficiency data center electrical distribution
06/10/10Touch input interpretation
06/10/10Soft keyboard control
06/10/10Command remoting techniques
06/10/10Two-dimensional shadows showing three-dimensional depth
06/10/10Color packing glyph textures with a processor
06/10/10Command remoting
06/10/10Dvd identification
06/10/10Bandwidth allocation algorithm for peer-to-peer packet scheduling
06/10/10Stereo movie editing
06/10/10Transductive multi-label learning for video concept detection
06/10/10Remote desktop protocol compression acceleration using single instruction, multiple dispatch instructions
06/10/10Using called party mobile presence and movement in communication application
06/10/10Reducing messaging costs
06/10/10Out-of-band voice communication with interactive voice response services during gameplay
06/10/10User interface having customizable text strings
06/10/10Removing noise from speech
06/10/10Keystroke sound suppression
06/10/10Replying to text messages via automated voice search techniques
06/10/10Interaction between healthcare software products
06/10/10Digital media retrieval and display
06/10/10Relaxed filter set
06/10/10Automatic discovery of alternate mailboxes
06/10/10Dynamic restoration of message object search indexes
06/10/10On-demand search result details
06/10/10Using message sampling to determine the most frequent words in a user mailbox
06/10/10Translating queries to representational state transfer (rest)
06/10/10Role based search
06/10/10Pseudo-anchor text extraction
06/10/10Abstracting request from a development environment to object model
06/10/10Micro-browser viewers and searching
06/10/10Textual search for numerical properties
06/10/10Techniques to provide unified logging services
06/10/10Previewing search results for suggested refinement terms and vertical searches
06/10/10Extendable business type system in a performance management platform
06/10/10Rich-context tagging of resources
06/10/10Soft type binding for distributed systems
06/10/10Searching an email system dumpster
06/10/10Peer-to-peer (p2p) streaming overlay construction and optimization
06/10/10Network address translators (nat) type detection techniques
06/10/10Rate-controllable peer-to-peer data stream routing
06/10/10Caller-specific visibility masks for networking objects
06/10/10Peer-to-peer network address translator (nat) traversal techniques
06/10/10User-mode based remote desktop protocol (rdp) encoding architecture
06/10/10Peer-to-peer packet scheduling algorithm
06/10/10Authenticating a backup image with bifurcated storage
06/10/10Isolating received information on a locked device
06/10/10Parallel execution of a loop
06/10/10Isolating applications hosted by plug-in code
06/10/10Providing selected data through a locked display
06/10/10Touch display scroll control
06/10/10Adapter for bridging different user interface command systems
06/10/10Gui testing
06/10/10Object picker with window splitter
06/10/10Glanceable animated notifications on a locked device
06/10/10Motion adaptive user interface service
06/10/10Architecture for controlling a computer using hand gestures
06/10/10Architecture for controlling a computer using hand gestures
06/10/10Multi-layered storage and management of software components
06/10/10Developing applications at runtime
06/10/10Automatic test tool for webpage design with micro-browsers on mobile platforms
06/10/10Event filtering at a performance-based interface
06/10/10Handling exceptions in a data parallel system
06/10/10Concurrent interactive television for network connected devices
06/10/10Credential sharing between multiple client applications
06/03/10Sensory outputs for communicating data values
06/03/10Opposite facing device keypad
06/03/10Manipulation of list on a multi-touch display
06/03/10Three dimensional journaling environment
06/03/10Methods and systems for providing texture tiling and mirroring
06/03/10Encoder with multiple re-entry and exit points
06/03/10Video coding
06/03/10Media coding for loss recovery with remotely predicted data units
06/03/10Image-based face search
06/03/10Media streaming with smooth fast-forward and rewind
06/03/10Implicit group formation around feed content for mobile devices
06/03/10Adaptive web mining of bilingual lexicon
06/03/10Viewing messages and message attachments in different languages
06/03/10Method, apparatus and system for communicating heatlhcare information to and from a portable, hand-held device
06/03/10Provision of location-based advertising
06/03/10Providing resource-related information using a standardized format
06/03/10Smart grid price response service for dynamically balancing energy supply and demand
06/03/10Supporting media content revert functionality across multiple devices
06/03/10Generating histograms of population data by scaling from sample data
06/03/10Click chain model
06/03/10Crunching dynamically generated script files
06/03/10Online archiving of message objects
06/03/10End-to-end validation in a push environment
06/03/10Sandboxed execution of plug-ins
06/03/10Encryption scheme for streamed multimedia content protected by rights management system
06/03/10Fork codes for erasure coding of data blocks
06/03/10Multi-panel user interface
06/03/10Manipulating thumbnails of windows
06/03/10Discrete objects for building virtual environments
06/03/10In-place function modification
06/03/10Resource coverage and analysis
05/27/10Unified proxy location selection mechanism
05/27/10Radio frequency certificates of authenticity and related scanners
05/27/10Parallel poisson disk sampling
05/27/10Context-based routing in multi-hop networks
05/27/10Adjusting hardware acceleration for video playback based on error detection
05/27/10Marking voice messages as heard
05/27/10Modification of system call behavior
05/27/10Labeling image elements
05/27/10Identifying portions of an image for cropping
05/27/10Game of chance
05/27/10Reference model for data-driven analytics
05/27/10Use of taxonomized analytics reference model
05/27/10Hybrid solver for data-driven analytics
05/27/10Facilitating multimodal interaction with grammar-based speech applications
05/27/10Linking enterprise resource planning data to business capabilities
05/27/10Selecting between client-side and server-side market detection
05/27/10Context-sensitive advertising for mobile content
05/27/10Online service syndication
05/27/10Providing suggested sites associated with target sites
05/27/10Flattening multi-dimensional data sets into de-normalized form
05/27/10Analyzer engine
05/27/10Http cache with url rewriting
05/27/10Automatically showing more search results
05/27/10Implementation of stream algebra over class instances
05/27/10Unified event programming and queries
05/27/10Minimizing conflicts when synchronizing interrelated data between two systems
05/27/10Common configuration application programming interface
05/27/10Creating cross-technology configuration settings
05/27/10Unified storage for configuring multiple networking technologies
05/27/10Discovering and interacting with service providers
05/27/10Platform for enabling terminal services virtualization
05/27/10Hardware acceleration for remote desktop protocol
05/27/10Management of ownership control and data movement in shared-memory systems
05/27/10Lazy and stateless events
05/27/10Exceptional events
05/27/10Distributed single sign on technologies including privacy protection and proactive updating
05/27/10Anonymous verifiable public key certificates
05/27/10User-authored notes on shared documents
05/27/10Tiltable user interface
05/27/10Exposing asynchronous mechanisms as first-class events
05/27/10Efficient invariant inference for program verification
05/27/10Sampling techniques for dynamic data-race detection
05/27/10Cloud based source code version control
05/27/10Suite-based integration and deployment of business products
05/27/10Interactive media portal
05/27/10Reducing unicast session duration with restart tv
05/20/10In-air cursor control
05/20/10Acoustic pass through for handsets
05/20/10Channel reuse with cognitive low interference signals
05/20/10Audio encoding and decoding with intra frames and adaptive forward error correction
05/20/10Financial journals in financial models of performance servers
05/20/10Priority and cost based deadlock victim selection via static wait-for graph
05/20/10Review summaries for the most relevant features
05/20/10Social network referral coupons
05/20/10Network-accessible virtual shopping cart
05/20/10Maintaining client data integrity in a distributed environment using asynchronous data submission
05/20/10Origination based conflict detection in peer-to-peer replication
05/20/10Framework for open dynamic reflective applications
05/20/10Visualizing hyperlinks in a search results list
05/20/10Scalable selection management
05/20/10Modifying delete notifications in a storage stack
05/20/10Multi-tenancy using suite of authorization manager components
05/20/10Method and system for rapid and cost-effective development of user generated content
05/20/10Deterministic selection of domain controllers in a multi-master database distributed directory service
05/20/10Cross-domain communication technique for execution of web mashups
05/20/10Managing media content
05/20/10Service facade design and implementation
05/20/10Using delete notifications to free related storage resources
05/20/10Delete notifications for an entire storage volume
05/20/10Distributed system checker
05/20/10Form validation with table driven error handling
05/20/10Data-driven actions for network forms
05/20/10Diagram layout patterns
05/20/10Workflow engine for execution of web mashups
05/20/10Instrumenting a website with dynamically generated code
05/20/10Community generated content channels
05/20/10Trusted network transfer of content using of network input code
05/20/10Combining a mobile device and computer to create a secure personalized environment
05/20/10Estimating and visualizing security risk in information technology systems
05/13/10Bent monopole antenna with shared segments
05/13/10Wireless antenna for emitting conical radiation
05/13/10Functional image representation
05/13/10Mode information displayed in a mapping application
05/13/10System and method for link quality source routing
05/13/10Cognitive error control coding for channels with memory
05/13/10Secure network optimizations when receiving data directly in a virtual machine's memory address space
05/13/10Image segmentation
05/13/10System and method for binary persistence format for a recognition result lattice
05/13/10Positioning service utilizing existing radio base stations
05/13/10Game of chance
05/13/10Audio content management for video game systems
05/13/10Speech processing
05/13/10Selection of media content item having preferred instance attributes
05/13/10Index optimization for ranking using a linear model
05/13/10Automatic diagnosis of search relevance failures
05/13/10Lookup partitioning storage system and method
05/13/10Leveraging low-latency memory access
05/13/10Reporting language filtering and mapping to dimensional concepts
05/13/10Automatic designation of footnotes to fact data
05/13/10Service delivery online
05/13/10Auto-resolve recipients cache
05/13/10Multiple conditional formatting
05/13/10Programmable effects for a user interface
05/13/10Scrolling web pages using direct interaction
05/13/10Computer input control for specifying scope with explicit exclusions
05/13/10Multithreaded kernel for graphics processing unit
05/13/10Synchronized media experience
05/06/10Software-aided creation of animated stories
05/06/10Dynamic search result highlighting
05/06/10Splash resistant power adapter
05/06/10Determining user similarities based on location histories
05/06/10Remote computing platforms providing high-fidelity display and interactivity for clients
05/06/10Converting 2d video into stereo video
05/06/10Utilizing ultrasound to disrupt pathogens
05/06/10Retrieval using a generalized sentence collocation
05/06/10Social discovery of digital content
05/06/10Transcode matrix
05/06/10Replication for common availability substrate
05/06/10Configuration management in distributed data systems
05/06/10Atomic mulitple modification of data in a distributed storage system
05/06/10Inferred relationships from user tagged content
05/06/10Query submission pipeline using linq
05/06/10Relevant navigation with deep links into query
05/06/10Dynamic fragmentation of digital media
05/06/10Customized search
05/06/10Facet, logic and textual-based query composer
05/06/10Realtime popularity prediction for events and queries
05/06/10Modeling party identities in computer storage systems
05/06/10Virtualized boot block with discovery volume
05/06/10Incremental lock-free stack scanning for garbage collection
05/06/10Computing device with relatively limited storage space and operating/file system thereof
05/06/10Do not disturb filter for electronic messages
05/06/10Content-recommendation message
05/06/10Data allocation and replication across distributed storage system
05/06/10Universal secure token for obfuscation and tamper resistance
05/06/10Support of multiple pre-shared keys in access point
05/06/10Transforming math text objects using build down and build up
05/06/10Web-based language translation memory compilation and application
05/06/10Combinable tabs for a tabbed document interface
05/06/10Browser tab management
05/06/10Sidebar engine, object model and schema
05/06/10Aggregating discovery data in a discovery interface
05/06/10Authentication in a network using client health enforcement framework
05/06/10Authentication of a server by a client to prevent fraudulent user interfaces
05/06/10Digital rights management scheme for an on-demand distributed streaming system
04/29/10Connection between machines and power source
04/29/10Multi-touch manipulation of application objects
04/29/10Multi-touch object inertia simulation
04/29/10Enhanced user interface elements in ambient light
04/29/10Determining orientation in an external reference frame
04/29/10Target display for gamma calibration
04/29/10Iterative processing
04/29/10Peer and composite localization for mobile applications
04/29/10Determining orientation in an external reference frame
04/29/10Regions of interest processing
04/29/10Named entity transliteration using corporate corpra
04/29/10Image-based semantic distance
04/29/10Smart, search-enabled web error pages
04/29/10Comprehensive human computation framework
04/29/10Certainty factor decay
04/29/10Monitoring agent programs in a distributed computing platform
04/29/10Synchronization of a conceptual model via model extensions
04/29/10Scalable blob storage integrated with scalable structured storage
04/29/10Identifying visually similar objects
04/29/10Blob manipulation in an integrated structured storage system
04/29/10Conflict prevention for peer-to-peer replication
04/29/10Cyclic commit transaction protocol
04/29/10Hardware and operating system support for persistent memory on a memory bus
04/29/10Random number generation failure detection and entropy estimation
04/29/10Computing discrete fourier transforms
04/29/10Automatically securing distributed applications
04/29/10Providing functionality to client services by implementing and binding contracts
04/29/10Replica placement in a distributed storage system
04/29/10Automating deployment of service applications by exposing hosting environment constraints
04/29/10Quorum based transactionally consistent membership management in distributed storage systems
04/29/10Script based computer health management system
04/29/10Bootstrap rendezvous federation
04/29/10Arbitrating an appropriate back-end server to receive channels of a client sesssion
04/29/10Hardware and operating system support for persistent memory on a memory bus
04/29/10Consistency models in a distributed store
04/29/10Poll based cache event notifications in a distributed cache
04/29/10Data location obfuscation
04/29/10Opportunistic page largification
04/29/10Avoiding information disclosure when direct mapping non-page aligned buffers
04/29/10Partition management in a partitioned, scalable, and available structured storage
04/29/10Failure notification in rendezvous federation
04/29/10Expressing fault correlation constraints
04/29/10Template-based calculator application
04/29/10In-document floating object re-ordering
04/29/10Display of predicted storage state of target computing device during media file synchronization
04/29/10Child window surfacing and management
04/29/10Painting user controls
04/29/10Surfacing and management of window-specific controls
04/29/10Light box for organizing digital images
04/29/10Displaying available content via a screen saver
04/29/10Scalability analysis for server systems
04/29/10Dispatch mechanism for coordinating application and communication medium state
04/29/10Access control state determination based on security policy and secondary access control state
04/29/10Secured compartment for transactions
04/29/10Authentication - circles of trust
04/29/10Network location determination for direct access networks
04/29/10Tamper-tolerant programs
04/22/10Method and apparatus for directing light around an obstacle using an optical waveguide for uniform lighting of a cylindrical cavity
04/22/10Hybrid tree/mesh overlay for data delivery
04/22/10Method and system for forwarding telephone calls based on presence information
04/22/10Speech recognition system with display information
04/22/10Recommender system
04/22/10Systems and methods for using world-space coordinates of ad objects and camera information for adverstising within a vitrtual environment
04/22/10Future data event prediction using a generative model
04/22/10Forgetting items with knowledge based synchronization
04/22/10System and method for spam identification
04/22/10Sharing data within an instant messaging session
04/22/10Dynamically balancing user experiences in a multi-user computing system
04/22/10Low-level conditional synchronization support
04/22/10Transaction processing in transactional memory
04/22/10System to reduce interference in concurrent programs
04/22/10Optimizing defragmentation operations in a differential snapshotter
04/22/10Conserving power using predictive modelling and signaling
04/22/10Providing remote user authentication
04/22/10Natural visualization and routing of digital signatures
04/22/10Creating search enabled web pages
04/22/10Suppressing unwanted ui experiences
04/22/10System and method for formatting a cell in response to data stored in a separate location
04/22/10Interactive design environments to visually model, debug and execute resource oriented programs.
04/22/10Transaction processing for side-effecting actions in transactional memory
04/22/10Providing supplemental semantics to a transactional queue manager
04/22/10User authentication management
04/22/10Passthru for client authentication
04/15/10Press-your-luck challenge
04/15/10Photo mantel view and animation
04/15/10Flat-panel optical projection apparatus with reduced distortion
04/15/10Cognitive channel adaptation in wireless sensor networks
04/15/10Simple protocol for tangible security
04/15/10Dynamic switching of microphone inputs for identification of a direction of a source of speech sounds
04/15/10Reduced dc gain mismatch and dc leakage in overlap transform processing
04/15/10Provisioning of wireless connectivity for devices using nfc
04/15/10Device authentication within deployable computing environment
04/15/10Targeted advertisements to social contacts
04/15/10Universal mobile device messaging
04/15/10Virtual space mapping of a variable activity region
04/15/10Generalized kernel learning in support vector regression
04/15/10Evaluating decision trees on a gpu
04/15/10Techniques to manage retention policy tags
04/15/10Named entity resolution using multiple text sources
04/15/10Content package for electronic distribution
04/15/10Modular forest automata
04/15/10Preserving user intention in distributed data systems
04/15/10Quick-creating objects in an application
04/15/10Declarative programming model for modeling and execution of triggers for resource oriented system
04/15/10Transient networks
04/15/10Automated role based usage determination for software system
04/15/10Selectively utilizing a plurality of disparate solid state storage locations
04/15/10Trusted and confidential remote tpm initialization
04/15/10Method and computer-readable medium for navigating between attachments to electronic mail messages
04/15/10Declarative programming model for authoring and execution control and data flow for resource oriented system
04/15/10Caching runtime generated code
04/15/10Virtualized storage assignment method
04/15/10Graph based bot-user detection
04/08/10Two-dimensional barcode localization for camera based devices
04/08/10Oblique display with additional detail
04/08/10Parallel surface reconstruction
04/08/10User-guided surface reconstruction
04/08/10Surface normal reconstruction from a single image
04/08/10Rendering in scattering media
04/08/10Optimal 2d texturing from multiple images
04/08/10Rendering annotations for images
04/08/10Multi-device capture and spatial browsing of conferences
04/08/10Protecting optical media using random, moving radio frequency scatterers
04/08/10Framework for optimizing and simplifying network communication in close proximity networks
04/08/10Models for routing tree selection in peer-to-peer communications
04/08/10Full volume encryption in a clustered environment
04/08/10Almost rectangular triangulations
04/08/10Face alignment via component-based discriminative search
04/08/10Image super-resolution using gradient profile prior
04/08/10Alignment of sharp and blurred images based on blur kernel sparseness
04/08/10Movie making techniques
04/08/10Threading together messages with multiple common participants
04/08/10Inter-threading indications of different types of communication
04/08/10Assisted navigation in virtual environments
04/08/10Location-aware selection of public transportation
04/08/10Calendar event scheduling
04/08/10Utilizing extra text message space
04/08/10Unified analytics across a distributed computing services infrastructure
04/08/10Graphical model for data validation
04/08/10System and method for synchronizing a repository with a declarative defintion
04/08/10System and method for managing database applications
04/08/10Transitioning clone data maps and synchronizing with a data query
04/08/10Co-location visual pattern mining for near-duplicate image retrieval
04/08/10Packaging and bulk transfer of files and metadata for synchronization
04/08/10Resource tracking
04/08/10Mining new words from a query log for input method editors
04/08/10Efficient large-scale joining for querying of column based data encoded structures
04/08/10Efficient large-scale filtering and/or sorting for querying of column based data encoded structures
04/08/10Streaming queries
04/08/10Domain expertise determination
04/08/10Incremental feature indexing for scalable location recognition
04/08/10Packaging system to facilitate declarative model-driven development
04/08/10Fast computation of general fourier transforms on graphics processing units
04/08/10Network based jit on a priori knowledge of a set of disparate clients
04/08/10Conference networking system incorporating social networking site information
04/08/10Obtaining content and adding same to document
04/08/10Message rendering for identification of content features
04/08/10Data sharing proxy for mobile devices
04/08/10Determining network delay and cdn deployment
04/08/10Edge traversal service dormancy
04/08/10Configuration space virtualization
04/08/10Optimizing information lifecycle management for fixed storage
04/08/10Mode-specific container runtime attachment
04/08/10Protocol for determining availability of peers in a peer-to-peer storage system
04/08/10Trusted platform module security
04/08/10External encryption and recovery management with hardware encrypted storage devices
04/08/10Statistical debugging using paths and adaptive profiling
04/08/10Using constraint solving to discovering disjunctive and quantified invariants over predicate abstraction
04/08/10Talking paper authoring tools
04/08/10Multi-application control
04/08/10Content aware adaptive display
04/08/10User interface for viewing clusters of images
04/08/10Merged tree-view ui objects
04/08/10Type system for declarative data scripting language
04/08/10Tree-based directed graph programming structures for a declarative programming language
04/08/10Common intermediate representation for data scripting language
04/08/10Logical extensions to intermediate code
04/08/10Compact syntax for data scripting language
04/08/10System and method for recognizing structure in text
04/08/10Test case management controller web access
04/08/10Bidirectional type checking for declarative data scripting language
04/08/10Calculating resource bounds of programs manipulating recursive data structures and collections
04/08/10System and method for mapping a domain modeling language to a relational store
04/08/10Programming language with extensible syntax
04/08/10Branding binary modules using resource patching
04/08/10Replacing the identity of an activex control
04/08/10Dynamic, customizable and configurable notification mechanism
04/08/10Checking transactional memory implementations
04/08/10Meta-scheduler with meta-contexts
04/08/10Content promotion to anonymous clients
04/08/10Computational recommendation engine
04/08/10Global object access auditing
04/08/10Identity and authentication system using aliases
04/08/10Device-side inline pattern matching and policy enforcement
04/01/10Mechanical architecture for display keyboard keys
04/01/10Using physical objects in conjunction with an interactive surface
04/01/10Ray tracing on graphics hardware using kd-trees
04/01/10Photon mapping on graphics hardware using kd-trees
04/01/10Methods for rendering source content of a file for display on a destination figure
04/01/10Compensating for anticipated movement of a device
04/01/10Multi-modal interaction for a screen magnifier
04/01/10Processing aspects of a video scene
04/01/10Display system and method
04/01/10Uniformly lighting a cylindrical cavity via a prism
04/01/10Resilient 1:n first-hop gateway selection mechanism
04/01/10Processing real-time video
04/01/10Adaptive video processing of an interactive environment
04/01/10Fine-grained client-side control of scalable media delivery
04/01/10Techniques to perform fast motion estimation
04/01/10Perceptual mechanism for the selection of residues in video coders
04/01/10Offline voicemail
04/01/10Classification via semi-riemannian spaces
04/01/10Letter model and character bigram based language model for handwriting recognition
04/01/10Smart navigation for 3d maps
04/01/10Fast directional image interpolator with difference projection
04/01/10Hybrid interface for interactively registering images to digital models
04/01/10Associating optical character recognition text data with source images
04/01/10Geotagging photographs using annotations
04/01/10Obtaining and presenting metadata related to a radio broadcast
04/01/10Virtual skywriting
04/01/10Delegation of mobile communication to external device
04/01/10Sms based social networking
04/01/10Glow touch feedback for virtual input devices
04/01/10Adaptation for alternate gaming input devices
04/01/10Journal service
04/01/10Storage input/output utilization associated with a software application
04/01/10Replacing terms in machine translation
04/01/10Sequential speech recognition with two unequal asr systems
04/01/10Speech and text driven hmm-based body animation synthesis
04/01/10Network-based healthcare data management
04/01/10Suggesting things to do during time slots in a schedule
04/01/10Modeling and measuring value added networks
04/01/10Linking organizational strategies to performing capabilities
04/01/10Predictive geo-temporal advertisement targeting
04/01/10Adaptive run-time advertisements
04/01/10Training a search result ranker with automatically-generated samples
04/01/10Joint ranking model for multilingual web search
04/01/10Analyzing data and providing recommendations
04/01/10Modifying a system in response to indications of user frustration
04/01/10Method and system of managing conflicts for a set of synchronized folders
04/01/10Storage tiers for database server system
04/01/10Flexible electronic records management
04/01/10Data-tier application component fabric management
04/01/10Aggregation of write traffic to a data store
04/01/10Data placement transparency for high availability and load balancing
04/01/10Evaluating the ranking quality of a ranked list
04/01/10Deep-content indexing and consolidation
04/01/10Multidimensional data space queries with expression evaluation
04/01/10Combining log-based rankers and document-based rankers for searching
04/01/10Automatic search query suggestions with search result suggestions from user history
04/01/10Directly optimizing evaluation measures in learning to rank
04/01/10Determining relevance between an image and its location
04/01/10Optimizing ranking of documents using continuous conditional random fields
04/01/10Bayesian video search reranking
04/01/10Pair-wise ranking model for information retrieval
04/01/10Processing maximum likelihood for listwise rankings
04/01/10Tracking constraints and dependencies across mapping layers
04/01/10Automatic search suggestions from server-side user history
04/01/10Generating synonyms based on query log data
04/01/10Linking search queries to rich media themes
04/01/10Information retrieval system user interface
04/01/10Visitor-assisted user profile creation
04/01/10Octree construction on graphics processing units
04/01/10Real-time kd-tree construction on graphics hardware
04/01/10Nested file system support
04/01/10Extensible remote programmatic access to user interface
04/01/10Recording and/or use of generation information
04/01/10Dynamically transforming data to the context of an intended recipient
04/01/10User perception of electronic messaging
04/01/10Role-independent context exchange
04/01/10Communications grouped as conversations
04/01/10Stabilization of distributed systems
04/01/10Flexible compliance agent with integrated remediation
04/01/10Measured client experience for computer network
04/01/10Multiple parallel user experiences provided by a single set of internet hosting machines
04/01/10Integrating enterprise identity authorization in conferences
04/01/10Isp-friendly rate allocation for p2p applications
04/01/10Balancing usage of hardware devices among clients
04/01/10Methods and systems for a portable, interactive display device for use with a computer
04/01/10Log manager for aggregating data
04/01/10Parallel document processing
04/01/10Protocol-independent remote attestation and sealing
04/01/10Transparent trust validation of an unknown platform
04/01/10Storing composite services on untrusted hosts
04/01/10Establishment of a relationship between wireless devices
04/01/10Cryptographic applications of efficiently evaluating large degree isogenies
04/01/10Active hip
04/01/10Configuration of memory management techniques selectively using mitigations to reduce errors
04/01/10Memory management techniques selectively using mitigations to reduce errors
04/01/10Evaluating effectiveness of memory management techniques selectively using mitigations to reduce errors
04/01/10Handling unhandled raster operations in a document conversion
04/01/10Streaming information that describes a webpage
04/01/10Phrase generation using part(s) of a suggested phrase
04/01/10Manipulation of objects on multi-touch user interface
04/01/10Object search ui and dragging object results
04/01/10Panoramic graphical user interface
04/01/10Advertising-driven theme preview and selection
04/01/10Magnifier panning interface for natural input devices
04/01/10Variable screen magnifier user interface
04/01/10Hardware abstraction in embedded systems
04/01/10Runtime object composition
04/01/10Data feature tracking through hierarchical node sets
04/01/10Symbolic runtime checking of quantified contracts
04/01/10Binary manipulation of intermediate-language code
04/01/10Flexible and scalable operating system achieving a fast boot and reliable operation
04/01/10Notification batching based on user state
04/01/10Temporal batching of i/o jobs
04/01/10Array object concurrency in stm
04/01/10Scheduling execution contexts with critical regions
04/01/10Intelligent context migration for user mode scheduling
04/01/10Managing pools of dynamic resources
04/01/10Hardware throughput saturation detection
04/01/10Transparent user mode scheduling on traditional threading systems
04/01/10On-the-fly replacement of physical hardware with emulation
04/01/10Data-tier application component
04/01/10Determining user-to-user simlarities in an online media environment
04/01/10Synchronized video playback among multiple users across a network
04/01/10Binding activation of network-enabled devices to web-based services
04/01/10Techniques to manage access to organizational information of an entity
04/01/10Detection accuracy tuning for security
03/25/10Encoding, updating, and decoding barcodes in a document
03/25/10Alerting users using a multiple state status icon
03/25/10Calibration of an optical touch-sensitive display device
03/25/10Method and system for progressive image transmission
03/25/10Calculating a webpage importance from a web browsing graph
03/25/10Visual summarization of web pages
03/25/10Print preview with page numbering for multiple pages per sheet
03/25/10Discovering communication rules in a network trace
03/25/10Adaptive image compression using predefined models
03/25/10Multichannel acoustic echo cancellation
03/25/10Object detection and user settings
03/25/10Editing 2d structures using natural input
03/25/10Coherent phrase model for efficient image near-duplicate retrieval
03/25/10Kernelized spatial-contextual image classification
03/25/10Validation and correction of map data using oblique images
03/25/10Image upsampling with training images
03/25/10Learning-based partial differential equations for computer vision
03/25/10Removing blur from an image
03/25/10Computing and harnessing inferences about the timing, duration, and nature of motion and cessation of motion with applications to mobile computing and communications
03/25/10Mobile device dynamic background
03/25/10Wifi and gsm landmarks and neighborhoods for location based services
03/25/10Mobile data flow collection and dissemination
03/25/10Location based services with combinatorial data sources
03/25/10Tensor linear laplacian discrimination for feature extraction
03/25/10Computerized statistical machine translation with phrasal decoder
03/25/10Adapting a compressed model for use in speech recognition
03/25/10Phase sensitive model adaptation for noisy speech recognition
03/25/10Structured models of repitition for speech recognition
03/25/10Advertisement repository and advertisement search
03/25/10Real-time auction of cloud computing resources
03/25/10Calculating web page importance based on web behavior model
03/25/10Automated feature selection based on rankboost for ranking
03/25/10Field-programmable gate array based accelerator system
03/25/10Online multi-label active annotation of data files
03/25/10Techniques for resource location and migration across data centers
03/25/10Matrix-based scans on parallel processors
03/25/10Food nutrition management system and method
03/25/10Information retrieval system
03/25/10Virtual javascript object notation
03/25/10Summarizing online forums into question-context-answer triples
03/25/10Tokenized javascript indexing system
03/25/10Redirection of multiple remote devices
03/25/10Tracking of electronic mail messages
03/25/10Dynamically configurable switch for distributed test lab
03/25/10System and method for optimizing server resources while providing interaction with documents accessible through the server
03/25/10Coordinating data delivery using time suggestions
03/25/10Low latency real-time audio streaming
03/25/10Transparent resource administration using a read-only domain controller
03/25/10Managing thread affinity on multi-core processors
03/25/10Non-volatile memory cache performance improvement
03/25/10Certificate based authentication for online services
03/25/10Resource arbitration for shared-write access via persistent reservation
03/25/10Multi-platform presentation system
03/25/10Virtual magnification with interactive panning
03/25/10Flexible architecture for notifying applications of state changes
03/25/10Method and apparatus for navigating a graphical representation of a virtual exhibition
03/25/10Presentation facilitation
03/25/10Pluggable presentation and domain coupling
03/25/10Guidance across complex tasks
03/25/10Method and system of taskbar button interfaces
03/25/10Displaying application information in an application-switching user interface
03/25/10Combining elements in presentation of content
03/25/10Area selectable menus
03/25/10Parallel processing of an expression
03/25/10Debugger exception filtering with target-based rules
03/25/10Managing updates using compiler and linker information
03/25/10Coalescing periodic timer expiration in guest operating systems in a virtualized environment
03/25/10User interface having zoom functionality
03/25/10Providing simplified internet access
03/25/10Authentication service for seamless application operation
03/25/10Partial installation based on available privileges
03/25/10Collecting and analyzing malware data
03/18/10Resistive switch matrix
03/18/10Keyboard structure with a self-luminous circuit board
03/18/10Resistive switch matrix
03/18/10Context aware auxiliary display platform and applications
03/18/10Compact interactive tabletop with projection-vision
03/18/10Integrated haptic control apparatus and touch sensitive display
03/18/10Highlevel active pen matrix
03/18/10Image view synthesis using a three-dimensional reference model
03/18/10Stylized prosody for speech synthesis-based applications
03/18/10Selective character magnification on touch screen devices
03/18/10Reconstruction of image in a bayer pattern
03/18/10Globally invariant radon feature transforms for texture classification
03/18/10Multi-class transform for discriminant subspace analysis
03/18/10Dehazing an image using a three-dimensional reference model
03/18/10Pre-determined responses for wireless devices
03/18/10System and methods for communication between instant message users and short message service users
03/18/10vehicle operation by leveraging traffic related data
03/18/10Adapting cross-lingual information retrieval for a target collection
03/18/10Piecewise-based variable -parameter hidden markov models and the training thereof
03/18/10Parameter clustering and sharing for variable-parameter hidden markov models
03/18/10Auction system
03/18/10Digital rights management license identification
03/18/10Online pricing and buyback
03/18/10Computationally efficient probabilistic linear regression
03/18/10Automated criterion-based grouping and presenting
03/18/10Identifying product issues using forum data
03/18/10Reducing use of randomness in consistent uniform hashing
03/18/10Data schema transformation using declarative transformations
03/18/10Virtual block-level storage over a file system
03/18/10Balanced routing of questions to experts
03/18/10Asynchronous queued messaging for web applications
03/18/10Dye injected request generation
03/18/10Protocol exchange and policy enforcement for a terminal server session
03/18/10Offloading network protocol operations to network interface in sleep state
03/18/10Managing cache data and metadata
03/18/10Buffer snapshots from unmodifiable data piece tables
03/18/10Transactional memory system
03/18/10Managing cache data and metadata
03/18/10Technologies for detecting erroneous resumptions in a continuation based runtime
03/18/10Interactive profile presentation
03/18/10Seamless conversion of ordinary email data into calendar data
03/18/10Rich drag drop user interface
03/18/10Screen magnifier panning model
03/18/10Start menu operation for computer user interface
03/18/10Rendering a customized list of controls
03/18/10Motion activated content control for media system
03/18/10System and method for sharing objects between applications in a virtual runtime environment
03/18/10Efficient patching
03/18/10Automatic detection and installation of client peripheral devices by a server
03/18/10Integration of runtime environments
03/18/10Service binding
03/18/10Reverse proxy architecture
03/11/10Clutch-height adjustment in an optical tracking device
03/11/10Controlling device operation relative to a surface
03/11/10Temporally separate touch input
03/11/10Pressure sensitive controls
03/11/10Hard tap
03/11/10Modifying a chart
03/11/10Zooming graphical user interface
03/11/10Controlling sensitive information leakage in printing
03/11/10Skip modes for inter-layer residual video coding and decoding
03/11/10Intelligent contact management
03/11/10Energy cost reduction and ad delivery
03/11/10Navigation communication with self-identifying elements
03/11/10Visualizing relationships among components using grouping information
03/11/10Discovering question and answer pairs
03/11/10Flexible system health and remediation agent
03/11/10Linking service level expectations to performing entities
03/11/10Method for providing creator-centric region on displays, devices, and social networks where content owners can define rights and creating a novel rights and content repositor
03/11/10Syndicated advertising and commerce through widgets
03/11/10Unified searching and running of files
03/11/10Pipeline for network based server-side 3d image rendering
03/11/10Automatic non-junk message list inclusion
03/11/10Content recommendations based on browsing information
03/11/10Leveraging synchronous communication protocols to enable asynchronous application and line-of-business behaviors
03/11/10Efficient algorithm for finding candidate objects for remote differential compression
03/11/10Network hang recovery
03/11/10World-readiness and globalization testing assemblies
03/11/10Network map
03/11/10Portable electronic device with relative gesture recognition mode
03/11/10Declarative testing for user interfaces
03/11/10Satisfying missing dependencies on a running system
03/11/10Securely roaming digital identities
03/04/10Collapsible mouse with pinch-risk solution
03/04/10Simultaneous input across multiple applications
03/04/10Methods for automated and semiautomated composition of visual sequences, flows, and flyovers based on content and context
03/04/10Flat panel lens
03/04/10Photography auto-triage
03/04/10Image-based backgrounds for images
03/04/10Automatic image straightening
03/04/10Tagging images with labels
03/04/10Image tagging user interface
03/04/10Rules-based association of a phone number with one or more destination locations
03/04/10Automated direct bids to purchase entertainment content upon a predetermined event
03/04/10Extensible system for customized avatars and accessories
03/04/10Method and system for an integrated platform wide party system within a multiplayer gaming environment
03/04/10Speech interfaces
03/04/10Structured implementation of business functionality changes
03/04/10Accommodating learned clauses in reconfigurable hardware accelerator for boolean satisfiability solver
03/04/10Search provider recommendation
03/04/10Information feeds of a social network
03/04/10Predicting future queries from log data
03/04/10Synchronization of records of a table using bookmarks
03/04/10Post-processing search results on a client computer
03/04/10Query-oriented message characterization
03/04/10Persisting a group in an instant messaging application
03/04/10Automatic determination of an entity's searchable social network using role-based inferences
03/04/10Dynamic metadata
03/04/10Minimal extensions required for multi-master offline and collaboration for devices and web services
03/04/10Method and system for adapting search results to personal information needs
03/04/10Intelligent container index and search
03/04/10Project property sheets
03/04/10Inverse transformation loading
03/04/10Shared hosting using host name affinity
03/04/10Leveraging communications to identify social network friends
03/04/10Email confirmation page for social network notifications
03/04/10Composing message processing pipelines
03/04/10Email messages
03/04/10Maintaining client affinity in network load balancing systems
03/04/10Probabilistic mesh routing
03/04/10Efficiently managing modular data storage systems
03/04/10Controlling access to data streams
03/04/10Login authentication using a trusted device
03/04/10Environment wide configuration system
03/04/10Dynamic inline sequence interface
03/04/10Displaying subscribable content
03/04/10Hierarchical bit stream markup compilation and rendering
03/04/10Discovering alternative user experiences for websites
03/04/10Modifying conversation windows
03/04/10Scrollable area multi-scale viewing
03/04/10Internal scroll activation and cursor adornment
03/04/10Flexible base class library
03/04/10Compositional view of imperative object model
03/04/10Detouring in scripting systems
03/04/10Seamless debugging among different application views
03/04/10Type descriptor management for frozen objects
03/04/10Rolling upgrades in distributed applications
03/04/10Managing distributed system software on a gaming system
03/04/10Data center programming model
03/04/10Exposure of remotely invokable method through a webpage to an application outside web browser
03/04/10Firewall data transport broker
03/04/10Intent-oriented user interface application programming interface
03/04/10Protecting a virtual guest machine from attacks by an infected host
03/04/10Load balancing for services
03/04/10Collecting anonymous and traceable telemetry
03/04/10Software anti-piracy protection
02/25/10Counterfeit and tamper resistant labels with randomly occurring features
02/25/10Continuous automatic key control
02/25/10Stability monitoring using synthetic aperture radar
02/25/10Touch screen mobile device as graphics tablet input
02/25/10Social virtual avatar modification
02/25/10Distance estimation based on image contrast
02/25/10Rendezvousing resource requests with corresponding resources
02/25/10Conversion operations in scalable video encoding and decoding
02/25/10Entropy coding/decoding of hierarchically organized data
02/25/10Image restoration by vector quantization utilizing visual patterns
02/25/10Determining utility of a question
02/25/10Method and system of generating reference variations for directory assistance data
02/25/10Geographically targeted advertising
02/25/10Recovery of a computer that includes virtual disks
02/25/10Extraction of anchor explanatory text by mining repeated patterns
02/25/10Fat directory structure for use in transaction safe file
02/25/10Recovery of disconnected channels over a reliable protocol
02/25/10Content sharing and instant messaging
02/18/10Tactile enhancement for input devices
02/18/10Advanced inductive charging pad for portable devices
02/18/10Method and system for defining and controlling algorithmic elements in a graphics display system
02/18/10Satellite microphones for improved speaker detection and zoom
02/18/10Host initiated background formatting of optical medium
02/18/10Protocol for device to station association
02/18/10Location aware mobile-device software development
02/18/10Context based online advertising
02/18/10Context based advertisement bidding mechanism
02/18/10Processing gasoline price data in a networked environment
02/18/10Mobile device enhanced shopping experience
02/18/10Context based advertisement filtration
02/18/10Determination of advertisement referrer incentives and disincentives
02/18/10Deployment of a solution artifact to a client application
02/18/10Rank documents based on popularity of key metadata
02/18/10Transactional file system
02/18/10Claim generation for testing claims-based applications
02/18/10Cross-domain authentication
02/18/10Social media guided authoring
02/18/10Variable formatting of cells
02/18/10Activities operating on structured data
02/18/10Animations and transitions
02/18/10Web page content discovery
02/18/10Constrained physical design tuning
02/18/10Optimization of imperative implementation of compositional content
02/18/10Installation management using virtual machines
02/18/10High accuracy timer
02/18/10Portable device association
02/11/10Example-based motion detail enrichment in real-time
02/11/10Windowless shape drawing
02/11/10Augmenting a call with context
02/11/10Secure resource name resolution using a cache
02/11/10Method and system providing spectator information for a multimedia application
02/11/10Avatar closet/ game awarded avatar
02/11/10Reducing bandwidth requirements for peer-to-peer gaming based on importance of remote objects to a local player
02/11/10Flow tracking of environmental substances
02/11/10Structured implementation of business adaptability changes
02/11/10Ubiquitous intent-based customer incentive scheme
02/11/10Efficient size optimization of visual information or auditory information
02/11/10Sharing television clips
02/11/10Meta file system - transparently managing storage using multiple file systems
02/11/10Message exchange pattern rendezvous abstraction
02/11/10Distributed load balancer
02/11/10Secure resource name resolution
02/11/10Sections of a presentation having user-definable properties
02/11/10Social networking tool
02/11/10Recycling of view components in a user interface
02/11/10User feedback correlated to specific user interface or application features
02/11/10Immutable parsing
02/11/10Grammar-based generation of types and extensions
02/11/10Non intrusive application mechanism
02/11/10Form filling with digital identities, and automatic password generation
02/11/10Two stage access control for intelligent storage device
02/04/10Fusing rfid and vision for surface object tracking
02/04/10Avatar items and animations
02/04/10Gpu scene composition and animation
02/04/10Video region of interest features
02/04/10Inverse multiplexing heterogeneous wireless links for high-performance vehicular connectivity
02/04/10Path estimation in a wireless mesh network
02/04/10Evolution codes (opportunistic erasure coding) platform
02/04/10Content transfer
02/04/10Method and apparatus for providing ringback tones
02/04/10Recognizing actions of animate objects in video
02/04/10Surface ui for gesture-based interaction
02/04/10Curvise handwriting recognition with hierarchical prototype search
02/04/10Real-time sequential game play
02/04/10Social media driven advertisement targeting
02/04/10Mobile device security using wearable security tokens
02/04/10Efficient large-scale processing of column based data encoded structures
02/04/10Query builder for testing query languages
02/04/10Clustering question search results based on topic and focus
02/04/10Searching questions based on topic and focus
02/04/10Efficient column based data encoding for large-scale data storage
02/04/10Maintaining large random sample with semi-random append-only operations
02/04/10Content discovery and transfer between mobile communications nodes
02/04/10Enforcement of object permissions in enterprise resource planning software
02/04/10Populating and using caches in client-side caching
02/04/10Estimating latencies for query optimization in distributed stream processing
02/04/10Re-establishing a connection for an application layer via a service layer
02/04/10Raising the visibility of a voice-activated user interface
02/04/10Creation and navigation of infinite canvas presentation
02/04/10User-defined gesture set for surface computing
02/04/10User-defined gesture set for surface computing
02/04/10Installation sequence manager
02/04/10Efficient detection and response to spin waits in multi-processor virtual machines
02/04/10Automation-resistant, advertising-merged interactive services
02/04/10User indicator signifying a secure mode
02/04/10Malware detection using code analysis and behavior monitoring
02/04/10Distributive security investigation
02/04/10Software enhanced trusted platform module
01/28/10Touch interaction with a curved display
01/28/10Method and system for managing graphics objects in a graphics display system
01/28/10Presenting dynamic grids
01/28/10Closed captioning preferences
01/28/10Interactive wifi connectivity for moving vehicles
01/28/10Barbell lifting for wavelet coding
01/28/10Method for overlapping visual slices
01/28/10Discovering points of interest from users map annotations
01/28/10Random walk restarts in minimum error rate training
01/28/10Static typing of xquery expressions in lax validation content
01/28/10System and method for automatically linking data sources for providing data related to a query
01/28/10Using an id domain to improve searching
01/28/10Search engine enhancement using mined implicit links
01/28/10Automatic user interface generation for entity interaction
01/28/10State separation for application changes
01/28/10Api for diffie-hellman secret agreement
01/28/10Reducing power consumption by offloading applications
01/28/10Error recovery and diagnosis for pushdown automata
01/28/10Presenting annotations in hierarchical manner
01/28/10Declarative forms and views
01/28/10System for editing an avatar
01/28/10Active and progressive targeted advertising
01/28/10Touch interaction with a curved display
01/28/10Non-constant data encoding for table-driven systems
01/28/10Computer application packages with customizations
01/28/10Generic user interface command architecture
01/28/10Restartable transformation automaton
01/28/10Detecting machines compromised with malware
01/28/10Specifying rights in a digital rights license according to events
01/21/10Tracking input in a screen-reflective interface environment
01/21/10Gpu bezier path rasterization
01/21/10Prismatic film backlight
01/21/10Travel management system
01/21/10Need-driven advertising
01/21/10Travel expense management system
01/21/10Method and system for self-adapting classification of user generated content
01/21/10System and method for scoping searches using index keys
01/21/10Fast byzantine paxos
01/21/10Low overhead atomic memory operations
01/21/10Secure network address provisioning
01/21/10Ad-hoc trust establishment using visual verification
01/21/10Notification of activity around documents
01/21/10Rich drag drop user interface
01/21/10Pan and zoom control
01/21/10Automatic computer program customization based on a user information store
01/21/10Scenario based security
01/21/10Differentiated authentication for compartmentalized computing resources
01/21/10Lockbox for mitigating same origin policy failures
01/14/10Mesh network services for devices supporting dynamic direction information
01/14/10Method and system for unified audio control on a personal computer
01/14/10Method and system for automatically generating world environment reverberation from a game geometry
01/14/10Delaying interaction with points of interest discovered based on directional device information
01/14/10Programming apis for an extensible avatar system
01/14/10Method and system for unified audio control on a personal computer
01/14/10Route prediction
01/14/10Conflict resolution and error recovery strategies
01/14/10Social product advertisements
01/14/10Advertising across social network communication pathways
01/14/10Method and system for web resource location classification and detection
01/14/10Content management that addresses levels of functionality
01/14/10Automatic bit rate detection and throttling
01/14/10State as a first-class citizen of an imperative language
01/14/10Control protocol for image enumeration and transfer
01/14/10Dynamic web page behavior
01/14/10Simultaneously reformatting a document with multiple colors
01/14/10Text box numbering and linking visual aids
01/14/10System and method for selecting a tab within a tabbed browser
01/14/10Automatically distributed network protection
01/14/10Verification of un-trusted code for consumption on an insecure device
01/07/10Representing security identities using claims
01/07/10Cipher for disk encryption
01/07/10Optical out-of-band key distribution
01/07/10Quantifying trust in computing networks
01/07/10Organizing resources into collections to facilitate more efficient and reliable resource access
01/07/10Performing a collaborative search in a computing network
01/07/10Standardized mechanism of remote management of embedded radio modules
01/07/10Application reputation service
01/07/10Method and apparatus for viewing and managing collaboration data from within the context of a shared document
06/24/10Controlling applications through inter-process communication
04/22/10Permissions using a namespace

ARCHIVE: New 2017 2016 2015 2014 2013 2012 2011 2010 2009


This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. is not affiliated or associated with Microsoft Corporation in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Microsoft Corporation with additional patents listed. Browse our Agent directory for other possible listings. Page by