Real Time Touch

new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)

Real Time Touch

Filing Names

Microsoft Corporation
Microsoft Corporation One Microsoft Way
Microsoft Corporation Way
Microsoft Corporation Inc
Microsoft Corporation_20100107
Microsoft Corporation Microsoft Patent Group
Microsoft Corporation_20100114
Microsoft Corporation_20131212
Microsoft Corporation_20100128
Microsoft Corporation_20100121
Microsoft Corporationi

Microsoft Corporation patents (2012 archive)

Recent patent applications related to Microsoft Corporation. Microsoft Corporation is listed as an Agent/Assignee. Note: Microsoft Corporation may have other listings under different names/spellings. We're not affiliated with Microsoft Corporation, we're just tracking patents.

ARCHIVE: New 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "M" | Microsoft Corporation-related inventors

Date Microsoft Corporation patents (2012 archive) (updated weekly) - BOOKMARK this page
12/27/12Environmental-light filter for see-through head-mounted display device
12/27/12Region of interest segmentation
12/27/12Directed performance in motion capture system
12/27/12Infrastructural haptics on wall scale interactive displays
12/27/12Fully automatic dynamic articulated model calibration
12/27/12Total field of view classification for head-mounted display
12/27/12Modifying video regions using mobile device input
12/27/12Automatic video framing
12/27/12Voice-body identity correlation
12/27/12Resource conservation based on a region of interest
12/27/12Video projection system for mobile device
12/27/12Communication using delegates, such as delegates specified in an email or scheduling application
12/27/12Message processing engine with a virtual network interface
12/27/12Techniques for transfer error recovery
12/27/12Hierarchical models for language modeling
12/27/12Resource management for cloud computing platforms
12/27/12Universally targeting online advertisements
12/27/12Fast personalized page rank on map reduce
12/27/12Conventions for inferring data models
12/27/12Synthetic data generation
12/27/12Anchor image identification for vertical video search
12/27/12Value-based positioning for outer join queries
12/27/12Optimizing fine grained access control using authorization indexes
12/27/12Presenting supplemental content in context
12/27/12Multi-part search result ranking
12/27/12Scalable metadata extraction for video search
12/27/12Regularized latent semantic indexing for topic modeling
12/27/12Consistent phrase relevance measures
12/27/12Sorting a dataset of incrementally received data
12/27/12Techniques to automatically build a language dependency graph for localizable resources
12/27/12Map editing with little user input
12/27/12Object-relational mapped database initialization
12/27/12Remote presentation session connectionless oriented channel broker
12/27/12Remote server management using a mobile computing device
12/27/12Push mechanism for efficiently sending aggregated data items to client
12/27/12Caching and exposing pre-send data relating to the sender or recipient of an electronic mail message
12/27/12Computing system for managing data
12/27/12Audio presentation of condensed spatial contextual information
12/27/12Organizing resources into collections to facilitate more efficient and reliable resource access
12/27/12Resource management for cloud computing platforms
12/27/12Organizing resources into collections to facilitate more efficient and reliable resource access
12/27/12Failover mechanism
12/27/12User-controlled data encryption with obfuscated policy
12/27/12Media agnostic, distributed, and defendable data retention
12/27/12Span out load balancing model
12/27/12Power-capping based on ups capacity
12/27/12Adding individual database failover/switchover to an existing storage component with limited impact
12/27/12N-way runtime interoperative debugging
12/27/12Linking source code to running element
12/27/12Dynamically updating a running page
12/27/12Content rendering on a computer
12/27/12Discovering, defining, and implementing computer application topologies
12/27/12Media files including programming code and description
12/27/12Software development automated analytics
12/27/12Executing molecular transactions
12/27/12Dynamically allocated thread-local storage
12/27/12Programming interface for data communications
12/27/12Fluent api patterns for managing object persistence
12/27/12Trusted language runtime on a mobile platform
12/20/12Pressure sensor linearization
12/20/12Rf proximity sensor
12/20/12Pifa array
12/20/12Device interaction through barrier
12/20/12Sharing of event media streams
12/20/12Computing three-dimensional image models in parallel
12/20/12Mobile platform for augmented reality
12/20/12Vector graphics with controlled thin-plate splines
12/20/12Rendering stroke pairs for graphical objects
12/20/12Communicating status and expression
12/20/12Motion based virtual object navigation
12/20/12Combined lighting, projection, and image capture without video feedback
12/20/12Interactive and shared surfaces
12/20/12Volumetric video presentation
12/20/12Illuminated skin robot display
12/20/12Phone supporting mode conversion
12/20/12Wireless communications
12/20/12Adaptive codec selection
12/20/12Multiple independent narrow channels in wireless networks
12/20/12Cloud key escrow system
12/20/12Controlling access to protected objects
12/20/12Broadcast identifier enhanced facial recognition of images
12/20/12Location-aided recognition
12/20/12Near-duplicate video retrieval
12/20/12Providing video presentation commentary
12/20/12Companion timeline with timeline events
12/20/12Adaptively-spaced repetition learning system and method
12/20/12Simple peer-to-peer network formation
12/20/12Depersonalizing location traces
12/20/12Mobile communication device maintaining lifetrails in a battery efficient manner
12/20/12Client side cellular handoff prediction
12/20/12Position-based decision to provide service
12/20/12Mri scanner that outputs bone strength indicators
12/20/12Promoting exploration
12/20/12Docking process for recharging an autonomous mobile device
12/20/12Optimized temperature-driven device cooling
12/20/12User-mounted device calibration using external data
12/20/12Detecting impact of extrinsic events on a time series
12/20/12Mobile emulator integration
12/20/12Speech to text medical forms
12/20/12Automated adverse drug event alerts
12/20/12Bitstream syntax for multi-process audio decoding
12/20/12Distributed sharing of electronic medical records
12/20/12Real-time monitoring of public sentiment
12/20/12Incentivizing low-transaction-cost payments
12/20/12Click prediction using bin counting
12/20/12Virtual identity manager
12/20/12Data custodian and curation system
12/20/12Monetization strategies in privacy-conscious personalization
12/20/12Online marketplace with dynamic pricing
12/20/12Functionality for personalizing search results
12/20/12Graph-based classification based on file relationships
12/20/12Entity recognition using probabilities for out-of-collection data
12/20/12Recommending data enrichments
12/20/12Virtual machine snapshotting and analysis
12/20/12Light-weight validation of native images
12/20/12Semantic reflection storage and automatic reconciliation of hierarchical messages
12/20/12Two-phase eviction process for file handle caches
12/20/12Search results based on user and result profiles
12/20/12Enriched search features based in part on discovering people-centric search intent
12/20/12Hover translation of search result captions
12/20/12Interactive web crawler
12/20/12Query optimization techniques for business intelligence systems
12/20/12Query-dependent audio/video clip search result previews
12/20/12Surfacing applications based on browsing activity
12/20/12Web searching
12/20/12Navigating media content by groups
12/20/12Dictionary for hierarchical attributes from catalog items
12/20/12Efficient optimization over uncertain data
12/20/12Compression aware physical database design
12/20/12Spatial attribute ranking value index
12/20/12Iterative set expansion using samples
12/20/12Displaying notifications based on importance to the user
12/20/12Automatic synchronization of most recently used document lists
12/20/12Bulk create, update and delete (cud) database operations for table inheritance
12/20/12Selection mapping between fetched files and source files
12/20/12Processing queries for event data in a foreign representation
12/20/12Data framework to enable rich processing of data from any arbitrary data source
12/20/12Enriching database query responses using data from external data sources
12/20/12Dialog-enhanced contextual search query analysis
12/20/12Embedded query formulation service
12/20/12Relational modeling and runtime for date effective entities
12/20/12Composable sql query generation
12/20/12Specification of database table relationships for calculation
12/20/12Spelling using a fuzzy pattern search
12/20/12Learning discriminative projections for text similarity measures
12/20/12Dynamic lock-free hash tables
12/20/12Concurrently accessed hash table
12/20/12Presentation software automation services
12/20/12Storage media abstraction for uniform data storage
12/20/12Garbage collection based on total resource usage and managed object metrics
12/20/12Language integrated query over vector spaces
12/20/12Efficient state reconciliation
12/20/12Mobile social interaction
12/20/12Providing access to shared state data
12/20/12Dynamic activation of web applications
12/20/12Direct networking for multi-server units
12/20/12Middleware services framework for on-premises and cloud deployment
12/20/12Cross-scope synchronization of data item knowledge and corresponding metadata
12/20/12Managing replicated virtual storage at recovery sites
12/20/12Memory manager with enhanced application metadata
12/20/12Memory management model and interface for unmodified applications
12/20/12Memory management model and interface for new applications
12/20/12Stateless human detection for real-time messaging systems
12/20/12Platform that facilitates preservation of user privacy
12/20/12Verifying requests for access to a service provider using an authentication component
12/20/12Trusted snapshot generation
12/20/12Cloud key directory for federating data exchanges
12/20/12Wireless cloud-based computing for rural and developing areas
12/20/12Power and load management based on contextual information
12/20/12Variable formatting of values
12/20/12Mapping selections between a browser and the original file fetched from a web server
12/20/12Using gestures to generate code, including for text flow
12/20/12Incrementally tokenizing and/or parsing a style sheet
12/20/12Transitioning between an editing view and a backstage view of an electronic document
12/20/12Reading ease of text on a device
12/20/12Hierarchical, zoomable presentations of media sets
12/20/12Movie discovery system
12/20/12User interface extensibility for web application development tool
12/20/12Predictive word completion
12/20/12Command user interface for displaying selectable software functionality controls
12/20/12Pattern analysis and performance accounting
12/20/12Multi-tenant collaborative review service
12/20/12Live browser tooling in an integrated development environment
12/20/12Navigation history visualization in integrated development environment
12/20/12Automatic code decoration for code review
12/20/12Streamlined testing experience
12/20/12Selectable dual-mode jit compiler for simd instructions
12/20/12Aliasing buffers
12/20/12Pattern-based compilation of asynchronous consumption
12/20/12Context aware application model for connected devices
12/20/12Cloud based management of an in-store device experience
12/20/12Virtual machine image composition and signing
12/20/12Efficient logical merging over physically divergent streams
12/20/12Monad based cloud computing
12/20/12Managing nodes in a high-performance computing system using a node registrar
12/20/12Using compiler-generated tasks to represent programming elements
12/20/12Work item processing in distributed applications
12/20/12Scheduling execution requests to allow partial results
12/20/12Transactional computation on clusters
12/20/12Object marshaling
12/20/12Video highlight identification based on environmental sensing
12/20/12Video selection based on environmental sensing
12/20/12Interest-based video streams
12/20/12Selection of advertisements via viewer feedback
12/20/12Detecting and distributing video content identities
12/20/12Streaming media bandwidth reduction
12/20/12Stateless human detection for real-time messaging systems
12/20/12Token data operations
12/20/12Mobile device operations with battery optimization
12/20/12Cloud malware false positive recovery
12/20/12System, method and device for cloud-based content inspection for mobile devices
12/20/12Automatic sharing of event content by linking devices
12/13/12Nomadic security device with patrol alerts
12/13/12Optimized on-screen video composition for mobile device
12/13/12Staged animated transitions for aggregation charts
12/13/12Techniques for multiple video source stitching in a conference room
12/13/12Invariant features for computer vision
12/13/12Navigation model to render centered objects using images
12/13/12Flexible display foldable assembly
12/13/12Flexible display extendable assembly
12/13/12Natural user interfaces for mobile image viewing
12/13/12Image type classifier for improved remote presentation session compression
12/13/12Accurate text classification through selective use of image data
12/13/12Determining foreground regions and background regions in an image
12/13/12Automatic exposure correction of images
12/13/12Alternate source conflict resolution
12/13/12Centralized context awareness through network association
12/13/12Locational node device
12/13/12Geographic data acquisition by user motivation
12/13/12Interactive robot initialization
12/13/12Providing remote gestural and voice input to a mobile robot
12/13/12Tracking and following of moving objects by a mobile robot
12/13/12Automatic navigation to a prior known location
12/13/12Hybrid-approach for localizaton of an agent
12/13/12Dynamic video caption translation player
12/13/12Dynamically adding personalization features to language models for voice search
12/13/12Storytelling delivery based on request
12/13/12Client-server joint personalization for private mobile advertising
12/13/12Simulating an advertising auction
12/13/12Transparent virtual currency using verifiable tokens
12/13/12Identification of moved or renamed files in file synchronization
12/13/12Query-based information hold
12/13/12Location-aware search ranking
12/13/12Associating search queries and entities
12/13/12Performing parallel joins on distributed database data
12/13/12Using aggregate location metadata to provide a personalized service
12/13/12Instance-based command execution, approval, and notification framework
12/13/12Selection of proxy device for connection pooling
12/13/12Subscribing to multiple resources through a common connection
12/13/12Anonymous location-based notification
12/13/12Directing messages based on domain names
12/13/12Selective linking of message accounts
12/13/12Asynchronous video threads
12/13/12Web-browser based desktop and application remoting solution
12/13/12Remotely retrieving information from consumer devices
12/13/12Establishment of a pairing relationship between two or more communication devices
12/13/12Statistical network traffic signature analyzer
12/13/12Using cooperative greedy ballooning to reduce second level paging activity
12/13/12Managing data placement on flash-based storage by use
12/13/12Storage architecture for backup application
12/13/12Transforming addressing alignment during code generation
12/13/12Estimating and preserving battery life based on usage patterns
12/13/12Propagating unobserved exceptions in distributed execution environments
12/13/12Embedded web viewer for presentation applications
12/13/12Techniques for adapting an interpretive run time application to multiple clients
12/13/12Automated user interface object transformation and code generation
12/13/12Application development enviroment for portable electronic devices
12/13/12Optimizing execution of kernels
12/13/12Binding executable code at runtime
12/13/12Automatic recognition of web application
12/13/12Operating system decoupled heterogeneous computing
12/13/12Scheduling execution of complementary jobs based on resource usage
12/13/12Highly reliable and scalable architecture for data centers
12/13/12Channel navigation techniques
12/13/12Use of user location information for remote actions
12/13/12Applying antimalware logic without revealing the antimalware logic to adversaries
12/13/12Threat level assessment of applications
12/06/12Reverse reminders
12/06/12Adaptation of notification perimeter based on relevance to a user
12/06/12Compression match enumeration
12/06/12Low accuracy positional data by detecting improbable samples
12/06/12Gesture recognition techniques
12/06/12Three-dimensional foreground selection for vision system
12/06/12Motion effect reduction for displays and touch input
12/06/12Multi-touch text input
12/06/12Birefringent lenslet camera
12/06/12Distributed asynchronous localization and mapping for augmented reality
12/06/12Mesh sequence file format
12/06/12Adding attributes to virtual representations of real-world objects
12/06/12Generating computer models of 3d objects
12/06/12Modeling and rendering of heterogeneous translucent materals using the diffusion equation
12/06/12Hardware accelerated caret rendering
12/06/12Global composition system
12/06/12Augmented reality and filtering
12/06/12Controlling objects in a virtual environment
12/06/12Techniques to provide fixed video conference feeds of remote attendees with attendee information
12/06/12Ambulatory presence features
12/06/12Object digitization
12/06/12Automatic sharing and replacement of content based on network connectivity
12/06/12Fluid ingress resistant interactive display device
12/06/12Printing using a platform-independent driver
12/06/12Flexible display flexure assembly
12/06/12Techniques for adaptive rounding offset in video encoding
12/06/12Parameterization for fading compensation
12/06/12Head rotation tracking from depth-based center of mass
12/06/12System for recognizing an open or closed hand
12/06/12Decentralized relaying algorithm for mobile devices
12/06/12Dynamic camera based practice mode
12/06/12Action trigger gesturing
12/06/12Three-dimensional background removal for vision system
12/06/12Generation of avatar reflecting player appearance
12/06/12Rein-controlling gestures
12/06/12Sensing floor for locating people and devices
12/06/12System for finger recognition and tracking
12/06/12Automated sensor driven match-making
12/06/12Action selection gesturing
12/06/12Shape trace gesturing
12/06/12Physical characteristics based user identification for matchmaking
12/06/12Occupancy prediction using historical occupancy patterns
12/06/12Optimized utilities consumption
12/06/12Customizable route planning
12/06/12Asymmetric dynamic geo-fencing
12/06/12Presenting offers to consumers based on information from a vehicle
12/06/12Learned context correlation through network communication observations
12/06/12Automatic configuration of a recovery service
12/06/12Scope based indexing prioritization
12/06/12Crawl freshness in disaster data center
12/06/12Unique join data caching method
12/06/12Discovering expertise using document metadata in part to rank authors
12/06/12Geo-targeted data collection or other action
12/06/12Semantic search interface for data collections
12/06/12Stability-adjusted ranking and geographic anchoring using a finite set of accessed items
12/06/12Customizing language for organization application installation
12/06/12Clustered file service
12/06/12Smart rounding supporting psychological pricing
12/06/12Automated sensor driven friending
12/06/12Emotion-based user identification for online experiences
12/06/12Privacy-preserving matching service
12/06/12Enabling peer-to-peer content retrieval in http
12/06/12Dynamic reconfiguration of cloud resources
12/06/12Flyway generation in data centers
12/06/12Time synchronization across computers in a distributed system
12/06/12Direct addressability and direct server return
12/06/12Sector-based write filtering with selective file and registry exclusions
12/06/12Delete notifications for an entire storage device
12/06/12Probe response supported wireless autoconnection
12/06/12Redirecting requests to secondary location during temporary outage
12/06/12Recovery service location for a service
12/06/12Replaying jobs at a secondary location of a service
12/06/12Dynamically controlling collisions of form controls in an electronic document
12/06/12Collecting, aggregating, and presenting activity data
12/06/12Accessing web content based on mobile contextual data
12/06/12Map-based methods of visualizing relational databases
12/06/12User interface and geo-parsing data structure
12/06/12Asynchronous handling of a user interface manipulation
12/06/12Target element zoom
12/06/12Gesture to trigger application-pertinent information
12/06/12Using enterprise management application proxies for developing projects in program development tools
12/06/12Repository based development using project development tools in enterprise management environment
12/06/12Remapping debuggable code
12/06/12Editor visualization of symbolic relationships
12/06/12Static semantic analysis of dynamic languages
12/06/12Statically derived symbolic references for dynamic languages
12/06/12Capturing rich actionable feedback on working software
12/06/12Path-sensitive visualizations of aggregated profiling and trace date
12/06/12Dynamic interface reduction for software model checking
12/06/12Transforming dynamic source code based on semantic analysis
12/06/12Distributed computing framework
12/06/12Isolation of virtual machine i/o in multi-disk hosts
12/06/12License management in a cluster environment
12/06/12Episodic coordination model for distributed applications
12/06/12Techniques to consume content and metadata
12/06/12Distributed network name
12/06/12Redirection using token and value
12/06/12Override for policy enforcement system
12/06/12Moderation of shared data objects
11/29/12Location determination
11/29/12Multi-platform motion-based computer interactions
11/29/12Touchscreen japanese character selection through sliding input
11/29/12Identifying contacts and contact attributes in touch sensor data using spatial and temporal features
11/29/12Avatar-based virtual dressing room
11/29/12Determining affinity in social networks
11/29/12Adaptive timeline views of data
11/29/12Disambiguating picture content and picture frames
11/29/12Replacement of picture content in a layout
11/29/12Calculating zoom level timeline data
11/29/12Optimizing room lighting based on image sensor feedback
11/29/12Local participant identification in a web conferencing system
11/29/12Orientation-based generation of panoramic fields
11/29/12Imaging system
11/29/12Imaging system
11/29/12Automatically optimizing capture of images of one or more subjects
11/29/12Adaptive super resolution for video enhancement
11/29/12Learning to rank local interest points
11/29/12Dual-phase red eye correction
11/29/12Mobile network operator identification
11/29/12User character input interface with modifier support
11/29/12Interaction hint for interactive video presentations
11/29/12Communication between avatars in different games
11/29/12Avatars of friends as non-player-characters
11/29/12Map navigation with suppression of off-route feedback near route terminus
11/29/12Optimization of navigation tools using spatial sorting
11/29/12Optional re-routing
11/29/12Navigation system with assistance for making multiple turns in a short distance
11/29/12First waypoint distance
11/29/12Adjustable destination icon in a map navigation tool
11/29/12Start-of-route map navigation with suppression of off-route feedback
11/29/12User-driven navigation in a map navigation tool
11/29/12Changing emphasis of list items in a map navigation tool
11/29/12Inferring effects of configuration on performance
11/29/12Energy-efficient unobtrusive identification of a speaker
11/29/12Flexible workflow task assignment system and method
11/29/12Post paid coupons
11/29/12Advertisement rendering for multiple synced devices
11/29/12Ad impact testing
11/29/12Semantic advertising selection from lateral concepts and topics
11/29/12Unified yield management for display advertising
11/29/12Indirect online advertisements promoting third-party web content
11/29/12Online shopping optimization system
11/29/12Comparison of modeling and inference methods at multiple spatial resolutions
11/29/12Interactive framework for name disambiguation
11/29/12Learning processes for single hidden layer neural networks with linear output units
11/29/12Synchronous replication in a distributed storage environment
11/29/12Asynchronous replication in a distributed storage environment
11/29/12Versioned and hierarchical data structures and distributed transactions
11/29/12Replication processes in a distributed storage environment
11/29/12Geo-verification and repair
11/29/12Dynamically-created landing webpage
11/29/12Resource download policies based on user browsing statistics
11/29/12Automating responses to information queries
11/29/12Dynamic rule reordering for message classification
11/29/12Cross-platform data preservation
11/29/12Enabling multidimensional search on non-pc devices
11/29/12Managing a binary object in a database system
11/29/12Cross language object sharing
11/29/12Load balancing when replicating account data
11/29/12Feedback-based symptom and condition correlation
11/29/12Offloading load balancing packet modification
11/29/12Location based access control
11/29/12Storage account migration between storage stamps
11/29/12Implementing failover processes between storage stamps
11/29/12Operator state checkpoints
11/29/12Code coverage-based taint perimeter detection
11/29/12Separation of error information from error propagation information
11/29/12Interface definition language extensions
11/29/12Interactive build instructions
11/29/12Sentiment-based content aggregation and presentation
11/29/12Device user interface to input emoji and other symbols
11/29/12Insertion of picture content for use in a layout
11/29/12System and method for discovering and publishing of presence information on a network
11/29/12File access with different file hosts
11/29/12Context aware input engine
11/29/12Three-dimensional gesture controlled avatar configuration interface
11/29/12Binding between a layout engine and a scripting engine
11/29/12Reducing network trips for remote expression evaluation
11/29/12Management of software and operating system updates required for the process of creating a virtual machine facsimile of an existing physical or virtual machine
11/29/12Software image distribution
11/29/12Dynamic attribute resolution for orchestrated management
11/29/12Managing and simplifying distributed applications
11/29/12Memory model for a layout engine and scripting engine
11/29/12Protection from unfamiliar login locations
11/29/12Automating cloud service reconnections
11/29/12Brokered item access for isolated applications
11/29/12Picture gesture authentication
11/29/12Automatic detection of search results poisoning attacks
11/29/12Security model for a layout engine and scripting engine
11/29/12Validating access to a group of related elements
11/22/12Forming non-uniform optical guiding structures
11/22/12Monitoring interactions between two or more objects within an environment
11/22/12Systems, methods, and computer-readable media for invoking an electronic ink or handwriting interface
11/22/12Disambiguating intentional and incidental contact and motion in multi-touch pointing devices
11/22/12User interface for handwriting inputs
11/22/12User interface for handwriting inputs
11/22/12Monitoring pointer trajectory and modifying display interface
11/22/12Pressure-sensitive multi-touch device
11/22/12Remote multi-touch
11/22/12Pressure-sensitive multi-touch device
11/22/12Determine intended motions
11/22/12Displaying and inputting symbols
11/22/12Event augmentation with real-time information
11/22/12Techniques and system for automatic video conference camera feed selection based on room events
11/22/12Short-range nodes with adaptive preambles for coexistence
11/22/12Long-range nodes with adaptive preambles for coexistence
11/22/12Video transcoding with dynamically modifiable spatial resolution
11/22/12Credential storage structure with encrypted password
11/22/12Salient object detection by composition
11/22/12Searching for images by video
11/22/12Depth reconstruction using plural depth capture units
11/22/12Opacity measurement using a global pixel set
11/22/12Gesture-based visual search
11/22/12Compression of text contents for display remoting
11/22/12Rank order-based image clustering
11/22/12Transform space difference compression
11/22/12Realtime user guidance for freehand drawing
11/22/12Computer-based active teaching
11/22/12Discovering nearby places based on automatic query
11/22/12User behavior model for contextual personalized recommendation
11/22/12Delayed and time-space bound notifications
11/22/12Continuous automatic key control
11/22/12Background audio listening for content recognition
11/22/12Inferring a behavioral state of a vehicle
11/22/12Resistor matrix offset compensation
11/22/12Instruction set emulation for guest operating systems
11/22/12Universal text input
11/22/12Displaying key pinyins
11/22/12Syntax-based augmentation of statistical machine translation phrase tables
11/22/12User-modifiable word lattice display for editing documents and search queries
11/22/12Multi-mode text input
11/22/12User authentication by combining speaker verification and reverse turing test
11/22/12Advertising utilizing device-to-device interactions
11/22/12Adaptive interactive search
11/22/12Optimistic application of data edits
11/22/12System and method for dynamically generating a selectable search extension
11/22/12Net change notification based cached views with linked attributes
11/22/12Text to image translation
11/22/12Adaptively learning a similarity model
11/22/12Credibility information in returned web results
11/22/12Contextual relevance engine for activity feeds
11/22/12Query and matching for content recognition
11/22/12Detecting potentially abusive action in an online social network
11/22/12Managing compression dictionaries
11/22/12Auto connect in peer-to-peer network
11/22/12Cross-cloud management and troubleshooting
11/22/12Privacy-conscious personalization
11/22/12Recommendations for social network based on low-rank matrix recovery
11/22/12Technologies for detecting erroneous resumptions in a continuation based runtime
11/22/12Stream operator
11/22/12Surface caching
11/22/12Multi-threaded processes for opening and saving documents
11/22/12Usable security of online password management with sensor-based authentication
11/22/12Privacy-preserving metering with low overhead
11/22/12Policy bound key creation and re-wrap service
11/22/12Network event notification and delivery
11/22/12Intelligent user determinable power conservation in a portable electronic device
11/22/12Auto-connect in a peer-to-peer network
11/22/12Cross-cloud computing for capacity management and disaster recovery
11/22/12Platform for continuous mobile-cloud services
11/22/12Media presentation playback annotation
11/22/12Rss data-processing object
11/22/12Informed partitioning of data in a markup-based document
11/22/12Network search for writing assistance
11/22/12Presenting or sharing state in presence
11/22/12Auto-connect in a peer-to-peer network
11/22/12Navigation control availability
11/22/12Advanced prediction
11/22/12Document glancing and navigation
11/22/12Search and browse hybrid
11/22/12Dynamic code generation and memory management for component object model data constructs
11/22/12Inferred and shared source control integration across mulitiple program development tools
11/22/12Document serialization and comparison via object model
11/22/12Target-based access check independent of access request
11/22/12Granular assessment of device state
11/22/12Security indicator using timing to establish authenticity
11/22/12Detecting a compromised online user account
11/22/12Discovering malicious input files and performing automatic and distributed remediation
11/15/12Modeling and location inference based on ordered beacon sets
11/15/12Body scan
11/15/12Interface including views positioned in along multiple dimensions
11/15/12Power saving field sequential color
11/15/12Partitioning high resolution images into sub-images for display
11/15/12Imaging through a display screen
11/15/12Video chat within a webpage and video instant messaging
11/15/12Adaptive high dynamic range camera
11/15/12Liquid crystal display (lcd)
11/15/12Low inductance light source module
11/15/12Programmable and high performance switch for data center networks
11/15/12Syntax element prediction in error correction
11/15/12Predicting values in sequence
11/15/12Association and prediction in facial recognition
11/15/12Pose-robust recognition
11/15/12Synthesizing training samples for object recognition
11/15/12Removal of image artifacts from sensor dust
11/15/12Tv program database
11/15/12Proximity-based task notification
11/15/12Geographically constrained network services
11/15/12Creating and implementing language-dependent string pluralizations
11/15/12Sentence simplification for spoken language understanding
11/15/12Exploiting query click logs for domain detection in spoken language understanding
11/15/12Product lifecycle management techniques
11/15/12Delegated application authorization with inline purchase
11/15/12Training statistical dialog managers in spoken dialog systems with web data
11/15/12Collection of intranet activity data
11/15/12Sharing public search queries and interactions
11/15/12Checkpointing iterators during search
11/15/12Automatic social graph calculation
11/15/12Mining intent of queries from search log data
11/15/12Identifying visual contextual synonyms
11/15/12Interest tracking using shared search queries and interactions
11/15/12Identifying and recommending experts using shared queries and interactions
11/15/12Custom local search
11/15/12Write agent delayed write to data stores
11/15/12Personalized news feed based on peer and personal activity
11/15/12State control of remote hosts for management of distributed applications
11/15/12Account compromise detection
11/15/12Mass re-formation of groups in a peer-to-peer network
11/15/12Data synch notification using a notification gateway
11/15/12Direct memory access filter for virtualized operating systems
11/15/12Non-volatile memory cache performance improvement
11/15/12Emulating mixed-code programs using a virtual machine instance
11/15/12Virtualized application power budgeting
11/15/12Matrix computation framework
11/15/12Data classifier
11/15/12Extensibility features for electronic communications
11/15/12Sharing data within an instant messaging session
11/15/12Aggregation of computing device settings
11/15/12Query box polymorphism
11/15/12System and method that facilitates computer desktop use via scaling of displayed objects
11/15/12Interface including selectable items corresponding to single or multiple data items
11/15/12Web service proxy interface augmentation
11/15/12Managing a working set in an integrated development environment
11/15/12Thread-related actions based on historical thread behaviors
11/15/12Protected mode for mobile communication and other devices
11/15/12Presenting messages associated with locations
11/08/12Magnetic stripe-based transactions using mobile communication devices
11/08/12Attribute state classification
11/08/12Photo-realistic synthesis of three dimensional animation with facial features synchronized with speech
11/08/12Employing mesh files to animate transitions in client applications
11/08/12Routing edges with ordered bundles
11/08/12Immersive remote conferencing
11/08/12Visual communication using a robotic device
11/08/12Detecting an interest point in an image using edges
11/08/12Staged element classification
11/08/12Antenna structure for a near-field communication device
11/08/12Privacy preservation platform
11/08/12Setting up on-line game sessions out of a game context
11/08/12Photo-realistic synthesis of image sequences with lip movements synchronized with speech
11/08/12Multi-metric trending storyboard
11/08/12Using collective data for targeting of advertisements
11/08/12Secure card-based transactions using mobile phones or other mobile devices
11/08/12System and method for collaboration via team and role designation and control and management of annotations
11/08/12Build of website knowledge tables
11/08/12Dynamic digital montage
11/08/12Integrating applications within search results
11/08/12Prioritizing crawl lists using social networking rankings
11/08/12Location-aware application searching
11/08/12Presenting related searches on a toolbar
11/08/12Lightweight caching of transaction log for sequential access
11/08/12Extended above the lock-screen experience
11/08/12Data reporting framework across on-premise and hosted crm services
11/08/12Optimization of non-deterministic computational paths
11/08/12Changes to documents are automatically summarized in electronic messages
11/08/12Setting permissions for links forwarded in electronic messages
11/08/12System and method for optimizing network communication in response to network conditions
11/08/12Client calculation of links to network locations of files to upload
11/08/12Selectively disabling reliability mechanisms on a network connection
11/08/12Operating system virtual memory management for hardware transactional memory
11/08/12Working set profiler
11/08/12Dynamically redirecting boot to another operating system
11/08/12Protected authorization
11/08/12User input triggered device power management
11/08/12Storage device power management
11/08/12Monitoring the health of distributed systems
11/08/12Enhanced find and replace for electronic documents
11/08/12Content flow through containers
11/08/12Document based contextual communication
11/08/12Simultaneous email and attachment viewing
11/08/12Object model for a user interface
11/08/12Virtualized caching of user interface controls
11/08/12Multi-threaded conditional processing of user interactions
11/08/12Caching intermediate data for scroll view rendering
11/08/12Automated modification integration and conflict resolution for software development
11/08/12Heterogeneous language data typing without executable regeneration
11/08/12Validating the configuration of distributed systems
11/08/12Binding applications to device capabilities
11/08/12Virtual-machine-deployment-action analysis
11/08/12Distributed multi-phase batch job processing
11/08/12Processor state-based thread scheduling
11/08/12Interaction-based interface to a logical client
11/08/12Performing networking tasks based on destination networks
11/01/12Aggregating location with presence information
11/01/12Pressure sensitive controls
11/01/12Interpreting ambiguous inputs on a touch-screen
11/01/12Automated fitting of interior maps to general maps
11/01/12Aligning animation state update and frame composition
11/01/12Conference call monitoring with automatic reconnect
11/01/12Cryptographic key attack mitigation
11/01/12Inferring spatial object descriptions from spatial gestures
11/01/12Pre-processing of image data for enhanced compression
11/01/12Utilizing subtitles in multiple languages to facilitate second-language learning
11/01/12Talking teacher visualization for language learning
11/01/12Proximity-based mobile message delivery
11/01/12Implicit group formation around feed content for mobile devices
11/01/12Most valuable player gamer status and applications
11/01/12Control of separate computer game elements
11/01/12Manual and camera-based avatar control
11/01/12Manual and camera-based game control
11/01/12Bringing achievements to an offline world
11/01/12Autonomous and semi-autonomous modes for robotic capture of images and videos
11/01/12Identification of people using multiple types of input
11/01/12Changing consumer behavior with targeted offers
11/01/12Encouraging consumer behavior by unlocking digital content
11/01/12Marketing inventory based on spoilage
11/01/12Conducting an auction of services responsive to positional selection
11/01/12Presenting offers to consumers based on need
11/01/12Delivering location-based offers based on consumer characteristics
11/01/12Advertisement storage and retrieval
11/01/12Method and system for displayng an advertisement in an idle space upon the notification of the arrival of a received message
11/01/12Techniques to filter media content based on entity reputation
11/01/12Collaborative authoring
11/01/12Storing metadata inside file to reference shared version of file
11/01/12Semi-supervised truth discovery
11/01/12Multilingual search for transliterated content
11/01/12Relevant individual searching using managed property and ranking features
11/01/12Alternative market search result toggle
11/01/12Frequent pattern mining
11/01/12Presenting results with visual cues
11/01/12User analysis through user log feature extraction
11/01/12Stashing of locally persisted data to network accessible storage
11/01/12Applying actions to item sets within a constraint
11/01/12Effective circuits in packet-switched networks
11/01/12Making document changes by replying to electronic messages
11/01/12Presenting links to content as attachments in electronic messages
11/01/12Presenting link information near links within electronic messages
11/01/12Upload of attachment and insertion of link into electronic messages
11/01/12Uploading attachment to shared location and replacing with a link
11/01/12Most recently used list for attaching files to messages
11/01/12Automatic uploading of attachments to a shared location
11/01/12Initiating multiple connections from multiple communication devices
11/01/12Mapping meaningful hostnames
11/01/12Monitoring network performance to identify sources of network performance degradation
11/01/12Shaping virtual machine communication traffic
11/01/12Analyzing software performance issues
11/01/12Analyzing program execution
11/01/12Rule-based grid independent of content
11/01/12Multi-input gestures in hierarchical regions
11/01/12Common interface for multiple network services
11/01/12Workflows or processes with dynamic reference activity
11/01/12Automatically installing device drivers
11/01/12Virtual disk storage techniques
11/01/12Virtual processor allocation techniques
11/01/12Hardware assisted inter hypervisor partition data transfers
11/01/12Stream processing on heterogeneous hardware devices
11/01/12Load balancing
11/01/12On-the-fly replacement of physical hardware with emulation
11/01/12Reporting compromised email accounts
11/01/12Content distribution regulation by viewing user
10/25/12Energy efficient location detection
10/25/12Laser diode modes
10/25/12Depth camera-based relative gesture detection
10/25/12Parallel entropy encoding on gpu
10/25/12Drawing operations using multiple graphics interfaces
10/25/12Providing alternative content in a windowed environment
10/25/12Augmented reality extrapolation techniques
10/25/12Color channels and optical markers
10/25/12Magnification engine
10/25/12Augmented auditory perception for the visually impaired
10/25/12Capturing reflected light from a sampling surface
10/25/12Regions of interest for quality adjustments
10/25/12Automatic organ localization
10/25/12Image retrieval using spatial bag-of-features
10/25/12Facilitating use of a device based on short-range wireless technology
10/25/12Protective shroud for handheld device
10/25/12Contributing data to an on-line gamer database
10/25/12Monitoring data categorization and module-based health correlations
10/25/12Stochastic simulation of multi-language concurrent systems
10/25/12Speaker identification
10/25/12Predictively suggesting websites
10/25/12Generating domain-based training data for tail queries
10/25/12Content insertion elements to combine search results
10/25/12Predicting and using search engine switching behavior
10/25/12Mobile friendly internet searches
10/25/12Noise tolerant graphical ranking model
10/25/12Hybrid neighborhood graph search for scalable visual indexing
10/25/12Providng relevant information for a term in a user message
10/25/12Processing records in dynamic ranges
10/25/12Conservative garbage collecting and tagged integers for memory management
10/25/12Global traffic management using modified hostname
10/25/12Processing files from a mobile device
10/25/12Obtaining server address when domain name system proxy solution fails
10/25/12Adaptive semaphore
10/25/12Intelligent flash reprogramming
10/25/12Processor cache tracing
10/25/12Virtual machine trigger
10/25/12Fault-tolerant communications in routed networks
10/25/12Fault-tolerant communications in routed networks
10/25/12Software operability service
10/25/12Compact control menu for touch-enabled command execution
10/25/12Uninterruptible upgrade for a build service engine
10/25/12Rule based data driven validation
10/25/12Incremental upgrade of entity-relationship systems
10/25/12Consolidation of idle virtual machines
10/25/12Virtual disk storage techniques
10/25/12Human user verification
10/25/12Authentication ticket validation
10/25/12Origination verification using execution transparent marker context
10/18/12Particulate barrier for keyboard display
10/18/12Touch and stylus discrimination and rejection for contact sensitive computing devices
10/18/12Line space gathering for single scattering in large scenes
10/18/12Stereophonic teleconferencing using a microphone array
10/18/12City scene video sharing on digital maps
10/18/12Conduct and context relationships in mobile devices
10/18/12Mobile device localization using audio signals
10/18/12Spectral shaping for audio mixing
10/18/12Detecting key roles and their relationships from video
10/18/12Viewing display imagery through a keyboard keycap
10/18/12Identifying status based on heterogeneous sensors
10/18/12Data synchronization for devices supporting direction-based services
10/18/12Application interface for tracking player identity
10/18/12Integrated virtual environment
10/18/12Text entry by training touch models
10/18/12Suggestive mapping
10/18/12Peripheral device simulation
10/18/12Incremental compilation of object-to-relational mappings
10/18/12Eventually consistent storage and transactions
10/18/12Random walk on query pattern graph for query task classification
10/18/12Media tag recommendation technologies
10/18/12Query-based diagrammatic presentation of data
10/18/12Interactive semantic query suggestion for content search
10/18/12Ordering semantic query formulation suggestions
10/18/12Identifying query formulation suggestions for low-match queries
10/18/12Extension of schematized xml protocols
10/18/12Out of order assembling of data packets
10/18/12Using a proxy server for a mobile browser
10/18/12Web feed presence
10/18/12On demand location sharing
10/18/12Maximizing data transfer through multiple network devices
10/18/12Data taps on a server-managed data integration process
10/18/12Managing servicability of cloud computing resources
10/18/12Providing client access to devices over a network
10/18/12Lightweight random memory allocation
10/18/12Navigating performance data from different subsystems
10/18/12Browser intermediary
10/18/12Virtual address bar user interface control
10/18/12Multi-dimensional boundary effects
10/18/12Api descriptions
10/18/12Resource cost correlation across different subsystems
10/18/12Stepping out of an asynchronous method into its continuation in a debugger
10/18/12Allocating tasks to machines in computing clusters
10/18/12Transparent database connection reconnect
10/18/12Creating secure interactive connections with remote resources
10/18/12Registration of applications and complimentary features for interactive user interfaces
10/18/12Detecting script-based malware using emulation and heuristics
10/11/12Raster scanning for depth detection
10/11/12Video signature
10/11/12Receiving individual documents to serve
10/11/12Extendable connecting link
10/11/12Thermal management system
10/11/12One-time recovery credentials for encrypted data access
10/11/12Biometric recognition
10/11/12Image completion using scene geometry
10/11/12Image analysis tools
10/11/12Enforcing device settings for mobile devices
10/11/12Adaptive notifications
10/11/12Discovering an event using a personal preference list and presenting matching events to a user on a display
10/11/12Techniques for unified messaging
10/11/12Twisted track interferometer for producing magic states
10/11/12Text prediction
10/11/12Audio-interactive message exchange
10/11/12Mobile expense capture and reporting
10/11/12Non-destructive media presentation derivatives
10/11/12Transfer of learning for query classification
10/11/12Active learning of record matching packages
10/11/12Checkpoints for a file system
10/11/12User information needs based data selection
10/11/12Efficient query clustering using multi-partite graphs
10/11/12Lock-free indexing of documents
10/11/12Accessible commanding interface
10/11/12Determination of landmarks
10/11/12Cluster unique identifier
10/11/12Geo-data spam filter
10/11/12Document object model api for mime
10/11/12Cached data detection
10/11/12Management of background tasks
10/11/12Recovery of a document serving environment
10/11/12Learning signatures for application problems using trace data
10/11/12Cooperative rendering cache for mobile browser
10/11/12Handling external content in web applications
10/11/12Enterprise data as office content
10/11/12Potential communication recipient prediction
10/11/12Integrated contact card communication
10/11/12Scheduled message cleanup
10/11/12Customized launching of applications
10/11/12Push notifications for updating multiple dynamic icon panels
10/11/12Three-dimensional icons for organizing, invoking, and using applications
10/11/12Graphical user interface with customized navigation
10/11/12Stateful component authoring and execution
10/11/12Software build optimization
10/11/12Modeling and consuming business policy rules
10/11/12Resource consumption with enhanced requirement-capability definitions
10/11/12Asynchronous callback driven messaging request completion notification
10/11/12Messaging interruptible blocking wait with serialization
10/11/12Mapping global policy for resource management to machines
10/11/12Flexible authentication for online services with unreliable identity providers
10/11/12Secure and usable protection of a roamable credentials store
10/11/12Multi-browser authentication
10/11/12Network accountability among autonomous systems
10/11/12Automated malware signature generation
10/04/12Virtual touchpad using a depth camera
10/04/12Window minimization trigger
10/04/12Learning from high quality depth measurements
10/04/12Camera and sensor augmented reality techniques
10/04/12Audio stream management for television content
10/04/12Hub label based routing in shortest path determination
10/04/12Multi-threaded implementations of deblock filtering
10/04/12Conference signal anomaly detection
10/04/12Feature design for character recognition
10/04/12Robust large-scale visual codebook construction
10/04/12Classification algorithm optimization
10/04/12Event determination from photos
10/04/12Aggregated facial tracking in video
10/04/12Publishing location information
10/04/12Semi-autonomous mobile device driving with obstacle avoidance
10/04/12Frame mapping approach for cross-lingual voice transformation
10/04/12Translation of multilingual embedded phrases
10/04/12Augmented conversational understanding agent
10/04/12Conversational dialog learning and correction
10/04/12Personalization of queries, conversations, and searches
10/04/12Task driven user intents
10/04/12Location-based conversational understanding
10/04/12Talking paper authoring tools
10/04/12Table approach for determining quality scores
10/04/12Machine learning approach for determining quality scores
10/04/12User intent strength aggregating by decay factor
10/04/12Bid traffic estimation
10/04/12License upgrade management
10/04/12Software application license roaming
10/04/12Supervised re-ranking for visual search
10/04/12Deep convex network with joint use of nonlinear random projection, restricted boltzmann machine and batch-based parallelizable optimization
10/04/12Extract, transform and load using metadata
10/04/12Maintaining client data integrity in a distributed environment using asynchronous data submission
10/04/12Synchronizing records between databases
10/04/12Synchronization of data for a robotic device
10/04/12Distributed component runtime
10/04/12distributed file system
10/04/12Recovery of tenant data across tenant moves
10/04/12Providing lock-based access to nodes in a concurrent linked list
10/04/12Serving multiple search indexes
10/04/12Shortest path determination in databases
10/04/12Techniques to manage file conversions
10/04/12Enhanced query rewriting through click log analysis
10/04/12Enhanced query rewriting through statistical machine translation
10/04/12Techniques for conference system location awareness and provisioning
10/04/12Augmented conversational understanding architecture
10/04/12Locating and executing objects in a distributed network
10/04/12Flexible order of authoring for data integration solutions
10/04/12Conservative garbage collecting with concurrent marking and concurrent sweeping for memory management
10/04/12System and method for replicating offline scheduling transactions from a client to a server
10/04/12Caching infrastructure
10/04/12Distributing collected information to data consumers based on global user consent information
10/04/12Providing additional email content in an email client
10/04/12Random file request for software attestation
10/04/12Mobile device configuration based on status and location
10/04/12Providing a witness service
10/04/12Relative timestamp when real time clock is unavailable
10/04/12Network resource management with prediction
10/04/12Placement goal-based database instance consolidation
10/04/12Placement goal-based database instance dynamic consolidation
10/04/12Relative timestamp when real time clock is unavailable
10/04/12Branch-and-bound on distributed data-parallel execution engines
10/04/12Remote disabling of applications
10/04/12Three party attestation of untrusted software on a robot
10/04/12Fault detection and recovery as a service
10/04/12Proactive failure handling in database services
10/04/12Dynamic electronic correction code feedback to extend memory device lifetime
10/04/12Map service
10/04/12Techniques for electronic aggregation of information
10/04/12Techniques to create structured document templates using enhanced content controls
10/04/12Taskbar media player
10/04/12Media asset pivot navigation
10/04/12Current updates
10/04/12Contact sidebar tile
10/04/12Predictive tiling
10/04/12Dynamic distribution of client windows on multiple monitors
10/04/12Application-centric user interface techniques
10/04/12Combined activation for natural user interface systems
10/04/12Processing optimization load adjustment
10/04/12Application-centric user interface techniques
10/04/12Pos hardware abstraction
10/04/12Establishing privileges through claims of valuable assets
10/04/12Licensing software on a single-user basis
09/27/12Data center topology with low sts use
09/27/12Contextually-appropriate task reminders
09/27/12Text input using key and gesture information
09/27/12Interacting with physical and digital objects via a multi-touch device
09/27/12Generic interface
09/27/12Accelerometer-based lighting and effects for mobile devices
09/27/12High dynamic range texture compression
09/27/12Three-dimensional (3d) imaging based on motionparallax
09/27/12Multi-level representation of reordered transform coefficients
09/27/12Automatic rejoining of conferences
09/27/12Transfer of data-intensive content between portable devices
09/27/12Flexible mobile display
09/27/12User to user game referrals
09/27/12Exposing off-host audio processing capabilities
09/27/12Assistance information controlling
09/27/12Adaptive ambient sound suppression and speech tracking
09/27/12Synchronizing file partitions utilizing a server storage model
09/27/12Online spelling correction/phrase completion system
09/27/12Semantic table of contents for search results
09/27/12Co-range partition for query plan optimization and data-parallel programming model
09/27/12Querying compressed time-series signals
09/27/12Consolidating event data from different sources
09/27/12Reconstruction of garbage collection information
09/27/12Systems, methods, and user interfaces for storing, searching, navigating, and retrieving electronic information
09/27/12Sharing channels
09/27/12Notifying participants that a conference is starting
09/27/12Selectively enabled quality of service policy
09/27/12Filtering and promoting application store applications
09/27/12Unified web service uri builder and verification
09/27/12User-input scheduling of synchronization operation on a mobile device based on user activity
09/27/12Cache eviction using memory entry value
09/27/12Techniques to manage a collection of objects in heterogeneous environments
09/27/12Combining memory pages having identical content
09/27/12Bare metal machine recovery
09/27/12Central and implicit certificate management
09/27/12Protocols for reporting power status over multiple buses
09/27/12High rate locally decodable codes
09/27/12System for editing an avatar
09/27/12Distributed component model
09/27/12Automated generation of client/driver communication interfaces
09/27/12Debugger-set identifying breakpoints after coroutine yield points
09/27/12Device flags
09/27/12Techniques to optimize upgrade tasks
09/27/12Hierarchically disassembling messages
09/27/12Programming, verifying, visualizing, and deploying browser extensions with fine-grained security policies
09/27/12Email-based automated recovery action in a hosted environment
09/27/12Lightweight authentication for on-premise rich clients
09/27/12Using social graphs to combat malicious attacks
09/27/12Visual styles for trust categories of messages
09/27/12Resource sharing and isolation in role based access
09/27/12Information privacy system and method
09/20/12Device location detection
09/20/12Controlling application windows in an operating system
09/20/12Brush, carbon-copy, and fill gestures
09/20/12Multi-protocol wireless audio client device
09/20/12Performing structure from motion for unordered images of a scene with multiple object instances
09/20/12Grouping variables for fast image labeling
09/20/12Image descriptor quantization
09/20/12Systems and methods for pairing bluetooth devices
09/20/12Wireless identifiers for proximity applications
09/20/12Predicting joint positions
09/20/12Natural human to robot remote control
09/20/12Virtual machine power usage estimations
09/20/12Modeling a plurality of contests at a crowdsourcing node
09/20/12Virtual shopping assistance
09/20/12Virtual closet for storing and accessing virtual representations of items
09/20/12Interactive virtual shopping experience
09/20/12Navigation to dynamic endpoint
09/20/12Classification of stream-based data using machine learning
09/20/12Seamless upgrades in a distributed database system
09/20/12Tracking redo completion at a page level
09/20/12Providing suggestions of related videos
09/20/12Ranking contextual signals for search personalization
09/20/12Extent virtualization
09/20/12Unsupervised message clustering
09/20/12Data collections on a mobile device
09/20/12Machine assisted query formulation
09/20/12Keyword extraction from uniform resource locators (urls)
09/20/12Online service for program lookup
09/20/12Discovery and client routing to database nodes
09/20/12Distributed storage for collaboration servers
09/20/12Read-only operations processing in a paxos replication system
09/20/12Roaming groups in a peer-to-peer network
09/20/12Messaging for notification-based clients
09/20/12Device identification using device functions
09/20/12Touch gesture indicating a scroll on a touch-sensitive display in a single direction
09/20/12Self-revelation aids for interfaces
09/20/12Imaging extensibility for device management platforms
09/20/12Internet privacy user interface
09/20/12Optional retargeting of library references
09/20/12Persisting application state
09/20/12Communication abuse prevention
09/20/12Provisional administrator privileges
09/13/12Push personalization of interface controls
09/13/12Interactive visualization for exploring multi-modal, multi-relational, and multivariate graph data
09/13/12Set visualizations
09/13/12Integration of sketch-based interaction and computer data analysis
09/13/12Theme-based augmentation of photorepresentative view
09/13/12Transitioning presence indication through animation
09/13/12Illuminator with refractive optical element
09/13/12Method and system to reduce stray light reflection error in time-of-flight sensor arrays
09/13/12Augmented view of advertisements via head-mounted display
09/13/12Mean absolute difference prediction for video encoding rate control
09/13/12Content access
09/13/12Controlling audio of a device
09/13/12Slot antenna
09/13/12Redeeming offers of digital content items
09/13/12Optimizing an index of web documents
09/13/12Managing data with backup server indexing
09/13/12Efficient multi-version locking for main memory databases
09/13/12Context-aware query alteration
09/13/12Indexing and searching features including using reusable index fields
09/13/12Aggregating document annotations
09/13/12Generating visual summaries of research documents
09/13/12Generation of context-informative co-citation graphs
09/13/12Exposing and using metadata and meta-metadata
09/13/12Creating virtual worlds from existing data structures
09/13/12Enterprise search over private and public data
09/13/12Requesting, responding and parsing
09/13/12Proxy communications on a social network
09/13/12Peer-to-peer group with renegotiation of group owner
09/13/12Transport system for instant messaging
09/13/12Media device presence management
09/13/12Managing shared memory used by compute nodes
09/13/12Backup and restore strategies for data deduplication
09/13/12Virtual disk storage techniques
09/13/12Pagefile reservations
09/13/12Managing software changes
09/13/12Server-aided multi-party protocols
09/13/12Fault tolerance in a parallel database system
09/13/12Time-based viewing of electronic documents
09/13/12Validation, rejection, and modification of automatically generated document annotations
09/13/12Graphical user interface that supports document annotation
09/13/12Task-based address bar and tabs scaling
09/13/12Providing item specific functionality via service-assisted applications
09/13/12Profile driven multicore background compilation
09/13/12Application compatibility leveraging successful resolution of issues
09/13/12Efficient data structures for multi-dimensional security
09/13/12Grouping personal accounts to tailor a web service
09/06/12Immersive display experience
09/06/12Multi-pass touch contact tracking
09/06/12Controlled interaction with heterogeneous data
09/06/12Dynamic perspective video window
09/06/12Credit feedback system for parallel data flow control
09/06/12Harmonic quantizer scale
09/06/12Noise adaptive beamforming for microphone arrays
09/06/12Noise suppression in low light images
09/06/12Game dossier for an advisory services network
09/06/12Cascading points system
09/06/12Motion-based voice activity detection
09/06/12Metric driven behavior and presentation of goals
09/06/12Indexing for limited search server availability
09/06/12Parallel database backup and restore
09/06/12Managing database recovery time
09/06/12Efficient size optimization of visual information or auditory information
09/06/12Fulfilling queries using specified and unspecified attributes
09/06/12Facet determination using query logs
09/06/12Query expansion for web search
09/06/12Keyword generation for media content
09/06/12Media collections service
09/06/12Expressing and executing semantic queries within a relational database
09/06/12Extensible surface for consuming information extraction services
09/06/12Scalable queues on a scalable structured storage system
09/06/12Publishable metadata for content management and component testing
09/06/12Protecting operating system configuration values
09/06/12Duplicate-aware disk arrays
09/06/12Static data race detection and anaylsis
09/06/12Controlling electronic devices in a multimedia system through a natural user interface
09/06/12Content customization with security for client preferences
09/06/12Graphical programming object population user interface autogeneration
09/06/12Incremental generation of managed assemblies
09/06/12Cross platform service notification
09/06/12Lightweight on-demand virtual machines
09/06/12Driver shimming
09/06/12Dynamic application migration
09/06/12Application compatibility with library operating systems
09/06/12Sharing user id between operating system and application
08/30/12Adjusting 3d effects for wearable viewing devices
08/30/12Data visualization design and view systems and methods
08/30/12Satellite microphone array for video conferencing
08/30/12User interface presentation and interactions
08/30/12Global alignment for high-dynamic range image generation
08/30/12Multi-spectral imaging
08/30/12Associating a telephone call with a dialog based on a computer protocol such as sip
08/30/12Image labeling with global parameters
08/30/12Automatic localized adjustment of image shadows and highlights
08/30/12Updating contact information for mobile traffic
08/30/12Seeding in a skill scoring framework
08/30/12Measurement-only topological quantum computation
08/30/12Leveraging speech recognizer feedback for voice activity detection
08/30/12Multi-variable product rank
08/30/12Declarative update to a live system
08/30/12Augmenting search results
08/30/12Social weight of social media content
08/30/12Data object linking and browsing tool
08/30/12Linking framework for information technology management
08/30/12Cached and server views with automatic caching and smooth scrolling
08/30/12High availability conferencing
08/30/12Extensions for usb driver interface functions
08/30/12Multi-dimensional array manipulation
08/30/12Multi-phase resume from hibernate
08/30/12Operating system experience states
08/30/12Multi-phase resume from hibernate
08/30/12Managing memory faults
08/30/12Accessing an out-space user interface for a document editor program
08/30/12Scrollable list navigation using persistent headings
08/30/12Distributed application definition
08/30/12Modeling software behavior using learned predicates
08/30/12Shared resource access verification
08/30/12Tiered object-related trust decisions
08/30/12Permissions based on behavioral patterns
08/30/12Validating the origin of web content
08/23/12Modal touch input
08/23/12Optical touch detection
08/23/12User interface with parallax animation
08/23/12Providing an interactive experience using a 3d depth camera and a 3d projector
08/23/12Life streaming
08/23/12Coding of motion vector information
08/23/12Local picture identifier and computation of co-located information
08/23/12Estimating document similarity using bit-strings
08/23/12Provisioning of wireless connectivity for devices using nfc
08/23/12Automatic answering of a mobile phone
08/23/12Motion recognition
08/23/12Shuffling playback content based on multiple criteria
08/23/12Semi-autonomous robot that supports multiple modes of navigation
08/23/12Video contextual advertisements using speech recognition
08/23/12Dynamic distributed query execution over heterogeneous sources
08/23/12Propagating signals across a web graph
08/23/12Data-programming environment
08/23/12Managing unwanted communications using template generation and fingerprint comparison features
08/23/12Automatic grouping of electronic mail
08/23/12Interfacing distinct services for providing web based document manipulation access
08/23/12Multi-tenant services gateway
08/23/12Hang recovery in software applications
08/23/12Dynamic lazy type system
08/23/12Private views of data and local calculations during real time collaboration
08/23/12Application store topics
08/23/12State management of operating system and applications
08/23/12Interface for displaying content supporting hardware acceleration
08/23/12Providing data security through declarative modeling of queries
08/23/12Security restructuring for web media
08/23/12Detection of code-based malware
08/16/12Multi-touch input device with orientation sensing
08/16/12Push actuation of interface controls
08/16/12Universal stylus device
08/16/12Angular contact geometry
08/16/12Prediction-based touch contact tracking
08/16/12Hinge electrical interconnection guide
08/16/12Double hinge torsion bar
08/16/12Efficient collimation of light with optical wedge
08/16/12Signaling to application lack of requested bandwidth
08/16/12Authorizing access between communication networks
08/16/12Detecting and localizing multiple objects in images using probabilistic inference
08/16/12Image registration
08/16/12Updating a low frame rate image using a high frame rate image stream
08/16/12Interactive paper system
08/16/12Flat-panel optical projection apparatus with reduced distortion
08/16/12Flat-panel optical projection apparatus
08/16/12Automatic check-out upon location departure
08/16/12Background audio on mobile devices
08/16/12Change invariant scene recognition by an agent
08/16/12Social marketing incentives and rewards
08/16/12Check-ins to commercial venues
08/16/12Keyword expression language for online search and advertising
08/16/12Interaction with networked screen content via motion sensing device in retail setting
08/16/12Business rules
08/16/12Incremental virtual machine backup supporting migration
08/16/12Identifying task groups for organizing search results
08/16/12Providing applications with personalized and contextually relevant content
08/16/12Bookmarking segments of content
08/16/12Aggregated view of content with presentation according to content type
08/16/12Multilevel multipath widely distributed computational node scenarios
08/16/12Integrating enterprise identity authorization in conferences
08/16/12Social influencers discovery
08/16/12System and method for improved synchronization between a server and a client
08/16/12Background transfer service for applications on mobile devices
08/16/12Network device matching
08/16/12Dynamic media asset delivery
08/16/12Efficiently isolating malicious data requests
08/16/12Server-assisted and peer-to-peer synchronization
08/16/12Remote core operations in a multi-core computer
08/16/12One-time password certificate renewal
08/16/12Cognitive agent
08/16/12Resizing an editable area in a web page
08/16/12User interfaces for personalized recommendations
08/16/12Data-driven schema for describing and executing management tasks in a graphical user interface
08/16/12Compositional dashboards with processor components
08/16/12Directly assigning desktop backgrounds
08/16/12Task switching on mobile devices
08/16/12Automatically creating business applications from description of business processes
08/16/12Mechanism for compatibility and preserving framework refactoring
08/16/12Virtual switch interceptor
08/16/12Dormant background applications on mobile devices
08/16/12Constrained execution of background application code on mobile devices
08/16/12Asynchronous programming execution
08/16/12Presentation of customized digital media programming
08/16/12Extensible and programmable multi-tenant service architecture
08/09/12Method and system for unified audio control on a personal computer
08/09/12Touch-pressure sensing in a display panel
08/09/12Techniques and system for active lighting control in video conferencing
08/09/12Three-dimensional display with motion parallax
08/09/12Directional backlighting for display panels
08/09/12Stack signaling to application with lack of requested bandwidth
08/09/12Telephone line sensor and redialer
08/09/12Environmental modifications to mitigate environmental factors
08/09/12Annotation detection and anchoring on ink notes
08/09/12Techniques for announcing conference attendance changes in multiple languages
08/09/12Selection of domain-adapted translation subcorpora
08/09/12Language segmentation of multilingual texts
08/09/12Learning similarity function for rare queries
08/09/12Online catalog with integrated content
08/09/12Relevant online search for long queries
08/09/12Detecting mobile operator networks
08/09/12Media content location awareness and decision making
08/09/12Techniques to automatically syndicate content over a network
08/09/12Distributed routing table interface
08/09/12Proxy-based cache content distribution and affinity
08/09/12Selecting computing nodes in cloud service using replication topologies
08/09/12Xml-based web feed for web access of remote resources
08/09/12Name-based customization of executables from web
08/09/12Multi-master media metadata synchronization
08/09/12Self regulation of the subject of attestation
08/09/12Data race detection
08/09/12Document synchronization over stateless protocols
08/09/12Providing web-based content to local device
08/09/12Higher-level e-mail address creation at signup
08/09/12Configuration of user interfaces
08/09/12Service platform for in-context results
08/09/12License reconciliation for online services
08/02/12Presenting selectors within three-dimensional graphical environments
08/02/12Three-dimensional environment reconstruction
08/02/12Using a three-dimensional environment model in gameplay
08/02/12Functionality for indicating direction of attention
08/02/12Mobile camera localization using depth maps
08/02/12Living room movie creation
08/02/12Reducing interference between multiple infra-red depth cameras
08/02/12Double hinge axial cams
08/02/12Aggregating endpoint capabilities for a user
08/02/12Moving object segmentation using depth images
08/02/12Real-time camera tracking using depth maps
08/02/12Action-aware intent-based behavior targeting
08/02/12Quantified belief propagation
08/02/12Estimating relatedness in social network
08/02/12Gesture-based search
08/02/12Automatic generation of an executive summary for a medical event in an electronic medical record
08/02/12Information retrieval using subject-aware document ranker
08/02/12Search behavior based communication forums
08/02/12Parallel serialization of request processing
08/02/12Configuration based approach to unify web services
08/02/12Cloud based master data management
08/02/12Functionality for sharing items using recipient-specific access codes
08/02/12Securely publishing data to network service
08/02/12Web service support for bulk item export/import
08/02/12Cloud based master data management architecture
08/02/12Web based client/server notification engine
08/02/12Adaptive network communication techniques
08/02/12Embedded system development platform
08/02/12Efficiently synchronizing with separated disk caches
08/02/12Secure messaging with read-undeniability and deletion-verifiability
08/02/12Re-establishing push notification channels via user identifiers
08/02/12Automated table transformations from examples
08/02/12Unifying discoverability of a website's services
08/02/12Transferring data using a physical gesture
08/02/12Engineering project event-driven social networked collaboration
08/02/12Support for heterogeneous database artifacts in a single project
08/02/12Resumable private browsing session
08/02/12Multi-device session pairing using a visual tag
07/26/12Coherent quantum information transfer between conventional qubits
07/26/12Touchscreen testing
07/26/12Wearable electromyography-based human-computer interface
07/26/12Contact geometry tests
07/26/12Probabilistic latency modeling
07/26/12System architecture design for time-of-flight system having reduced differential pixel size, and time-of-flight systems so designed
07/26/12Video coding redundancy reduction
07/26/12Mitigating use of machine solvable hips
07/26/12Associating captured image data with a spreadsheet
07/26/12Latency measurement
07/26/12Position-dependent phonetic models for reliable pronunciation identification
07/26/12Automatic application of targeted advertising in datasets
07/26/12Synchronizing database projects with partner projects
07/26/12Detecting search mode in a browser navigation bar
07/26/12Data items manager
07/26/12Programmatically enabling user access to crm secured field instances based on secured field instance settings
07/26/12Site-aware distributed file system access from outside enterprise network
07/26/12Decommissioning factored code
07/26/12Modifying the behavior of a multimedia transport system in response to detected capabilities of a client system
07/26/12Representation of people in a spreadsheet
07/26/12Formatting data by example
07/26/12Hybrid client/network service application integration
07/26/12Transforming user interface actions to script commands
07/26/12Direct navigation through browser address bar
07/26/12Graph partitioning with natural cuts
07/26/12Code advisor for web compatibility and interoperability
07/26/12Factoring middleware for anti-piracy
07/26/12Automatically generated tv favorites list
07/26/12Reputation checking of executable programs
07/19/12Adaptive thermal management for devices
07/19/12Cognitive multi-user ofdma
07/19/12Clustering crowd-sourced data for determining beacon positions
07/19/12Interactive concept learning in image search
07/19/12Combining online and offline recognizers in a handwriting recognition system
07/19/12Delayed image decoding
07/19/12Filtering and clustering crowd-sourced data for determining beacon positions
07/19/12Multi-state model for robot and user interaction
07/19/12Confidence measure generation for speech related searching
07/19/12Extracting text for conversion to audio
07/19/12Scalable database workload replay with mode selections
07/19/12Creating business value by embedding domain tuned search on web-sites
07/19/12Clustering crowd-sourced data to identify event beacons
07/19/12Providing query completions based on data tuples
07/19/12Limited subscription throttling
07/19/12Inter-cache communication using http resource
07/19/12Analyzing resource consumption of software executing during a usage scenario
07/19/12User interface interaction behavior based on insertion point
07/19/12User interface with vertical text elements for an east-asian defined layout
07/19/12Media foundation media processor
07/19/12Image recognition of content
07/19/12Directory driven mailbox migrations
07/19/12Incorporating network connection security levels into firewall rules
07/19/12Secure computing in multi-tenant data centers
07/12/12Multiple video stream capability negotiation
07/12/12High definition media content processing
07/12/12Motion detection using depth images
07/12/12Image retrieval using discriminative visual features
07/12/12Wireless communication techniques
07/12/12Wireless communication techniques
07/12/12Automatic story summarization from clustered messages
07/12/12Machine translation split between front end and back end processors
07/12/12Transaction support for distributed data
07/12/12Resolving conflicts in content management systems
07/12/12Search index format optimizations
07/12/12Hardware accelerated shortest path computation
07/12/12Query reformulation in association with a search box
07/12/12Scalable random number generation
07/12/12Providing deep links in association with toolbars
07/12/12Chromeless user interface
07/12/12User interface for displaying a gallery of formatting options applicable to a selected object
07/12/12Natural input for spreadsheet actions
07/12/12Centralized planning for real-time self tuning of planned actions in a distributed environment
07/12/12Image recognition of content
07/12/12Monitoring presentation timestamps
07/12/12Group-associated content recommendation
07/05/12Deicing louvers for datacenter applications
07/05/12Virtual controller for touch display
07/05/12Staged access points
07/05/12Touch event anticipation in a computing device
07/05/12System for reducing effects of undesired signals in an infrared imaging system
07/05/12Navigating images using image based geometric alignment and object based controls
07/05/12Navigating images using image based geometric alignment and object based controls
07/05/12Structural chassis for a display device
07/05/12Communications using different modalities
07/05/12Communicating information pertaining to cancelling of forked call requests
07/05/12Tone mapping of very large aerial image mosaic
07/05/12Automatic wireless device message management responsive to end user preferences
07/05/12Clear rectangle processing
07/05/12Subspace speech adaptation
07/05/12Behavior based loyalty system to deliver personalized benefits
07/05/12Integrating report actions for a series of reports within a single user interface
07/05/12Hint-enabled search advertisements
07/05/12Tile space user interface for mobile devices
07/05/12Unified tracking and reporting across multiple publishers
07/05/12Single, mixed-view presentation of related products
07/05/12Medical data prediction method using genetic algorithms
07/05/12Progressive spatial searching using augmented structures
07/05/12Priority hash index
07/05/12Allocation of tenants to database services
07/05/12Dynamic facet ordering for faceted search
07/05/12Variational mode seeking
07/05/12Patient identification
07/05/12Composite nested streams
07/05/12Creation and management of resilient wireless groups
07/05/12Content channels for electronic messaging
07/05/12Cloud-based web page applications for extending functionality
07/05/12Format negotiation for media remoting scenarios
07/05/12Multi-user display proxy server
07/05/12Communication across domains
07/05/12Managing cache data and metadata
07/05/12Communication across domains
07/05/12Key management using trusted platform modules
07/05/12Storage codes for data recovery
07/05/12Web page application controls
07/05/12Content-based snap point
07/05/12Presentation of search results
07/05/12Displaying a series of reports within a single user interface
07/05/12Platform for distributed applications
07/05/12Digital identity management
07/05/12Distributed single sign on technologies including privacy protection and proactive updating
07/05/12Trusted communications with child processes
07/05/12Connected account provider for multiple personal computers
07/05/12User identification with biokinematic input
07/05/12Client-side captcha ceremony for user verification
06/28/12Sensing user input using the body as an antenna
06/28/12Skeletal joint recognition and tracking system
06/28/12Touch screen control
06/28/12Physics simulation-based interaction for surface computing
06/28/12Encoded micro pattern
06/28/12Display region refresh
06/28/12Image search color sketch filtering
06/28/12Techniques for dynamic layout of presentation tiles on a grid
06/28/12Transparent display active panels
06/28/12Transparent display active backlight
06/28/12Mixed sequential color display
06/28/12Mapping sound spatialization fields to panoramic video
06/28/12Double hinge radial cams
06/28/12Transparent display backlight assembly
06/28/12Image and video decoding implementations
06/28/12Synchronizing sensor data across devices
06/28/12Filter bank optimization for acoustic echo cancellation
06/28/12Systems and methods for detecting a tilt angle from a depth image
06/28/12Matching text to images
06/28/12Automated identification of image outliers
06/28/12Classification of posture states
06/28/12Effects of gravity on gestures
06/28/12Interacting with a computer based application
06/28/12Visual based identitiy tracking
06/28/12Scalable real-time motion recognition
06/28/12Interactive content creation
06/28/12Robotic drive system modularity
06/28/12Navigation instructions using low-bandwidth signaling
06/28/12Dual-band speech encoding
06/28/12Word-dependent language model
06/28/12Automated clustering for patient disposition
06/28/12Not-started customer relationship management (crm) dialogs
06/28/12Framework that facilitates third party integration of applications into a search engine
06/28/12Hierarchical classification system
06/28/12Smart attribute classification (sac) for online reviews
06/28/12Forward chaining as an orchestration mechanism for analytics
06/28/12Using index partitioning and reconciliation for data deduplication
06/28/12Aspected interfaces and methods for synchronized containers and other data structures
06/28/12Discovery of remotely executed applications
06/28/12Supplementing search results with keywords derived therefrom
06/28/12Asynchronous transfer of state information between continuous query plans
06/28/12Query authoring by modifying a view of the results of the query
06/28/12Generating maps of private spaces using mobile computing device sensors
06/28/12Keywords extraction and enrichment via categorization systems
06/28/12Easily queriable software repositories
06/28/12Co-map communication operator
06/28/12Filtering queried data on data stores
06/28/12Adaptive index for data deduplication
06/28/12Spam tracking analysis reporting system
06/28/12Automated image data processing and visualization
06/28/12Efficient label acquisition for query rewriting
06/28/12Database transfers using constraint free data
06/28/12Techniques for generating custom objects representing content files
06/28/12Unified access to resources
06/28/12Providing state service for online application users
06/28/12Systems and methods for communicating between components in a hybrid environment
06/28/12Supporting intelligent user interface interactions
06/28/12Modifying service provider context information to facilitate locating interceptor context information
06/28/12Modifying service provider context information to facilitate locating interceptor context information
06/28/12Automated file distribution
06/28/12Reading and writing during cluster growth phase
06/28/12Satisfying application dependencies
06/28/12Distributed network coordinate system
06/28/12Standardized mechanism of remote management of embedded radio modules
06/28/12Flexible policy based network decisionmaking
06/28/12Licensing and metering of virtualized applications
06/28/12Data copy management for faster reads
06/28/12Agile communication operator
06/28/12Extensible data parallel semantics
06/28/12Auxiliary functionality for pixel data
06/28/12Predicting, diagnosing, and recovering from application failures based on resource access patterns
06/28/12Creating cross-tabular reports
06/28/12System and method for generating social summaries
06/28/12Content processing with extensibility
06/28/12Techniques for electronic aggregation of information
06/28/12Techniques for electronic aggregation of information
06/28/12Private pinning including task bar pinning and jump list task and item launching
06/28/12Surfacing content including content accessed from jump list tasks and items
06/28/12Converting desktop applications to web applications
06/28/12Presenting list previews among search results
06/28/12Techniques to customize a user interface for different displays
06/28/12Companion window experience
06/28/12Creating an immersive environment
06/28/12Presenting an application change through a tile
06/28/12Application reporting in an application-selectable user interface
06/28/12Xml application framework
06/28/12Selectively enabling runtime editing of an application
06/28/12Contextually intelligent code editing
06/28/12Virtualizing embedded devices
06/28/12Parameterized interface identifier techniques
06/28/12Dynamic instrumentation of software code
06/28/12Identifying factorable code
06/28/12Emulating pointers
06/28/12Compiler validation via program verification
06/28/12On-demand or incremental remote data copy
06/28/12Predictive software streaming
06/28/12Invasion analysis to identify open types
06/28/12System and method for proactive task scheduling
06/28/12Model for hosting and invoking applications on virtual machines in a distributed computing environment
06/28/12Resource deployment based on conditions
06/28/12Storing and resuming application runtime state
06/28/12Power management via coordination and selective operation of timer-related tasks
06/28/12Application execution in a restricted application execution environment
06/28/12Electronic programming guide (epg) affinity clusters
06/28/12Scoped resource authorization policies
06/28/12Policy-based access to virtualized applications
06/28/12Trusted email sender indicators
06/28/12Registration and network access control
06/28/12Automatic context-sensitive sanitization
06/28/12Safe file transmission and reputation lookup
06/28/12Protected and virtual interfaces for com aggregation
06/28/12Email trust service
06/21/12Self cleaning fan assembly
06/21/12Pen digitizer
06/21/12Supplementing biometric identification with device identification
06/21/12Computing device having plural display parts for presenting plural spaces
06/21/12Creation, editing and navigation of diagrams
06/21/12Detecting gestures involving intentional movement of a computing device
06/21/12Using movement of a computing device to enhance interpretation of input events produced when interacting with the computing device
06/21/12Cooperative use of plural input mechanisms to convey gestures
06/21/12Supplementing a touch input mechanism with fingerprint detection
06/21/12Display-screen adaptation for interactive devices
06/21/12Parallel processing machine learning decision tree training
06/21/12Techniques for enabling remote management of servers configured with graphics processors
06/21/12Discovering and configuring representations of data via an insight taxonomy
06/21/12Incremental creation of a graphical object to visually represent a data set
06/21/12Assessment results viewer
06/21/12Vertex-baked three-dimensional animation augmentation
06/21/12Automatic adjustment of computer interface colors using image processing
06/21/12Displaying user interface elements having transparent effects
06/21/12Human interactive proofs leveraging virtual techniques
06/21/12Smart camera for virtual conferences
06/21/12Virtual circular conferencing experience using unified communication technology
06/21/12Aggregation of video receiving capabilities
06/21/12System for capturing panoramic stereoscopic video
06/21/12Chassis assembly for 360-degree stereoscopic video capture
06/21/12Stereo 3d video support in computing devices
06/21/12Capturing gated and ungated light in the same frame on the same photosurface
06/21/12Plural detector time-of-flight depth mapping
06/21/12Left/right image generation for 360-degree stereoscopic video
06/21/12Plural anode time-of-flight sensor
06/21/12Techniques for atmospheric and solar correction of aerial images
06/21/12Modeling an object from image data
06/21/12Kernel awareness of physical environment
06/21/12Deadline-aware network protocol
06/21/12Synchronizing state among load balancer components
06/21/12Multi-path communications in a data center environment
06/21/12Auto-regressive edge-directed interpolation with backward projection constraint
06/21/12Attribute based encryption using lattices
06/21/12Encrypted content streaming
06/21/12Non-interactive verifiable, delegated computation
06/21/12Secure protocol for peer-to-peer network
06/21/12Supporting dns security in a multi-master environment
06/21/12Virtual audio environment for multidimensional conferencing
06/21/12Localized weather prediction through utilization of cameras
06/21/12First person shooter control with virtual skeleton
06/21/12Image search including facial image
06/21/12Establishing clusters of user preferences for image enhancement
06/21/12Image quality assessment
06/21/12Statistical approach to large-scale image annotation
06/21/12Utilizing images as online identifiers to link behaviors together
06/21/12Spatial image index and associated updating functionality
06/21/12Seamless left/right views for 360-degree stereoscopic video
06/21/12Models for guiding physical work
06/21/12Operating system supporting cost aware applications
06/21/12Driving simulator control with virtual skeleton
06/21/12Intelligent gameplay photo capture
06/21/12Skeletal control of three-dimensional virtual world
06/21/12Banning verbal communication to and from a selected party in a game playing system
06/21/12Companion object customization
06/21/12Pose tracking pipeline
06/21/12Persistent handles for interface guides
06/21/12Home heating server
06/21/12Mobile search based on predicted location
06/21/12Navigation user interface
06/21/12Application compatibility shims for minimal client computers
06/21/12Functionality for providing clinical decision support
06/21/12Pricing batch computing jobs at data centers
06/21/12Social marketing manager
06/21/12Social incentives platform
06/21/12Offline counterfactual analysis
06/21/12Prioritizing advertisements based on user engagement
06/21/12Provision of contextual advertising
06/21/12Randomized auctions with priority option
06/21/12Budget control configuration
06/21/12Human-assisted training of automated classifiers
06/21/12Structured cross-lingual relevance feedback for enhancing search results
06/21/12Interactive recommendations
06/21/12Visualizing machine learning accuracy
06/21/12Detection and categorization of malicious urls
06/21/12Detecting and responding to unintentional contact with a computing device
06/21/12Information propagation probability for a social network
06/21/12Efficient probabilistic reasoning over semantic data
06/21/12Data mining in a business intelligence document
06/21/12Data feed having customizable analytic and visual behavior
06/21/12Configuration of asynchronous message processing in dataflow networks
06/21/12Non-relational function-based data publication for relational data
06/21/12Context-specific rollback
06/21/12Backup and restore of data from any cluster node
06/21/12System reset and system restore
06/21/12Structuring unstructured web data using crowdsourcing
06/21/12Data retention component and framework
06/21/12Extensible pipeline for data deduplication
06/21/12Storing and publishing contents of a content store
06/21/12Partial recall of deduplicated files
06/21/12Enabling random access within objects in zip archives
06/21/12Volumes and file system in cluster shared volumes
06/21/12Modeling intent and ranking search results using activity-based context
06/21/12Image tag refinement
06/21/12Button-activated contextual search
06/21/12Searching files
06/21/12Efficient indexing of error tolerant set containment
06/21/12Face recognition using social data
06/21/12Classifying results of search queries
06/21/12Search lexicon expansion
06/21/12Local search using feature backoff
06/21/12Multi-tiered information retrieval training
06/21/12Social network powered search enhancements
06/21/12Tag association with image regions
06/21/12Deriving document similarity indices
06/21/12Business application publication
06/21/12Inference indexing
06/21/12Rendering selected and unselected lists of an item set
06/21/12Automated generation of analytic and visual behavior
06/21/12Granular metadata for digital content
06/21/12Inherited entity storage model
06/21/12Bulk operations
06/21/12Mapping from objects to data model
06/21/12User interface for interactive query reformulation
06/21/12Decomposing and merging regular expressions
06/21/12Temporal binding for semantic queries
06/21/12Large-scale event evaluation using realtime processors
06/21/12Feature vector construction
06/21/12Aggregated profile and online concierge
06/21/12Techniques to discover object interfaces
06/21/12Automatically matching data sets with storage components
06/21/12Policy-based application delivery
06/21/12Usb device redirection for remote systems
06/21/12Exposing server functions to brower code
06/21/12Wireless network interface with infrastructure and direct modes
06/21/12Non-greedy consumption by execution blocks in dataflow networks
06/21/12Proxy communications of non-person entities
06/21/12Resource optimization for online services
06/21/12Hash tag management in a microblogging infrastructure
06/21/12Contextual conversation framework
06/21/12Techniques for universal representation of digital content
06/21/12Virtual machine provisioning engine
06/21/12Monitoring a model-based distributed application
06/21/12Augmenting personal availability using a mobile device
06/21/12Determining whether a device is inside a network
06/21/12Operating system supporting cost aware applications
06/21/12Enhanced content consumption
06/21/12Fast join of peer to peer group with power saving mode
06/21/12Streaming digital content with flexible remote playback
06/21/12Distributed smooth streaming utilizing dynamic manifests
06/21/12Media requests to counter latency and minimize network bursts
06/21/12Identifying an efficient destination server
06/21/12Api supporting server and key based networking
06/21/12Distributed robust clock synchronization
06/21/12Coordination of direct i/o with a filter
06/21/12Storage topology manager
06/21/12Memory power tokens
06/21/12Protecting data during different connectivity states
06/21/12Scalable multimedia computer system architecture with qos guarantees
06/21/12Garbage collection and hotspots relief for a data deduplication chunk store
06/21/12Storage device migration and redirection
06/21/12System and method for providing stealth memory
06/21/12Security sandbox
06/21/12Business exception management pattern for business processes
06/21/12Kernel awareness of physical environment
06/21/12Tamper proof location services
06/21/12Providing security services on the cloud
06/21/12Digital signatures with error polynomials
06/21/12Server-side encrypted pattern matching
06/21/12Security through opcode randomization
06/21/12Idle time service
06/21/12Providing resilient services
06/21/12Recovery of a computer that includes virtual disks
06/21/12Proactive error scan and isolated error correction
06/21/12Scaling out a messaging system
06/21/12Compatibility testing using traces, linear temporal rules, and behavioral models
06/21/12Online fault verification in a file system
06/21/12File system resiliency management
06/21/12Debugging in data parallel computations
06/21/12Resource index identifying multiple resource instances
06/21/12Debugger presentation of parallel application threads
06/21/12Extended page patching
06/21/12Temporal rule-based feature definition and extraction
06/21/12Alerting recipients to errors occurring when accessing external services
06/21/12Validation analysis of human target
06/21/12Generating customized data bound visualizations
06/21/12Rendering source regions into target regions of web pages
06/21/12Representation of an interactive document as a graph of entities
06/21/12Adaptive content layout
06/21/12Full screen view reading and editing user interface
06/21/12Delayed progress meter for long running tasks in web applications
06/21/12Rich interactive saga creation
06/21/12Real-time interaction with entertainment content
06/21/12Representation of an interactive document as a graph of entities
06/21/12Extensible system action for sharing while remaining in context
06/21/12Media navigation via portable networked device
06/21/12Interactions with contextual and task-based computing environments
06/21/12Meeting-specific state indicators
06/21/12Optimized joint document review
06/21/12Staggered animation scheduling
06/21/12Z-order bands
06/21/12Framework for web services exposing line of business applications
06/21/12Contextual tabs and associated functionality galleries
06/21/12Editing data records associated with static images
06/21/12Toolbar search centered user interface model
06/21/12Managing an immersive environment
06/21/12Customization of an immersive environment
06/21/12Multi-level image viewing
06/21/12Snipping tool
06/21/12Application-launching interface for multiple modes
06/21/12Workspace manipulation using mobile device gestures
06/21/12Detecting visual gestural patterns
06/21/12Distributed application manifest
06/21/12Application model for implementing composite applications
06/21/12Metadata based eventing
06/21/12Extensible template pipeline for web applications
06/21/12Code clone notification and architectural change visualization
06/21/12Fusing debug information from different compiler stages
06/21/12Graphical user interface for exploring source code execution behavior
06/21/12Probe insertion via background virtual machine
06/21/12Reconstructing program control flow
06/21/12Method for checkpointing and restoring program state
06/21/12Business intelligence document
06/21/12Software deployment to multiple computing devices
06/21/12Multi-machine deployment and configuration of multi-tiered applications
06/21/12Virtual machine branching and parallel execution
06/21/12Providing a persona-based application experience
06/21/12Mutual-exclusion algorithms resilient to transient memory faults
06/21/12Resilient message passing applications
06/21/12Scheduling and management in a personal datacenter
06/21/12Cancelable and faultable dataflow nodes
06/21/12Message passing in a cluster-on-chip computing environment
06/21/12Conditional deferred queuing
06/21/12Sharing object representations
06/21/12Metadata-based eventing supporting operations on data
06/21/12Managing a model-based distributed application
06/21/12Multi-tenant, high-density container service for hosting stateful and stateless middleware components
06/21/12Simulated group interaction with multimedia content
06/21/12Current device location advertisement distribution
06/21/12Wireless distribution system proxy caches
06/21/12Applying activity actions to frequent activities
06/21/12Providing a security boundary
06/21/12Anonymous principals for policy languages
06/21/12Distributed single sign on technologies including privacy protection and proactive updating
06/21/12Distributed single sign on technologies including privacy protection and proactive updating
06/21/12Third party initiation of communications between remote parties
06/21/12Transition from ws-federation passive profile to active profile
06/21/12Scareware detection
06/21/12Dns-based determining whether a device is inside a network
06/21/12Functionality for providing de-identified data
06/14/12Free-space gesture musical instrument digital interface (midi) controller
06/14/12Human presence detection
06/14/12Orienting the position of a sensor
06/14/12Coordination of animations across multiple applications or processes
06/14/12Response to user input based on declarative mappings
06/14/12Sympathetic optic adaptation for see-through display
06/14/12Radiometric calibration from noise distributions
06/14/12Generation and provision of media metadata
06/14/12Direct connection with side channel control
06/14/12Cognitive use of multiple regulatory domains
06/14/123d gaze tracker
06/14/12Multisource, adaptive printer configuration
06/14/12Printer driver and application decoupling using event centric registration model
06/14/12Multi-layered printer driver model
06/14/12Direct connection with side channel control
06/14/12Low-latency video decoding
06/14/12Coexistence of white space devices and wireless narrowband devices
06/14/12Extensions for modifying a graphical object to display data
06/14/12Location estimation using image analysis
06/14/12Place-based image organization
06/14/12Power and data connector
06/14/12Electronic device cooling fan testing
06/14/12Reactive coincidence
06/14/12Personality-based device
06/14/12Integration of crm applications to ecs application user interface
06/14/12Business application lifecycle management
06/14/12Meeting lifecycle management
06/14/12Generating advertisements during interactive advertising sessions
06/14/12Automatic advertisement generation based on user expressed marketing terms
06/14/12Integration of reserved and dynamic advertisement allocations
06/14/12Enabling advertisers to bid on abstract objects
06/14/12Monetizing product features as part of enforcing license terms
06/14/12Dialog page interaction model
06/14/12Knowledge corroboration
06/14/12Social newsfeed triage
06/14/12Immersive planning of events including vacations
06/14/12Addressing system degradation by application disabling
06/14/12Addition of plan-generation models and expertise by crowd contributorst
06/14/12Platform agnostic file attribute synchronization
06/14/12Content license storage
06/14/12Updating a search index using reported browser history data
06/14/12Using social-network data for identification and ranking of urls
06/14/12Training parsers to approximately optimize ndcg
06/14/12Optimizing blending algorithms using interleaving
06/14/12Automated database generation for answering fact lookup queries
06/14/12Searching linked content using an external search system
06/14/12Auditing queries using query differentials
06/14/12Matching queries to data operations using query templates
06/14/12Web-relevance based query classification
06/14/12Efficient use of computational resources for interleaving
06/14/12Search result relevance by determining query intent
06/14/12Matching reviewers to review objects
06/14/12Relevance estimation using a search satisfaction metric
06/14/12Highlighting known answers in search results
06/14/12Bookmarking of meeting context
06/14/12Autonomous mobile blogging
06/14/12Relevancy sorting of user's browser history
06/14/12Efficient database compression
06/14/12Change notifications from an updated data representation
06/14/12Placeholders returned for data representation items
06/14/12Concerted coordination of multidimensional scorecards
06/14/12Microblog-based customer support
06/14/12Multidimensional data-centric service protocol
06/14/12In browser real time collaboration lists and forms
06/14/12Using e-mail message characteristics for prioritization
06/14/12Dynamically enabling user logging across distributed systems
06/14/12Presenting notifications of content items shared by social network contacts
06/14/12Interactive search results page
06/14/12Reliable delivery of multi-cast conferencing data
06/14/12Auto-resolve recipients cache
06/14/12Provider-specific parsing for content retrieval
06/14/12Link expansion service
06/14/12Real-time media optimization over remoted sessions
06/14/12Connecting devices to a media sharing service
06/14/12Generic and automatic address configuration for data center networks
06/14/12Low energy mobile information delivery
06/14/12Targeted data transfer between operational domains
06/14/12Receive window auto-tuning
06/14/12Device action service
06/14/12Inheritance of growth patterns for derived tables
06/14/12Data deduplication in a virtualization environment
06/14/12Instruction optimization
06/14/12Type and length abstraction for data types
06/14/12Polynomial evaluation delegation
06/14/12Granular tagging of content
06/14/12Providing transparent failover in a file system
06/14/12Memory management to accommodate non-maskable failures
06/14/12System reset
06/14/12Real time error detection in multimodal communication systems
06/14/12Early detection of failing computers
06/14/12Supporting distributed key-based processes
06/14/12Location aware spreadsheet actions
06/14/12Using text messages to interact with spreadsheets
06/14/12Accessing and interacting with information
06/14/12Using cinematographic techniques for conveying and interacting with plan sagas
06/14/12Synthesis of a linear narrative from search content
06/14/12Presenting device availability statuses
06/14/12Network management system supporting customizable groups
06/14/12Organic projects
06/14/12Codeless sharing of spreadsheet objects
06/14/12Shared attachments
06/14/12Defining actions for data streams via icons
06/14/12Generating and managing electronic documentation
06/14/12Presenting content items shared within social networks
06/14/12Identifying actions in documents using options in menus
06/14/12Static definition of unknown visual layout positions
06/14/12Configuration of custom controls in data-driven environments
06/14/12Bull's-eye multidimensional data visualization
06/14/12Repurposing toolbar input areas
06/14/12Navigating between views of a graph using placemarkers
06/14/12Reverse engineering user interface mockups from working software
06/14/12Visual cues based on file type
06/14/12Networked program dependency compatibility analysis
06/14/12Globally sound and consistent configuration management for distributed datacenter components
06/14/12Data parallelism aware debugging
06/14/12Automatic reconnection of debugger to a reactivated application
06/14/12Display of data from parallel programming contexts
06/14/12Platform-agnostic diagnostic data collection and display
06/14/12Remote debugging of server side code without blocking or high-level privileges
06/14/12Nested communication operator
06/14/12Providing com access to an isolated system
06/14/12Template virtual machines
06/14/12Architecture for providing on-demand and background processing
06/14/12Sharing data among concurrent tasks
06/14/12Communication interface for non-communication applications
06/14/12Creation and termination of component scopes
06/14/12In-program content targeting
06/14/12User interface presenting enhanced video content information associated with video programs
06/14/12Progressive consent
06/14/12Software activation using digital licenses
06/14/12Offline scan, clean and telemetry using installed antimalware protection components
06/14/12String operations with transducers
06/14/12Seeding of account setup operations
06/07/12Context dependent computer operation
06/07/12Head pose assessment methods and systems
06/07/12User interface device with actuated buttons
06/07/12Tabletop display providing multiple views to users
06/07/12Semantic rigging of avatars
06/07/12Layer combination in a surface composition system
06/07/12Controlling runtime execution from a host to conserve resources
06/07/12Dual module portable devices
06/07/12Eye gaze reduction
06/07/12Controlling minimum air inlet temperature using waste heat
06/07/12Light source module
06/07/12Converting leakage current to dc output
06/07/12Incast congestion control in a network
06/07/12Multimodal telephone calls
06/07/12Color balancing for partially overlapping images
06/07/12Reducing false detection rate using local pattern based post-filter
06/07/12Image classification
06/07/12Map with media icons
06/07/12Methods and systems for processing digital data rate and directional playback changes
06/07/12Video preview based browsing user interface
06/07/12Evaluation assistant for online discussion
06/07/12Untangled euler diagrams
06/07/12Partitioned artificial intelligence for networked games
06/07/12Integrative and discriminative technique for spoken utterance translation
06/07/12Fuzzy matching and scoring based on direct alignment
06/07/12Warped spectral and fine estimate audio encoding
06/07/12Trajectory tiling approach for text-to-speech
06/07/12Loyalty offer modeling
06/07/12Discoverability using behavioral data
06/07/12Room-based computing environments
06/07/12Targeting advertisements based on emotion
06/07/12Using behavioral data to manage computer services
06/07/12Account transfer techniques
06/07/12Commerce card
06/07/12Click model that accounts for a user's intent when placing a quiery in a search engine
06/07/12Relevance of search results determined from user clicks and post-click user behavior obtained from click logs
06/07/12Page selection for indexing
06/07/12Feature specification via semantic queries
06/07/12Answer model comparison
06/07/12Cross-trace scalable issue detection and clustering
06/07/12Metric-label co-learning
06/07/12Electronic communications triage
06/07/12Electronic communications triage
06/07/12Protecting files that include editable metadata
06/07/12File system backup using change journal
06/07/12Creating and utilizing network restore points
06/07/12Hierarchical software locking
06/07/12Multi-level coverage for crawling selection
06/07/12Entity following
06/07/12Real-time personalized recommendation of location-related entities
06/07/12Identifying key phrases within documents
06/07/12Client performance optimization by delay-loading application files with cache
06/07/12Measuring entity extraction complexity
06/07/12Prioritizing travel itineraries
06/07/12Pattern matching framework for log analysis
06/07/12Acquisition of item counts from hosted web services
06/07/12Query pattern generation for answers coverage expansion
06/07/12Wild card auto completion
06/07/12Meta-application framework
06/07/12Social networking feed extensibility based on data types
06/07/12Populating documents with user-related information
06/07/12Enabling plural computing devices to communicate using a master account
06/07/12Presence capabilities and preferences
06/07/12Throttling usage of resources
06/07/12Client-adjustable window size for connectionless transfer protocols
06/07/12Client-based caching of remote files
06/07/12Multichannel connections in file system sessions
06/07/12Content recommendation through consumer-defined authorities
06/07/12Computing scheduling using resource lend and borrow
06/07/12Light weight transformation for media
06/07/12Mixing synchronous and asynchronous data streams
06/07/12Shared buffer for connectionless transfer protocols
06/07/12Configuration space virtualization
06/07/12Universal dock for context sensitive computing device
06/07/12Efficient cache management
06/07/12Recommendation based caching of content items
06/07/12Dynamic memory allocation and relocation to create low power regions
06/07/12Fast computer startup
06/07/12Fast computer startup
06/07/12Fast computer startup
06/07/12Counting delegation using hidden vector encryption
06/07/12User authentication in a mobile environment
06/07/12Secure element authentication
06/07/12Performance monitoring for applications without explicit instrumentation
06/07/12Automated task completion by flowing context
06/07/12User interface form field expansion
06/07/12Providing summary view of documents
06/07/12Proposing visual display components for processing data
06/07/12Render transform based scrolling and panning for smooth effects
06/07/12Data visualizations including interactive time line representations
06/07/12Managing virtual ports
06/07/12Decentralized system services
06/07/12Events fired pre- and post-method execution
06/07/12Repairing corrupt software
06/07/12Customized computer image preparation and deployment including virtual machine mode
06/07/12Wait on address synchronization interface
06/07/12Media asset voting
06/07/12Ranking content using user feedback
06/07/12Interactive television
06/07/12Recording multi-stream interactive television
06/07/12Data store including a file location attribute
06/07/12Managed dissemination of location data
06/07/12Revoking delegatable anonymous credentials
06/07/12Distributed single sign on technologies including privacy protection and proactive updating
06/07/12Using virtual table protections to prevent the exploitation of object corruption vulnerabilities
06/07/12Host ip reputation
06/07/12Antimalware protection of virtual machines
06/07/12Malicious code infection cause-and-effect analysis
06/07/12Predictive malware threat mitigation
06/07/12Securing mixed-mode applications
05/31/12Compression and decompression of mass spectrometry data
05/31/12Gesture recognition management
05/31/12Strip panorama
05/31/12Generating a texture from multiple images
05/31/12Remote user interface updates using difference and motion encoding
05/31/12Instantaneous panning using a groove metaphor
05/31/12Camera tracking with user script control
05/31/12Robust recovery of transform invariant low-rank textures
05/31/12Camera calibration with lens distortion from low-rank textures
05/31/12Asynchronous communication in an unstable network
05/31/12Systems and methods for tracking a model
05/31/12Rectification of characters and text as transform invariant low-rank textures
05/31/12Reconstruction of sparse data
05/31/12Electrical connection between devices
05/31/12Arrangement for building and operating human-computation and other games
05/31/12Visual aid for assisting a user in interpreting a digital map
05/31/12Suggesting spelling corrections for personal names
05/31/12Event planning within social networks
05/31/12Browsing and quality of service features
05/31/12Display of search ads in local language
05/31/12Mobile query suggestions with time-location awareness
05/31/12Incremental query refinement
05/31/12Device certificate individualization
05/31/12Stateless remote power management of computers
05/31/12Systematic mitigation of memory errors
05/31/12Error report processing
05/31/12Detecting browser failure
05/31/12Data visualization interface including range control and treemap integration
05/31/12Tracking information flow
05/31/12Verification of a dataflow representation of a program through static type-checking
05/31/12Managing groups of computing entities
05/31/12Devices as services in a decentralized operating system
05/31/12Adaptive tree structure for visualizing data
05/31/12Malicious code infection cause-and-effect analysis
05/24/12Scalable music recommendation by search
05/24/12Variable light diffusion in interactive display device
05/24/12Automatic switching between functions emulated by a click pad device
05/24/12Single-camera display device detection
05/24/12Hover detection in an interactive display device
05/24/12Systems and methods for applying model tracking to motion capture
05/24/12Controlling edge routing using layout constraints
05/24/12Maintaining graphical presentations based on user customizations
05/24/12Parallel processing of pixel data
05/24/12Selection of foreground characteristics based on background
05/24/12Branch office direct printing
05/24/12Full-rate cooperative relay
05/24/12Backbone network with policy driven routing
05/24/12Minimizing network latency in interactive internet applications
05/24/12Mixed lossless audio compression
05/24/12Spatial noise suppression for a microphone array
05/24/12Bi-modal depth-image analysis
05/24/12Human tracking system
05/24/12Script-agnostic text reflow for document images
05/24/12Access techniques using a mobile communication device
05/24/12Desktop to mobile data and action transfer
05/24/12Path progression matching for indoor positioning systems
05/24/12Dynamically placing computing jobs
05/24/12Online distorted speech estimation within an unscented transformation framework
05/24/12Real-time animation for an expressive avatar
05/24/12Digital media universal elementary stream
05/24/12Automatic upgrade scheduling
05/24/12Selection compression
05/24/12Providing alternative content in a windowed environment
05/24/12Computing cost per interaction for interactive advertising sessions
05/24/12Techniques and system for revenue sharing in an online storefront
05/24/12Reputation scoring for online storefronts
05/24/12Decomposable ranking for efficient precomputing
05/24/12Symbolic finite automata
05/24/12Techniques to cross-synchronize data
05/24/12Heterogeneous file optimization
05/24/12Classification of transactional queries based on identification of forms
05/24/12Generating context information for a search session
05/24/12Concept disambiguation via search engine search results
05/24/12Selection of atoms for search engine retrieval
05/24/12Efficient string pattern matching for large pattern sets
05/24/12Dynamic query master agent for query execution
05/24/12Hybrid approach to federated search
05/24/12Matching funnel for large document index
05/24/12Efficient forward ranking in a search engine
05/24/12Tiering of posting lists in search engine index
05/24/12Hybrid-distribution model for search engine indexes
05/24/12File kinship for multimedia data tracking
05/24/12Indentifying referring expressions for concepts
05/24/12Enhancing personal data search with information from social networks
05/24/12Scalable chunk store for data deduplication
05/24/12Dependency-based query expansion alteration candidate scoring
05/24/12Asynchronous online searches
05/24/12System and method for deploying logic in data files
05/24/12Concurrently applying an image file while it is being downloaded using a multicast protocol
05/24/12Email filtering using relationship and reputation data
05/24/12System and method for generating a consistent user name-space on networked devices
05/24/12Network latency estimation for mobile devices
05/24/12Managing rich presence collections in a single request
05/24/12Invite abuse prevention
05/24/12Multimedia aware cloud for mobile device computing
05/24/12Thin provisioned space allocation
05/24/12Securing partner-enabled web service
05/24/12Secure software product identifier for product validation and activation
05/24/12Managing automated and manual application testing
05/24/12Capture and playback for gui-based tasks
05/24/12Sections of a presentation having user-definable properties
05/24/12Integrated application feature store
05/24/12Switching of emails in a conversation thread
05/24/12Gesture recognition training
05/24/12Gesture recognition
05/24/12Reusing expression graphs in computer programming languages
05/24/12Code deployment assistance
05/24/12Read-only communication operator
05/24/12Interactive troubleshooting flowcharts
05/24/12Automatic program partition for targeted replay
05/24/12Efficient virtual application update
05/24/12Complex event processing (cep) adapters for cep systems for receiving objects from a source and outputing objects to a sink
05/24/12Hybrid tuner control
05/24/12Security context lockdown
05/24/12Hardware-based credential distribution
05/24/12Using cached security tokens in an online service
05/24/12Back-end constrained delegation model
05/24/12Reliable software product validation and activation with redundant security
05/17/12interactive and scalable treemap as a visualization service
05/17/12Target display for gamma calibration
05/17/12Clipart cartoon techniques
05/17/12Hinge mechanism for mobile electronic device
05/17/12Bitstream manipulation and verification of encoded digital media data
05/17/12Compressive wireless modulation
05/17/12In-image accessibility indication
05/17/12Converting continuous tone images
05/17/12Inline handwriting recognition and correction
05/17/12Recognition of tabular structures
05/17/12Generating a map that includes location and price of products in a shopping list
05/17/12Displaying product recommendations on a map
05/17/12Automatic batching of gui-based tasks
05/17/12Object-sensitive image search
05/17/12Action prediction and identification temporal user behavior
05/17/12Data cube high availability
05/17/12Increasing database availability during fault recovery
05/17/12Method, system, and apparatus for providing resilient data transfer in a data protection system
05/17/12Extensible data provider querying and scheduling system
05/17/12Unified application discovery across application stores
05/17/12Registration for system level search user interface
05/17/12Browsing related image search result sets
05/17/12Period to date functions for time intelligence functionality
05/17/12Rich search over and deep integration with applications
05/17/12Application transfer protocol
05/17/12Transformation of regular expressions
05/17/12Recommending queries according to mapping of query communities
05/17/12Extensible search term suggestion engine
05/17/12System level search user interface
05/17/12Domain constraint based data record extraction
05/17/12Domain constraint path based data record extraction
05/17/12Application file system access
05/17/12Extensible video player selection via server-side detection of client application
05/17/12Contextual and task focused computing
05/17/12Rich email attachment presentation
05/17/12Cooperative session-based filtering
05/17/12Sharing a port with multiple processes
05/17/12Apparatus and computer-readable media for processing http requests
05/17/12Generalized proximity service
05/17/12Method and apparatus for detecting the type of interface to which a peripheral device is connected
05/17/12Analyzing performance of computing devices in usage scenarios
05/17/12Http signing
05/17/12Systems and methods of providing fast leader elections in distributed systems of simple topologies
05/17/12Description language for identifying performance issues in event traces
05/17/12Debugging in a cluster processing network
05/17/12Storage device failure management
05/17/12Audience-based presentation and customization of content
05/17/12Presentation progress as context for presenter and audience
05/17/12Predictive cursor interaction
05/17/12Techniques to annotate street view images with contextual information
05/17/12High fidelity conversion of documents
05/17/12Alerting users to personalized information
05/17/12Issuing behavioral and contextual notifications
05/17/12Display and resolution of incompatible layout constraints
05/17/12File management user interface
05/17/12Debugging in a multi-processing environment
05/17/12Presentation focus and tagging
05/17/12Managing operations via a user interface
05/17/12Facilitating interaction with system level search user interface
05/17/12Quick data share
05/17/12Auto retract and background warm up
05/17/12Scenario testing composability across multiple components
05/17/12Map transformation in data parallel code
05/17/12Automatic passive and anonymous feedback system
05/17/12Collection user interface
05/10/12Resolution enhancing analog-to-digital conversion
05/10/12Resolving merged touch contacts
05/10/12Systems and methods for providing intermediate targets in a graphics system
05/10/12Augmented reality with direct user interaction
05/10/12Dynamic image result stitching
05/10/12User interaction in augmented reality
05/10/12Compressing and decompressing multiple, layered, video streams employing multi-directional spatial encoding
05/10/12Cognitive load reduction
05/10/12Building a person profile database
05/10/12Hierarchical sparse representation for image retrieval
05/10/12Privacy in mobile device communications
05/10/12Game builder for mobile device-based games
05/10/12Extended and editable gamer profile
05/10/12Extended and editable gamer profile
05/10/12Minimum converted trajectory error (mcte) audio-to-video engine
05/10/12Hybrid task board and critical path method based project application
05/10/12Hybrid task board and critical path method based project management application interface
05/10/12Payment determination in auctions
05/10/12Providing advertisements based on user grouping
05/10/12Advertising that is relevant to a person
05/10/12Application store tastemaker recommendations
05/10/12Long term workflow management
05/10/12Automated evaluation of compliance data from heterogeneous it systems
05/10/12Parallel processing of data sets
05/10/12Synchronization of replications for different computing systems
05/10/12Combining song and music video playback using playlists
05/10/12Measuring duplication in search results
05/10/12Multi-modal approach to search query input
05/10/12Web forum crawling using skeletal links
05/10/12Presenting actions and providers associated with entities
05/10/12Ranking authors in social media systems
05/10/12Domain expertise determination
05/10/12Automated partitioning in parallel database systems
05/10/12Indexing and querying hash sequence matrices
05/10/12Business intelligence and report storyboarding
05/10/12Query suggestions using replacement substitutions and an advanced query syntax
05/10/12Optimized kd-tree for scalable search
05/10/12Content distribution system
05/10/12Serializing document editing commands
05/10/12Location control service
05/10/12Insertion of management agents during machine deployment
05/10/12Service directory
05/10/12Model-based data center management
05/10/12Group based allocation of network bandwidth
05/10/12Preventing quality of service policy abuse in a network
05/10/12Managing memory with limited write cycles in heterogeneous memory systems
05/10/12Combination based lru caching
05/10/12Hardware diagnostics and software recovery on headless server appliances
05/10/12Decentralized sleep management
05/10/12Creating and modifying an image wiki page
05/10/12Version history inside document
05/10/12Learning tool for a ribbon-shaped user interface
05/10/12Managing network usage per application via policies
05/10/12Partial loading and editing of documents from a server
05/10/12Interaction with networked screen content via mobile phone in retail setting
05/10/12Declarative and multi-mode wizard framework
05/10/12Secondary output generation from a presentation framework
05/10/12Three-dimensional user interaction
05/10/12Instantiating a software development environment from an environment class
05/10/12Amplification of dynamic checks through concurrency fuzzing
05/10/12Optimization of declarative queries
05/10/12On-demand loading of types of software code of a program executing on a computing device
05/10/12Mobile application migration service
05/10/12Pluggable claim providers
05/10/12Security system for computing resources pre-releases
05/10/12File system operation and digital rights management (drm)
05/03/12Detection of configuration changes in an illumination system
05/03/12Multimodal input system
05/03/12Transparent display assembly
05/03/12User input device
05/03/12Virtual controller for visual displays
05/03/12Surface computing device
05/03/12Computing device with flat touch surface
05/03/12Transparent display configuration modes
05/03/12Remote user interface raster segment motion detection and encoding
05/03/12Techniques for efficient sampling for image effects
05/03/12Transparent display interaction
05/03/12In-home depth camera calibration
05/03/12Methods and apparatus for reducing structured noise in video
05/03/12Location brokering for providing security, privacy and services
05/03/12Face recognition in video content
05/03/12Burst mode image compression and decompression
05/03/12Image search
05/03/12Shared surface hardware-sensitive composited video
05/03/12Advisory services network and architecture
05/03/12Personal digital context
05/03/12Augmenting communication sessions with applications
05/03/12Automatic multimedia slideshows for social media-enabled mobile devices
05/03/12Challenge search query game
05/03/12Gaming notifications aggregator
05/03/12Achievement incentives within a console-based gaming environment
05/03/12Stimulus description collections
05/03/12Providing multi-lingual translation for third party content feed applications
05/03/12Bi-directional handwriting insertion and correction
05/03/12Leveraging interaction context to improve recognition confidence scores
05/03/12Audio output of a document from mobile device
05/03/12Logical chart of accounts with hashing
05/03/12Data center system that accommodates episodic computation
05/03/12Testing on-line advertising
05/03/12Trusted online advertising
05/03/12Sponsored multi-media blogging
05/03/12Application name marketplace
05/03/12Integrated cloud based marketplace services
05/03/12Integrated cloud based marketplace services
05/03/12Reactive load balancing for distributed systems
05/03/12Enhanced training data for learning-to-rank
05/03/12Real-time adaptive output
05/03/12Resource analysis
05/03/12Organization of data mart using clustered key
05/03/12Preserving user intent in merging ordered objects
05/03/12Partitioning online databases
05/03/12Versatile in-memory database recovery
05/03/12Configuring a data protection system
05/03/12Marketization analysis
05/03/12Halloween protection in a multi-version database system
05/03/12Efficient column based data encoding for large-scale data storage
05/03/12Object model to key-value data model mapping
05/03/12Web services runtime for dataset transformation
05/03/12Providing consolidated project information service
05/03/12Identifying physical locations of entities
05/03/12Adaptive image retrieval database
05/03/12Two stage search
05/03/12Method and system for calculating importance of a block within a display page
05/03/12Providing search results for mobile computing devices
05/03/12Visual preview of search results
05/03/12Robust auto-correction for data retrieval
05/03/12Antinull usage and simulation in data filtering
05/03/12Retrieval and storage of localized instances of data objects
05/03/12Application store concierge
05/03/12Data rendering optimization
05/03/12Conditional execution of regular expressions
05/03/12Homomorphism lemma for efficiently querying databases
05/03/12Search cache for document search
05/03/12Generating data models
05/03/12Unified policy over heterogenous device types
05/03/12Enabling routing of data on a network based on a portion of data accessed from a non-network enabled device
05/03/12Website redevelopment wrapper
05/03/12Envelope attachment for message context
05/03/12Selectively utilizing a plurality of disparate solid state storage locations
05/03/12Remapping of inoperable memory blocks
05/03/12Virtualization and offload reads and writes
05/03/12Failure recognition
05/03/12Reporting of intra-device failure data
05/03/12Method and system for securing data of a mobile communications device
05/03/12Application-specific power management
05/03/12Spreadsheet model for distributed computations
05/03/12Tool for automated online blog generation
05/03/12Parallel web page processing
05/03/12Style and layout caching of web content
05/03/12Proportional font scaling
05/03/12Help document animated visualization
05/03/12Dynamic help user interface control with secured customization
05/03/12Display of image search results
05/03/12Video viewing and tagging system
05/03/12Integrated voice command modal user interface
05/03/12Virtualized layouts
05/03/12Context menu
05/03/12Enterprise resource planning oriented context-aware user interface
05/03/12Position aware gestures with visual feedback as input method
05/03/12Data type provider for an operating system instrumentation store
05/03/12Customized binaries on-the-fly
05/03/12Data type provider for a web semantic store
05/03/12Viral application distribution
05/03/12Stateful applications operating in a stateless cloud computing environment
05/03/12Inherited product activation for virtual machines
05/03/12Dynamic allocation and assignment of virtual environment
05/03/12Enterprise resource planning oriented context-aware environment
05/03/12Task cancellation grace periods
05/03/12Client application independent extensibility model
05/03/12Globally valid measured operating system launch with hibernation support
05/03/12Use of popularity information to reduce risk posed by guessing attacks
04/26/12Chassis slots accepting battery modules and other module types
04/26/12Radiometric calibration using temporal irradiance mixtures
04/26/12Provisioning techniques
04/26/12Image patch descriptors
04/26/12Fabrication of a laminated optical wedge
04/26/12Environment-interactive context-aware devices and methods
04/26/12Energy efficient continuous sensing for communications devices
04/26/12High quality video game replay
04/26/12Model checking for distributed application validation
04/26/12Query by humming for ringtone search and download
04/26/12Topic models
04/26/12Semantic analysis of information
04/26/12Synchronizing online document edits
04/26/12Online database availability during upgrade
04/26/12Database data recovery system and method
04/26/12Upgrade of highly available farm server groups
04/26/12Distributed transaction management for database systems with multiversioning
04/26/12Ranking model adaptation for domain-specific search
04/26/12Result types for conditional data display
04/26/12Automatically creating data hierarchy in crm applications based on imported contact data
04/26/12Automatic disambiguation based on a reference resource
04/26/12Content recommendation system and method
04/26/12Entity name matching
04/26/12Dynamically splitting multi-tenant databases
04/26/12Non-privileged access to data independent of filesystem implementation
04/26/12Applying analytic patterns to data
04/26/12Prioritized client-server backup scheduling
04/26/12Synchronization of form fields in a client-server environment
04/26/12Synchronization of form fields in a client-server environment
04/26/12Templates for displaying data
04/26/12Running legacy applications on cloud computing systems without rewriting
04/26/12Managing data delivery based on device state
04/26/12Communication and coordination between web services in a cloud-based computing environment
04/26/12Automatic identification of travel and non-travel network addresses
04/26/12Policy processor for configuration management
04/26/12Machine manager service fabric
04/26/12Placing objects on hosts using hard and soft constraints
04/26/12Routing traffic in an online service with high availability
04/26/12Optimized consumption of third-party web services in a composite service
04/26/12Application specific web request routing
04/26/12Bidirectional synchronization with crm applications
04/26/12Aggregation of write traffic to a data store
04/26/12Efficient file management through granular opportunistic locking
04/26/12Low ram space, high-throughput persistent key-value store using secondary memory
04/26/12Consistent messaging with replication
04/26/12Customization of display templates
04/26/12Touch gesture notification dismissal techniques
04/26/12Displaying battery life resulting from setting changes
04/26/12Synchronization of form fields in a client-server environment
04/26/12Context-aware user input prediction
04/26/12Sharing rich interactive narratives on a hosting platform
04/26/12Representing data through a graphical object
04/26/12Visualization for resource capacity management
04/26/12Notification group touch gesture dismissal techniques
04/26/12Multi-dimensional objects
04/26/12Generating documentation from tests
04/26/12Parallel test execution
04/26/12High availability of machines during patching
04/26/12Coordinated upgrades in distributed systems
04/26/12Installing software remotely using a high privilege process
04/26/12Creating and deploying service-ready virtual hard disks
04/26/12Entitlement lifecycle management in a resource management system
04/26/12Ordered scheduling of suspended processes based on resumption events
04/26/12Managing networks and machines for an online service
04/26/12Green computing via event stream management
04/26/12Application lifetime management
04/26/12Dynamic process virtualization
04/26/12Web service patterns for globally distributed service fabric
04/26/12Mixed-mode authentication
04/26/12Integrating security protection tools with computer device integrity and privacy policy
04/19/12Molding of nonuniform object having undercut structure
04/19/12Field-programmable gate array based accelerator system
04/19/12Reconfigurable multiple-plane computer display system
04/19/12Speckle interference laser tracking
04/19/12Synthetic gesture trace generator
04/19/12Region-based image manipulation
04/19/12Presenting two-dimensional elements in three-dimensional stereo applications
04/19/12Snapping user interface elements based on touch input
04/19/12Optimized telepresence using mobile device gestures
04/19/12Automatically tracking user movement in a video chat application
04/19/12Controlling spacing between display and reinforcement layer
04/19/12System and method for high-precision 3-dimensional audio for augmented reality
04/19/12Generating search requests from multimodal queries
04/19/12Active segmentation for groups of images
04/19/12Intelligent determination of replays based on event identification
04/19/12Smooth rewind media playback
04/19/12Automated secure pairing for wireless devices
04/19/12Mobile messaging message notifications processing
04/19/12Utilizing mobile device functionality from remote computers
04/19/12Language identification in multilingual text
04/19/12Parsing observable collections
04/19/12Leveraging back-off grammars for authoring context-free grammars
04/19/12Incentive selection of region-of-interest and advertisements for image advertising
04/19/12Pricing mechanisms for perishable time-varying resources
04/19/12Following online social behavior to enhance search experience
04/19/12Providing information to users based on context
04/19/12Search session with refinement
04/19/12Predicting future queries from log data
04/19/12Providing contextual hints associated with a user session
04/19/12Ranking results of multiple intent queries
04/19/12Affinitizing datasets based on efficient query processing
04/19/12Embedding content-based searchable indexes in multimedia files
04/19/12Disambiguation of entities
04/19/12User query reformulation using random walks
04/19/12Personalized object dimension
04/19/12Optimizing browser caching through deterministic marking of files
04/19/12Availability management for reference data services
04/19/12Location updates for a distributed data store
04/19/12Registering, transferring, and acting on event metadata
04/19/12Distributed decentralized data storage and retrieval
04/19/12Dynamic cache configuration using separate read and write caches
04/19/12Remote access to hosted virtual machines by enterprise users
04/19/12Detecting and recovering from process failures
04/19/12Scrubbing touch infotip
04/19/12Cloud-based virtual clipboard
04/19/12Use of low-power display on device
04/19/12Capability-based application recommendation
04/19/12Parsing of declarations in all branches of preprocessor conditionals
04/19/12Compute cluster with balanced resources
04/19/12Cancelling digital signatures for form files
04/19/12First computer process and second computer process proxy-executing code on behalf of first process
04/12/12Method of making an interactive keyboard
04/12/12Inferring building metadata from distributed sensors
04/12/12Local binary xml string compression
04/12/12User notification system with an illuminated computer input device
04/12/12Keyboard device with optically enhanced display output
04/12/12Target independent rasterization
04/12/12Image identification and sharing on mobile devices
04/12/12Rapidly initializing and dynamically adjusting media streams
04/12/12Multi-channel audio encoding and decoding
04/12/12Recognizing hand poses and/or object classes
04/12/12Computation of travel routes, durations, and plans over multiple contexts
04/12/12General purpose correction of grammatical and word usage errors
04/12/12Speech recognition user interface
04/12/12Global pricing for content distribution
04/12/12Market design for a resource exchange system
04/12/12Publishing commercial information in a social network
04/12/12Loyalty offer
04/12/12Management of preferred items list
04/12/12Privacy-preserving metering
04/12/12System and method for parameter evaluation
04/12/12Self-contained partial database backups
04/12/12Item level recovery
04/12/12Informing search results based on commercial transaction publications
04/12/12Search result diversification
04/12/12Automatic contact linking from multiple sources
04/12/12Efficient paging of search query results
04/12/12Live migration method for large-scale it management systems
04/12/12Aggregating connection maintenance to optimize resource consumption
04/12/12Providing a monitoring service in a cloud-based computing environment
04/12/12Allocation of resources between web services in a composite service
04/12/12Range weighted internet protocol address blacklist
04/12/12Secure tunnel over https connection
04/12/12Secure deployment of provable identity for dynamic application environments
04/12/12Fuzz testing of asynchronous program code
04/12/12Pessimistic model-based testing
04/12/12Multi-user test framework
04/12/12Identifying language translations for source documents using links
04/12/12Conversion of declarative statements into a rich interactive narrative
04/12/12Dynamic companion device user interface
04/12/12Initiating and completing transactions via notification elements
04/12/12Tile communication operator
04/12/12Dynamic data and compute resource elasticity
04/12/12Runtime agnostic representation of user code for execution with selected execution runtime
04/12/12Declarative programming model with a native programming language
04/12/12Image based servicing of a virtual machine
04/12/12Integrating software components
04/12/12Process pool of empty application hosts to improve user perceived launch time of applications
04/12/12Hosting non-messaging workflows in a messaging host
04/12/12Secure push and status communication between client and server
04/12/12Cross-site scripting prevention in dynamic content
04/05/12Media display device
04/05/12Dynamic virtual device failure recovery
04/05/12Routing using global address pairs
04/05/12Single chip protocol converter
04/05/12Content adaptive deblocking during video encoding and decoding
04/05/12Multi-channel audio encoding and decoding
04/05/12Time-of-flight depth imaging
04/05/12Entropy coder for image compression
04/05/12Mobile telephone hosted meeting controls
04/05/12Travel route planning using geo-tagged photographs
04/05/12Association of semantic meaning with data elements using data definition tags
04/05/12Advertisement management
04/05/12Claims issuance rule generation pipeline
04/05/12Affecting user experience based on assessed state
04/05/12Providing suggestions based on user intent
04/05/12Data write-back to data provider from individual grid cells
04/05/12Configuring a data protection system
04/05/12Providing associations between objects and individuals associated with relevant media items
04/05/12Search detail display using search result context
04/05/12Applying search queries to content sets
04/05/12Dynamic domain query and query translation
04/05/12Recursive processing in streaming queries
04/05/12Geographic text search using image-mined data
04/05/12Moving large volumes of data from fact to archive tables
04/05/12Virtual javascript object notation
04/05/12Collecting and presenting information
04/05/12Presenting availability statuses of synchronized objects
04/05/12Website compatibility shims
04/05/12Page loading optimization using page-maintained cache
04/05/12Unified reconnection to multiple remote servers
04/05/12Virtual desktop configuration and operation techniques
04/05/12Methods and systems for providing secure access to a hosted service via a client application
04/05/12Logical networks
04/05/12Real-load tuning of database applications
04/05/12Configuration reporting
04/05/12Model slicing and versioning
04/05/12Web test generation
04/05/12End-point identifiers in sip
04/05/12Remote control command translation
04/05/12Shared memory between child and parent partitions
04/05/12Token-based authentication using middle tier
04/05/12Cryptographic device that binds an additional authentication factor to multiple identities
04/05/12Remote resources single sign on
04/05/12Parameterized template compression for binary xml
04/05/12Securely rendering online ads in a host page
04/05/12Displaying images interesting to a user
04/05/12Multiple-access-level lock screen
04/05/12Designer extensibility
04/05/12Programming language support for reactive programming
04/05/12Debugger launch and attach on compute clusters
04/05/12Transactional debugger for a transactional memory system
04/05/12Techniques for load balancing gpu enabled virtual machines
04/05/12Techniques for streaming virtual machines from a server to a host
04/05/12Virtual machine and/or multi-level scheduling support on systems with asymmetric processor cores
04/05/12Tracking requests that flow between subsystems
04/05/12Model, service and implementation separation
04/05/12Authenticated content discovery
04/05/12Trustworthy device claims for enterprise applications
04/05/12Trustworthy device claims as a service
04/05/12Realtime multiple engine selection and combining
04/05/12Claims-aware role-based access control
03/29/12Ruggedized display device
03/29/12Touch sensing using shadow and reflective modes
03/29/12Arc spline gpu rasterization for cubic bezier drawing
03/29/12Prevention of dos attack by a rogue graphics application
03/29/12Low complexity method for motion compensation of dwt based systems
03/29/12Two-way video conferencing system
03/29/12Wide angle field of view active illumination imaging system
03/29/12Techniques to support large numbers of subscribers to a real-time event
03/29/12Interactive display
03/29/12External image based summarization techniques
03/29/12Visual feedback in electronic entertainment system
03/29/12In-call contact information display
03/29/12Visual target tracking
03/29/12Remotely collecting and managing diagnostic information
03/29/12Unified model for authoring and executing flow-based and constraint-based workflows
03/29/12Advertising service based on content and user log mining
03/29/12Query analysis for geographic-based listing service
03/29/12System and method for scaleable multiplexed transactional log recovery
03/29/12Comparing and selecting data cleansing service providers
03/29/12Optimized lazy query operators
03/29/12Content searching and configuration of search results
03/29/12Using an id domain to improve searching
03/29/12Text classification using concept kernel
03/29/12Searchable symmetric encryption with dynamic updating
03/29/12Scripting using new ordering algorithm
03/29/12Large graph measurement
03/29/12Visual-cue refinement of user query results
03/29/12Interactive addition of semantic concepts to a document
03/29/12Data model dualization
03/29/12Garbage collection extensibility via managed code
03/29/12Polling protocol for automatic load limiting
03/29/12Method and system for delayed allocation of resources
03/29/12Message gateway with hybrid proxy / store-and-forward logic
03/29/12Proving domain name ownership
03/29/12Providing virtual networks using multi-tenant relays
03/29/12Multiple image buffer simulation
03/29/12Performing computations in a distributed infrastructure
03/29/12Detecting state loss on a device
03/29/12Separating authorization identity from policy enforcement identity
03/29/12Object security over network
03/29/12Filtering user interface for a data summary table
03/29/12Adaptable license platform for remote sessions
03/29/12System and method for providing a dynamic expanded timeline
03/29/12Dynamic, set driven, ribbon, supporting deep merge
03/29/12Software build analysis
03/29/12Expressing equivalency relationships with identity graphs
03/29/12Multi-path brokered test automation execution
03/29/12Query constraint encoding with type-based state machine
03/29/12Compile-time bounds checking for user-defined types
03/29/12Intermediate representation construction for static analysis
03/29/12Subscriber-based ticking model for platforms
03/29/12Distributed workflow in loosely coupled computing
03/29/12Dependency-ordered resource synchronization
03/29/12Performing computations in a distributed infrastructure
03/29/12Altering event lifetimes
03/29/12Management and marketplace for distributed home devices
03/29/12Module interrogation
03/29/12Separation of duties checks from entitlement sets
03/29/12Deriving express rights in protected content
03/29/12Safety and securely us personal computer working at home or anywhere instead of going and working in the office
03/29/12Federated mobile authentication using a network operator infrastructure
03/29/12Offload reads and writes
03/29/12Proxy authentication and indirect certificate chaining
03/29/12Request based license mode selection
03/22/12Interactive keyboard with multiple different key arrangements
03/22/12Interactive keyboard with viewable display
03/22/12Spatial exploration field of view preview mechanism
03/22/12Display with focused illumination
03/22/12Entropy encoding and decoding using direct level and run-length/level context-adaptive arithmetic coding/decoding modes
03/22/12Prevention of accidental device activation
03/22/12Stereo video for gaming
03/22/12Quantum computational systems
03/22/12Full-sequence training of deep structures for speech recognition
03/22/12Using location for determining relevance between queries and advertisements
03/22/12Data-driven item value estimation
03/22/12Curated application store
03/22/12Directory oplock
03/22/12Dictionary service
03/22/12Image search by interactive sketching and tagging
03/22/12Data representation for push-based queries
03/22/12Query processing algorithm for vertically partitioned federated database systems
03/22/12Semantic grouping for program performance data analysis
03/22/12Query and result rebinding
03/22/12Monadic type preservation for query operators
03/22/12Techniques using captured information
03/22/12Defining sub-cube scope based upon a query
03/22/12Object instance versioning
03/22/12System and method for dynamically generating a selectable search extension
03/22/12Content discovery and transfer between mobile communications nodes
03/22/12Elastic management framework
03/22/12Persisting a group in an instant messaging application
03/22/12Node clustering
03/22/12Integrating external and cluster heat map data
03/22/12Monitoring cloud-runtime operations
03/22/12Directory leasing
03/22/12Using templates to configure cloud resources
03/22/12Automatic addressing protocol for a shared bus
03/22/12Multi-level buffer pool extensions
03/22/12Multitenant-aware protection service
03/22/12Retrieving and using cloud based storage credentials
03/22/12Analysis and visualization of cluster resource utilization
03/22/12Repair-policy refinement in distributed systems
03/22/12Fast, non-write-cycle-limited persistent memory for secure containers
03/22/12Web page behavior enhancement controls
03/22/12Techniques to provide pivot-based search for business data
03/22/12Scrollable area multi-scale viewing
03/22/12Unified data type system and method
03/22/12Agent-based remote function execution
03/22/12Automatic customized advertisement generation system
03/22/12Secondary credentials for batch system
03/22/12Detecting potential fraudulent online user activity
03/15/12Motion based display management
03/15/12Stylus modes
03/15/12Flexible touch-based scrolling
03/15/12Visualizing video within existing still images
03/15/12Laser-scanning virtual image display
03/15/12Distributed network management
03/15/12Methods and systems for estimating network available bandwidth using packet pairs and spatial filtering
03/15/12Array of scanning sensors
03/15/12User-specific attribute customization
03/15/12Resizable filmstrip view of images
03/15/12Managing computational workloads of computing apparatuses powered by renewable resources
03/15/12Deep belief network for large vocabulary continuous speech recognition
03/15/12Providing time-sensitive information for purchase determinations
03/15/12File-backed in-memory structured storage for service synchronization
03/15/12Providing lightweight multidimensional online data storage for web service usage reporting
03/15/12Interface to navigate and search a concept hierarchy
03/15/12Utilizing hierarchy metadata to improve path selection
03/15/12Custom operators for a parallel query engine
03/15/12Automatic layout derivation and implementation
03/15/12Scalably imaging clients over a network
03/15/12Tracking of electronic mail messages
03/15/12Reputation checking obtained files
03/15/12Network dna
03/15/12Converting luns into files or files into luns in real time
03/15/12Using pulses to control work ingress
03/15/12Controlled automatic healing of data-center services
03/15/12Application query control with cost prediction
03/15/12Concurrent editing of online drawings
03/15/12Drag-able tabs
03/15/12Default location that may be dynamically changed
03/15/12Branded browser frame
03/15/12Multi-dimensional auto-scrolling
03/15/12Simulation environment for distributed programs
03/15/12Virtual and physical enterprise system imaging
03/15/12Optimizations for implementing multi-stack stack hosts
03/15/12Control-based content pricing
03/08/12Modularization of data center functions
03/08/12Content signaturing
03/08/12System for fast, probabilistic skeletal tracking
03/08/12Dynamic gesture parameters
03/08/12Distance-time based hit-testing
03/08/12Precise selection techniques for multi-touch screens
03/08/12Alternate source for controlling an animation
03/08/12Migrating and save restoring a virtual 3d graphics device
03/08/12Depth camera based on structured light and stereo vision
03/08/12Systems and methods for tracking a model
03/08/12Scalable real-time motion recognition
03/08/12Script detection service
03/08/12Mobile communication device for transcribing a multi-party conversation
03/08/12Predictive geo-temporal advertisement targeting
03/08/12Providing time-sensitive information for purchase determinations
03/08/12Mirroring file data
03/08/12Updating an inverted index in a real time fashion
03/08/12Providing entity-specific content in response to a search query
03/08/12Unified rules for voice and messaging
03/08/12Efficient connection management and data synchronization
03/08/12Secure and verifiable data handling
03/08/12Web page error reporting
03/08/12Erasure coding immutable data
03/08/12Discovering alternative user experiences for websites
03/08/12Removing style corruption from extensible markup language documents
03/08/12Social network notifications
03/08/12Notification bar user interface control
03/08/12Content signaturing user interface
03/08/12Reauthentication to a web service without disruption
03/01/12Use of sack geometry to implement a single qubit phase gate
03/01/12Reliable location information for a mobile station using a non-gps location technique
03/01/12Gesture recognizer system architecture
03/01/12Resistive matrix with optimized input scanning
03/01/12Controller with transformable surface topology
03/01/12Buffer construction with geodetic circular arcs
03/01/12Aligning animation state update and frame composition
03/01/12Adaptive grid generation for improved caching and image classification
03/01/12Two-dimensional object packing
03/01/12Determination of bypass zones from network configuration settings
03/01/12Hearing aid-compatible apparatus for wireless communication devices
03/01/12Depth projector system with integrated vcsel array
03/01/12Containment coefficient for identifying textual subsets
03/01/12User selection and navigation based on looped motions
03/01/12Coordinated motion and audio experience using looped motions
03/01/12Identifying topically-related phrases in a browsing sequence
03/01/12Maintaining targetable user inventory for digital advertising
03/01/12Advertising targeting based on image-derived metrics
03/01/12Reducing locking during database transactions
03/01/12Information retrieval using time
03/01/12Sketch-based image search
03/01/12Enhancing search-result relevance ranking using uniform resource locators for queries containing non-encoding characters
03/01/12Regulating media quality using a session bandwidth limit
03/01/12Site redirection
03/01/12Session admission control on sip trunk legs
03/01/12Admitting calls based on endpoint locations
03/01/12Network feed content
03/01/12Add-ins dynamically extending display targets and business-logic programming model
03/01/12Correlating hardware devices between local operating system and global management entity
03/01/12Dynamic rebasing of persisted time information
03/01/12Dynamic calculation of sample profile reports
03/01/12Techniques for selectively enabling or disabling virtual devices in virtual environments
03/01/12State separation of user data from operating system in a pooled vm environment
03/01/12Parental controls for entertainment content
03/01/12Online advertisement selection
03/01/12Propagating user privacy preferences across multiple applications
03/01/12Automatically generating rules for connection security
03/01/12Three-layer web management protocol device emulation
03/01/12Host usability and security via an isolated environment
03/01/12Application selection using current detection intelligence
03/01/12Adaptively selecting electronic message scanning rules
03/01/12Adaptive electronic message scanning
02/23/12Routing a voip call with contextual information
02/23/12Dynamic adjustment of bandwidth allocation for an in-progress media session
02/23/12Hierarchical video sub-volume search
02/23/12Image resizing for web-based image search
02/23/12Selective update of core mobile device user interface through application marketplace
02/23/12Content signature notification
02/23/12Network topology detection using a server
02/23/12Directing modalities over different networks in multimodal communications
02/23/12Virtual machine memory management in systems with asymmetric memory
02/23/12Hierarchical memory management in virtualized systems for non-volatile memory models
02/23/12Boot management of non-volatile memory
02/23/12Aligning content in an electronic document
02/23/12Relating web page change with revisitation patterns
02/23/12Reputation-based safe access user experience
02/23/12Translating user motion into multiple object responses
02/23/12Execution environment support for reactive programming
02/23/12Securing resource stores with claims-based security
02/23/12Safe url shortening
02/23/12Method and system for device integrity authentication
02/16/12Gpu texture tile detail control
02/16/12Projection of images onto tangible user interfaces
02/16/12Variable resolution images
02/16/12Demand driven avails
02/16/12Mirroring data changes in a database system
02/16/12Text mining of microblogs using latent topic labels
02/16/12Scalable and extensible framework for data-driven web services
02/16/12Management of collections of websites
02/16/12Location and contextual-based mobile application promotion and delivery
02/16/12Xslt/xpath focus inference for optimized xslt implementation
02/16/12Content gestures
02/16/12Cloning or extending a computer desktop on a wireless display surface
02/16/12Updating application data after anticipating imminent use
02/16/12Cloning specific windows on a wireless display surface
02/16/12Presenting suggested items for use in navigating within a virtual space
02/16/12Translating declarative models
02/09/12Resolution enhancement
02/09/12Manipulation of graphical objects
02/09/12Population of lists and tasks from captured voice and audio content
02/09/12Quantization and inverse quantization for audio
02/09/12Personalization of a mobile communcation device
02/09/12Search personalization using identifiers and authentication state
02/09/12Determining mobile account to apply marketplace charges
02/09/12Extended user profile
02/09/12State management in a distributed computing system
02/09/12Data consistency within a federation infrastructure
02/09/12Efficiently synchronizing with separated disk caches
02/09/12Combining request-dependent metadata with media content
02/09/12Secure and verifiable data handling
02/09/12Computer system with enhanced user interface for images
02/09/12Relationship visualization and graphical interaction model in it client management
02/09/12Access authorization having embedded policies
02/09/12Trusted license removal in a content protection system or the like
02/09/12Automatic configuration and continuation of federation relationships
02/02/12Image contrast enhancement in depth sensor
02/02/12Raw image processing
02/02/12Server-centric high performance network architecture for modular data centers
02/02/12Energy-efficient on-the-fly wi-fi hotspot using mobile devices
02/02/12Intelligent formatting of voip telephone numbers
02/02/12Adjustable earphone and earphone set
02/02/12Data difference guided image capturing
02/02/12Line and pixel based methods for intra frame coding
02/02/12Privacy-enabled telephone directory
02/02/12Two-way communication of events between a mobile device and remote client
02/02/12Alternative inputs of a mobile communications device
02/02/12Method for planar implementation of pi/8 gate in chiral topological superconductors
02/02/12Language detection service
02/02/12Anonymous healthcare and records system
02/02/12Data migration for service upgrades
02/02/12Application instance and query stores
02/02/12Interfaces for high availability systems and log shipping
02/02/12Topics in relevance ranking model for web search
02/02/12Employing topic models for semantic class mining
02/02/12System of providing suggestions based on accessible and contextual information
02/02/12Modeling recurring events in a data store
02/02/12Preview publishing of reports
02/02/12Capture of content from dynamic resource services
02/02/12Wireless synchronization of media content and subscription content
02/02/12Peer-to-peer (p2p) streaming overlay construction and optimization
02/02/12Web page load time prediction and simulation
02/02/12Dynamically allocating index server resources to partner entities
02/02/12Unique block header patterns for media verification
02/02/12System and method for personal biometric data sequestering and remote retrieval with power checking
02/02/12Virtual keyboard text replication
02/02/12Non-disruptive, reliable live migration of virtual machines with network data reception directly into virtual machines' memory
02/02/12Dynamic load redistribution among distributed servers
01/26/123d layering of map metadata
01/26/12Rear-projection display
01/26/12Estimating sample-domain distortion in the transform domain with rounding compensation
01/26/12Variable kernel size image matting
01/26/12Motivational deployment mechanism for networked systems
01/26/12Automatic delivery of digital content to a computing device
01/26/12Statistical machine translation processing
01/26/12Advertising framework for wireless networks
01/26/12Ecommerce marketplace integration techniques
01/26/12Mobile wallet and digital payment
01/26/12Customizing search home pages using interest indicators
01/26/12Extraction of rich search information from index servers via an alternative asynchronous data path
01/26/12Smart defaults for data visualizations
01/26/12Executing business logic extensions on a client computing system
01/26/12Dynamic composition of media
01/26/12Orientation free user interface
01/26/12Dynamic user interface for previewing live content
01/26/12Interactive image matting
01/26/12Measuring actual end user performance and availability of web applications
01/26/12Workload interference estimation and performance optimization
01/26/12Method for updating data in accordance with rights management policy
01/19/12Method and system for multi-phase dynamic calibration of three-dimensional (3d) sensors in a time-of-flight system
01/19/12Print plug-in isolation
01/19/12Opportunistic use of wireless network stations as repeaters
01/19/12Simultaneous wireless support in software defined radio
01/19/12Method and apparatus for audio normalization
01/19/12Multiple directions to a destination without providing a specific origin
01/19/12Visual assessment of landmarks
01/19/12Speaker recognition via voice sample based on multiple nearest neighbor classifiers
01/19/12Using a directed graph as an advertising system taxonomy
01/19/12Enriching metadata of categorized documents for search
01/19/12Hierarchical merging for optimized index
01/19/12Scaled management system
01/19/12Collecting and presenting temporal-based action information
01/19/12Identity management user experience
01/19/12Monitoring activity with respect to a distributed application
01/19/12Display-agnostic user interface for mobile devices
01/19/12Ultra-low cost sandboxing for application appliances
01/19/12Interface protocol and api for a wireless transceiver
01/19/12Security authorization queries
01/12/12Method and system to reduce stray light reflection error in time-of-flight sensor arrays
01/12/12Soft handoffs in networks
01/12/12Above-lock camera access
01/12/12Ubiquitous unified player identity tracking system
01/12/12Recommendations and targeted advertising based upon directions requests activity and data
01/12/12Media purchase techniques
01/12/12Semantic entity manipulation using input-output examples
01/12/12Shared log-structured multi-version transactional datastore with metadata to enable melding trees
01/12/12Generating programs based on input-output examples using converter modules
01/12/12Transaction-safe fat file system improvements
01/12/12Fat directory structure for use in transaction safe file system
01/12/12Url-facilitated access to spreadsheet elements
01/12/12Providing web-based imaging services within a client-based application
01/12/12Internet e-mail bridge
01/12/12Cluster-based friend suggestion aggregator
01/12/12Generating alerts based on managed and unmanaged data
01/12/12User authentication across multiple network stacks
01/12/12Method and system for intelligently mining data during communication streams to present context-sensitive advertisements using background substitution
01/12/12Binary code change vulnerability prioritization
01/12/12Methods for supporting users with task continuity and completion across devices and time
01/05/12Unintentional touch rejection
01/05/12Mediation of tasks based on assessments of competing cognitive loads and needs
01/05/12Health care policy development and execution
01/05/12Combining human and machine intelligence to solve tasks with crowd sourcing
01/05/12Predicting escalation events during information searching and browsing
01/05/12Integrating specialized knowledge sources into a general search service
01/05/12Logical recovery with unbundled transaction services
01/05/12Using computational engines to improve search relevance
01/05/12Dynamic asset monitoring and management using a continuous event processing platform
01/05/12Extracting facts from social network messages
01/05/12Using distributed queues in an overlay network
01/05/12Managing recurring appointments
01/05/12Collaborative ranking and filtering of electronic mail messages
01/05/12Non-volatile memory cache performance improvement
01/05/12Predictive computing device power management
01/05/12Small form factor web browsing
01/05/12Smart copy/paste of graphical nodes
01/05/12Indexable type transformations
01/05/12Application context based access control
08/16/12Social network based contextual ranking

ARCHIVE: New 2017 2016 2015 2014 2013 2012 2011 2010 2009


This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. is not affiliated or associated with Microsoft Corporation in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Microsoft Corporation with additional patents listed. Browse our Agent directory for other possible listings. Page by