At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Network-accessible signal processing service
Methods and apparatus for a network-accessible signal-processing service are disclosed. A programmatic interface may be established to enable clients to specify...
Detection of network security breaches based on analysis of network record
Computer program products and methods of inspecting a log of security records in a computer network are provided. The method includes retrieving a log record,...
System and method for data quality analysis between untrusted parties
A system and method for data quality analysis between untrusted parties is provided. A dataset having attributes each associated with one or more elements is...
System and method for reducing the data packet loss employing adaptive
transmit queue length
The present invention provides a system and method for reduction of data packet loss for the multiple network interfaces. Particularly, the invention provides a...
Predictive analysis of network analytics
Methods and apparatus for ascertaining trends in network activity data are disclosed. A plurality of trend indicators is calculated for a plurality of values of...
Automated slice milling for viewing a feature
A method and apparatus for performing a slice and view technique with a dual beam system. The feature of interest in an image of a sample is located by machine...
Performing spatial masking with respect to spherical harmonic coefficients
In general, techniques are described by which to perform spatial masking with respect to spherical harmonic coefficients. As one example, an audio encoding...
Game performance determination by incremental revenue
Embodiments of the present invention are directed to methods of determining the performance of a gaming device by analyzing the incremental revenue generated by...
Method, system and apparatus for image capture, analysis and transmission
A method, system and apparatus for image capture, analysis and transmission are provided. A link aggregation method involves identifying controller network...
Dashboard for monitoring energy consumption and demand
A system for presenting a utility consumption dashboard. The dashboard may have one or more panes for displaying energy or other utility consumption related...
System and method for conducting web-based financial transactions in
The present invention provides a system and method that enables users, such as institutional investors and financial institutions, to interactively engage in...
Anomaly detection in spatial and temporal memory system
Detecting patterns and sequences associated with an anomaly in predictions made a predictive system. The predictive system makes predictions by learning spatial...
Systems and methods for predicting optimum run times for software samples
A computer-implemented method for predicting optimum run times for software samples may include (1) identifying a set of training data that identifies (i) a...
Intelligent video analysis system and method
The present disclosure relates to an intelligent video analysis system and method and, more specifically, an intelligent video analysis system and method which...
Server-side malware detection and classification
A server-side system that detects and classifies malware and other types of undesirable processes and events operating on network connected devices through the...
Collection, monitoring, analyzing and reporting of traffic data via
vehicle sensor devices placed at multiple...
Traffic management reports are created from data provided by vehicle sensor devices placed at different fixed locations in a region. Data of vehicles that pass...
Apparatus, system and method for data collection, import and modeling
A method of and system for data analysis, including interrogating a plurality of computer systems to generate for each computer system at least one dump file,...
Enhancing event summaries of synced online content management system
Disclosed are systems, methods, and computer-readable storage media for enhancing event summaries of synced online content management system interactions. Users...
Method and system for validating data integrity
A method of validating data between a first system and at least one second system, wherein the first and second systems have corresponding data volumes, the...
Photo clustering into moments
In one embodiment, a method includes automatically and without user input grouping one or more images captured by a first user into clusters of particular...
Testing framework for applications
An application distribution server may be operable to select a plurality of data processing devices which are capable of receiving application updates. One or...
Method for press forming analysis
A method for press forming analysis includes (1) performing a coordinate transformation to calculate a distribution of stress (a) before a release from the...
System and method for microseismic analysis
This invention provides a method for characterizing natural fracture networks or other textural networks in an Earth formation when using microseismic...
Method and system for assisting in robot control, having a function for
detecting the intention of an operator
A method for assisting in the control of a collaborative robot is provided, comprising a grasping member capable of holding a part at a grasping point, by an...
Exercise data collection system
An exercise data collection system for use with an exercise machine, including a computerized processing unit and at least two sensors mounted on or near the...
Toothbrush usage monitoring
The invention provides a system suitable for monitoring the usage of a toothbrush, the system comprising: (a) a toothbrush; (b) a sound sensor which is located...
Activity analysis, fall detection and risk assessment systems and methods
Aspects of the present disclosure include methods and corresponding systems for performing health risk assessments for a patient in the home environment. In...
Gait analysis system and methods
Systems and methods for analyzing the gait of an individual are disclosed. The disclosed systems and methods can be configured to acquire data from a first...
Non-invasive method and system for characterizing cardiovascular systems
for all-cause mortality and sudden...
Methods and systems for evaluating the electrical activity of the heart to identify novel ECG patterns closely linked to the subsequent development of serious...
Device and method for performing opportunistic sniffing
Recent LTE communications schemes utilize such large amounts of data traffic, that there is little available bandwidth for performing sniffing of nearby base...
Filtering out access point data based on non-conformity with other access
Methods and systems are described for filtering out signal strength data associated with access points and a client device using heuristic and intra-access...
Latency reduction in transposer-based virtual bass systems
A latency reduction system in a virtual bass processing system performs harmonic transposition on low frequency components of an audio signal to generate...
Self powering camera
Approaches provide for a computing device that includes, for example, a camera assembly, a lens assembly. The camera assembly can include an image sensor that...
Method and apparatus for man-in-the-middle agent-assisted client filtering
Example embodiments of the present invention relate to a method, an apparatus and a computer-program product for man-in-the-middle agent-assisted client...
Applying a mitigation specific attack detector using machine learning
In one embodiment, a device in a network detects a network attack using aggregated metrics for a set of traffic data. In response to detecting the network...
Security threat information analysis
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for analyzing data that includes security threat information....
Virtual network flow monitoring
Embodiments perform end-to-end virtual network flow monitoring in a virtual datacenter and provide differentiated views to users based on user role. A target...
Apparatus, system, and method for enhanced reporting and measurement of
A system includes a first device and a second device configured to monitor a plurality of data flows traversing the second device. The second device is...
Component analysis of software applications on computing devices
Detection, identification, and control of application behavior dealing with malware, security risks, data privacy, or resource usage can be difficult in an era...
Nonlinear fourier analysis in optical systems
A receiver configured to receive wave packets encoded with data via a nonlinear channel is disclosed. The receiver includes an input configured to receive the...
Electrostatic mass spectrometer with encoded frequent pulses
A method, apparatus and algorithms are disclosed for operating an open electrostatic trap (E-trap) or a multi-pass TOF mass spectrometer with an extended flight...
Security system health monitoring
An apparatus and method for determining at least one operational condition of a premises based system including at least one premises device. The apparatus...
Vision-based quality metric for three dimensional video
In general, techniques are described for determining a vision-based quality metric for three-dimensional (3D) video. A device (12, 14) comprising a 3D analysis...
Funnel analysis of the adoption of an application
A funnel approach is used to analyze the behavior of users in adopting a software application offered through an electronic store. The electronic store may...
Demographic and media preference prediction using media content data
Methods, systems and computer program products are provided for predicting data. A name or title is obtained from a taste profile. There is an index into a data...
System recommendations based on incident analysis
In one embodiment, a computer-implemented method includes obtaining incident data related to a plurality of servers, including a first server. Configuration...
Predictive and descriptive analysis on relations graphs with heterogeneous
A method provides a random walk model with heterogeneous graphs to leverage multiple source data and accomplish prediction tasks. The system and method...
Processes for generating content sharing recommendations based on image
Processes are disclosed for generating share recommendations for sharing content based at least in part on associated metadata of the content (e.g.,...
Data analysis system
A data analysis system for analyzing data from multiple devices has a database service module including a data storage subsystem storing data from collected...
Methods and systems for the analysis of protein samples
The present invention relates to methods for analyzing protein samples, e.g., monoclonal antibodies, via the SITRS technique, as well as methods and systems...