At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
System and method for inputting user commands to a processor
A system for inputting operation system (OS) commands to a data processing device. The system comprises a video camera that captures images of a viewing space....
EUV mask inspection system
Disclosed are apparatuses, methods, and lithographic systems for EUV mask inspection. An EUV mask inspection system can include an EUV illumination source, an...
Crystal analysis apparatus, composite charged particle beam device, and
crystal analysis method
A crystal analysis apparatus includes: a measurement data storage configured to store electron back-scattering pattern (EBSP) data measured at electron beam...
System and method for identification of biological tissues
The present invention provides for a system, method, and device for analyzing, localizing and/or identifying tissue types. The method includes analyzing,...
Detecting a leak, or the like, with high accuracy on the basis of pressure and a flow volume acquired during use of fluid is made possible. A volume of gas...
Driver behavior from probe data for augmenting a data model
In one implementation, sets of probe data are collected by probe vehicles. The probe data describes the driving characteristics of the probe vehicles. The sets...
Method and system for classification of photo-plethysmographically
detected respiratory effort
Embodiments disclosed herein may include systems and methods for determining a patient's respiratory effort and blood oxygen saturation based on data acquired...
C-arm computerized tomography system
A system and method for generating CT-type three dimensional imaging information from a conventional C-arm fluoroscope system. This enables the adaptation of...
Footwear assembly with integral footbed suspension system
A footwear assembly with integral footbed suspension system is disclosed. A shoe comprises a sole, a blade extending away from the sole, an Energy Return System...
Systems and methods for determining malicious-attack exposure levels based
on field-data analysis
A computer-implemented method for determining malicious-attack exposure levels based on field-data analysis may include (1) receiving a plurality of attack...
Crawling multiple markets and correlating
A crawler program collects and stores application programs including application binaries and associated metadata from any number of sources such as official...
Method and system for dynamic protocol decoding and analysis
A method for dynamically decoding protocol data on a computer system is provided using a protocol decoder, which inspects and analyzes protocol data received by...
Adaptive secondary authentication criteria based on account data
An authentication challenge system for performing secondary authentication for an account associated with an online store is described. In one embodiment, the...
Experiment manager for manycore systems
An execution environment may have a monitoring, analysis, and feedback loop that may configure and tune the execution environment for currently executing...
System and method for automated assignment of virtual machines and
physical machines to hosts
A system and method for reconfiguring a computing environment comprising a consumption analysis server, a placement server, an infrastructure management client...
Systems and methods for information flow analysis
Computer-implemented methods for analyzing computer programs written in semi-structured languages are disclosed. The method is based on unification of the two...
Creating dynamic interactive views from trace events for performing
deterministic performance analysis
View definitions are created for deterministic performance analysis in real-time computing systems, and can then be used to present views for analyzing outliers...
Systematic failure remediation
Aspects of the present invention provide a tool for analyzing and remediating an update-related failure. In an embodiment, a failure state of a computer system...
Malfunction analysis apparatus, malfunction analysis method, and recording
A malfunction analysis apparatus (100) is provided with a malfunction-analysis processor (107), an attribute-extraction processor (108), and an outputter (105)....
Computer security threat data collection and aggregation with user privacy
An endpoint computer in an enterprise network is configured to detect computer security threat events, such as presence of a computer virus. Upon detection of a...
Detection and prevention of unwanted content on cloud-hosted services
The problem of abuse of privileges at cloud-hosted service sites is addressed at the sign-up stage by identifying suspicious or abusive users and preventing...
Cluster performance monitoring
Embodiments are directed towards the visualization of machine data received from computing clusters. Embodiments may enable improved analysis of computing...
Campaign and competitive analysis and data visualization based on search
Techniques for providing interactive visualizations for an entity or group of entities based on search interest data are provided. The search interest data may...
Unified interactive data analysis system
A system for analyzing data from a data set is disclosed. The system includes analysis logic responsive to a dimensional analysis control and an attribute...
Optimization to identify nearest objects in a dataset for data analysis
In one embodiment, a plurality of objects associated with a dataset and a specified number of nearest objects to be identified are received. The received...
Systems and methods for classifying documents for data loss prevention
A computer-implemented method for classifying documents for data loss prevention may include 1) identifying training documents for a machine learning classifier...
Systems and methods for identifying personalized vascular implants from
patient-specific anatomic data
Embodiments include methods of identifying a personalized cardiovascular device based on patient-specific geometrical information, the method comprising:...
Systems and methods for identifying personalized vascular implants from
patient-specific anatomic data
Embodiments include methods of identifying a personalized cardiovascular device based on patient-specific geometrical information, the method comprising...
Systems and methods for analyzing building operations sensor data
Systems and methods are disclosed for analyzing building sensor information and decomposing the information therein to a more manageable and more useful form....
Method and system for performing diagnostics or software maintenance for a
A method and system for performing diagnostics or software maintenance on a vehicle comprises recording high-fidelity data at the vehicle consistent with...
Automating predictive maintenance for automobiles
An approach is provided to automate predictive vehicle maintenance. In the approach, a vehicle's information handling system receives vehicle data transmissions...
Signal analysis in implantable cardiac treatment devices
Methods and devices for cardiac signal analysis in implantable cardiac therapy systems. Several signal processing and/or conditioning methods are shown...
Use of impedance techniques in breast-mass detection
A device is described for measuring electrical characteristics of biological tissues with one or a plurality of electrodes and a processor controlling the...
Beamformer coefficients may include a plurality of sets of theoretical statistical data for theoretical signals. Each theoretical signal may have its own...
Partial response equalizer and related method
A multi-phase partial response receiver supports various incoming data rates by sampling PrDFE output values at a selected one of at least two clock phases. The...
Systems and methods for comparative load analysis in storage networks
Methods and systems for collecting, analyzing, and presenting traffic loads in each part of a storage area network are described. These methods and systems...
Downhole telemetry system
A downhole telemetry system usable with a subterranean well comprises at least one pressure pulse generator, at least one pressure transmitter located in an...
Mask inspection with fourier filtering and image compare
A mask inspection system with Fourier filtering and image compare can include a first detector, a dynamic Fourier filter, a controller, and a second detector....
Analyzing large data sets using digital images
Approaches for analyzing large data sets using a digital image. A hardware or software component may arrange values of one or more data sets into a table. Each...
Multiple viewshed analysis
Viewshed intersection analysis and usage is disclosed. A plurality of object positions is obtained. Each object position is associated with a range. A relevant...
Estimating fingertip position using image analysis
A computing device and/or application executing on the device can utilize fingertip tracking using a camera. However, when the fingertip is in a dead zone (an...
Facility monitoring/controlling system and facility monitoring/controlling
A facility monitoring/controlling system and method enabling provision of a screen display function having an adequate real-time property in the range of a low...
System and method of data cognition incorporating autonomous security
Autonomous embedded data cognition enables data to perform real-time environmental configuration control, self-manage, perform analysis, determine its current...
Detection of malicious script operations using statistical analysis
A security server renders a plurality of web pages. The security server logs script operations of the plurality of web pages that are performed when the web...
Using new edges for anomaly detection in computer networks
Creation of new edges in a network may be used as an indication of a potential attack on the network. Historical data of a frequency with which nodes in a...
Automated discovery of resource definitions and relationships in a
Embodiments of the invention use incomplete metadata, automated heuristics, and user input to construct a data model implemented by a set of commands used in a...
Method and apparatus for generating gate-level activity data for use in
clock gating efficiency analysis
A mechanism for generating gate-level activity data for use in clock gating efficiency analysis of an integrated circuit (IC) design is provided. Generating the...
Monitoring and analysis of operating states in a computing environment
A set of techniques is described for monitoring and analyzing crashes and other malfunctions in a multi-tenant computing environment (e.g. cloud computing...
Data processing failure recovery method, system and program
When reproducing the running state after a failure has occurred in stream data processing, all window operations are used while minimizing the storage amount...
Root cause analysis in a sensor-actuator fabric of a connected environment
In one embodiment, the techniques herein provide that a node may receive indicia of a fault state in one or more components of a computer network. Based on the...