Patent application number | Description | Published |
20130342527 | AVATAR CONSTRUCTION USING DEPTH CAMERA - A method for constructing an avatar of a human subject includes acquiring a depth map of the subject, obtaining a virtual skeleton of the subject based on the depth map, and harvesting from the virtual skeleton a set of characteristic metrics. Such metrics correspond to distances between predetermined points of the virtual skeleton. In this example method, the characteristic metrics are provided as input to an algorithm trained using machine learning. The algorithm may be trained using a human model in a range of poses, and a range of human models in a single pose, to output a virtual body mesh as a function of the characteristic metrics. The method also includes constructing a virtual head mesh distinct from the virtual body mesh, with facial features resembling those of the subject, and connecting the virtual body mesh to the virtual head mesh. | 12-26-2013 |
20140132499 | DYNAMIC ADJUSTMENT OF USER INTERFACE - Embodiments related to dynamically adjusting a user interface based upon depth information are disclosed. For example, one disclosed embodiment provides a method including receiving depth information of a physical space from a depth camera, locating a user within the physical space from the depth information, determining a distance between the user and a display device from the depth information, and adjusting one or more features of a user interface displayed on the display device based on the distance. | 05-15-2014 |
20150035750 | ERGONOMIC PHYSICAL INTERACTION ZONE CURSOR MAPPING - Users move their hands in a three dimensional (“3D”) physical interaction zone (“PHIZ”) to control a cursor in a user interface (“UI”) shown on a computer-coupled 2D display such as a television or monitor. The PHIZ is shaped, sized, and positioned relative to the user to ergonomically match the user's natural range of motions so that cursor control is intuitive and comfortable over the entire region on the UI that supports cursor interaction. A motion capture system tracks the user's hand so that the user's 3D motions within the PHIZ can be mapped to the 2D UI. Accordingly, when the user moves his or her hands in the PHIZ, the cursor correspondingly moves on the display. Movement in the z direction (i.e., back and forth) in the PHIZ allows for additional interactions to be performed such as pressing, zooming, 3D manipulations, or other forms of input to the UI. | 02-05-2015 |
20150097766 | ZOOMING WITH AIR GESTURES - An NUI system for mediating input from a computer-system user. The NUI system includes a logic machine and an instruction storage machine. The instruction-storage machine holds instructions that cause the logic machine to receive data tracking a change in conformation of the user including at least a hand trajectory of the user. If the data show increasing separation between two hands of the user, the NUI system causes a foreground process of the computer system to be displayed in greater detail on the display. If the data show decreasing separation between the two hands of the user, the NUI system causes the foreground process to be represented in lesser detail. | 04-09-2015 |
20150123890 | TWO HAND NATURAL USER INPUT - Embodiments are disclosed which relate to two hand natural user input. For example, one disclosed embodiment provides a method comprising receiving first hand tracking data regarding a first hand of a user and second hand tracking data regarding a second hand of the user from a sensor system. The first hand tracking data and the second hand tracking data temporally overlap. A gesture is then detected based on the first hand tracking data and the second hand tracking data, and one or more aspects of the computing device are controlled based on the gesture detected. | 05-07-2015 |
20150123901 | GESTURE DISAMBIGUATION USING ORIENTATION INFORMATION - Embodiments are disclosed that relate to controlling a computing device based upon gesture input. In one embodiment, orientation information of the human subject is received, wherein the orientation information includes information regarding an orientation of a first body part and an orientation of a second body part. A gesture performed by the first body part is identified based on the orientation information, and an orientation of the second body part is identified based on the orientation information. A mapping of the gesture to an action performed by the computing device is determined based on the orientation of the second body part. | 05-07-2015 |
20150193107 | GESTURE LIBRARY FOR NATURAL USER INPUT - A method to decode natural user input from a human subject. The method includes detection of a gesture and concurrent grip state of the subject. If the grip state is closed during the gesture, then a user-interface (UI) canvas of the computer system is transformed based on the gesture. If the grip state is open during the gesture, then a UI object arranged on the UI canvas is activated based on the gesture. | 07-09-2015 |
20150193124 | VISUAL FEEDBACK FOR LEVEL OF GESTURE COMPLETION - Embodiments are disclosed that relate to providing feedback for a level of completion of a user gesture via a cursor displayed on a user interface. One disclosed embodiment provides a method comprising displaying a cursor having a visual property and moving a screen-space position of the cursor responsive to the user gesture. The method further comprises changing the visual property of the cursor in proportion to a level of completion of the user gesture. In this way, the level of completion of the user gesture may be presented to the user in a location to which the attention of the user is directed during performance of the gesture. | 07-09-2015 |
20150370349 | ERGONOMIC PHYSICAL INTERACTION ZONE CURSOR MAPPING - Users move their hands in a three dimensional (“3D”) physical interaction zone (“PHIZ”) to control a cursor in a user interface (“UI”) shown on a computer-coupled 2D display such as a television or monitor. The PHIZ is shaped, sized, and positioned relative to the user to ergonomically match the user's natural range of motions so that cursor control is intuitive and comfortable over the entire region on the UI that supports cursor interaction. A motion capture system tracks the user's hand so that the user's 3D motions within the PHIZ can be mapped to the 2D UI. Accordingly, when the user moves his or her hands in the PHIZ, the cursor correspondingly moves on the display. Movement in the z direction (i.e., back and forth) in the PHIZ allows for additional interactions to be performed such as pressing, zooming, 3D manipulations, or other forms of input to the UI. | 12-24-2015 |
Patent application number | Description | Published |
20080249414 | SYSTEM AND METHOD TO MEASURE CARDIAC EJECTION FRACTION - A system and method to acquire 3D ultrasound-based images during the end-systole and end-diastole time points of a cardiac cycle to allow determination of the change and percentage change in left ventricle volume at the time points. | 10-09-2008 |
20090062644 | SYSTEM AND METHOD FOR ULTRASOUND HARMONIC IMAGING - A system includes at least one transducer configured to transmit at least one ultrasound pulse into a region of interest (ROI) of a patient. The pulse has at least a first frequency and propagates through a bodily structure in the ROI. The system further includes at least one receiver configured to receive at least one echo signal corresponding to the pulse. The echo signal includes the first frequency and at least one harmonic multiple of the first frequency. The system further includes a processor configured to automatically determine, from the at least one harmonic multiple, at least one boundary of the bodily structure. In an embodiment, the processor is configured to automatically determine, from the at least one harmonic multiple, an amount of fluid within the bodily structure. | 03-05-2009 |
20090264757 | SYSTEM AND METHOD FOR BLADDER DETECTION USING HARMONIC IMAGING - Systems, methods, and ultrasound transceivers equipped and configured to execute harmonic analysis and extract harmonic information related to a targeted organ of a subject are described. The methods utilize neural network algorithms to establish improved segmentation accuracy of the targeted organ or structures within a region-of-interest. The neural network algorithms, refined for detection of the bladder and to ascertain the presence or absence of a uterus, is optimally applied to better segment and thus confer the capability to optimize measurement of bladder geometry, area, and volumes. | 10-22-2009 |
20110004101 | SYSTEM AND METHOD TO IDENTIFY AND MEASURE ORGAN WALL BOUNDARIES - Systems and methods are described for acquiring, processing, and presenting boundaries of a cavity-tissue interface within a region-of-interest in an ultrasound image based upon the strength of signals of ultrasound echoes returning from structures within the region-of-interest. The segmentation of boundaries of cavity shapes occupying the region-of-interest utilizes cost function analysis of pixel sets occupying the cavity-tissue interface. The segmented shapes are further image processed to determine areas and volumes of the organ or structure containing the cavity within the region-of-interest. | 01-06-2011 |
Patent application number | Description | Published |
20110225192 | AUTO-DETECTION OF HISTORICAL SEARCH CONTEXT - Architecture that automatically detects historical search contexts as well as behaviors related to a search query. Machine learning and hand-authored rules are employed to automatically identify search contexts. Historical information likely to be useful in the current context is surfaced. When a user enters a search query or executes another search behavior, past behaviors are exposed which are contextually related to the current behavior. The architecture also provides automatic discovery of historical contexts, features related to the contexts, and training or authoring of a system for classifying behavior into contexts, using some combination of the machine learning and/or hand-authored rules. A runtime system classifies the current user behavior into a context and surfaces contextual information to the user. | 09-15-2011 |
20110246573 | DISTRIBUTED NON-NEGATIVE MATRIX FACTORIZATION - Architecture that scales up the non-negative matrix factorization (NMF) technique to a distributed NMF (denoted DNMF) to handle large matrices, for example, on a web scale that can include millions and billions of data points. To analyze web-scale data, DNMF is applied through parallelism on distributed computer clusters, for example, with thousands of machines. In order to maximize the parallelism and data locality, matrices are partitioned in the short dimension. The probabilistic DNMF can employ not only Gaussian and Poisson NMF techniques, but also exponential NMF for modeling web dyadic data (e.g., dwell time of a user on browsed web pages). | 10-06-2011 |
20130246429 | MULTI-CENTER CANOPY CLUSTERING - A canopy clustering process merges at least one set of multiple single-center canopies together into a merged multi-center canopy. Multi-center canopies, as well as the single-center canopies, can then be used to partition data objects in a dataset. The multi-center canopies allow a canopy assignment condition constraint to be relaxed without risk of leaving any data objects in a dataset outside of all canopies. Approximate distance calculations can be used as similarity metrics to define and merge canopies and to assign data objects to canopies. In one implementation, a distance between a data object and a canopy is represented as the minimum of the distances between the data object and each center of a canopy (whether merged or unmerged), and the distance between two canopies is represented as the minimum of the distances for each pairing of the center(s) in one canopy and the center(s) in the other canopy. | 09-19-2013 |
20130253888 | ONE-PASS STATISTICAL COMPUTATIONS - Some embodiments of the invention employ algorithms enabling the calculation of one or more statistical moments in a single pass of a dataset. For example, some embodiments may apply algorithms for calculating statistical moments to a dataset using a map-reduce framework, whereby an input dataset is partitioned into multiple shards, a separate map process is used to apply an algorithm enabling calculation of one or more statistical moments in a single scan to each shard, and one or more reduce processes consolidate the results generated by the map processes to calculate the one or more statistical moments across the entire dataset. In other embodiments of the invention, a map-reduce framework may be employed to apply algorithms enabling calculation of a covariance between data elements expressed in a dataset, instead of or in addition to one or more statistical moments. | 09-26-2013 |
20130254280 | IDENTIFYING INFLUENTIAL USERS OF A SOCIAL NETWORKING SERVICE - Techniques for identifying influential users of a social networking service are provided. Influential users may be identified via an algorithm in which an influence score is assigned to each user based at least in part on other members of the community users having taken an affirmative step with respect to the user's communications. Iterative processing may be performed, with each user's influence score being determined by contributions from other users, and each contribution being determined by the contributor's influence score as of a prior iteration. A map-reduce framework may be employed, with data representing the community being partitioned into a plurality of discrete shards, a map process corresponding to each shard calculating an influence score for users represented in the shard, and reduce processes ranking users according to influence score across all shards. | 09-26-2013 |
20130339000 | IDENTIFYING COLLOCATIONS IN A CORPUS OF TEXT IN A DISTRIBUTED COMPUTING ENVIRONMENT - Technologies pertaining to computing a metric that is indicative of whether an n-gram in a large corpus of text is a collocation are described herein. The metric is computed in connection with a distributed computing framework, wherein n-grams of varying lengths can be analyzed in a single input data pass, and wherein secondary sorting functionality of the distributed computing framework need not be invoked. | 12-19-2013 |
20130346424 | COMPUTING TF-IDF VALUES FOR TERMS IN DOCUMENTS IN A LARGE DOCUMENT CORPUS - Technologies pertaining to computing a respective TF-IDF value for each term in each document of a relative large document corpus are described herein. TF-IDF values are computed with respect to terms in documents of a large document corpus by in a single pass over the document corpus. Secondary sorting functionality of a distributed computing framework is exploited to compute TF-IDF values efficiently. | 12-26-2013 |
20130346466 | IDENTIFYING OUTLIERS IN A LARGE SET OF OBJECTS - Described herein are various technologies pertaining to identifying global outlier candidates from a relatively large collection of computer-readable objects in a distributed computing environment. The collection of computer-readable objects is partitioned into a plurality of sets of objects, and local outlier candidates are identified from each set of objects in the plurality of sets of objects. The local outlier candidates are updated through a hierarchical pairwise similarity analysis until global outlier candidates are identified. Thereafter, a pairwise similarity analysis is undertaken with respect to the global outlier candidates and the sets of objects in the plurality of sets of objects to identify true global outliers. | 12-26-2013 |
20140189000 | SOCIAL MEDIA IMPACT ASSESSMENT - A system for identifying influential users of a social network platform. The system may compute a score for each of multiple users. Such a score may be topic-based, leading to a more accurate identification of influential users. Such a topic-based score may indicate authority and/or impact of a user with respect to a topic. The impact may be computed based on authority combined with other factors, such as power of the user. The authority score may be simply computed, in whole or in part, directly from a tweet log without, for example creating a retweet graph. As a result, the scores may be computed, using MapReduce primitives or other constructs that allow the computations to be distributed across multiple parallel processors. Such scores may be used to select users based on impact as part of social trend analysis, marketing or other functions. | 07-03-2014 |
20140189536 | SOCIAL MEDIA IMPACT ASSESSMENT - A system for identifying influential users of a social network platform. The system may compute a score for each of multiple users. Such a score may be topic-based, leading to a more accurate identification of influential users. Such a topic-based score may indicate authority and/or impact of a user with respect to a topic. The impact may be computed based on authority combined with other factors, such as power of the user. The authority score may be simply computed, in whole or in part, directly from a tweet log without, for example creating a retweet graph. As a result, the scores may be computed, using MapReduce primitives or other constructs that allow the computations to be distributed across multiple parallel processors. Such scores may be used to select users based on impact as part of social trend analysis, marketing or other functions. | 07-03-2014 |
20150039619 | GROUPING DOCUMENTS AND DATA OBJECTS VIA MULTI-CENTER CANOPY CLUSTERING - A canopy clustering process merges at least one set of multiple single-center canopies together into a merged multi-center canopy. Multi-center canopies, as well as the single-center canopies, can then be used to partition data objects in a dataset. The multi-center canopies allow a canopy assignment condition constraint to be relaxed without risk of leaving any data objects in a dataset outside of all canopies. Approximate distance calculations can be used as similarity metrics to define and merge canopies and to assign data objects to canopies. In one implementation, a distance between a data object and a canopy is represented as the minimum of the distances between the data object and each center of a canopy (whether merged or unmerged), and the distance between two canopies is represented as the minimum of the distances for each pairing of the center(s) in one canopy and the center(s) in the other canopy. | 02-05-2015 |
Patent application number | Description | Published |
20090253405 | Intelligent Real Time Billing for Messaging - Traditional systems and methods of billing for text messages for prepaid customers are improved by offering a service provider a series of features relating to intelligent and customized billing. These features include the ability to determine priority of messages sent for certain purposes such as SMS Voting, participating in contests, and other uses, and subsequently processing the billing requests generated by these messages in a dynamic manner in real time or close to real time through dynamic late-billing. The service provider has the option of arranging relevant billing requests in queues and queue groups, and allocating system resources for processing billing requests in order of priority. The end result is increased revenue for the mobile operator and greater customer satisfaction. | 10-08-2009 |
20100130162 | ROUTING SYSTEM THAT ENABLES CHARGING FOR APPLICATION-TO-APPLICATION ROUTING OF MESSAGES FORMATTED IN A MOBILE PHONE MESSAGING STANDARD - A message routing system that enables charging for messages that are formatted in a mobile phone messaging standard and routed between software applications. The mobile phone messaging standard may be, for example, the Short Message Service standard or the Multimedia Messaging Service standard. The routing system receives a message from a mobile device or from an application server. The routing system screens the message to determine whether the message should be delivered to a recipient. If the message passes the screening check, the routing system routes the message for delivery to a recipient mobile device or application server. The system may receive and route the message over any type of network, whether wired or wireless. In accordance with configurable business rules, the routing system generates a charging data record associated with the message to allow the message sender and/or message recipient to be billed for the message. | 05-27-2010 |
20130078904 | Content Source, Content Sink, And Method for Natively Managing and Delivering Active Content From One or More Content Sources to One or More Content Sinks Wirelessly - A content source, a content sink, and a method for natively managing and delivering active content are provided. The content source wirelessly exchanges management information with the content sink, identifies and manages the content sink, and transmits active content to the content sink whereby the content sink displays the active content. | 03-28-2013 |
Patent application number | Description | Published |
20130159281 | EFFICIENT QUERYING USING ON-DEMAND INDEXING OF MONITORING TABLES - Embodiments are directed to replicating database tables for efficient data querying and to using a background task to update a database index table on a periodic basis. In one scenario, a computer system accesses an existing, original time-based database table that includes various entities and properties for each entity. Each entity also includes a time stamp value. The computer system receives an indication that the new index table is to be indexed according to a user-specified property and sorts the new index table based on both the value of the user-specified property and the time stamp value of the entity to which the user-specified property belongs. The computer system then periodically copies the entities and associated properties of the original time-based database table into a new database index table. | 06-20-2013 |
20140164376 | HIERARCHICAL STRING CLUSTERING ON DIAGNOSTIC LOGS - A set of strings can be assigned to clusters utilizing one or more clustering techniques. In accordance with one aspect, hierarchical clustering can be performed in which there are several iterations of clustering. For instance, strings can be clustered based on string length, and each cluster can be assigned to separate sub-clusters based on edit distance between strings. In accordance another aspect, clusters can be analyzed based on the similarity or difference of strings in a cluster to determine if a clustering error exists, and if a clustering error is detected, the cluster can be partitioned into separate clusters. | 06-12-2014 |
20140172887 | MINING FOR STATISTICAL ENUMERATED TYPE - Time-based event stream attributes are analyzed to determine whether the attributes are of a statistical enumerated type, or, in other words, whether the attributes comprise statistically fixed sets of unique values, for instance. The analysis can involve determining a magnitude of change to a set of unique attribute values. In one instance, such a determination can be performed as a function of a number, or count, of unique values. Further, event stream processing can be performed dynamically, for instance, by partitioning data into time intervals and processing the intervals incrementally. | 06-19-2014 |
20160063069 | MINING FOR STATISTICAL ENUMERATED TYPE - Event stream attributes are analyzed to determine whether the attributes are of a statistical enumerated type, or, in other words, whether the attributes comprise statistically fixed sets of unique values, for instance. The analysis can involve determining a magnitude of change to a set of unique attribute values. In one instance, such a determination can be performed as a function of a number, or count, of unique values. Further, event stream processing can be performed dynamically, for instance, by partitioning data into time intervals and processing the intervals incrementally. | 03-03-2016 |
Patent application number | Description | Published |
20100125471 | FINANCIAL JOURNALS IN FINANCIAL MODELS OF PERFORMANCE SERVERS - Architecture that employs a journal assignment that can be created on demand when journal is created, and operates outside the business cycle. The assignment is routed to reviewers and approvers based on predefined company policy that users define. The assignment encloses a changelist of data changes created by the journal. The changelist is used for rendition and calculation for reviewers and approvers (in addition to the journal contributor) to view/verify and modify the data as if the data is already written into the model. At the time that other users access this model, the data is not present. At the end of the successful workflow chain the changelist is written into the model. If failed, the changelist will be used as that basis for correction or the user can discard the changelist. | 05-20-2010 |
20100125549 | MAINTAINING CLIENT DATA INTEGRITY IN A DISTRIBUTED ENVIRONMENT USING ASYNCHRONOUS DATA SUBMISSION - Data processing architecture where submitters can write data and/or metadata changes to a destination through an asynchronous interface. The architecture includes a ticketing system that issues a ticket (a unique identifier) to the submitter in response to receiving a changelist from the submitter. When the changes are successfully completed at the destination, the cached destination data can be re-downloaded to the submitter, and the changes cached in the submitter, discarded. Absent this capability, a user has to manually manage the cached changes and cached data. The architecture can be distributed in that multiple submitters can submit changelists. The destination provides data integrity by managing submissions to assist in ensuring data integrity across multiple submissions. Automatic changelist cleanup is provided on the submitter so that changelists do not impact performance, memory, and storage. | 05-20-2010 |
20100125578 | SCALABLE SELECTION MANAGEMENT - Architecture for handling large data selections with small and substantially constant memory footprints. The architecture facilitates the creation of sets of data objects (e.g., rows) of a data source based on selection of the data objects. The set structures can be defined according to a range (span) of data objects selected and a pattern of the objects selected. These set structures are then saved in memory, rather than the data objects, to provide optimized memory usage. In a database implementation, the solution stores the set representation (the structure) in nearly a constant amount of memory, regardless of the number of rows in the grid, and regardless of the number of rows selected. Memory usage can be proportional to the number of discontinuous spans of rows selected by the user. Structures in memory can be consolidated, replaced, or eliminated dynamically as the user changes row selections and pattern criteria. | 05-20-2010 |
20100146014 | EXTENDABLE BUSINESS TYPE SYSTEM IN A PERFORMANCE MANAGEMENT PLATFORM - Architecture for operating an industrial solution on top of a performance management platform using a custom business type library. The platform can plug/unplug the custom business type library, interacts with the type library to ensure data integrity and enforce business rules, and simplifies localizations of the industrial solution. The custom type library extends the capability to define specific behavior for models and dimensions, and create and define content specific to any industry, reuse, and packaging. The custom type library inherits from a generic type library of the platform. The customized type library defines business object types and associates business rules therewith. Through a common interface, the performance management platform can iterate through the business rule chains and enforce/apply the business rules during the operations. | 06-10-2010 |
20120254104 | MAINTAINING CLIENT DATA INTEGRITY IN A DISTRIBUTED ENVIRONMENT USING ASYNCHRONOUS DATA SUBMISSION - Data processing architecture where submitters can write data and/or metadata changes to a destination through an asynchronous interface. The architecture includes a ticketing system that issues a ticket (a unique identifier) to the submitter in response to receiving a changelist from the submitter. When the changes are successfully completed at the destination, the cached destination data can be re-downloaded to the submitter, and the changes cached in the submitter, discarded. Absent this capability, a user has to manually manage the cached changes and cached data. The architecture can be distributed in that multiple submitters can submit changelists. The destination provides data integrity by managing submissions to assist in ensuring data integrity across multiple submissions. Automatic changelist cleanup is provided on the submitter so that changelists do not impact performance, memory, and storage. | 10-04-2012 |
20160078075 | SCALABLE SELECTION MANAGEMENT - Architecture for handling large data selections with small and substantially constant memory footprints. The architecture facilitates the creation of sets of data objects (e.g., rows) of a data source based on selection of the data objects. The set structures can be defined according to a range (span) of data objects selected and a pattern of the objects selected. These set structures are then saved in memory, rather than the data objects, to provide optimized memory usage. In a database implementation, the solution stores the set representation (the structure) in nearly a constant amount of memory, regardless of the number of rows in the grid, and regardless of the number of rows selected. Memory usage can be proportional to the number of discontinuous spans of rows selected by the user. Structures in memory can be consolidated, replaced, or eliminated dynamically as the user changes row selections and pattern criteria. | 03-17-2016 |
Patent application number | Description | Published |
20130063482 | APPLICATION PROGRAMMING INTERFACE FOR A BITMAP COMPOSITION ENGINE - An application programming interface is provided by an operating system that includes a direct composition engine. The composition engine maintains a data structure that represents the display objects to be rendered on a desktop display. The application programming interface allows an application to write data to the data structure to update the display object, such as a window, for the application. Thus, multiple applications can update their respective display objects in this data structure. The direct composition engine is an operating system level process, presented to user-level processes as a service of the operating system. By having an operating system level process, performance standards can be maintained. The application programming interface also allows applications to provide display information that can be rendered more efficiently by the operating system than by the application. | 03-14-2013 |
20130174325 | Hosiery with Sheer Outer Layer and Skin Color Base Layer - Hosiery with a sheer outer layer and a base layer of skin tone color. The said article creates the illusion of wearing sheer hosiery while providing reinforced thermal comfort provided by the base layer of skin color when worn. The base layer also helps relieve slippery discomfort primarily around the sole area that results from poor ventilation commonly seen in conventional sheer hosiery. The processes may include attaching conventional sheer or translucent hosiery onto a skin-toned base layer of the same shape. The base layer shall be made of stretchable fabric that matches the skin color of the wearer to mimic bare leg or foot. For additional warmth and thermal protection, the base layer may be comprised of thermal lining fabric such as cotton, wool and other fleece-like materials. | 07-11-2013 |
20140344729 | PRIMITIVE-BASED COMPOSITION - Primitive-based composition techniques are described. In one or more implementations, a global composition system may be configured to perform rendering for a plurality of applications. For example, the global composition system may be configured to expose one or more application programming interfaces (APIs) that are accessible to the applications. The APIs may then be used to cause a single composition engine to perform the rendering for the plurality of applications. Further, the composition engine may support the use of primitives, which include one or more rendering instructions and thus an element associated with a visual to be rendered may be something other than a bitmap. | 11-20-2014 |
20160071315 | Convex Polygon Clipping During Rendering - In one example, a graphic computing device may apply a clipping technique to accurately and efficiently render a graphic data set. A central processing unit may generate a convex polygonal clip from a two-dimensional polygon. The central processing unit may calculate a clipping plane for a convex polygonal clip based on an edge of the convex polygonal clip. A graphics processor may apply the convex polygonal clip in a pixel shader. | 03-10-2016 |
Patent application number | Description | Published |
20080222273 | Adaptive rendering of web pages on mobile devices using imaging technology - Described is browsing websites with a small form-factor (e.g., mobile) device that is similar to a desktop browsing experience, without requiring websites to redesign pages for such devices. A server responds to client requests for page content by providing server-rendered image data to the requesting client, along with properties of elements of the page represented in the image data. The client displays a representation of the page based on the image data, and uses the property data to emulate interaction with the page rather than the image that is actually being displayed. The server may provide tiles corresponding to zoomed-in portions of the page, or the client device may generate tiles from the image data. Using the tiles, element properties and a moveable/resize-able zoom rectangle provided to the user, the client device can zoom into the page to facilitate interaction with the elements in that area. | 09-11-2008 |
20080222530 | Navigating user interface controls on a two-dimensional canvas - Described is a technology for two-dimensional navigation among user interface controls of a canvas based on up, down, left or right navigational commands received from a two-dimensional directional input mechanism such as a D-Pad, such as on a mobile device. Navigation includes iterating over candidate controls to determine which will control be chosen receive focus based on a received navigational command, the control that currently has focus, and criteria including distance and relative position of each candidate control to the control currently having focus. Vertical distance (alignment) as well as absolute distance may be used to determine the candidate control having the least computed distance. Direction and whether the candidate control is also currently visible in a viewport when the control having focus is currently visible in the viewport are other criteria that may be used in selecting a chosen control on which focus will be set. | 09-11-2008 |
20090080526 | DETECTING VISUAL GESTURAL PATTERNS - A processing device and method are provided for capturing images, via an image-capturing component of a processing device, and determining a motion of the processing device. An adaptive search center technique may be employed to determine a search center with respect to multiple equal-sized regions of an image frame, based on previously estimated motion vectors. One of several fast block matching methods may be used, based on one or more conditions, to match a block of pixels of one image frame with a second block of pixels of a second image. Upon matching blocks of pixels, motion vectors of the multiple equal-sized regions may be estimated. The motion may be determined, based on the estimated motion vectors, and an associated action may be performed. Various embodiments may implement techniques to distinguish motion blur from de-focus blur and to determine a change in lighting condition. | 03-26-2009 |
20090176451 | ENCODED COLOR INFORMATION FACILITATING DEVICE PAIRING FOR WIRELESS COMMUNICATION - Pairing information is encoded as color information by a color coding device. The encoded color information is displayed by the color coding device and viewed by a color decoding device. The color decoding device decodes the encoded pairing information and uses the decoded pairing information to establish wireless communication with the color coding device. | 07-09-2009 |
20120159404 | DETECTING VISUAL GESTURAL PATTERNS - A processing device and method are provided for capturing images, via an image-capturing component of a processing device, and determining a motion of the processing device. An adaptive search center technique may be employed to determine a search center with respect to multiple equal-sized regions of an image frame, based on previously estimated motion vectors. One of several fast block matching methods may be used, based on one or more conditions, to match a block of pixels of one image frame with a second block of pixels of a second image. Upon matching blocks of pixels, motion vectors of the multiple equal-sized regions may be estimated. The motion may be determined, based on the estimated motion vectors, and an associated action may be performed. Various embodiments may implement techniques to distinguish motion blur from de-focus blur and to determine a change in lighting condition. | 06-21-2012 |
Patent application number | Description | Published |
20100054584 | IMAGE-BASED BACKGROUNDS FOR IMAGES - In accordance with one or more aspects of the image-based backgrounds for images, an image is analyzed in order to identify a color that represents the image. An enhanced background is generated based at least in part on the identified color, and both the image and the enhanced background are output on a screen. In addition, or alternatively, the identified color can be saved as being associated with the image in order to be used to generate an enhanced background for the image when the image is displayed. | 03-04-2010 |
20120300019 | ORIENTATION-BASED GENERATION OF PANORAMIC FIELDS - A field sensor may be capable of generating a panoramic field, e.g., by instructing the user to capture a sequence of fields of the panorama, performing a field evaluation to identify one or more landmarks depicted in overlapping areas of two contiguous fields, performing a field registration therebetween, and stitching together the panoramic field. However, panoramic field stitching based on field evaluation may fail to register two fields accurately or at all. Rather, panoramic field stitching may be performed using a device having an orientation sensor that detects the orientation of the device while capturing each field with a field sensor. The detected orientation may be used to orient the fields within a projection, from which a panoramic field may be accurately stitched. Additional variations include stitching together projections of the panorama captured at different times and utilizing fields captured at a distance from the root location of the panorama. | 11-29-2012 |
20130002702 | IMAGE-BASED BACKGROUNDS FOR IMAGES - In accordance with one or more aspects of the image-based backgrounds for images, an image is analyzed in order to identify a color that represents the image. An enhanced background is generated based at least in part on the identified color, and both the image and the enhanced background are output on a screen. In addition, or alternatively, the identified color can be saved as being associated with the image in order to be used to generate an enhanced background for the image when the image is displayed. | 01-03-2013 |
Patent application number | Description | Published |
20090006409 | METADATA-BASED APPLICATION DEPLOYMENT - Computer-implemented methods, computer-readable media, and an application system are disclosed for creating and deploying metadata-generated applications. Access is provided to one or more type libraries that each include one or more defined object types configurable for use in generating the application. The defined object types include data structure types, rule types, and data types. Input is elicited from a user regarding desired content and function of the application. Based on the user input, metadata is generated to adapt the defined object types to generate the application. Metadata is generated to adapt the defined data structure types to create one or more application databases, to adapt the defined rule types to create one or more application behaviors, and to adapt the defined data types to create one or more application data types. | 01-01-2009 |
20090113283 | METHOD FOR CAPTURING DESIGN-TIME AND RUN-TIME FORMULAS ASSOCIATED WITH A CELL - An interface for designing a report is provided, with elements of the report being disposed at intersections of report positions and configured to present information derived from data in a database. A formula is associated with one or more selected elements in the report to generate a result for the one or more selected elements. A tuple identifying the report positions of the one or more selected elements is associated and stored with the formula in a formula list associated with the report. The report is configured so that, when the report is generated, it is determined whether identifying report positions corresponding to an identified element in the report correspond with the tuple in the formula list. Upon determining the tuple corresponds with the identifying report positions for the identified element, the formula associated with the tuple is applied to generate the result. | 04-30-2009 |
20090133132 | Secure Authoring and Execution of User-Entered Database Programming - A secure framework for authoring and execution of user-entered database scripts, rules, procedures and other forms of programming is provided. A performance management application is used as an interface between a client data modeling, manipulation or analysis application and one or more data sources or analysis services to prevent malicious or inadvertent implementation of harmful, damaging and/or unauthorized new or modified scripts, rules, procedures or other forms of programming to one or more data sources or data analysis/manipulation services that may be used for retrieving, storing, modifying or using data contained in or affected by the one or more data sources or data analysis/manipulation services. | 05-21-2009 |
20100293449 | METHOD FOR EXPANDING AND COLLAPSING DATA CELLS IN A SPREADSHEET REPORT - Data cells in a spreadsheet report are collapsed and expanded without disrupting other spreadsheet data. A user may want to drill down on data corresponding to a parent member of the report to display more detailed information about the parent member. Likewise, a user may want to drill up the displayed information corresponding to the parent member to hide detailed information associated with the parent member. Before expanding or collapsing a report, the spreadsheet is scanned for information to determine whether the display of other data in the spreadsheet would be disrupted by the expansion/collapse. The information may include cross-join information associated with the parent member, the number of child members associated with the parent member, the dimension of the report created by the parent member and the associated child members, and other reports that may be linked to the report that includes the parent member. | 11-18-2010 |
20130290823 | METHOD FOR EXPANDING AND COLLAPSING DATA CELLS IN A SPREADSHEET REPORT - Data cells in a spreadsheet report are collapsed and expanded without disrupting other spreadsheet data. A user may want to drill down on data corresponding to a parent member of the report to display more detailed information about the parent member. Likewise, a user may want to drill up the displayed information corresponding to the parent member to hide detailed information associated with the parent member. Before expanding or collapsing a report, the spreadsheet is scanned for information to determine whether the display of other data in the spreadsheet would be disrupted by the expansion/collapse. The information may include cross join information associated with the parent member, the number of child members associated with the parent member, the dimension of the report created by the parent member and the associated child members, and other reports that may be linked to the report that includes the parent member. | 10-31-2013 |
Patent application number | Description | Published |
20110022893 | DETECTING DATA RACE AND ATOMICITY VIOLATION VIA TYPESTATE-GUIDED STATIC ANALYSIS - Mechanisms for analyzing computer instructions implementing a program in which typestate analysis is informed by concurrency analysis. The concurrency-guided typestate analysis may simulate the “worst case” scenario due to thread interleaving by transitioning a simulated state of the variable to a special state whenever the variable is not guarded by its intended guarding lock. While in the special state, the analysis may assume that the state of the simulated variable is the worst possible state with respect to processing operations that may lead to an error depending on the state of the variable. Thus, the analysis performed may assume that referencing the variable in a state-dependent operation while the simulated state of the variable is in the special state may lead to an error, and the analysis may generate a warning, accordingly. The analysis may process the computer instructions to infer which lock is intended to guard a shared variable. | 01-27-2011 |
20120222009 | DEFECTIVE CODE WARNING RESOLUTION ANALYSIS - In embodiments of defective code warning resolution analysis, defective code warnings are received, such as code development warnings and/or code execution warnings. The defective code warnings can be grouped into warning groups according to properties of each defective code warning. Each instance of a defective code warning in a warning group can then be determined as one of fixed, suppressed, or ignored. Each instance of the defective code warning in the warning group is also aggregated based on each warning state of fixed, suppressed, or ignored. | 08-30-2012 |
20140068567 | DETERMINING RELEVANT EVENTS IN SOURCE CODE ANALYSIS - In embodiments of determining relevant events in source code analysis, a computing device includes a key event manager that is implemented to traverse executable paths in source code of executable software instructions, log events along the executable paths in the source code, and determine a defect in the source code along an executable path in the source code. A state machine is implemented to traverse back through the logged events and determine relevant events that are associated with the defect in the source code. An analysis output of the relevant events can then be generated to indicate the defect in the source code and a cause of the defect. | 03-06-2014 |
Patent application number | Description | Published |
20100081057 | Nanocomposite of graphene and metal oxide materials - Nanocomposite materials comprising a metal oxide bonded to at least one graphene material. The nanocomposite materials exhibit a specific capacity of at least twice that of the metal oxide material without the graphene at a charge/discharge rate greater than about 10C. | 04-01-2010 |
20100178586 | Novel Approach for Improved Stability and Performance of SOFC Metallic Interconnects - The present invention provides a material and a method for its creation and use wherein a reactive element, preferably a rare earth element, is included in an oxide coating material. The inclusion of this material modifies the growth and structure of the scale beneath the coating on metal substrate and improves the scale adherence to the metal substrate. | 07-15-2010 |
20100202952 | NANOWIRE SYNTHESIS FROM VAPOR AND SOLID SOURCES - Methods of the present invention can be used to synthesize nanowires with controllable compositions and/or with multiple elements. The methods can include coating solid powder granules, which comprise a first element, with a catalyst. The catalyst and the first element should form when heated a liquid, mixed phase having a eutectic or peritectic point. The granules, which have been coated with the catalyst, can then be heated to a temperature greater than or equal to the eutectic or peritectic point. During heating, a vapor source comprising the second element is introduced. The vapor source chemically interacts with the liquid, mixed phase to consume the first element and to induce condensation of a product that comprises the first and second elements in the form of a nanowire. | 08-12-2010 |
20110033746 | Self assembled multi-layer nanocomposite of graphene and metal oxide materials - Nanocomposite materials having at least two layers, each layer consisting of one metal oxide bonded to at least one graphene layer were developed. The nanocomposite materials will typically have many alternating layers of metal oxides and graphene layers, bonded in a sandwich type construction and will be incorporated into an electrochemical or energy storage device. | 02-10-2011 |
20110045347 | Self Assembled Multi-Layer Nanocomposite of Graphene and Metal Oxide Materials - Nanocomposite materials having at least two layers, each layer consisting of one metal oxide bonded to at least one graphene layer were developed. The nanocomposite materials will typically have many alternating layers of metal oxides and graphene layers, bonded in a sandwich type construction and will be incorporated into an electrochemical or energy storage device. | 02-24-2011 |
20110111299 | LITHIUM ION BATTERIES WITH TITANIA/GRAPHENE ANODES - Lithium ion batteries having an anode comprising at least one graphene layer in electrical communication with titania to form a nanocomposite material, a cathode comprising a lithium olivine structure, and an electrolyte. The graphene layer has a carbon to oxygen ratio of between 15 to 1 and 500 to 1 and a surface area of between 400 and 2630 m | 05-12-2011 |
20120077067 | Fe-V Redox Flow Batteries - A redox flow battery having a supporting solution that includes Cl | 03-29-2012 |
20120077068 | Redox Flow Batteries Having Multiple Electroactive Elements - Introducing multiple redox reactions with a suitable voltage range can improve the energy density of redox flow battery (RFB) systems. One example includes RFB systems utilizing multiple redox pairs in the positive half cell, the negative half cell, or in both. Such RFB systems can have a negative electrolyte, a positive electrolyte, and a membrane between the negative electrolyte and the positive electrolyte, in which at least two electrochemically active elements exist in the negative electrolyte, the positive electrolyte, or both. | 03-29-2012 |
20120077079 | Redox Flow Batteries Based on Supporting Solutions Containing Chloride - Redox flow battery systems having a supporting solution that contains Cl | 03-29-2012 |
20120088154 | Graphene-Sulfur Nanocomposites for Rechargeable Lithium-Sulfur Battery Electrodes - Rechargeable lithium-sulfur batteries having a cathode that includes a graphene-sulfur nanocomposite can exhibit improved characteristics. The graphene-sulfur nanocomposite can be characterized by graphene sheets with particles of sulfur adsorbed to the graphene sheets. The sulfur particles have an average diameter less than 50 nm. | 04-12-2012 |
20120107213 | Energy Storage Devices Having Electrodes Comprising Nanowires - Methods of the present invention can be used to synthesize nanowires with controllable compositions and/or with multiple elements. The methods can include coating solid powder granules, which comprise a first element, with a catalyst. The catalyst and the first element should form when heated a liquid, mixed phase having a eutectic or peritectic point. The granules, which have been coated with the catalyst, can then be heated to a temperature greater than or equal to the eutectic or peritectic point. During heating, a vapor source comprising the second element is introduced. The vapor source chemically interacts with the liquid, mixed phase to consume the first element and to induce condensation of a product that comprises the first and second elements in the form of a nanowire. | 05-03-2012 |
20120107660 | Redox Flow Batteries Based on Supporting Solutions Comprising a Mixture of Acids - Redox flow battery systems having a supporting solution that contains Cl” ions can exhibit improved performance and characteristics. Furthermore, a supporting solution having mixed SO | 05-03-2012 |
20120164534 | GRAPHENE/LiFePO4 CATHODE WITH ENHANCED STABILITY - A lithium ion battery having an anode, an electrolyte, and a cathode comprising nano-structured carbon in electrical communication with LiFePO | 06-28-2012 |
20120244406 | Iron-Sulfide Redox Flow Batteries - Iron-sulfide redox flow battery (RFB) systems can be advantageous for energy storage, particularly when the electrolytes have pH values greater than 6. Such systems can exhibit excellent energy conversion efficiency and stability and can utilize low-cost materials that are relatively safer and more environmentally friendly. One example of an iron-sulfide RFB is characterized by a positive electrolyte that comprises Fe(III) and/or Fe(II) in a positive electrolyte supporting solution, a negative electrolyte that comprises S | 09-27-2012 |
20120295096 | NANOCOMPOSITE OF GRAPHENE AND METAL OXIDE MATERIALS - Nanocomposite materials comprising a metal oxide bonded to at least one graphene material. The nanocomposite materials exhibit a specific capacity of at least twice that of the metal oxide material without the graphene at a charge/discharge rate greater than about 10 C. | 11-22-2012 |
20120295147 | NANOMATERIALS FOR SODIUM-ION BATTERIES - A crystalline nanowire and method of making a crystalline nanowire are disclosed. The method includes dissolving a first nitrate salt and a second nitrate salt in an acrylic acid aqueous solution. An initiator is added to the solution, which is then heated to form polyacrylatyes. The polyacrylates are dried and calcined. The nanowires show high reversible capacity, enhanced cycleability, and promising rate capability for a battery or capacitor. | 11-22-2012 |
20120305165 | SELF ASSEMBLED MULTI-LAYER NANOCOMPOSITE OF GRAPHENE AND METAL OXIDE MATERIALS - Nanocomposite materials having at least two layers, each layer consisting of one metal oxide bonded to at least one graphene layer were developed. The nanocomposite materials will typically have many alternating layers of metal oxides and graphene layers, bonded in a sandwich type construction and will be incorporated into an electrochemical or energy storage device. | 12-06-2012 |
20130095386 | Metal Fluoride Electrode Protection Layer and Method of Making Same - Modifications to the surface of an electrode and/or the surfaces of the electrode material can improve battery performance. For example, the modifications can improve the capacity, rate capability and long cycle stability of the electrode and/or may minimize undesirable catalytic effects. In one instance, metal-ion batteries can have an anode that is coated, at least in part, with a metal fluoride protection layer. The protection layer is preferably less than 100 nm in thickness. | 04-18-2013 |
20130260204 | Energy Storage Systems Having an Electrode Comprising LixSy - Improved lithium-sulfur energy storage systems can utilizes Li | 10-03-2013 |
20130266836 | Hybrid Energy Storage Systems Utilizing Redox Active Organic Compounds - Redox flow batteries (RFB) have attracted considerable interest due to their ability to store large amounts of power and energy. Non-aqueous energy storage systems that utilize at least some aspects of RFB systems are attractive because they can offer an expansion of the operating potential window, which can improve on the system energy and power densities. One example of such systems has a separator separating first and second electrodes. The first electrode includes a first current collector and volume containing a first active material. The second electrode includes a second current collector and volume containing a second active material. During operation, the first source provides a flow of first active material to the first volume. The first active material includes a redox active organic compound dissolved in a non-aqueous, liquid electrolyte and the second active material includes a redox active metal. | 10-10-2013 |
20140030181 | NANOCOMPOSITE OF GRAPHENE AND METAL OXIDE MATERIALS - Nanocomposite materials comprising a metal oxide bonded to at least one graphene material. The nanocomposite materials exhibit a specific capacity of at least twice that of the metal oxide material without the graphene at a charge/discharge rate greater than about 10 C. | 01-30-2014 |
20140199607 | REDOX FLOW BATTERIES BASED ON SUPPORTING SOLUTIONS CONTAINING CHLORIDE - Redox flow battery systems having a supporting solution that contains Cl | 07-17-2014 |
Patent application number | Description | Published |
20130196224 | Intermediate Temperature Sodium Metal-Halide Energy Storage Devices - Sodium metal-halide energy storage devices utilizing a substituting salt in its secondary electrolyte can operate at temperatures lower than conventional ZEBRA batteries while maintaining desirable performance and lifetime characteristics. According to one example, a sodium metal-halide energy storage device operates at a temperature less than or equal to 200° C. and has a liquid secondary electrolyte having M | 08-01-2013 |
20140079976 | Iron-Sulfide Redox Flow Batteries - Iron-sulfide redox flow battery (RFB) systems can be advantageous for energy storage, particularly when the electrolytes have pH values greater than 6. Such systems can exhibit excellent energy conversion efficicency and stability and can utilize low-cost materials that are relatively safer and more environmentally friendly. One example of an iron-sulfide RFB is characterized by a positive electrolyte that comprises Fe(III) and/or Fe(II) in a positive electrolyte supporting solution, a negative electrolyte that comprises S | 03-20-2014 |
20140203469 | GRAPHENE-SULFUR NANOCOMPOSITES FOR RECHARGEABLE LITHIUM-SULFUR BATTERY ELECTRODES - Rechargeable lithium-sulfur batteries having a cathode that includes a graphene-sulfur nanocomposite can exhibit improved characteristics. The graphene-sulfur nanocomposite can be characterized by graphene sheets with particles of sulfur adsorbed to the graphene sheets. The sulfur particles have an average diameter less than 50 nm. | 07-24-2014 |
20140234536 | Metal Fluoride Electrode Protection Layer and Method of Making Same - Modifications to the surface of an electrode and/or the surfaces of the electrode material can improve battery performance. For example, the modifications can improve the capacity, rate capability and long cycle stability of the electrode and/or may minimize undesirable catalytic effects. In one instance, metal-ion batteries can have an anode that is coated, at least in part, with a metal fluoride protection layer. The protection layer is preferably less than 100 nm in thickness. The anode material is fabricated according to methods that result in improved anode performance. | 08-21-2014 |
20140234753 | REDOX FLOW BATTERIES BASED ON SUPPORTING SOLUTIONS CONTAINING CHLORIDE - Redox flow battery systems having a supporting solution that contains Cl | 08-21-2014 |
20150380757 | REDOX FLOW BATTERY BASED ON SUPPORTING SOLUTIONS CONTAINING CHLORIDE - Redox flow battery systems having a supporting solution that contains Cl | 12-31-2015 |
Patent application number | Description | Published |
20120258687 | ENFORCING DEVICE SETTINGS FOR MOBILE DEVICES - The present invention extends to methods, systems, and computer program products for enforcing device settings for mobile devices. Generally, a computer system enforces appropriate mobile device settings (e.g., policy and/or configuration settings) prior to permitting a mobile device to access maintained data. The computer system receives a request from a mobile device. The computer system determines that current mobile device settings are not appropriate for accessing the maintained data. The computer system sends device settings, representing a new mobile device configuration that is appropriate accessing the maintained data, to the mobile device. The computer system receives an indication that the mobile device is configured in accordance with the device settings. The computer system permits the mobile device to access the maintained data in response to receiving the indication that the mobile device is configured in accordance with the device settings. | 10-11-2012 |
20140089475 | ENFORCING DEVICE SETTINGS FOR MOBILE DEVICES - The present invention extends to methods, systems, and computer program products for enforcing device settings for mobile devices. Generally, a computer system enforces appropriate mobile device settings (e.g., policy and/or configuration settings) prior to permitting a mobile device to access maintained data. The computer system receives a request from a mobile device. The computer system determines that current mobile device settings are not appropriate for accessing the maintained data. The computer system sends device settings, representing a new mobile device configuration that is appropriate accessing the maintained data, to the mobile device. The computer system receives an indication that the mobile device is configured in accordance with the device settings. The computer system permits the mobile device to access the maintained data in response to receiving the indication that the mobile device is configured in accordance with the device settings. | 03-27-2014 |
20150207681 | ENFORCING DEVICE SETTINGS FOR MOBILE DEVICES - The present invention extends to methods, systems, and computer program products for enforcing device settings for mobile devices. Generally, a computer system enforces appropriate mobile device settings (e.g., policy and/or configuration settings) prior to permitting a mobile device to access maintained data. The computer system receives a request from a mobile device. The computer system determines that current mobile device settings are not appropriate for accessing the maintained data. The computer system sends device settings, representing a new mobile device configuration that is appropriate accessing the maintained data, to the mobile device. The computer system receives an indication that the mobile device is configured in accordance with the device settings. The computer system permits the mobile device to access the maintained data in response to receiving the indication that the mobile device is configured in accordance with the device settings. | 07-23-2015 |