Patents Assigned to Microsoft
-
Publication number: 20120014540Abstract: A request is received to play an audio file. A determination is made regarding whether volume normalization parameters associated with the audio file are stored in a media library. If the volume normalization parameters associated with the audio file are stored in the media library, the volume normalization parameters are retrieved from the media library. If the volume normalization parameters associated with the audio file are not stored in the media library, retrieving the volume normalization parameters from the audio file. The volume normalization parameters are applied while playing the audio file. The volume normalization process can be applied across multiple audio files during playback.Type: ApplicationFiled: September 21, 2011Publication date: January 19, 2012Applicant: Microsoft CorporationInventors: Phillip Lu, Adil Sherwani, Kipley J. Olson
-
Publication number: 20120016869Abstract: Functionality is described for collecting and presenting action information. The action information describes actions that take place on items at specified times. Among other applications, the functionality assists a user in identifying and accessing relevant items. In one illustrative case, the functionality can display action information in a timeline presentation.Type: ApplicationFiled: September 28, 2011Publication date: January 19, 2012Applicant: Microsoft CorporationInventors: Ojiakonobi Udezue, Anthony G. Thane, Carmen Zlateff
-
Publication number: 20120016864Abstract: Methods, systems, and media are provided for an optimized search engine index. The optimized index is formed by merging small lower level indexes of fresh documents together into a hierarchical cluster of multiple higher level indexes. The optimized index of fresh documents is formed via a single threaded process, while a fresh index serving platform concurrently serves fresh queries. The hierarchy of higher level indexes is formed by merging lower and/or higher level indexes with similar expiration times together. Therefore, as some indexes expire, the remaining un-expired indexes can be re-used and merged with new incoming indexes. The single threaded process provides fast serving of fresh documents, while also providing time to integrate the fresh indexes into a long term primary search engine index, prior to expiring.Type: ApplicationFiled: July 13, 2010Publication date: January 19, 2012Applicant: MICROSOFT CORPORATIONInventors: JAY KUMAR GOYAL, NEIL SHARMAN, VIBHAAKAR SHARMA, VINAY SUDHIR DESHPANDE, UTKARSH JAIN, GAURAV SAREEN, YINZHE YU, DANIEL YUAN
-
Publication number: 20120017223Abstract: A wireless protocol may be implemented in a smart transceiver device that contains the physical (PHY) and media access control (MAC) layers of the wireless protocol stack. In various embodiments, a serial peripheral interface (SPI) based design may be used. Disclosed is an embodiment of a protocol which may be used to provide control and data transfer to and from the smart transceiver. In particular, an exemplary format of the protocol, the commands, and responses is disclosed. In a further embodiment, an application programming interface (API) is disclosed. The API may provide hardware independent services that can be used to establish, maintain, and transport data to and from the system and the smart transceiver device. In particular, an exemplary and non-limiting set of services, function calls, configuration methods, events, and parameters is disclosed.Type: ApplicationFiled: September 23, 2011Publication date: January 19, 2012Applicant: Microsoft CorporationInventors: David W. RUSSO, Gregory Ray SMITH, Uwe PAKENDORF, Denny GUMLICH
-
Publication number: 20120017172Abstract: Application user interfaces can be displayed on different sizes and types of displays without having to modify the application for each different display by scaling a layout of the user interface automatically for specific displays, especially smaller size displays such as mobile device displays, reducing a need to create customized versions of the application.Type: ApplicationFiled: July 15, 2010Publication date: January 19, 2012Applicant: Microsoft CorporationInventors: Sachin Sheth, Anton Krantz, Ravi Jaiswal, Sanjib Biswas
-
Publication number: 20120016866Abstract: An exemplary system for managing an applications and data space includes a strategy layer configured to receive a query statement and to formulate one or more custom queries based on the query statement and a query scheduler layer configured to schedule issuance of the one or more custom queries to one or more query response modules associated with the applications and data space. Other methods, devices and systems are also disclosed.Type: ApplicationFiled: September 23, 2011Publication date: January 19, 2012Applicant: MICROSOFT CORPORATIONInventors: John D. Dunagan, Albert Greenberg, Emre M. Kiciman, Heather E. Warncke, Alastair Wolman
-
Publication number: 20120016673Abstract: A speaker recognition system generates a codebook store with codebooks representing voice samples of speaker, referred to as trainers. The speaker recognition system may use multiple classifiers and generate a codebook store for each classifier. Each classifier uses a different set of features of a voice sample as its features. A classifier inputs a voice sample of an person and tries to authenticate or identify the person. A classifier generates a sequence of feature vectors for the input voice sample and then a code vector for that sequence. The classifier uses its codebook store to recognize the person. The speaker recognition system then combines the scores of the classifiers to generate an overall score. If the score satisfies a recognition criterion, then the speaker recognition system indicates that the voice sample is from that speaker.Type: ApplicationFiled: September 27, 2011Publication date: January 19, 2012Applicant: Microsoft CorporationInventor: Amitava Das
-
Publication number: 20120013887Abstract: A phase-based TOF system preferably generates an optical waveform with fast rise and fall times, to enhance modulation contrast, notwithstanding there will be many high order harmonics. The system is preferably operated with an odd number of phases, to reduce system bias error due to the higher order harmonics, while maintaining good modulation contrast, without unduly increasing system memory requirements. Preferably the system can dynamically calibrate (and compensate for) higher order harmonics in the TOF generated optical energy waveform, over time and temperature. Within the optical energy transmission channel, or within the optical energy detection channel, detection amplifier gain may be modified, and/or detector signal integration time may be varied, and/or digital values may be employed to implement calibration and error reduction The resultant TOF system can operate with improved phase-vs-distance characteristics, with reduced calibration requirements.Type: ApplicationFiled: April 22, 2011Publication date: January 19, 2012Applicant: MICROSOFT CORPORATIONInventors: Zhanping Xu, Travis Perry, Gage Hills
-
Publication number: 20120014363Abstract: A system and method for providing the ability to discover the capabilities of a user's computer to determine whether it is capable of supporting more than one wireless protocol simultaneously is provided. A computing device's capabilities (including, for example, hardware and/or software capabilities) is checked to determine if it supports at least two specific wireless protocols and checking a computing device's capabilities (including, for example, hardware and/or software capabilities) is checked to determine if it supports both wireless protocols simultaneously. The techniques for determining the computing device's compatibility may include comparing lists of protocol requirements to lists of system capabilities and/or generating test signals by the system according to the protocol.Type: ApplicationFiled: September 26, 2011Publication date: January 19, 2012Applicant: Microsoft CorporationInventors: Amer A. Hassan, Deyun Wu, Hui Shen, Christian Huitema, Thomas W. Kuehnel
-
Publication number: 20120017263Abstract: In an example implementation, a bifurcated security scheme has a first level that does not allow usage of negations and a second level that does permit usage of negations. In another example implementation, an authorization query table maps respective resource-specific operations to respective associated authorization queries. In yet another example implementation, authorization queries are permitted to have negations, but individual assertions are not.Type: ApplicationFiled: September 27, 2011Publication date: January 19, 2012Applicant: MICROSOFT CORPORATIONInventors: Blair B. Dillaway, Moritz Y. Becker, Andrew D. Gordon, Cedric Fournet
-
Publication number: 20120016583Abstract: The automatic generation of multiple sets of directions for navigating geographically to a specific destination without specification of an origin. Based on the destination, candidate roads or other transportation conduits are selected for analysis. Candidate meta-departure points are analyzed and selected along the roads based on distribution about the destination, cardinal directions relative to the destination, road metadata, distance to the destination, driving time, and other factors. The number of departure points generated to represent routes to the destination from the several logical cardinal directions is minimized. The generated departure points also represent routes that a majority of people would likely take to the destination. Additionally, the generated departure points originate from places that users are likely to be familiar with and can get to without additional guidance.Type: ApplicationFiled: September 23, 2011Publication date: January 19, 2012Applicant: MICROSOFT CORPORATIONInventors: Matthew Cheung, Jeffrey D. Couckuyt, Markus Jansen
-
Publication number: 20120014313Abstract: Implementation of opportunistic use of stations in a wireless network as repeaters is described. In one implementation, a station detects the existence of rate anomaly in a wireless network. In response to the rate anomaly, the station may transform into a software repeater for certain other neighboring stations. The repeater function allows for the relaying of packets sent by these neighboring stations to the access point and vice versa. The other neighboring stations, owing to their relative proximity to the repeater station, transmit data at a higher rate to the repeater station. Thus, the removal of the slower stations reduces clogging of the access point and increases the overall data rate within the wireless network. Further, a zero-overhead network coding protocol may be implemented in conjunction with the repeater function to increase capacity of the wireless network.Type: ApplicationFiled: September 26, 2011Publication date: January 19, 2012Applicant: Microsoft CorporationInventors: Ranveer Chandra, Paramvir Bahl, Jitendra D. Padhye, Yan Yu
-
Publication number: 20120013932Abstract: In embodiments of print plug-in isolation, a print system input can be received at a print system, and the print system input can be redirected from the print system to an isolation module that isolates one or more print plug-ins from the print system. The print system input can be processed at the isolation module with the one or more print plug-ins to generate print plug-in output, and the print plug-in output can then be communicated back to the print system from the isolation module.Type: ApplicationFiled: September 22, 2011Publication date: January 19, 2012Applicant: Microsoft CorporationInventors: Frank Gorgenyi, Oliver H. Foehr, Adrian F. Maxa
-
Publication number: 20120016903Abstract: Upon requesting to share one or more types of identity information, a user is automatically presented with an interface through which the user can interact in selecting an amount of identity items to share. A subset of the total identity items selected may then be shared with specified entities. Interfaces can also be used to assist the user in managing identity information that has been shared with others by providing the user with a visual list of entities for which the user has shared specified identity information and to whom updated information can be sent.Type: ApplicationFiled: September 23, 2011Publication date: January 19, 2012Applicant: Microsoft CorporationInventors: Melissa W. Dunn, Marcus Harvey
-
Patent number: 8099373Abstract: An object detector that includes a number of weak classifiers can be trained using a subset (a “working set”) of training data instead of all of the training data. The working set can be updated so that, for example, it remains representative of the training data. A decision to update the working set may be made based on the false positive sample rate—if that rate falls below a threshold value, an update of the working set can be triggered.Type: GrantFiled: February 14, 2008Date of Patent: January 17, 2012Assignee: Microsoft CorporationInventors: Rong Xiao, Xiao-ou Tang
-
Patent number: 8098831Abstract: The presentation of visual feedback in an electronic entertainment system is disclosed. One disclosed embodiment relates to a method of providing user feedback in an electronic entertainment system, wherein the method comprises inviting an input from a user, receiving a user input via a hand-held remote input device, performing a comparison of the user input received to an expected input, assigning a rating to the user input received based upon the comparison to the expected input, and adjusting light emitted by one or more lights sources on the input device based upon the rating.Type: GrantFiled: May 15, 2008Date of Patent: January 17, 2012Assignee: Microsoft CorporationInventors: Vasco Rubio, Eric Filer, Loren Douglas Reas, Dennis W Tom
-
Patent number: 8099494Abstract: A system for automatically adjusting operation of a distributed application program includes analytics means having a monitoring component. The monitoring component receives one or more event streams of data corresponding to execution of one or more modules of the distributed application program. The monitoring component joins the received event streams with one or more declarative models to create operational data. A forensics component of the analytics means queries, such as by using data from a declarative model store, the operational data to identify trends or behavior information for the various modules or components of the distributed application program. A planner component then reviews data created by the forensics component to identify any needed changes to the declarative models. The planner component passes any modified declarative models back to the system, so that the distributed application program can operate more efficiently using the changes to the declarative models, as needed.Type: GrantFiled: March 31, 2011Date of Patent: January 17, 2012Assignee: Microsoft CorporationInventors: Igor Sedukhin, Daniel Eshner, Amol S. Kulkarni, Prasad S. Panditharadhya, Mariusz G. Borsa, Gilles C. J. A. Zunino
-
Patent number: 8099432Abstract: Methods and computer-readable media provide for efficient paging of search results in accordance with the access rights of a user. According to various implementations, a request for a search query results in a calculated number of search results being retrieved and analyzed for user access rights. As documents having user access rights are located, session state information corresponding to the number of located documents having user access rights and to the number of analyzed documents required to locate the number of documents having user access rights is maintained. This information is used to dynamically alter the number of subsequent documents that are retrieved in order to fill a page of results. This minimizes redundant determinations of user access rights and minimizes the number of documents required to be retrieved and analyzed in order to fulfill a search query request.Type: GrantFiled: February 5, 2009Date of Patent: January 17, 2012Assignee: Microsoft CorporationInventors: Arshish Kapadia, Mark Zeller
-
Patent number: 8099458Abstract: A workgroup application with contextual clues. The workgroup application allows any one of multiple participants to provide input, such as commands to edit a document or speech. The effects of the input are presented to other participants in a workgroup session in conjunction with a participant indicator. As one example, each participant may control a cursor that is displayed on the display screens of workstations in a network hosting a workgroup application. Each cursor may be displayed in conjunction with a participant icon that follows the cursor on the display screens. Contextual clues may also be provided by modulating visual properties of the participant icons in response to activity level.Type: GrantFiled: October 27, 2005Date of Patent: January 17, 2012Assignee: Microsoft CorporationInventors: E. Russell Burtner, IV, Thomas Vaughan Gruver, Edward W. Yip
-
Patent number: 8098728Abstract: A process for compressing and decompressing non-keyframes in sequential sets of contemporaneous video frames making up multiple video streams where the video frames in a set depict substantially the same scene from different viewpoints. Each set of contemporaneous video frames has a plurality frames designated as keyframes with the remaining being non-keyframes. In one embodiment, the non-keyframes are compressed using a multi-directional spatial prediction technique. In another embodiment, the non-keyframes of each set of contemporaneous video frames are compressed using a combined chaining and spatial prediction compression technique. The spatial prediction compression technique employed can be a single direction technique where just one reference frame, and so one chain, is used to predict each non-keyframe, or it can be a multi-directional technique where two or more reference frames, and so chains, are used to predict each non-keyframe.Type: GrantFiled: July 15, 2005Date of Patent: January 17, 2012Assignee: Microsoft CorporationInventors: Simon Winder, Matthew Uyttendaele, Charles Zitnick, III, Richard Szeliski, Sing Bing Kang