Month of July 2010 - Page Number 12

Showing 111 - 120 of 537 from July 2010
Browse Prior Art Database
  1. 111.
    Disclosed is a method and device for support live avatar expression in 3D virtual world. So called live expression means the avatar’s facial expression will be real-timely updated to present its controlling user’s real facial expression. The main idea is to capture user expression by computer camera, then update...
    IPCOM000198086D | 2010-Jul-26
  2. 112.
    Disclosured is a system and method for user-involved clothes advertisement experience. We provide: A method to construct a 3D avatar based on the user’s appearance and figure. A method to fit virtual clothes onto the avatar using optimization process. And a system and method to generate avatar animation sequence in...
    IPCOM000198085D | 2010-Jul-26
  3. 113.
    We propose the method to detect and report financial suspicious transactions with high efficiency. Commercial banks are facing a larger number of transactions and how to detect suspicious transactions with a high efficiency especially when the detection rules become more complex. In this paper, we assign a belief to...
    IPCOM000198084D | 2010-Jul-26
  4. 114.
    Web widgets have been the featured components and widely used in Web application. To improve the interaction and usability of the Web widgets, the disclosure propose a novel method and system for developing interactive and multi-page view in Web based widget. The disclosure firstly defines pages and events centric...
    IPCOM000198083D | 2010-Jul-26
  5. 115.
    In recent years, there are more and more mixed language audio contents. However, many speech recognition systems can only handle one language well. Thus, when a mixed language is met, errors of speech recognition will occur. Though the recognized text can be totally different from the correct spelling in another...
    IPCOM000198082D | 2010-Jul-26
  6. 116.
    Data security and privacy are very important for nowadays online hosting applications, especially in the SaaS era. But the client-side PC is still not secure enough. Phishing, wireless sidejacking, and trojan can steal user account info or tamper the transaction. The information leakage could happen in the scenarios...
    IPCOM000198081D | 2010-Jul-26
  7. 117.
    “A picture is worth a thousand words!” Just as the old adage says, image is always one of the most intuitive expressions. Interactive visualization of image collections has been an active subject in visual art, design, and human-computer interaction [MoMA exhibit][UMD photomesa][vister], these techniques can...
    IPCOM000198080D | 2010-Jul-26
  8. 118.
    MQT stands for Materialized Query Table, it is a standard technique in data warehousing, also known as aggregate tables and aggregate (re-)routing, or alternatively, as materialized views. The key idea is to cache query result and optimize query automatically and transparently to improve performance. In SaaS...
    IPCOM000198079D | 2010-Jul-26
  9. 119.
    Electronic commerce (e-commerce) consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks. The amount of trade conducted electronically has grown extraordinarily since the spread of the Internet. Millions of products are for sale in some...
    IPCOM000198078D | 2010-Jul-26
  10. 120.
    Background: In SaaS operation environment, there are large number of services and tenants. Tenants will subscribe one or more services. Every subscription requests a certain number of system resource (such as CPU, disk, memory) that claimed in SLA. These requests have some features: • A large number of requests will...
    IPCOM000198077D | 2010-Jul-26