Detection of spyware threats within virtual machine
(57) ABSTRACT A system analyzes content accessed at a network site to determine whether
it is malicious. The system employs a tool able to identify spyware that is piggy-backed on …
it is malicious. The system employs a tool able to identify spyware that is piggy-backed on …
Systems and methods for facilitating data discovery
707f709, 710, 736, 741, 755, 756, 790 select at least a first set of files and a second set of
files, each 707/791; 709/200 204 206 207. 705/1. of the first set of files and the second set of …
files, each 707/791; 709/200 204 206 207. 705/1. of the first set of files and the second set of …
System and method for aggregating and summarizing product/topic sentiment
M Shilman, R Chandran - US Patent App. 12/486,344, 2009 - Google Patents
BACKGROUND 0003 Consumers like to use opinions of other people for making product
purchase decisions. Conventionally, limited information sources have been available for …
purchase decisions. Conventionally, limited information sources have been available for …
Method and apparatus for searching network resources
JP Singh, R Wang - US Patent 7,415,469, 2008 - Google Patents
US7415469B2 - Method and apparatus for searching network resources - Google Patents
US7415469B2 - Method and apparatus for searching network resources - Google Patents …
US7415469B2 - Method and apparatus for searching network resources - Google Patents …
Reputation of an author of online content
WC Brougher, N Stoll, SD Kamvar, MD Dixon - US Patent 8,150,842, 2012 - Google Patents
Methods, computer program products and systems are described for online-content
management. Multiple online content items authored by multiple authors are received at one …
management. Multiple online content items authored by multiple authors are received at one …
Reputation-based strategy for forwarding and responding to interests over a content centric network
A CCN network node use reputation values for one or more interfaces to determine how to
forward an Interest. During operation, the network node can receive an Interest or Content …
forward an Interest. During operation, the network node can receive an Interest or Content …
Dynamically integrating disparate systems and providing secure data sharing
J Wesley, E Cooley, N Daniels, J Harding… - US Patent App. 11 …, 2005 - Google Patents
Systems and methods for Seamlessly integrating disparate data Systems to Securely,
customizably and dynamically collaborate and share real-time information, and for provid …
customizably and dynamically collaborate and share real-time information, and for provid …
Using popularity data for ranking
MR Richardson, ED Brill, RJ Ragno… - US Patent …, 2010 - Google Patents
BACKGROUND Searching has become Such an important feature of appli cations and
operating systems for computer users. Even more so, it has turned into a highly profitable …
operating systems for computer users. Even more so, it has turned into a highly profitable …
Credibility of an author of online content
J Lawyer - US Patent 8,126,882, 2012 - Google Patents
Methods, computer program products and systems are described for obtaining at a first
computer an online content item authored by an author for public online display. A credibility …
computer an online content item authored by an author for public online display. A credibility …
Method and system for managing network resources based on a dynamic quorum
S Nagaraj, N Sirisilla, HS Madhusudhana - US Patent 8,285,825, 2012 - Google Patents
6, 192,365 B1* 2/2001 Draper et al.................. 707/101 6, 192401 B1* 2/2001 Modiri et
al.................. TO9. 220 6,339,784 B1* 1/2002 Morris et al.... 709,204 6,460,039 B1* 10/2002 …
al.................. TO9. 220 6,339,784 B1* 1/2002 Morris et al.... 709,204 6,460,039 B1* 10/2002 …