scispace - formally typeset
S

Steven G. Lisa

Publications -  8
Citations -  1195

Steven G. Lisa is an academic researcher. The author has contributed to research in topics: Phone & Mobile telephony. The author has an hindex of 6, co-authored 8 publications receiving 1195 citations.

Papers
More filters
Patent

Realtime, location-based cell phone enhancements, uses, and applications

TL;DR: In this article, the location of a cell phone is used to enhance and alter the operation of the cell phone, based on the information and other programmed factors, such as the phone's location.
Patent

System, Methods and Applications for Embedded Internet Searching and Result Display

TL;DR: In this paper, a user who is composing or reading a document can identify and link multiple sets of key words into separate search queries by highlighting and assigning either unique search numbers, colors or other readily ascertained indicators of their logical relation.
Patent

Realtime, interactive and geographically defined computerized personal matching systems and methods

TL;DR: In this paper, a system and method of interactive and live computerized matching in which a first user is provided with a personal data device including a wireless communication system is presented, where a secure network is configured to include a server programmed with personal characteristic database and a database searching algorithm, and a wireless communications system at a specific geographic location that is capable of communicating with the user's personal device.
Patent

Systems and methods for embedded internet searching, and result display

TL;DR: In this article, a user who is composing or reading a document can identify and link multiple sets of key words into separate search queries by highlighting and assigning either unique search numbers, colors or other readily ascertained indicators of their logical relation.
Patent

Realtime, Interactive and Geographically Defined Computerized Personal Identification and Payment Matching Systems

TL;DR: In this paper, a secure network is configured to include a server programmed with a personal characteristic database, a database searching algorithm, and to be coupled to a wireless communication system that is capable of communicating with the user's personal data device.