Follow

Article

PDF

WEB 3.0 COLD WALLET COMPATIBLE XR EQUIPMENT, HP INC

PDF

Automatic Ringtone Selection Based on Device Battery Level, Ramprasad Sedouram

PDF

ROBUST DATA SENDING IN PRINTER TELEMETRY, HP INC

PDF

SMART ALERT TO RECOMMEND THE CAPACITY OF THE SUPPLIES THAT A USER SHOULD BUY USING PRINTER USAGE INFORMATION BEFORE SUPPLIES ARE EMPTY, HP INC

PDF

ENABLING AUTOMATED PEER-TO-PEER COLLABORATION BETWEEN AR/VR-ENABLED WI-FI CLIENTS FOR REMOTE WORKERS, Akram Sheriff, Nagendra Kumar Nainar, and Carlos M. Pignataro

PDF

TECHNIQUES TO IMPROVE HYBRID WORK ENVIRONMENTS, Arnaud Caigniet

PDF

MULTI-FACTOR AUTHENTICATION IN WIRELESS NETWORKS, Sachin D. Wakudkar and Ugo Campiglio

PDF

METHOD AND SYSTEM FOR SECURE THIRD-PARTY IDENTIFICATION, TODD MAZUREK, NEERAV BERRY, and ANYA MILLER

PDF

PREMIUM PATH OFFLOADING OF CRITICAL TRAFFIC AND DIRECT CONNECTIVITY CLIQUES IN HIERARCHICAL SDWAN NETWORKS, Satish Mahadevan, Laxmikantha Reddy Ponnuru, Samir Thoria, Vivek Agarwal, and Hamzah Kardame

PDF

ADVANCED SCREEN SIGINING WORKFLOW, HP INC

PDF

CLOUD BASED BIOMETRIC SUPPLY GASE GAGE - IMPROVEMENTS BASED ON GEOLOCATION INPUT, HP INC

PDF

OAM linked SR-TE policy to prevent longer explicit path due to network failure, Anonymous

PDF

METHOD TO OPTIMIZE QUERY PROCESSING AND UNGRACEFUL SERVICE PROVIDER HANDLING OF MDNS SERVICES IN WIRELESS DEPLOYMENTS, Niranjan M M

PDF

FREQUENCY ANALYSIS TO FACILITATE THE LIGHTWEIGHT TRANSFER OF TIMESERIES DATA, Thomas Vegas and Anirban Karmakar

PDF

Micro-loop free Delivery on the Post-Convergence Path after a Link change in the Topology, Anonymous

PDF

Variable EMC Filter Board - ID-05919, Christian Mohr

PDF

Distributed Shader Cache, Doug Horn

PDF

TRANSPORT OF 800GE TRAFFIC OVER TWO 400GE FRAMES, Gilberto Loprieno, Emanuele Giacometti, Luca Della Chiesa, and Jim Duda

PDF

Personalized Health Reminders in the Voice of a Trusted Caregiver, Twinkle Gupta and Naga Sreenivas Meruva

PDF

Novel Crystalline Polymorph Of Baloxavir Marboxil And Process For Preparation Thereof, Srinivasan Thirumalai Rajan, Sajja Eswaraiah, Vijayavitthal T. Mathad, Saladi Venkata Narasayya, Kammari Bal Raju, and Mandad Pratap Reddy

PDF

NEW WAKE UP SCENARIO: WAKE ON PICK UP, HP INC

PDF

Surfacing Resources for Emotional Support based on the User’s Inferred State of Mind, n/a

PDF

Offering Empathetic Coping Mechanisms in Response to Queries on Emotional Well-being, n/a

PDF

HYBRID FINGERPRINT TECHNIQUE FOR IOT ASSET CLASSIFICATION AND MANAGEMENT, Ajith Chandran

PDF

Adaptive First Radio Access Technology Selection For Public Land Mobile Network Search, Poying Chuang and Jecy Lai

PDF

AUTOMATIC DIAGNOSIS RF SHIELDING CAN ASSEMBLY, HP INC

PDF

VRAN CAPACITY ENHANCEMENT SOLUTION BY RADIO UNIT SELF-DISCOVERY AND SELF-MANAGEMENT, Fred Anderson and Shailender Potharaju

PDF

METHOD FOR THE EFFECTIVE UTILISATION OF THE TUNNEL BETWEEN SDWAN ROUTER AND SECURE INTERNET GATEWAY, Niranjan M M, Vijay Kothamasu, and Nagaraj Kenchaiah

PDF

TRANSACTION PROCESSING HOLD MANAGEMENT, Kobus Meyer Mr, Jonathan Woodword Mr, Jessica Deaton Ms, Sharon Vialpando Ms, Anil Chandupattla Mr, and Aruna Srinivasulu Ms

PDF

Trust-Based Emergency Message Relay, Poying Chuang and Tim Chen

PDF

PREVENTIVE LEAKAGE TEST USING LOW VOLTAGE OUTPUTS FROM ANY IC LIKE MICROCONTROLLER OR FPGA, HP INC

PDF

Secured and integrated mobile App for government communications, johan vercruysse

PDF

Early Determination Of Emergency Call Retry On Roaming Network, Edison Chen and Gary Tsao

PDF

A GREEN TRANSACTION TAGGING AND A METHOD OF ASSIGNING GREEN SCORE FOR CARDS, Nuri Vinod Purswani Ramchandani, Namita Shah, Jinyeop Kim, Ajit Vilasrao Patil, Peiwen Wang, Praveen Kumar Arackal Thankappa Panicker, and Anubhav Narang

PDF

Sustainable/eco-friendly packaging ready for automation - ID-05680, Christian Mohr

PDF

METHOD TO ADDRESS SECURITY VULNERABILITIES WITH RESPECT TO OFFLINE AND ONLINE DICTIONARY ATTACKS ON WPA2-PSK, Niranjan M M, Vijay Kothamasu, and Nagaraj Kenchaiah

PDF

QOS POLICIES FOR SERVICES ON THE SECURE INTERNET GATEWAY IN THE SDWAN DEPLOYMENTS, Niranjan M M

PDF

Modular Voltage Regulator, n/a

PDF

Recovery Of Server Identifiers In Response To Network Failure, Poying Chuang and Rayson Chou

PDF

A METHOD OF BOOK SCANNING VIA FLATBED IMAGE SCANNERS, HP INC

PDF

SYSTEM AND METHOD OF LOCKING AND RANKING THE RESOURCE FOR UTILIZATION IN A DISTRIBUTED SCHEDULING SYSTEM, Srijan Mukherjee, Nishant Kumar, Dhanuesh R C, and Arunkumar P

PDF

CERTIFIED ICC PROFILES USING NON-FUNGIBLE TOKENS (NFT), HP INC

PDF

Proxy Mode for Accessing Input/Output Pins in Multi-Dice Silicon Modules, n/a

PDF

Mitigation of Voids During Direct Soldering of Cooling Components to Silicon, n/a

PDF

IOT SMART CONTRACT ENABLEMENT WITH TEMPLATE BASED APPROACH, Dennis Lanov

PDF

Magnetic Integrated Trans-Inductor Voltage Regulator, n/a

PDF

SERVICE BASED ENCRYPTION FOR SECURING MULTI-CLOUD SERVICE CHAINING DEPLOYMENTS, Niranjan M M

PDF

DATA QUALITY FOR IOT, Mohsin Alam, Juan Cazila, and Fabio Salvemini

PDF

UNIVERSAL PRODUCT ARTIFICIAL NEURAL NETWORK (UPANN), Kate Ligon, Ted Ghose, and Ariel Peterson

PDF

LAYER 2 COLLISION AVOIDANCE USING COMPOSED MAC ADDRESS, Thomas Vegas, Anirban Karmakar, Vincent Cuissard, and Loris Gazzarrini

PDF

ADJUSTING VIRTUAL BACKGROUND TO CONVEY EMOTIONS, HP INC

PDF

A METHOD TO ESTIMATE SKEW FOR IMAGES ACQUIRED VIA IMAGE SCANNERS, HP INC

PDF

PROVIDING CENTRALIZED AND RTS/CTS-BASED CHANNEL ACCESS AND RESERVATION, Thomas Vegas, Vincent Cuissard, Loris Gazzarrini, and Anirban Karmakar

PDF

MINIMAL ENCRYPTION TO ACHIEVE CONFIDENTIALITY AND POWER SAVING, Thomas Vegas and Anirban Karmakar

PDF

A METHOD TO ESTIMATE SKEW FOR IMAGES ACQUIRED VIA IMAGE SCANNERS, HP INC

PDF

Receiving Messages on Wearable Devices in Configurable Power Saving Modes, Anonymous

PDF

Optimized Emergency Call Handling in NR-5G Only Mode Without Emergency Call Support, Mahesh Telang

PDF

MULTI-FACTOR AUTHENTICATION IN A NEXT GENERATION MESH NETWORK, Harbor Dong, Li Zhao, Huimin She, and Wenchuan Ji

PDF

Obtaining Accurate Position Data for the PIDF-LO Header in Emergency Calls, Anonymous

PDF

Transmitting Reliable Location Information via PIDF-LO in Emergency Calls, Anonymous

PDF

HEIGHT DETECTION ROUTINE BETWEEN TWO AXES TO AVOID COMPONENTS DAMAGE, HP INC

PDF

Diffused Corrosion Protection on Pressure Control Equipment, Taylor Mozisek, Nicolas Arteaga, and Adam Dyer

PDF

DAMPING ELEMENT FOR DOWNHOLDER, Axel Unger

PDF

INCREASING TYRE PRESSURE WHILE DRIVING AT HIGH SPEEDS (SYSTEM TO INCREASE DRIVING SAFETY)., Axel Unger

PDF

POSSIBILITY OF IDENTIFYING AND DISPLAYING CHARGING CABLES CARRIED IN AN ELECTRIC VEHICLE, Axel Unger

PDF

TRUSTED 5G NETWORK DEPLOYMENTS, Niranjan M M

PDF

METHOD TO PROVIDE SECURE AND RELIABLE MFA AND SSO USING HYPER LEDGER, Niranjan M M

PDF

TRUSTED RPL PROTOCOL FOR FIELD AREA NETWORKS, Niranjan M M

PDF

AUTHENTICITY AND LIFETIME OF PRODUCTS, Niranjan M M

PDF

METHOD TO SUPPORT IDENTITY PSK, CAPTIVE PORTAL AND ENHANCE ROAMING FEATURES FOR RANDOM MAC ADDRESS CLIENTS, Niranjan M M and Srihari Bhavanasi

PDF

TRUSTED VIRTUAL ROUTER REDUNDANCY PROTOCOL, NIRANJAN M M

PDF

EFFICIENT DISTRIBUTION OF ROGUE INFORMATION IN SOFTWARE DEFINED WIRELESS NETWORKS, Niranjan M M

PDF

TECHNIQUES TO FACILITATE POLICY DRIVEN CONVERSION OF UNICAST 5G SESSIONS TO MULTICAST, Raghavendar Rao Kota, Nithin Chitta, and Srini Irigi

PDF

Empty Oven Recognition_ID-05977, Christian Mohr

PDF

Rotation block detection_ID-05993, Christian Mohr

PDF

Recommender System for Recipes (Netflix Personalization)_ID-05777, Christian Mohr

PDF

AGGREGATE COMMUNICATION BETWEEN CONTROL PLANE AND USER PLANE IN A MOBILE NETWORK ENVIRONMENT, Pravin Ajagekar and Suyog Belsare

PDF

Bootstrapped Identifier for Recognizing People in a Video, Anonymous

PDF

DE-CENTRALISED, AUTHENTICATED AND SECURE COMMUNICATION BETWEEN CONTAINERS, Niranjan M M

PDF

AUTOMATIC MEDIA LENGTH DETECTION, HP INC

PDF

DETECTING AND PROFILING SLOW FRAMES IN AN INTEGRATED DEVELOPMENT ENVIRONMENT, Adhithya Ramakumar, Phillip Nguyen, Yi Yang, Lily Rapaport, and Shukang Zhou

PDF

SHORTEST PATH ASSISTED USER PLANE FUNCTION SELECTION ON 5G SESSION MANAGEMENT FUNCTION, Dennis Lanov

PDF

Improving Under-Display Fingerprint Authentication Latency by Normalizing Frame Luminance, Vicky Wen and Sang Young Youn

PDF

5G DEPLOYMENT WITH DISTRIBUTED APPROACH FOR NF INSTANCE AND SERVICE DISCOVERY, Niranjan M. M and Nagaraj Kenchaiah

PDF

METHOD TO IMPROVE QUALITY OF EXPERIENCE TO 5G USERS IN MULTI-SLICE NETWORK DEPLOYMENTS, Niranjan M M

PDF

RESILIENT METHOD TO ENHANCE EFFICIENCY OF INTERNET OF THINGS IN WI-FI6/WI-FI7 DEPLOYMENTS, Niranjan M M

PDF

SECURING IN-SITU OAM USING OPTIMISED AND QUANTUM RESISTANT METHOD, Niranjan M M

PDF

QUANTUM SECURE MULTICAST, Niranjan M M

PDF

Determining Driving Routes that Match User Preferences, Equipment, and Experience, Joe Turner

PDF

METHOD TO OPTIMISE DISTRIBUTION OF AUTHENTICATION INFORMATION FOR CLIENT RE-CONNECTIVITY, Niranjan M M and Vijay Kothamasu

PDF

AUTHENTICATED AND SECURE SERVICE DISCOVERY USING HOLOCHAIN, Niranjan M M

PDF

SECURE METHOD TO DISCOVER MESH ROUTERS IN SOFTWARE-DEFINED WIRELESS MESH NETWORKS, Niranjan M M

PDF

METHOD TO PROVIDE TRUSTWORTHY BETWEEN ACCESS POINT AND WIRELESS LAN CONTROLLER, Niranjan M M

PDF

Find local food supplier_ID-05997, Christian Mohr

PDF

Dishware Recognition_ID-05990, Christian Mohr

PDF

Dynamically Adjusting State of Charge and Charging Method to Preserve Lithium-Ion Battery Cell Life, Jon Hurwitz

PDF

QUANTUM RESISTANT RADSEC FOR OPENROAMING AND WIRELESS BROADBAND APPLIANCE OPERATIONS, NIRANJAN M M

PDF

Unfreezing recognition_ID-05988, Christian Mohr

PDF

TRUSTWORTHY ENABLER FOR EOGRE, GRE AND EOIP PROTOCOLS USED ACROSS HETEROGENOUS TECHNOLOGIES, NIRANJAN M M

PDF

SECURE PROVENANCE METHOD FOR TRACEABILITY AND TROUBLESHOOTING IN SDN DEPLOYMENTS, NIRANJAN M M