Article
WEB 3.0 COLD WALLET COMPATIBLE XR EQUIPMENT, HP INC
Automatic Ringtone Selection Based on Device Battery Level, Ramprasad Sedouram
ROBUST DATA SENDING IN PRINTER TELEMETRY, HP INC
ENABLING AUTOMATED PEER-TO-PEER COLLABORATION BETWEEN AR/VR-ENABLED WI-FI CLIENTS FOR REMOTE WORKERS, Akram Sheriff, Nagendra Kumar Nainar, and Carlos M. Pignataro
TECHNIQUES TO IMPROVE HYBRID WORK ENVIRONMENTS, Arnaud Caigniet
MULTI-FACTOR AUTHENTICATION IN WIRELESS NETWORKS, Sachin D. Wakudkar and Ugo Campiglio
METHOD AND SYSTEM FOR SECURE THIRD-PARTY IDENTIFICATION, TODD MAZUREK, NEERAV BERRY, and ANYA MILLER
PREMIUM PATH OFFLOADING OF CRITICAL TRAFFIC AND DIRECT CONNECTIVITY CLIQUES IN HIERARCHICAL SDWAN NETWORKS, Satish Mahadevan, Laxmikantha Reddy Ponnuru, Samir Thoria, Vivek Agarwal, and Hamzah Kardame
ADVANCED SCREEN SIGINING WORKFLOW, HP INC
CLOUD BASED BIOMETRIC SUPPLY GASE GAGE - IMPROVEMENTS BASED ON GEOLOCATION INPUT, HP INC
OAM linked SR-TE policy to prevent longer explicit path due to network failure, Anonymous
METHOD TO OPTIMIZE QUERY PROCESSING AND UNGRACEFUL SERVICE PROVIDER HANDLING OF MDNS SERVICES IN WIRELESS DEPLOYMENTS, Niranjan M M
FREQUENCY ANALYSIS TO FACILITATE THE LIGHTWEIGHT TRANSFER OF TIMESERIES DATA, Thomas Vegas and Anirban Karmakar
Micro-loop free Delivery on the Post-Convergence Path after a Link change in the Topology, Anonymous
Variable EMC Filter Board - ID-05919, Christian Mohr
Distributed Shader Cache, Doug Horn
TRANSPORT OF 800GE TRAFFIC OVER TWO 400GE FRAMES, Gilberto Loprieno, Emanuele Giacometti, Luca Della Chiesa, and Jim Duda
Personalized Health Reminders in the Voice of a Trusted Caregiver, Twinkle Gupta and Naga Sreenivas Meruva
Novel Crystalline Polymorph Of Baloxavir Marboxil And Process For Preparation Thereof, Srinivasan Thirumalai Rajan, Sajja Eswaraiah, Vijayavitthal T. Mathad, Saladi Venkata Narasayya, Kammari Bal Raju, and Mandad Pratap Reddy
NEW WAKE UP SCENARIO: WAKE ON PICK UP, HP INC
Surfacing Resources for Emotional Support based on the User’s Inferred State of Mind, n/a
Offering Empathetic Coping Mechanisms in Response to Queries on Emotional Well-being, n/a
HYBRID FINGERPRINT TECHNIQUE FOR IOT ASSET CLASSIFICATION AND MANAGEMENT, Ajith Chandran
Adaptive First Radio Access Technology Selection For Public Land Mobile Network Search, Poying Chuang and Jecy Lai
AUTOMATIC DIAGNOSIS RF SHIELDING CAN ASSEMBLY, HP INC
VRAN CAPACITY ENHANCEMENT SOLUTION BY RADIO UNIT SELF-DISCOVERY AND SELF-MANAGEMENT, Fred Anderson and Shailender Potharaju
METHOD FOR THE EFFECTIVE UTILISATION OF THE TUNNEL BETWEEN SDWAN ROUTER AND SECURE INTERNET GATEWAY, Niranjan M M, Vijay Kothamasu, and Nagaraj Kenchaiah
TRANSACTION PROCESSING HOLD MANAGEMENT, Kobus Meyer Mr, Jonathan Woodword Mr, Jessica Deaton Ms, Sharon Vialpando Ms, Anil Chandupattla Mr, and Aruna Srinivasulu Ms
Trust-Based Emergency Message Relay, Poying Chuang and Tim Chen
PREVENTIVE LEAKAGE TEST USING LOW VOLTAGE OUTPUTS FROM ANY IC LIKE MICROCONTROLLER OR FPGA, HP INC
Secured and integrated mobile App for government communications, johan vercruysse
Early Determination Of Emergency Call Retry On Roaming Network, Edison Chen and Gary Tsao
A GREEN TRANSACTION TAGGING AND A METHOD OF ASSIGNING GREEN SCORE FOR CARDS, Nuri Vinod Purswani Ramchandani, Namita Shah, Jinyeop Kim, Ajit Vilasrao Patil, Peiwen Wang, Praveen Kumar Arackal Thankappa Panicker, and Anubhav Narang
Sustainable/eco-friendly packaging ready for automation - ID-05680, Christian Mohr
METHOD TO ADDRESS SECURITY VULNERABILITIES WITH RESPECT TO OFFLINE AND ONLINE DICTIONARY ATTACKS ON WPA2-PSK, Niranjan M M, Vijay Kothamasu, and Nagaraj Kenchaiah
QOS POLICIES FOR SERVICES ON THE SECURE INTERNET GATEWAY IN THE SDWAN DEPLOYMENTS, Niranjan M M
Modular Voltage Regulator, n/a
Recovery Of Server Identifiers In Response To Network Failure, Poying Chuang and Rayson Chou
A METHOD OF BOOK SCANNING VIA FLATBED IMAGE SCANNERS, HP INC
SYSTEM AND METHOD OF LOCKING AND RANKING THE RESOURCE FOR UTILIZATION IN A DISTRIBUTED SCHEDULING SYSTEM, Srijan Mukherjee, Nishant Kumar, Dhanuesh R C, and Arunkumar P
CERTIFIED ICC PROFILES USING NON-FUNGIBLE TOKENS (NFT), HP INC
Proxy Mode for Accessing Input/Output Pins in Multi-Dice Silicon Modules, n/a
Mitigation of Voids During Direct Soldering of Cooling Components to Silicon, n/a
IOT SMART CONTRACT ENABLEMENT WITH TEMPLATE BASED APPROACH, Dennis Lanov
Magnetic Integrated Trans-Inductor Voltage Regulator, n/a
SERVICE BASED ENCRYPTION FOR SECURING MULTI-CLOUD SERVICE CHAINING DEPLOYMENTS, Niranjan M M
DATA QUALITY FOR IOT, Mohsin Alam, Juan Cazila, and Fabio Salvemini
UNIVERSAL PRODUCT ARTIFICIAL NEURAL NETWORK (UPANN), Kate Ligon, Ted Ghose, and Ariel Peterson
LAYER 2 COLLISION AVOIDANCE USING COMPOSED MAC ADDRESS, Thomas Vegas, Anirban Karmakar, Vincent Cuissard, and Loris Gazzarrini
ADJUSTING VIRTUAL BACKGROUND TO CONVEY EMOTIONS, HP INC
A METHOD TO ESTIMATE SKEW FOR IMAGES ACQUIRED VIA IMAGE SCANNERS, HP INC
PROVIDING CENTRALIZED AND RTS/CTS-BASED CHANNEL ACCESS AND RESERVATION, Thomas Vegas, Vincent Cuissard, Loris Gazzarrini, and Anirban Karmakar
MINIMAL ENCRYPTION TO ACHIEVE CONFIDENTIALITY AND POWER SAVING, Thomas Vegas and Anirban Karmakar
A METHOD TO ESTIMATE SKEW FOR IMAGES ACQUIRED VIA IMAGE SCANNERS, HP INC
Receiving Messages on Wearable Devices in Configurable Power Saving Modes, Anonymous
Optimized Emergency Call Handling in NR-5G Only Mode Without Emergency Call Support, Mahesh Telang
MULTI-FACTOR AUTHENTICATION IN A NEXT GENERATION MESH NETWORK, Harbor Dong, Li Zhao, Huimin She, and Wenchuan Ji
Obtaining Accurate Position Data for the PIDF-LO Header in Emergency Calls, Anonymous
Transmitting Reliable Location Information via PIDF-LO in Emergency Calls, Anonymous
HEIGHT DETECTION ROUTINE BETWEEN TWO AXES TO AVOID COMPONENTS DAMAGE, HP INC
Diffused Corrosion Protection on Pressure Control Equipment, Taylor Mozisek, Nicolas Arteaga, and Adam Dyer
DAMPING ELEMENT FOR DOWNHOLDER, Axel Unger
INCREASING TYRE PRESSURE WHILE DRIVING AT HIGH SPEEDS (SYSTEM TO INCREASE DRIVING SAFETY)., Axel Unger
POSSIBILITY OF IDENTIFYING AND DISPLAYING CHARGING CABLES CARRIED IN AN ELECTRIC VEHICLE, Axel Unger
TRUSTED 5G NETWORK DEPLOYMENTS, Niranjan M M
METHOD TO PROVIDE SECURE AND RELIABLE MFA AND SSO USING HYPER LEDGER, Niranjan M M
TRUSTED RPL PROTOCOL FOR FIELD AREA NETWORKS, Niranjan M M
AUTHENTICITY AND LIFETIME OF PRODUCTS, Niranjan M M
METHOD TO SUPPORT IDENTITY PSK, CAPTIVE PORTAL AND ENHANCE ROAMING FEATURES FOR RANDOM MAC ADDRESS CLIENTS, Niranjan M M and Srihari Bhavanasi
TRUSTED VIRTUAL ROUTER REDUNDANCY PROTOCOL, NIRANJAN M M
EFFICIENT DISTRIBUTION OF ROGUE INFORMATION IN SOFTWARE DEFINED WIRELESS NETWORKS, Niranjan M M
TECHNIQUES TO FACILITATE POLICY DRIVEN CONVERSION OF UNICAST 5G SESSIONS TO MULTICAST, Raghavendar Rao Kota, Nithin Chitta, and Srini Irigi
Empty Oven Recognition_ID-05977, Christian Mohr
Rotation block detection_ID-05993, Christian Mohr
Recommender System for Recipes (Netflix Personalization)_ID-05777, Christian Mohr
AGGREGATE COMMUNICATION BETWEEN CONTROL PLANE AND USER PLANE IN A MOBILE NETWORK ENVIRONMENT, Pravin Ajagekar and Suyog Belsare
Bootstrapped Identifier for Recognizing People in a Video, Anonymous
DE-CENTRALISED, AUTHENTICATED AND SECURE COMMUNICATION BETWEEN CONTAINERS, Niranjan M M
AUTOMATIC MEDIA LENGTH DETECTION, HP INC
DETECTING AND PROFILING SLOW FRAMES IN AN INTEGRATED DEVELOPMENT ENVIRONMENT, Adhithya Ramakumar, Phillip Nguyen, Yi Yang, Lily Rapaport, and Shukang Zhou
SHORTEST PATH ASSISTED USER PLANE FUNCTION SELECTION ON 5G SESSION MANAGEMENT FUNCTION, Dennis Lanov
Improving Under-Display Fingerprint Authentication Latency by Normalizing Frame Luminance, Vicky Wen and Sang Young Youn
5G DEPLOYMENT WITH DISTRIBUTED APPROACH FOR NF INSTANCE AND SERVICE DISCOVERY, Niranjan M. M and Nagaraj Kenchaiah
METHOD TO IMPROVE QUALITY OF EXPERIENCE TO 5G USERS IN MULTI-SLICE NETWORK DEPLOYMENTS, Niranjan M M
RESILIENT METHOD TO ENHANCE EFFICIENCY OF INTERNET OF THINGS IN WI-FI6/WI-FI7 DEPLOYMENTS, Niranjan M M
SECURING IN-SITU OAM USING OPTIMISED AND QUANTUM RESISTANT METHOD, Niranjan M M
QUANTUM SECURE MULTICAST, Niranjan M M
Determining Driving Routes that Match User Preferences, Equipment, and Experience, Joe Turner
METHOD TO OPTIMISE DISTRIBUTION OF AUTHENTICATION INFORMATION FOR CLIENT RE-CONNECTIVITY, Niranjan M M and Vijay Kothamasu
AUTHENTICATED AND SECURE SERVICE DISCOVERY USING HOLOCHAIN, Niranjan M M
SECURE METHOD TO DISCOVER MESH ROUTERS IN SOFTWARE-DEFINED WIRELESS MESH NETWORKS, Niranjan M M
METHOD TO PROVIDE TRUSTWORTHY BETWEEN ACCESS POINT AND WIRELESS LAN CONTROLLER, Niranjan M M
Find local food supplier_ID-05997, Christian Mohr
Dishware Recognition_ID-05990, Christian Mohr
Dynamically Adjusting State of Charge and Charging Method to Preserve Lithium-Ion Battery Cell Life, Jon Hurwitz
QUANTUM RESISTANT RADSEC FOR OPENROAMING AND WIRELESS BROADBAND APPLIANCE OPERATIONS, NIRANJAN M M
Unfreezing recognition_ID-05988, Christian Mohr
TRUSTWORTHY ENABLER FOR EOGRE, GRE AND EOIP PROTOCOLS USED ACROSS HETEROGENOUS TECHNOLOGIES, NIRANJAN M M
SECURE PROVENANCE METHOD FOR TRACEABILITY AND TROUBLESHOOTING IN SDN DEPLOYMENTS, NIRANJAN M M