Follow

Article

PDF

Automatic context determination for answering user queries, Ruxandra Davies and Scott Davies

PDF

Click-to-call conversion measurement based on transcribing conversation, Alex Jacobson

PDF

Countering phishing attacks by automated responses, Brian Shucker and Brian Brewington

PDF

Automatic translation in voice calls, Sooraj Sasindran and Naveen Kalla

PDF

Automatic removal of unwanted objects from images, Daniel Citron and Lachlan (Locke) Dunn

PDF

COMBINING DOMAIN KEYWORDS INTO AUTOMATIC DOCUMENT CLASSIFICATION BY DEEP NEURAL NETWORK, Qian Diao, Abhijit Talathi, Sarah Kuppert, Robert Frost, and Adam Mattern

PDF

Thermal Downlink Throttle UE Specific Approach, Blake Kragten, Shivank Nayak, and Siddharth Ray

PDF

In-page search over text and images in a web page, Matthew Sharifi

PDF

User authentication via lip reading, Horacio Hernan Moraldo

PDF

AUTO-RECOVERY OF MICRO-SERVICES IN A LARGE DISTRIBUTED APPLIANCE MODEL, Kshitij Tanay, Raghu Rajendra Arur, and Taj Uddin

PDF

VIRTUALIZED INTELLIGENT HONEYPOT AGENT, Plamen Nedeltchev, Mani Kesavan, Hugo Latapie, and Enzo Fenoglio

PDF

Visual approach for secure transfer of user credentials, Patrick Georgi

PDF

OPTIMIZATION OF CLOUD PLATFORMS, Johnson Manuel-Devadoss, David Stanford, Billie Ansell, Sunil John, Luis Bravo, Miguel Figueroa, and Larone Gardner

PDF

INTELLIGENT EDITING ASSISTANT, Emmanuel Arriaga

PDF

VERIFIABLY SECURE SESSION INITIATION PROTOCOL REQUESTS, Mark Barrasso

PDF

Screen brightness adjustment using machine learning, Sandro Feuz and Thomas Deselaers

PDF

RADIOFREQUENCY TRENDS AWARE DYNAMIC BANDWIDTH SELECTION, Santosh Kulkarni, Vishal Desai, Young II Choi, and Pooya Monajemi

PDF

Enhanced call quality using user-specific voiceprint model, ChiLin Kuo, HsinHu Wang, SSU-TING TSAI, and Chin-Kuo Huang

PDF

A Homotopy Method of Path Analysis for the Purpose of Computing, Lei Liu

PDF

Better unpacking binary files using contextual information, Armijn Hemel

PDF

Matching Entities On Multiple Platforms Using Graph Bijections, Long Nguyen and Zachary Frazier

PDF

Identifying Abusive Videos Inserted In A Video, Filip Pavetic and Roman Vorushin

PDF

Design of neural networks based on cost estimation, Yair Movshovitz-Attias, Andrew Poon, Ariel Gordon, and Elad Edwin Tzvi Eban

PDF

ZERO-TOUCH BOOTSTRAP OF A NETWORK CONNECTED DEVICE, Owen Friel, Eliot Lear, Jerome Henry, and Stephen Orr

PDF

3D Face Messaging On A Watch, Vinay Venkataraman and Eric Caplain

PDF

SOFTWARE FOR GUIDED CHASSIS ADJUSTMENT, Verena Schwaiger

PDF

SHELF LABEL FLAG, Verena Schwaiger

PDF

NATURAL HMI FOR EFFICIENT DRIVING THROUGH PLANTS IN THE CAR, Verena Schwaiger

PDF

METHOD AND SYSTEM FOR COMPENSATING YAW RATE CHANGE BY LOAD CHANGE BEFORE OR DURING CORNERING, Verena Schwaiger

PDF

EXTENSION OF THE CURRENT FLOW DIAGNOSIS OF THE DC-CHARGING INTERFACE, Verena Schwaiger

PDF

CYCLONE SEPARATORS FOR SCREW SYSTEMS, Verena Schwaiger

PDF

BIDIRECTIONAL DC WALLBOX WITH DC-BUS INTERFACE AND INTEGRATED BIDIRECTIONAL ENERGY METER, Verena Schwaiger

PDF

Detecting the direction of ambient light using an array of photodiodes, Yi Zhang, Seobin Jung, and Kuan-Lin Chen

PDF

ENABLING INSTANTANEOUS SWITCH FROM DEFAULT MULTICAST DISTRIBUTION TREE TO DATA MULTICAST DISTRIBUTION TREE FOR MOBILITY AND MULTIHOMING IN ETHERNET VIRTUAL PRIVATE NETWORK TENANT ROUTED MULTICAST, Raunak Banthia, Manoj Pandey, Kesavan Thiruvenkatasamy, Saif Mohammed, and Vikas Ramesh Kamath

PDF

A Virtual Call Assistant, Anonymous

PDF

Intelligent wireless network selection, Jiwoong Lee

PDF

Mode selection for augmented reality application to control access to real-world data, Klaus Weidner

PDF

Smart equipment kiosk, Justin Von Kennel

PDF

Voice interface responses based on prior user interactions, Minkoo Seo, Brian Spilsbury, Gadi Ben Amram, Joo Hyung Lee, Togan Gencoglu, and Youngchan Park

PDF

IDENTIFYING NETWORK FAULTS IN DATA CENTERS USING A COVARIANCE MATRIX, Raghu Rajendra Arur, Nicholas Basker, and Hasmit Grover

PDF

Recognizing a natural language or language class in source code files, Armijn Hemel

PDF

Using build identifiers to fingerprint ELF binaries and link to build information without having access to source code, Armijn Hemel

PDF

PCA (Printed Circuit Assembly) and Electronic Devices Cleaning Station, Joel J. Castillo

PDF

Automatic dating of videos based on matching photos, Rainer Vincent Mager

PDF

NOTIFICATION OUTPUT VIA WATCH BEZEL, Aleksandr Rozman

PDF

Controlling access by tagging data, Juan Vasquez and Jesper Johansson

PDF

Detection of counterfeit silicon, Miguel Osorio Lozano and Sean Keys

PDF

Challenge keyword generation for voice-based authentication, Shuyang Chen and Nicholas Felker

PDF

ADVISING USERS IN A MEETING WHAT WAS LAST SAID BEFORE A CALL DROP, Jonathan Rosenberg

PDF

Security Event Timeline

PDF

SERVICE LAYER DEPENDENCY MAPPING BASED HEATMAP FOR FAULT ISOLATION, Carlos M. Pignataro, Nagendra Kumar Nainar, and Alejandro Eguiarte

PDF

Determining region-of-interest based on motion patterns, Ruiduo Yang

PDF

Image recognition for consumer shopping applications, Jibing Wang, Erik Stauffer, and Aamir Akram

PDF

INTELLIGENT PRESENTATION SLIDE ASSISTANT, Sammy El Ghazzal and Sandro Feuz

PDF

Process of Improving Software Engineering Predictability with Business Benefits, Atul Deshpande and Ravi Saxena

PDF

Automatic extraction and provision of coupon codes for online shopping, Matthew Sharifi

PDF

Transmit power setting based on dynamic SAR, Qi Jiang, Paul Husted, Srenik Mehta, and Nihar Jindal

PDF

Turning off or dimming a device screen based on user attention, Vidhya Navalpakkam, Tomer Shekel, and Dmitry Lagun

PDF

Verified revenue sharing between distributor OEM and app developers, John Dukellis

PDF

Smart auto-deactivation of device airplane mode, Gregory B. Roth

PDF

PCIe Riser Extension Assembly, Rick Salmonson, Troy Oxby, Larry Briski, Robert Normand, Russell Stacy, and Jeffrey Glanzman

PDF

Internet of Things Construction Monitors, Thomas A. Stern

PDF

CONNECTIVITY ASSESSMENT SURVEY FOR TECHNOLOGY EMERGENCY RESPONSE (CASTER), Rakesh Bharania, Chandler Johnson, and Dustin Li

PDF

A Novel Approach to Measure Code Coverage for a Typical OS Deployment Tool, Debdipta Ghosh

PDF

Item recommendations for cache and synchronization of application stores, Wei Chai, Zhiwei Gu, Sundeep Sancheti, and Yilan Liu

PDF

App distribution via affiliate marketing on social media, Sissie Hsiao, Tuna Toksoz, and John Dukellis

PDF

Embedded Ready To Use Hybrid Mesh Network For IoT Applications, Jérôme ELLEOUET and Emmanuel HELBERT

PDF

Web-based currency for online content and transactions, Kentaro Hara

PDF

Direct I/O solution for Containerized HPUX, Maheshwara Aithal, Dinesh Thanumoorthy, and Harish K

PDF

Fast & Scalable I/O for Emulated HPUX, Maheshwara Aithal, Dinesh Thanumoorthy, and Ranjith VK

PDF

A novel encoding & alignment of Histograms of referential integrity columns for scalable data generation, Suresh Soundararajan

PDF

New GPU Standard PCIe Card Holder Design, Tim Ko

PDF

Mounting Methods for JEDEC Standard Energy Cell, John Norton and David Thomas Byargeon

PDF

Lock Mechanism Design, Michelle Chen

PDF

Reducing Memory Footprint for In-Memory Root Filesystem (TMPFS), Erik Jacobson, Paul Schliep, and Christopher Holmes

PDF

VOICE OVER LONG TERM EVOLUTION SERVICE QUALITY MEASUREMENTS AND DIAGNOSTICS USING MACHINE LEARNING TECHNIQUES, Sri Gundavelli, Dhananjay Patki, Vimal Srivastava, and Amarnath Reddy Nagireddy

PDF

USING DEVICE MOVEMENT FOR MULTI-FACTOR COMPUTING DEVICE AUTHENTICATION, Isaac Andres

PDF

TECHNIQUES FOR EFFICIENT AND CONSISTENT HASHING WITH OPTIMAL FAIRNESS FOR FLOW DISTRIBUTION AND LOAD-BALANCING, Pierre Pfister, Mark Townsley, Yoann Desmouceaux, and Aloys Augustin

PDF

REAL-TIME NETWORK EVENT CORRELATION BASED ON DEPENDENCY GRAPH FOR NETWORK ISSUE ROOT CAUSING, Alok Kumar Sinha, Zach Cherian, and Kaushik Dam

PDF

NON-ORTHOGONAL MULTIPLE ACCESS FOR COLLISION AVOIDANCE IN LOW-POWER AND LOSSY NETWORKS, Ling Wei, Huimin She, Chuanwei Li, and Lele Zhang

PDF

Battery charge level based on power source availability, Thierry Strudel

PDF

Heat removal from high temperature hardware while shielding electromagnetic interference, Yao Xue and Eugene Fox

PDF

HEURISTIC ALGORITHM FOR SPANNING TREE PROTOCOL ROOT BRIDGE DETERMINATION, Michael Michaelides and Arabinda Samantaray

PDF

PROXY MONITORING OF SESSION STATE FOR SHARED FATE ENTITIES, Stefan Olofsson and Khalid Raza

PDF

Operator Drowsiness Test, Robin Dua, Andrei Broder, and Vidhya Navalpakkam

PDF

Delayed predicate algorithm evaluation in hybrid answer set programming (ASP), Alex Brik and Jori Bomanson

PDF

FIRMWARE COMPRESSION MECHANISM FOR SPEEDING UP FIRMWARE UPDATING IN A RESOURCE RESTRICTED NETWORK, Yinfang Wang, Chuanwei Li, Feiliang Wang, and Yajun Xia

PDF

A DEEP GAUSSIAN MIXTURE MODEL APPROACH TO SCORING BASED ON FEEDBACK, Pranjal Daga and Antonio Nucci

PDF

AUTOMATED FAILURE PREDICTION AND SELF-HEALING OF EDGE DEVICES IN INTERNET OF THINGS INFRASTRUCTURE, Lalit Jain, Nirup Pothireddy, Sai Kiran Reddy Malikireddy, Vivek Parekh, Bipin Algubelli, Chandra Veluru, and Dileep Kumar

PDF

Applying Machine Learning to Determine Documents Related to Email, Cayden Meyer, Harold Kim, and Alan Green

PDF

PERFORMANCE DELAY MEASUREMENT AND FAULT DETECTION OF SR / SRV6 TE POLICIES IN SOFTWARE DEFINED NETWORKS, Clarence Filsfils, Rakesh Gandhi, Tarek Saad, Patrick Khordoc, and Sagar Soni

PDF

Updating Content Item Delivery Criteria Based On User Interaction, Anonymous

PDF

Sound-based Classifier for Domain Specific Language Model Selection, Anonymous

PDF

Augmented Reality Dance Instructions, Anonymous

PDF

Maximum Power Point Tracking Using Test Cell(s) in Solar Array(s), Anonymous

PDF

Maximum Power Point Tracking Using a DC-DC Converter Coupled to Photovoltaic Cells and a Battery, Anonymous

PDF

Peer Node Eviction in Wireless Mesh Networks, Javier Cardona

PDF

Person Identification and Displaying AR Banners, Anonymous

PDF

A Wearable Emotion Detection and Video/Image Recording System, Anonymous

PDF

AIRSPEED MEASUREMENT DEVICE FOR SLOW AIRCRAFT