Follow

Article

PDF

SUBSCRIPTION-BASED ROUTING TO A PARTICULAR CORE NETWORK, Sri Gundavelli and Vimal Srivastava

PDF

TECHNIQUES FOR OBTAINING INDOOR LOCATION MAP AND UNIFORM RESOURCE IDENTIFIER FROM AN ACCESS NETWORK, Sri Gundavelli, Vimal Srivastava, and Tim Stammers

PDF

CONTROLLER-DRIVEN EVENT-BASED NETWORK HEAT MAP VISUALISATION, Praveen Kumar and Navdeep Sood

PDF

A kind of connection method used for a food sensor - ID-06222, Paolo Markovina

PDF

Place diverter to avoid physical damage during the movement of the PRS, HP INC

PDF

3D Printed Metal Structures for Thermoforming Molded Fiber Products, HP INC

PDF

QuickPass for TSA Security, HP INC

PDF

Slotted Side Guide for Cylinder Multi Positions, HP INC

PDF

Lightweight Companion Application for Onboarding and Verification of New Users for Receiving Digital Payments, Dillon Amadeo, Yohan Launay, Kiat Chuan Tan, and Nizam Anuar

PDF

Automated Checks to Detect and Remove Locally Inappropriate Products from Marketplace Listing, Paras Mamgain

PDF

Dynamically Responsive Search Result Weblinks, Diego Baron, Judy Mou, Andrew Silverman, and Pavan Kuppili

PDF

Personalized Photographs and Signatures on 3D Printed Radiation Therapy Immobilizer, HP INC

PDF

TECHNIQUES TO REDUCE THE RISK OF MALICIOUS OPERATIONS BEING PERFORMED DURING REMOTE CONTROL OF NETWORK DEVICES, Yi Ding, Humphrey Hanfeng Cai, Roman Volkov, and Samantha Wang

PDF

TECHNIQUES TO REDUCE THE RISK OF MALICIOUS OPERATIONS BEING PERFORMED DURING REMOTE CONTROL OF NETWORK DEVICES, Yi Ding, Humphrey Hanfeng Cai, Geetu, Roman Volkov, and Samantha Wang

PDF

ENSURING BILLING ACCURACY FOR OFFLINE CHARGING IN 5G NETWORKS, Sanjeev Panem Jaya, Sachin Powar, and Gaurav Saxena

PDF

Identifying Best Customers Using Linear Fitting, HP INC

PDF

Producing a Selective Priming Area in LEP Printing, HP INC

PDF

Computer Vision triggered by voice - ID-05992, Paolo Markovina

PDF

Virtual Food Probe - ID-06008, Paolo Markovina

PDF

Method to Improve Triple/Multi Light Source-single Receiver Scanner Resolution, Spectral Response, Speed & Versatility, HP INC

PDF

Floating Doctor Blade, HP INC

PDF

Setting Open Regulator Position in FSR Pen for Shipping with Sealed Nozzle Plate, HP INC

PDF

Quick Take-Off AR Device Headstrap, HP INC

PDF

Configuring and Auditing VPC Network Traffic Using a Private Hyperledger Blockchain, Kishore Jagannath

PDF

A METHOD FOR MITIGATING UNDERFITTING ISSUE IN TIME SERIES MODEL USING REGRESSORS, Pengfei Li, Pei Yang, Shuo Wang, Zhuoyi Wang, and Dan Wang

PDF

DYNAMIC TELEMETRY PROFILE ENFORCEMENT IN A CONTROLLER NETWORK, Rajesh I V, Vinay Saini, Nagendra Kumar Nainar, and Ram Mohan R

PDF

DYNAMIC RESOURCE PROFILE-BASED CONTAINER AND SERVERLESS CONSTRUCT FOR COMPOSABLE OBSERVABILITY TRACING, Nagendra Kumar Nainar, Akram Sheriff, Rajesh I V, Carlos Pignataro, and Dave Zacks

PDF

DOMAIN PERFORMANCE INDEXES (DPIS) FOR IMPROVING PREDICTIVE NETWORKING AND NETWORK CORRELATION, Navdeep Sood and Praveen Kumar

PDF

Single Parameter Driven Tunable Resource Allocation for Machine Learning Tasks, Peter Danenberg

PDF

DIRECT CURRENT POWER SUPPLY UNIT INPUT FEED ADAPTER, Rohit Dev Gupta, Paolo Sironi, Lorenzo Ghioni, Arjun Guzar Jayaprakash, and Joel Richard Goergen

PDF

SUSTAINABLE AND SLA-SATISFYING TRAFFIC ENGINEERING, Praveen Parthasarathy Iyengar, Alhad Rajuwar, Maneesh Saxena, and Pralhad Katti

PDF

MAGNETIC MEDIA TO IMPROVE PH ALIGNMENT, HP INC

PDF

Selectively Managing Objects in the Field of View during a Conference Call, HP INC

PDF

GENERIC SYSTEM AND METHOD FOR JSON DATA PARSING, VISHESH KAIN

PDF

Differential Anomaly Detection for Analysis of High Cardinality Time-series Data, Sarah Thompson

PDF

Automatic Triggering of Contextual Suggestions for Web Pages, Keun Soo Yim

PDF

NETWORK FUNCTION REGISTRATION TO TWO DIFFERENT NETWORK RESPOSITORY FUNCTIONS AND PROVIDING CAPABILITIES TO HANDLE DISCOVERY OF OTHER NETWORK FUNCTIONS AND INCOMING SESSIONS, Uday Kiran Bokam

PDF

Asset Quality Management, PIK KOON OON, SIQING LIU, and PLAMENA PETROVA

PDF

Recipe Recommendation_ID-06004, Paolo Markovina

PDF

Proactive Prevention and Mitigation of Saltwater Damage for Portable Devices, Kavinaath Murugan, Yun Sun Lee, Michael E. Bentz II, Luke Manuel Brantingham, and Aaditya Kandibanda

PDF

A METHOD AND SYSTEM FOR SECURE DOCUMENT SEARCH, Nicholas Kersting, Joydeep Mitra, Aman Mohanty, and Miaomiao Liu

PDF

Device Identification and Authentication with Radar and UWB Ranging, Xiating Zou and Cheng-Jung (CJ) Lee

PDF

Precisely Co-located Cameras with High Geometric and Thermo-mechanical Stability, Guillermo F. Diaz Lankenau, Antonio Yamil Layón Halun, and Andrew Huibers

PDF

DETECTING AND REPORTING STACK SPLITS IN A STACKABLE SWITCH, Zach Cherian, Julie Quan, Lalitha Devi Appasani, and Manish Jhanji

PDF

Collaborative Media Processing for Video Conferencing, HP INC

PDF

WEARABLE TILT-TO-ACTION IMPROVEMENT USING CAMERA, Sumukh Ashok Shevde

PDF

Video AI Experience as a Service, HP INC

PDF

Computer Vision-based Approach for Rejecting Portraits and Mannequins, HP INC

PDF

A process for purification of Rilpivirine

PDF

UNKNOWN SERVER NAME INDICATION (SNI) PROCESSING, Bill Cox and Mike Lugo

PDF

Fulfilling User Queries via Local Devices with Generative AI Capabilities, Gaurav Arora

PDF

Quantifying Screen Crease and Waviness in Foldable Displays, Joseph Lo and Adrian Manea

PDF

NOISE REDUCTION IN METRIC, EVENT, LOG, AND TRACE (MELT) DATA USING DISTRIBUTED MACHINE LEARNING, Srinivasan Srinivasan, Linda Zhou, and Manikandan Mari Vera Kumara

PDF

Recipe Recommendations Based on Visual Input of Available Ingredients, Cliff Chin Ngai Sze, Russell Goldenbroit, and Elisabeth Jeremko

PDF

PER PREFIX FLEXIBLE METRIC FOR INTENT BASED ROUTING AND TRAFFIC ENGINEERING USING EIGRP, Rohit Saluja, Pranay Anand, Baalajee S, Aditya Dogra, and Abin Mathew Abraham

PDF

Automatic Police Traffic Stop Feature, Anonymous

PDF

Method to Actively Drain EV Battery Due to Impending Flood Condition, Anonymous

PDF

Plug & Activate – An Alternative DC Fast Charging Authentication Method, Anonymous

PDF

Enabling Inline Correction of Speech Transcript via Audio Cues, Gaetano Ling, Amelia Schladow, Michael Colville, Matthew Sibigtroth, George Joseph Rickerby, and Benjamin Guy Alexander Pawle

PDF

SYSTEMS AND METHODS FOR SECURELY CONNECTING HETEROGENEOUS L3 NETWORK WITH SDWAN, Satyajit Das, Laxmikantha Reddy Ponnuru, Arul Murugan Manickam, and Surya Mohapatra

PDF

DYNAMIC FUNCTION UPDATES FOR HYBRID CONTROLLERS, Jerome Henry, Robert Barton, and Indermeet Gandhi

PDF

A spillage control attachment for pressure cooker, Versuni Holding B.V.

PDF

TECHNIQUES TO FACILITATE LEAD PRIORITIZATION FOR ONLINE LEAD GENERATION SYSTEMS, Chris Shatara, Aseem Banshidhar Asthana, Rui Brettes, and Anbarasi Chinnaiah

PDF

SAFER AUDIO CONSUMPTION WHILE DRIVING, Ramprasad Sedouram and Daniel Victor Klein

PDF

SHEET METAL COMPONENT WITH DEFINED CLEARANCE FOR INTEGRATION, Axel Unger

PDF

METHOD FOR THE ENRICHMENT OF SENSOR-DETECTED DRIVING EVENTS, Axel Unger

PDF

DRIVE STATE FEEDBACK MECHANISM FOR ELECTRIC VEHICLES (DSFM FOR EV), Axel Unger

PDF

A METHOD AND PAYMENT SYSTEM FOR MANAGING EXPENSES BY USING A PAYMENT CARD, SANGEETHA VENKATESH

PDF

Call Audio Quality Determination and Root Cause Analysis Using Machine Learning, Yu Liu, Jack Chan, Qin Zhang, and Xiantao Sun

PDF

PREDICTIVE AND ADAPTIVE MAC LEARNING AS A SERVICE FOR CLOUD AND WIRELESS ENVIRONMENTS, Madhan Sankaranarayanan, Jaganbabu Rajamanickam, Alejandro Eguiarte, Akram Sheriff, and Nagendra Kumar Nainar

PDF

CONNECTING BNPL PROVIDERS AND ENSURING REPAYMENT, Aishwarya Chembilathel Ramachandran and Jenny Abraham

PDF

USE OF GRAPH DATABASES TO DETECT ILLEGITIMATE MONEY TRANSFERS, Partha Saha, Roger Huang, Hemant Deshpande, Sumit Lal, Sam Hamilton, and Suman Mukherjee

PDF

SOLAR MODULE WITH DEFINED FIT IN STRAK OF SHEET METAL COMPONENT, Axel Unger

PDF

Avoiding Speech Collisions in Multi-party Conferencing via Modulation and Time Shifting, D Shin

PDF

Detection of Scammers Impersonating Authentic Merchants in Online Payment Systems, Ankit Aggarwal, Xuqian Zhang, and JJ Geewax

PDF

Data Compression Using Contrastive Pre-Training and Large Language Models, D Shin

PDF

DEFINING PROCEDURES AND AN INTERFACE BETWEEN A LOCAL NSACF AND A GLOBAL NSACF FOR EFFICIENT ADMISSION CONTROL, Ravi Shekhar and Dishant Parikh

PDF

TECHNIQUES TO REDUCE THE RISK OF MALICIOUS OPERATIONS BEING PERFORMED DURING REMOTE CONTROL OF NETWORK DEVICES, Yi Ding, Humphrey Hanfeng Cai, Roman Volkov, and Samantha Wang

PDF

Automatically Generating a Video Based on User Provided Text Input, Jinyue Peng and Nizam Anuar

PDF

Measuring User Journey Friction in Search Engines, Abhishek Roy and Rebecca Umbach

PDF

Risk-based Payment Authorization for Online Transactions, Stan Li, Aneesh Ali Nainamvalappil Cheriyakath, and Archana Malhotra

PDF

Measuring Net Occupancy of a Parking Area with a Sensor Pair at Each Entry and Exit, D Shin

PDF

Language Identification for Language Agnostic Text, Shubhi Sareen, Vijay Garg, Abhinav Khandelwal, Nidhi Gupta, Srinivas Varanasi, and Aditya Singh

PDF

PROVIDING A BUILT-IN SERVICE MONITORING DISPLAY FOR NETWORK DEVICES, Asier Arlegui, Josh Halley, and Sven Arend

PDF

APPLICATION OF AI/ML TECHNIQUES TO CREATE CONFIDENCE/TRUST SCORE TO PROTECT USERS AGAINST PHISHING ATTACKS, Vinay Kumar Abburi and Stephen M. Orr

PDF

AMF SELECTION AND SIGNALLING FOR AMF RECOVERY IN AN ENHANCED SERVICE-BASED ARCHITECTURE UTILIZING INDIRECT COMMUNICATIONS IN 5G NETWORKS, Vinod Kamalaraj, Dishant Parikh, Vimal Srivastava, and Ravi Shekhar

PDF

TEMPORAL TOKENIZATION SERVICE, PRATIK SATAPATHY, BABU SAGINADHAM, RAVI BHUSHAN MISHRA, VAMSI KRISHNA KALIDINDI, and ABDUL JAKEER GURRAMKONDA

PDF

Reducing Time to Reset a Stateful System Under Test (SUT), Souvik Paul, Andrew Khatko, Frank Legler, Shubham Sharma, and RK Palabindela

PDF

ENHANCED VISIBILITY AND FORWARDING IN A TELCOMMUNICATION DATA CENTER FABRIC, Radha Krishnaiah Pusapati, Rajagopalan Janakiraman, Murukanandam Panchalingam, and Javed Asghar

PDF

UNIVERSAL RODENT CONTAMINATION PROTECTION COVER PLATE FOR NATURAL CONVECTION PRODUCTS, Eric P. Heidepriem, Stephen A. Scearce, Phong Ho, and Mark W. Musser

PDF

Screenshots Enriched with Metadata to Enable Bookmarking and Semantic Retrieval, Duc-Hieu Tran

PDF

STRATIFIED INVESTIGATION OF LOW-PERFORMING NETWORK ARCHITECTURE (SINA) USING GRAPH NEURAL NETWORKS AND PEER BENCHMARKING, Benjamin L. Chang, Qixu Gong, and Qihong Shao

PDF

Privacy in Personal Computing Using Frequency-Hopped Spread Spectrum, Michael R. Torres

PDF

Automated Testing of Software with Adequate Coverage of Input Space, Matt Kenison, Justin Bagwell, and Mike Meade

PDF

NETWORK ASSISTED HANDOVER TO A PRIVATE 5G NETWORK, Snezana Mitrovic, Vinay Saini, Alwin Xavier, Robert Barton, and Jerome Henry

PDF

a-SiD Binding Release Mechanism, HP INC

PDF

A MECHANISM TO CORRELATE DISTRIBUTED LOGS TO PERFORM ROOT CAUSE ANALYSIS AND SCOPE ASSESSMENT, Xueqiang (Sherman) Ma

PDF

Generating Book Sample Based on Page Engagement Metrics, D Shin

PDF

SYSTEMS AND METHODS FOR TWO INGOT ROLLING OPERATIONS IN A HOT REVERSING MILL, Roberto Armbrust de Freitas Quintal and Spencer Krass

PDF

UNTETHERED FEATURES AND CAPABILITIES FOR CAMPING, Dhiraj Vijayrao Jadhav