Follow

Article

PDF

DYNAMIC DATA AND POLICY RELATIONSHIP TECHNOLOGIES FOR DATA PRIVACY COMPLIANCE IN ECOSYSTEM, HP INC

PDF

SYSTEM AND METHOD FOR TELEPHONIC PAYMENT CREDENTIAL COLLECTION, PATRICK FLANAGAN and VANESSA MAREN

PDF

MECHANISM TO ENHANCE SECURITY OF THE QUIC BASED COMMUNICATION, Niranjan M M

PDF

Compliant Coherent Module Functional Management, Anonymous

PDF

Finding a closest match for an ELF file based on proximity matching of extracted identifiers, Armijn Hemel

PDF

IMPROVING POINT OF LOAD EFFICIENCY BY DECREASING INDUCTOR SERIES RESISTANCE, Joel Goergen, Kami Hurst, Mary Kathryn Laue, and Shobhana Punjabi

PDF

Early Detection of Mental Health Problems, n/a

PDF

Semantic Indexing and Retrieval of Web Pages in a Web Browser, Duc-Hieu Tran

PDF

Connector module for cook tops - ID-05924, Christian Mohr

PDF

Light Structuring and Reflecting Optical system., punarjeewa abeysekera

PDF

ACCESS CONTROL POLICY ENFORCEMENT THROUGH ROUTE-BASED MICRO-SEGMENTATION AND CONTRACT TAGS, Victor Moreno, Sanjay Hooda, and Steve Wood

PDF

DETERMINATION OF TRAFFIC UTILIZATION FOR DWDM NETWORKS AND ENHANCED TRAFFIC ENGINEERING APPLICATIONS, Navdeep Sood and Praveen Kumar

PDF

Multi-functional carrier - ID-05922, Christian Mohr

PDF

ENERGY HARVESTING BATTERY-LESS SMART CARD WITH VICINITY COMMUNICATION CAPABILITY, YUEXI CHEN and MUSTAFA TOP

PDF

INPUT LIFT-OFF DETECTION AND DRIFT COMPENSATION FOR PRESENCE-SENSITIVE DEVICES, Mingyuan Zhong, Wenxin Feng, and Shumin Zhai

PDF

OPERATING SYSTEM-LEVEL SURVEY PLATFORM, Krishna Shukla

PDF

CONTENT-BASED DISPLAY COLOR ENHANCEMENT USING DYNAMIC MEMORY COLOR PROTECTION, Farnaz Agahian and Daniel Solomon

PDF

DEFINING AND ENFORCING PRIVACY RESTRICTIONS FOR SOFTWARE APPLICATIONS, Eugenio Marchiori

PDF

POLICY-DEFINED DATA ACCESS MODEL FOR DATA ACCESS LIMITS AND RESTRICTIONS ENFORCEMENT, Eugenio Marchiori, Wei Huang, Nikita Dubrovsky, and Sergey Volnov

PDF

PACKAGING AND PROPAGATION OF MOLECULAR DOCUMENTATION RESPONSES, Vishal Palliyathu, Anu Kothari, Manju Joseph, and Swetha K.S

PDF

Method to support iPSK for WPA3 clients as well as reduce Online Dictionary Attacks, Niranjan M M, Vijay Kothamasu, and Nagaraj Kenchaiah

PDF

Trusted Holochain Networks, Niranjan M M

PDF

Suggesting Chat with a Professional in Response to Queries about Emotional Well-being, n/a

PDF

SYSTEMS AND METHODS FOR UNIFIED REMOTE CONTROL OF MULTIPLE APPLIANCES AND DEVICES, Shyam Ramamurthy, Puneet Gupta, Kedar Chitnis, Smitha Naik, and Nitin Sharma

PDF

Interactions of Internet-of-Things (IoT) Devices with Augmented Reality, Andy Lavery and Corville Allen

PDF

VXLAN EXTENSIONS FOR 5G USER EQUIPMENT SESSIONS, Mahesh Satyanarayana

PDF

Improving Autofocus Speed in Macrophotography Applications, Dmitrii Boiarshinov

PDF

Optical Phased Array Light Shaping, Michael Robert Watts and Katia Shtyrkova

PDF

Estimating Product Field Life Under Multi-Stress Environments in HALT and HASS, Ouyang Simon Chase

PDF

SELF-SERVE KIOSK FOR CREDIT CARD ENROLLMENT, InVue Security Products Inc.

PDF

Semi-automated User Account Profile Generation Using Existing Social Media Data, Cliff Chin Ngai Sze, Russell Goldenbroit, and Elisabeth Jeremko

PDF

Command-line Interface with Improved Screen Reader Accessibility, David J. Murphy, Szu Yu Huang, Lucas Radaelli, and Amy Hu

PDF

Automatic Adjustment of Wireless Access Point Settings Based on Client-side RF Measurements, n/a

PDF

Distributed Computing Using Dynamic Local Network of Edge Devices, n/a

PDF

Responsive User Interface Updates for Remote Computation, Xu Cao

PDF

NOVEL METHOD FOR CAPTURING, STORING, AND EXCHANGING SECURITY KEY PERFORMANCE INDICATOR (KPI) DATA FOR 5G NETWORK SLICING, Prapanch Ramamoorthy, Akshay Dubey, Vijay Venugopal, and Selina Sun

PDF

Predicted Binders for WDR12 Protein Target from Machine Learning Applied to Affinity Screening Data, Anonymous

PDF

The Portable Virtual Content through Relative to Backpack Tracked Augmented Reality Headset., punarjeewa abeysekera

PDF

AUTOMATIC MOLECULAR LICENSING THROUGH TRUSTED PEERS, Orlando Ramirez

PDF

AUTHENTICATED MACHINE LEARNING IN 5G NETWORK DEPLOYMENTS, Niranjan M M and Nagaraj Kenchaiah

PDF

LAWFUL INTERCEPT IN MULTI-PROVIDER 5G DEPLOYMENTS USING HOLOCHAIN, Niranjan M M and Nagaraj Kenchaiah

PDF

SHARED USB-A, USB-C POWER AND CHARGING ECOSYSTEM BASED ON DEVCE LANDSCAPE, HP INC

PDF

Using Low-level Telemetry in Cloud Platforms to Mitigate Latency Risks for High-Performance Computing, Radu Iorga and Aurélien Legrand

PDF

Digital AirFry and Steam Guide, Christian Mohr

PDF

Wearable Device Mic Corrosion Mitigation, Yao Ding and Fred Temperton

PDF

POWER MANAGEMENT AND ON-DEMAND READING IN THE POWEROFF MODE FOR ULTRA-LOW-POWER DEVICES, Muhammad Khizer Kaleem and Steve Williams

PDF

Real-Time Feedback to Improve Selfies for Low-Vision Users, N/A

PDF

NETWORK MONITORING OF CONTAINER CLUSTERS IN PRIVATE, PUBLIC, AND HYBRID ENVIRONMENTS, Shyam Kapadia, Anil Jangam, and Deepika Sharma

PDF

REAL-TIME COORDINATION BETWEEN SHARED SCHEDULERS IN AN O-RAN ARCHITECTURE, Mark Grayson and Indermeet Gandhi

PDF

SYSTEM AND METHOD FOR PROVIDING VALIDATION SERVICES TO A CUSTOMER, Andrew Chen, Junjun Yu, Danielle Cole, and Aravind Srivatsa

PDF

Text Cutoff Detection for Document Images, Avisek Lahiri, Xinwei Yao, and Tianli Yu

PDF

COAXIAL COOLANT ROUTING IN MOTOR VEHICLES, Axel Unger

PDF

ARRANGEMENT AND METHOD FOR THE INDIVIDUAL GUIDANCE OF VEHICLES TO A CHARGING STATION WITH DISPLAY CONCEPT, Axel Unger

PDF

STRETCH MODE BEV, Axel Unger

PDF

AIWAC AUDI INTELLIGENT WHEEL ARCH COVER, Axel Unger

PDF

DRIVERLESS TRANSPORT VEHICLE WITH HYBRID ENERGY STORAGE, Axel Unger

PDF

COMPANY LOGO AS BEARING STRUCTURE, Axel Unger

PDF

AGENTLESS QUARANTINE OF NETWORK ENDPOINTS, Rajesh Tarakkad Venkateswaran, Veena Ramamoorthy, and Saravanan Radhakrishnan

PDF

DYNAMIC GRAPH NODE ALLOCATION FOR VECTOR PACKET PROCESSING WORKERS OPERATING IN A MOBILE NETWORK USER PLANE, Harish Kumar Krishnamurthy

PDF

SYSTEM AND METHOD FOR PROVIDING AUTOMATED REFUNDS FOR REAL-TIME PAYEMENTS, SOM MADHAB BHATTACHARYA

PDF

HOSTED SERVICES SUPPORT IN 5G NETWORKS, Ravi Shankar Mantha and Irfan Ali

PDF

INTEROPERABILITY INDEX PREDICTION, Praveen Kumar and Navdeep Sood

PDF

Peregrine Frigidaire Pro Door Handle - Assembly Design Features_ID-06011, Christian Mohr

PDF

DYNAMIC FEASIBILITY, DESIRABILITY EVALUATION, AND EXECUTION FOR SD-WAN SITE-TO-SITE TUNNELS, Dave Zacks, Steve Wood, Apoorva Sharma, Anmol Bondada Venkata, and Habishek T. E

PDF

IMPROVED PRINTER FAILURE PREDICTION, HP INC

PDF

PRINT FIDELITY PREDICTION USING MACHINE LEARNING, HP INC

PDF

SMART GROUPING – GOING BEYOND DOMAIN SIMILARITIES IN PEER RECOGNITION BY LEVERAGING COMPLEX HIERARCHIES USING MACHINE LEARNING, Doosan Jung, Qihong Shao, Belanna Zhou, Jonathan Arnowitz, Gurvinder Singh, and Kiran Yedavalli

PDF

LANGUAGE AGNOSTIC CALL-GRAPH INSTRUMENTATION, Ashutosh Goel and Prabish Kumar Tattari Prakasan

PDF

DETECTING PATHS EXPERIENCING PACKET LOSS USING AN SDN CONTROLLER, Clarence Filsfils, Ahmed Abdelsalam, Pablo Camarillo Garvia, and Rakesh Gandhi

PDF

Route Computation Methods Based On Node Type In Mixed Node Control Plane Networks, Anonymous

PDF

Fair Hash Distribution with Minimum Failover Disruption, Anonymous

PDF

Maximizing Linguistic Distance between Good and Bad Product Names when Competing in Global Markets, N/A

PDF

WEB 3.0 COLD WALLET COMPATIBLE XR EQUIPMENT, HP INC

PDF

Automatic Ringtone Selection Based on Device Battery Level, Ramprasad Sedouram

PDF

ROBUST DATA SENDING IN PRINTER TELEMETRY, HP INC

PDF

SMART ALERT TO RECOMMEND THE CAPACITY OF THE SUPPLIES THAT A USER SHOULD BUY USING PRINTER USAGE INFORMATION BEFORE SUPPLIES ARE EMPTY, HP INC

PDF

ENABLING AUTOMATED PEER-TO-PEER COLLABORATION BETWEEN AR/VR-ENABLED WI-FI CLIENTS FOR REMOTE WORKERS, Akram Sheriff, Nagendra Kumar Nainar, and Carlos M. Pignataro

PDF

TECHNIQUES TO IMPROVE HYBRID WORK ENVIRONMENTS, Arnaud Caigniet

PDF

MULTI-FACTOR AUTHENTICATION IN WIRELESS NETWORKS, Sachin D. Wakudkar and Ugo Campiglio

PDF

METHOD AND SYSTEM FOR SECURE THIRD-PARTY IDENTIFICATION, TODD MAZUREK, NEERAV BERRY, and ANYA MILLER

PDF

PREMIUM PATH OFFLOADING OF CRITICAL TRAFFIC AND DIRECT CONNECTIVITY CLIQUES IN HIERARCHICAL SDWAN NETWORKS, Satish Mahadevan, Laxmikantha Reddy Ponnuru, Samir Thoria, Vivek Agarwal, and Hamzah Kardame

PDF

ADVANCED SCREEN SIGINING WORKFLOW, HP INC

PDF

CLOUD BASED BIOMETRIC SUPPLY GASE GAGE - IMPROVEMENTS BASED ON GEOLOCATION INPUT, HP INC

PDF

OAM linked SR-TE policy to prevent longer explicit path due to network failure, Anonymous

PDF

METHOD TO OPTIMIZE QUERY PROCESSING AND UNGRACEFUL SERVICE PROVIDER HANDLING OF MDNS SERVICES IN WIRELESS DEPLOYMENTS, Niranjan M M

PDF

FREQUENCY ANALYSIS TO FACILITATE THE LIGHTWEIGHT TRANSFER OF TIMESERIES DATA, Thomas Vegas and Anirban Karmakar

PDF

Micro-loop free Delivery on the Post-Convergence Path after a Link change in the Topology, Anonymous

PDF

Variable EMC Filter Board - ID-05919, Christian Mohr

PDF

Distributed Shader Cache, Doug Horn

PDF

TRANSPORT OF 800GE TRAFFIC OVER TWO 400GE FRAMES, Gilberto Loprieno, Emanuele Giacometti, Luca Della Chiesa, and Jim Duda

PDF

Personalized Health Reminders in the Voice of a Trusted Caregiver, Twinkle Gupta and Naga Sreenivas Meruva

PDF

Novel Crystalline Polymorph Of Baloxavir Marboxil And Process For Preparation Thereof, Srinivasan Thirumalai Rajan, Sajja Eswaraiah, Vijayavitthal T. Mathad, Saladi Venkata Narasayya, Kammari Bal Raju, and Mandad Pratap Reddy

PDF

NEW WAKE UP SCENARIO: WAKE ON PICK UP, HP INC

PDF

Surfacing Resources for Emotional Support based on the User’s Inferred State of Mind, n/a

PDF

Offering Empathetic Coping Mechanisms in Response to Queries on Emotional Well-being, n/a

PDF

HYBRID FINGERPRINT TECHNIQUE FOR IOT ASSET CLASSIFICATION AND MANAGEMENT, Ajith Chandran

PDF

Adaptive First Radio Access Technology Selection For Public Land Mobile Network Search, Poying Chuang and Jecy Lai

PDF

AUTOMATIC DIAGNOSIS RF SHIELDING CAN ASSEMBLY, HP INC

PDF

VRAN CAPACITY ENHANCEMENT SOLUTION BY RADIO UNIT SELF-DISCOVERY AND SELF-MANAGEMENT, Fred Anderson and Shailender Potharaju

PDF

METHOD FOR THE EFFECTIVE UTILISATION OF THE TUNNEL BETWEEN SDWAN ROUTER AND SECURE INTERNET GATEWAY, Niranjan M M, Vijay Kothamasu, and Nagaraj Kenchaiah