Follow

Article

PDF

TRANSACTION PROCESSING HOLD MANAGEMENT, Kobus Meyer Mr, Jonathan Woodword Mr, Jessica Deaton Ms, Sharon Vialpando Ms, Anil Chandupattla Mr, and Aruna Srinivasulu Ms

PDF

Trust-Based Emergency Message Relay, Poying Chuang and Tim Chen

PDF

PREVENTIVE LEAKAGE TEST USING LOW VOLTAGE OUTPUTS FROM ANY IC LIKE MICROCONTROLLER OR FPGA, HP INC

PDF

Secured and integrated mobile App for government communications, johan vercruysse

PDF

Early Determination Of Emergency Call Retry On Roaming Network, Edison Chen and Gary Tsao

PDF

A GREEN TRANSACTION TAGGING AND A METHOD OF ASSIGNING GREEN SCORE FOR CARDS, Nuri Vinod Purswani Ramchandani, Namita Shah, Jinyeop Kim, Ajit Vilasrao Patil, Peiwen Wang, Praveen Kumar Arackal Thankappa Panicker, and Anubhav Narang

PDF

Sustainable/eco-friendly packaging ready for automation - ID-05680, Christian Mohr

PDF

METHOD TO ADDRESS SECURITY VULNERABILITIES WITH RESPECT TO OFFLINE AND ONLINE DICTIONARY ATTACKS ON WPA2-PSK, Niranjan M M, Vijay Kothamasu, and Nagaraj Kenchaiah

PDF

QOS POLICIES FOR SERVICES ON THE SECURE INTERNET GATEWAY IN THE SDWAN DEPLOYMENTS, Niranjan M M

PDF

Modular Voltage Regulator, n/a

PDF

Recovery Of Server Identifiers In Response To Network Failure, Poying Chuang and Rayson Chou

PDF

A METHOD OF BOOK SCANNING VIA FLATBED IMAGE SCANNERS, HP INC

PDF

SYSTEM AND METHOD OF LOCKING AND RANKING THE RESOURCE FOR UTILIZATION IN A DISTRIBUTED SCHEDULING SYSTEM, Srijan Mukherjee, Nishant Kumar, Dhanuesh R C, and Arunkumar P

PDF

CERTIFIED ICC PROFILES USING NON-FUNGIBLE TOKENS (NFT), HP INC

PDF

Proxy Mode for Accessing Input/Output Pins in Multi-Dice Silicon Modules, n/a

PDF

Mitigation of Voids During Direct Soldering of Cooling Components to Silicon, n/a

PDF

IOT SMART CONTRACT ENABLEMENT WITH TEMPLATE BASED APPROACH, Dennis Lanov

PDF

Magnetic Integrated Trans-Inductor Voltage Regulator, n/a

PDF

SERVICE BASED ENCRYPTION FOR SECURING MULTI-CLOUD SERVICE CHAINING DEPLOYMENTS, Niranjan M M

PDF

DATA QUALITY FOR IOT, Mohsin Alam, Juan Cazila, and Fabio Salvemini

PDF

UNIVERSAL PRODUCT ARTIFICIAL NEURAL NETWORK (UPANN), Kate Ligon, Ted Ghose, and Ariel Peterson

PDF

LAYER 2 COLLISION AVOIDANCE USING COMPOSED MAC ADDRESS, Thomas Vegas, Anirban Karmakar, Vincent Cuissard, and Loris Gazzarrini

PDF

ADJUSTING VIRTUAL BACKGROUND TO CONVEY EMOTIONS, HP INC

PDF

A METHOD TO ESTIMATE SKEW FOR IMAGES ACQUIRED VIA IMAGE SCANNERS, HP INC

PDF

PROVIDING CENTRALIZED AND RTS/CTS-BASED CHANNEL ACCESS AND RESERVATION, Thomas Vegas, Vincent Cuissard, Loris Gazzarrini, and Anirban Karmakar

PDF

MINIMAL ENCRYPTION TO ACHIEVE CONFIDENTIALITY AND POWER SAVING, Thomas Vegas and Anirban Karmakar

PDF

A METHOD TO ESTIMATE SKEW FOR IMAGES ACQUIRED VIA IMAGE SCANNERS, HP INC

PDF

Receiving Messages on Wearable Devices in Configurable Power Saving Modes, Anonymous

PDF

Optimized Emergency Call Handling in NR-5G Only Mode Without Emergency Call Support, Mahesh Telang

PDF

MULTI-FACTOR AUTHENTICATION IN A NEXT GENERATION MESH NETWORK, Harbor Dong, Li Zhao, Huimin She, and Wenchuan Ji

PDF

Obtaining Accurate Position Data for the PIDF-LO Header in Emergency Calls, Anonymous

PDF

Transmitting Reliable Location Information via PIDF-LO in Emergency Calls, Anonymous

PDF

HEIGHT DETECTION ROUTINE BETWEEN TWO AXES TO AVOID COMPONENTS DAMAGE, HP INC

PDF

Diffused Corrosion Protection on Pressure Control Equipment, Taylor Mozisek, Nicolas Arteaga, and Adam Dyer

PDF

DAMPING ELEMENT FOR DOWNHOLDER, Axel Unger

PDF

INCREASING TYRE PRESSURE WHILE DRIVING AT HIGH SPEEDS (SYSTEM TO INCREASE DRIVING SAFETY)., Axel Unger

PDF

POSSIBILITY OF IDENTIFYING AND DISPLAYING CHARGING CABLES CARRIED IN AN ELECTRIC VEHICLE, Axel Unger

PDF

TRUSTED 5G NETWORK DEPLOYMENTS, Niranjan M M

PDF

METHOD TO PROVIDE SECURE AND RELIABLE MFA AND SSO USING HYPER LEDGER, Niranjan M M

PDF

TRUSTED RPL PROTOCOL FOR FIELD AREA NETWORKS, Niranjan M M

PDF

AUTHENTICITY AND LIFETIME OF PRODUCTS, Niranjan M M

PDF

METHOD TO SUPPORT IDENTITY PSK, CAPTIVE PORTAL AND ENHANCE ROAMING FEATURES FOR RANDOM MAC ADDRESS CLIENTS, Niranjan M M and Srihari Bhavanasi

PDF

TRUSTED VIRTUAL ROUTER REDUNDANCY PROTOCOL, NIRANJAN M M

PDF

EFFICIENT DISTRIBUTION OF ROGUE INFORMATION IN SOFTWARE DEFINED WIRELESS NETWORKS, Niranjan M M

PDF

TECHNIQUES TO FACILITATE POLICY DRIVEN CONVERSION OF UNICAST 5G SESSIONS TO MULTICAST, Raghavendar Rao Kota, Nithin Chitta, and Srini Irigi

PDF

Empty Oven Recognition_ID-05977, Christian Mohr

PDF

Rotation block detection_ID-05993, Christian Mohr

PDF

Recommender System for Recipes (Netflix Personalization)_ID-05777, Christian Mohr

PDF

AGGREGATE COMMUNICATION BETWEEN CONTROL PLANE AND USER PLANE IN A MOBILE NETWORK ENVIRONMENT, Pravin Ajagekar and Suyog Belsare

PDF

Bootstrapped Identifier for Recognizing People in a Video, Anonymous

PDF

DE-CENTRALISED, AUTHENTICATED AND SECURE COMMUNICATION BETWEEN CONTAINERS, Niranjan M M

PDF

AUTOMATIC MEDIA LENGTH DETECTION, HP INC

PDF

DETECTING AND PROFILING SLOW FRAMES IN AN INTEGRATED DEVELOPMENT ENVIRONMENT, Adhithya Ramakumar, Phillip Nguyen, Yi Yang, Lily Rapaport, and Shukang Zhou

PDF

SHORTEST PATH ASSISTED USER PLANE FUNCTION SELECTION ON 5G SESSION MANAGEMENT FUNCTION, Dennis Lanov

PDF

Improving Under-Display Fingerprint Authentication Latency by Normalizing Frame Luminance, Vicky Wen and Sang Young Youn

PDF

5G DEPLOYMENT WITH DISTRIBUTED APPROACH FOR NF INSTANCE AND SERVICE DISCOVERY, Niranjan M. M and Nagaraj Kenchaiah

PDF

METHOD TO IMPROVE QUALITY OF EXPERIENCE TO 5G USERS IN MULTI-SLICE NETWORK DEPLOYMENTS, Niranjan M M

PDF

RESILIENT METHOD TO ENHANCE EFFICIENCY OF INTERNET OF THINGS IN WI-FI6/WI-FI7 DEPLOYMENTS, Niranjan M M

PDF

SECURING IN-SITU OAM USING OPTIMISED AND QUANTUM RESISTANT METHOD, Niranjan M M

PDF

QUANTUM SECURE MULTICAST, Niranjan M M

PDF

Determining Driving Routes that Match User Preferences, Equipment, and Experience, Joe Turner

PDF

METHOD TO OPTIMISE DISTRIBUTION OF AUTHENTICATION INFORMATION FOR CLIENT RE-CONNECTIVITY, Niranjan M M and Vijay Kothamasu

PDF

AUTHENTICATED AND SECURE SERVICE DISCOVERY USING HOLOCHAIN, Niranjan M M

PDF

SECURE METHOD TO DISCOVER MESH ROUTERS IN SOFTWARE-DEFINED WIRELESS MESH NETWORKS, Niranjan M M

PDF

METHOD TO PROVIDE TRUSTWORTHY BETWEEN ACCESS POINT AND WIRELESS LAN CONTROLLER, Niranjan M M

PDF

Find local food supplier_ID-05997, Christian Mohr

PDF

Dishware Recognition_ID-05990, Christian Mohr

PDF

Dynamically Adjusting State of Charge and Charging Method to Preserve Lithium-Ion Battery Cell Life, Jon Hurwitz

PDF

QUANTUM RESISTANT RADSEC FOR OPENROAMING AND WIRELESS BROADBAND APPLIANCE OPERATIONS, NIRANJAN M M

PDF

Unfreezing recognition_ID-05988, Christian Mohr

PDF

TRUSTWORTHY ENABLER FOR EOGRE, GRE AND EOIP PROTOCOLS USED ACROSS HETEROGENOUS TECHNOLOGIES, NIRANJAN M M

PDF

SECURE PROVENANCE METHOD FOR TRACEABILITY AND TROUBLESHOOTING IN SDN DEPLOYMENTS, NIRANJAN M M

PDF

PACKET LOSS DETECTOR AND ANALYSER SERVICE IN 5G DEPLOYMENTS, NIRANJAN M M

PDF

ATTESTED PMIPV6 PROTOCOL FOR SEAMLESS HANDOVER IN 5G/LTE/Wi-Fi DEPLOYMENTS, NIRANJAN M M

PDF

Process for the preparation of Perampanel, Srinivasan Thirumalai Rajan, Muppa Kishore Kumar, Mummadi Venkatesh and Anugu Praneeth Kumar; R&D Center, MSN Laboratories Private Limited; Hyderabad, India.

PDF

METHOD TO PROVIDE TRUSTWORTHINESS TO SGT EXCHANGE PROTOCOL, NIRANJAN M M

PDF

REMOTE ATTESTATION TO ENHANCE EMAIL SECURITY, NIRANJAN M M

PDF

METHOD TO COUNTER DISTRIBUTED DENIAL OF SERVICE ATTACK IN SEGMENT ROUTING USING HYPERLEDGER, NIRANJAN M M

PDF

DETECTION, PREVENTION AND MITIGATION OF ROGUE BASE STATIONS IN 5G NETWORKS, NIRANJAN M M

PDF

REDUCING DISTRACTED DRIVING, Ravi Soma

PDF

METHOD TO EFFICIENTLY UPGRADE MESH ROUTERS IN SOFTWARE-DEFINED WIRELESS MESH NETWORK, NIRANJAN M M

PDF

Navigation Suggestions to Select Driving Route with Low Sun Glare, Bruce Bahnsen and Yan Mayster

PDF

SOCIAL READING, Dongeek Shin

PDF

PRIVACY POLICIES FOR DISTRIBUTED OBJECT-BASED STORAGE IN MULTI-CLOUD DEPLOYMENTS, NIRANJAN M M

PDF

METHOD TO SECURELY AUTO-RECOVER THE STRANDED MESH ROUTER IN SOFTWARE-DEFINED WIRELESS MESH NETWORK DEPLOYMENTS, NIRANJAN M M

PDF

Contextual Proactive Suggestions for Custom Commands for Vehicle Components, Ankur Aggarwal, Priyank Devpura, Amit Singhal, Yao Lin, Douglas Mayle, Chandan Dubey, and Andrey Adaykin

PDF

ROBUST EMISSIVITY MEASUREMENT SYSTEM, HP INC

PDF

TRUSTWORTHINESS FOR LIGHTWEIGHT DIRECTORY ACCESS PROTOCOL, NIRANJAN M M

PDF

Generating Audio-Based User Data Associated with Physical Objects that may be Presented When a Device is Pointed at or Near the Physical Object, Sedou Ramprasad

PDF

CALENDAR BASED DATA RATE-LIMITING MECHANISM IN WI-FI DEPLOYMENTS, NIRANJAN M M

PDF

REDUCTION OF HANDOVER DURATION FOR LATENCY SENSITIVE APPLICATIONS IN 5G MOBILE NETWORKS, Krushang Shah, Rajaneesh Shetty, and Soundarya Pendyala

PDF

MULTIPLE PROVIDER SDN PROVISIONING USING HOLOCHAIN TECHNOLOGY, NIRANJAN M M

PDF

PREDICTION OF POST-FEC PERFORMANCE WITHOUT USING FEC SYMBOLS COUNTERS, David Nozadze, Amendra Koul, Mike Sapozhnikov, Upen Reddy Kareti, and Joel Goergen

PDF

AERIAL EDGE ORCHESTRATOR, Sudha Katgeri, Lubna Rasheed, and Jasna Jayaraj

PDF

APPLICATION CENTRIC GROUPING USING AUTHENTICATION AND KEY MANAGEMENT FOR APPLICATIONS (AKMA) TECHNIQUES, Rajesh I. V and Ram Mohan R

PDF

Automated clearing of software source code files using proximity matching and parsing file contents, Armijn Hemel

PDF

Process for the preparation of Tapentadol hydrochloride

PDF

SMART POWER ON WHEN SPECIFIC USB-C DOCK OR INDUSTRY USB-C DISPLAY CONNECTION, HP INC

PDF

Automatically Generating Descriptive Annotations for Participants in a Virtual Meeting, Daniel V. Klein and Igor S. Ramos

PDF

5G NETWORK DEPLOYMENTS WITH DE-CENTRALISATION OF POLICIES AND CONFIGURATIONS, NIRANJAN M M