Article
TRANSACTION PROCESSING HOLD MANAGEMENT, Kobus Meyer Mr, Jonathan Woodword Mr, Jessica Deaton Ms, Sharon Vialpando Ms, Anil Chandupattla Mr, and Aruna Srinivasulu Ms
Trust-Based Emergency Message Relay, Poying Chuang and Tim Chen
PREVENTIVE LEAKAGE TEST USING LOW VOLTAGE OUTPUTS FROM ANY IC LIKE MICROCONTROLLER OR FPGA, HP INC
Secured and integrated mobile App for government communications, johan vercruysse
Early Determination Of Emergency Call Retry On Roaming Network, Edison Chen and Gary Tsao
A GREEN TRANSACTION TAGGING AND A METHOD OF ASSIGNING GREEN SCORE FOR CARDS, Nuri Vinod Purswani Ramchandani, Namita Shah, Jinyeop Kim, Ajit Vilasrao Patil, Peiwen Wang, Praveen Kumar Arackal Thankappa Panicker, and Anubhav Narang
Sustainable/eco-friendly packaging ready for automation - ID-05680, Christian Mohr
METHOD TO ADDRESS SECURITY VULNERABILITIES WITH RESPECT TO OFFLINE AND ONLINE DICTIONARY ATTACKS ON WPA2-PSK, Niranjan M M, Vijay Kothamasu, and Nagaraj Kenchaiah
QOS POLICIES FOR SERVICES ON THE SECURE INTERNET GATEWAY IN THE SDWAN DEPLOYMENTS, Niranjan M M
Modular Voltage Regulator, n/a
Recovery Of Server Identifiers In Response To Network Failure, Poying Chuang and Rayson Chou
A METHOD OF BOOK SCANNING VIA FLATBED IMAGE SCANNERS, HP INC
SYSTEM AND METHOD OF LOCKING AND RANKING THE RESOURCE FOR UTILIZATION IN A DISTRIBUTED SCHEDULING SYSTEM, Srijan Mukherjee, Nishant Kumar, Dhanuesh R C, and Arunkumar P
CERTIFIED ICC PROFILES USING NON-FUNGIBLE TOKENS (NFT), HP INC
Proxy Mode for Accessing Input/Output Pins in Multi-Dice Silicon Modules, n/a
Mitigation of Voids During Direct Soldering of Cooling Components to Silicon, n/a
IOT SMART CONTRACT ENABLEMENT WITH TEMPLATE BASED APPROACH, Dennis Lanov
Magnetic Integrated Trans-Inductor Voltage Regulator, n/a
SERVICE BASED ENCRYPTION FOR SECURING MULTI-CLOUD SERVICE CHAINING DEPLOYMENTS, Niranjan M M
DATA QUALITY FOR IOT, Mohsin Alam, Juan Cazila, and Fabio Salvemini
UNIVERSAL PRODUCT ARTIFICIAL NEURAL NETWORK (UPANN), Kate Ligon, Ted Ghose, and Ariel Peterson
LAYER 2 COLLISION AVOIDANCE USING COMPOSED MAC ADDRESS, Thomas Vegas, Anirban Karmakar, Vincent Cuissard, and Loris Gazzarrini
ADJUSTING VIRTUAL BACKGROUND TO CONVEY EMOTIONS, HP INC
A METHOD TO ESTIMATE SKEW FOR IMAGES ACQUIRED VIA IMAGE SCANNERS, HP INC
PROVIDING CENTRALIZED AND RTS/CTS-BASED CHANNEL ACCESS AND RESERVATION, Thomas Vegas, Vincent Cuissard, Loris Gazzarrini, and Anirban Karmakar
MINIMAL ENCRYPTION TO ACHIEVE CONFIDENTIALITY AND POWER SAVING, Thomas Vegas and Anirban Karmakar
A METHOD TO ESTIMATE SKEW FOR IMAGES ACQUIRED VIA IMAGE SCANNERS, HP INC
Receiving Messages on Wearable Devices in Configurable Power Saving Modes, Anonymous
Optimized Emergency Call Handling in NR-5G Only Mode Without Emergency Call Support, Mahesh Telang
MULTI-FACTOR AUTHENTICATION IN A NEXT GENERATION MESH NETWORK, Harbor Dong, Li Zhao, Huimin She, and Wenchuan Ji
Obtaining Accurate Position Data for the PIDF-LO Header in Emergency Calls, Anonymous
Transmitting Reliable Location Information via PIDF-LO in Emergency Calls, Anonymous
HEIGHT DETECTION ROUTINE BETWEEN TWO AXES TO AVOID COMPONENTS DAMAGE, HP INC
Diffused Corrosion Protection on Pressure Control Equipment, Taylor Mozisek, Nicolas Arteaga, and Adam Dyer
DAMPING ELEMENT FOR DOWNHOLDER, Axel Unger
INCREASING TYRE PRESSURE WHILE DRIVING AT HIGH SPEEDS (SYSTEM TO INCREASE DRIVING SAFETY)., Axel Unger
POSSIBILITY OF IDENTIFYING AND DISPLAYING CHARGING CABLES CARRIED IN AN ELECTRIC VEHICLE, Axel Unger
TRUSTED 5G NETWORK DEPLOYMENTS, Niranjan M M
METHOD TO PROVIDE SECURE AND RELIABLE MFA AND SSO USING HYPER LEDGER, Niranjan M M
TRUSTED RPL PROTOCOL FOR FIELD AREA NETWORKS, Niranjan M M
AUTHENTICITY AND LIFETIME OF PRODUCTS, Niranjan M M
METHOD TO SUPPORT IDENTITY PSK, CAPTIVE PORTAL AND ENHANCE ROAMING FEATURES FOR RANDOM MAC ADDRESS CLIENTS, Niranjan M M and Srihari Bhavanasi
TRUSTED VIRTUAL ROUTER REDUNDANCY PROTOCOL, NIRANJAN M M
EFFICIENT DISTRIBUTION OF ROGUE INFORMATION IN SOFTWARE DEFINED WIRELESS NETWORKS, Niranjan M M
TECHNIQUES TO FACILITATE POLICY DRIVEN CONVERSION OF UNICAST 5G SESSIONS TO MULTICAST, Raghavendar Rao Kota, Nithin Chitta, and Srini Irigi
Empty Oven Recognition_ID-05977, Christian Mohr
Rotation block detection_ID-05993, Christian Mohr
Recommender System for Recipes (Netflix Personalization)_ID-05777, Christian Mohr
AGGREGATE COMMUNICATION BETWEEN CONTROL PLANE AND USER PLANE IN A MOBILE NETWORK ENVIRONMENT, Pravin Ajagekar and Suyog Belsare
Bootstrapped Identifier for Recognizing People in a Video, Anonymous
DE-CENTRALISED, AUTHENTICATED AND SECURE COMMUNICATION BETWEEN CONTAINERS, Niranjan M M
AUTOMATIC MEDIA LENGTH DETECTION, HP INC
DETECTING AND PROFILING SLOW FRAMES IN AN INTEGRATED DEVELOPMENT ENVIRONMENT, Adhithya Ramakumar, Phillip Nguyen, Yi Yang, Lily Rapaport, and Shukang Zhou
SHORTEST PATH ASSISTED USER PLANE FUNCTION SELECTION ON 5G SESSION MANAGEMENT FUNCTION, Dennis Lanov
Improving Under-Display Fingerprint Authentication Latency by Normalizing Frame Luminance, Vicky Wen and Sang Young Youn
5G DEPLOYMENT WITH DISTRIBUTED APPROACH FOR NF INSTANCE AND SERVICE DISCOVERY, Niranjan M. M and Nagaraj Kenchaiah
METHOD TO IMPROVE QUALITY OF EXPERIENCE TO 5G USERS IN MULTI-SLICE NETWORK DEPLOYMENTS, Niranjan M M
RESILIENT METHOD TO ENHANCE EFFICIENCY OF INTERNET OF THINGS IN WI-FI6/WI-FI7 DEPLOYMENTS, Niranjan M M
SECURING IN-SITU OAM USING OPTIMISED AND QUANTUM RESISTANT METHOD, Niranjan M M
QUANTUM SECURE MULTICAST, Niranjan M M
Determining Driving Routes that Match User Preferences, Equipment, and Experience, Joe Turner
METHOD TO OPTIMISE DISTRIBUTION OF AUTHENTICATION INFORMATION FOR CLIENT RE-CONNECTIVITY, Niranjan M M and Vijay Kothamasu
AUTHENTICATED AND SECURE SERVICE DISCOVERY USING HOLOCHAIN, Niranjan M M
SECURE METHOD TO DISCOVER MESH ROUTERS IN SOFTWARE-DEFINED WIRELESS MESH NETWORKS, Niranjan M M
METHOD TO PROVIDE TRUSTWORTHY BETWEEN ACCESS POINT AND WIRELESS LAN CONTROLLER, Niranjan M M
Find local food supplier_ID-05997, Christian Mohr
Dishware Recognition_ID-05990, Christian Mohr
Dynamically Adjusting State of Charge and Charging Method to Preserve Lithium-Ion Battery Cell Life, Jon Hurwitz
QUANTUM RESISTANT RADSEC FOR OPENROAMING AND WIRELESS BROADBAND APPLIANCE OPERATIONS, NIRANJAN M M
Unfreezing recognition_ID-05988, Christian Mohr
TRUSTWORTHY ENABLER FOR EOGRE, GRE AND EOIP PROTOCOLS USED ACROSS HETEROGENOUS TECHNOLOGIES, NIRANJAN M M
SECURE PROVENANCE METHOD FOR TRACEABILITY AND TROUBLESHOOTING IN SDN DEPLOYMENTS, NIRANJAN M M
PACKET LOSS DETECTOR AND ANALYSER SERVICE IN 5G DEPLOYMENTS, NIRANJAN M M
ATTESTED PMIPV6 PROTOCOL FOR SEAMLESS HANDOVER IN 5G/LTE/Wi-Fi DEPLOYMENTS, NIRANJAN M M
Process for the preparation of Perampanel, Srinivasan Thirumalai Rajan, Muppa Kishore Kumar, Mummadi Venkatesh and Anugu Praneeth Kumar; R&D Center, MSN Laboratories Private Limited; Hyderabad, India.
METHOD TO PROVIDE TRUSTWORTHINESS TO SGT EXCHANGE PROTOCOL, NIRANJAN M M
REMOTE ATTESTATION TO ENHANCE EMAIL SECURITY, NIRANJAN M M
METHOD TO COUNTER DISTRIBUTED DENIAL OF SERVICE ATTACK IN SEGMENT ROUTING USING HYPERLEDGER, NIRANJAN M M
DETECTION, PREVENTION AND MITIGATION OF ROGUE BASE STATIONS IN 5G NETWORKS, NIRANJAN M M
REDUCING DISTRACTED DRIVING, Ravi Soma
METHOD TO EFFICIENTLY UPGRADE MESH ROUTERS IN SOFTWARE-DEFINED WIRELESS MESH NETWORK, NIRANJAN M M
Navigation Suggestions to Select Driving Route with Low Sun Glare, Bruce Bahnsen and Yan Mayster
SOCIAL READING, Dongeek Shin
PRIVACY POLICIES FOR DISTRIBUTED OBJECT-BASED STORAGE IN MULTI-CLOUD DEPLOYMENTS, NIRANJAN M M
METHOD TO SECURELY AUTO-RECOVER THE STRANDED MESH ROUTER IN SOFTWARE-DEFINED WIRELESS MESH NETWORK DEPLOYMENTS, NIRANJAN M M
Contextual Proactive Suggestions for Custom Commands for Vehicle Components, Ankur Aggarwal, Priyank Devpura, Amit Singhal, Yao Lin, Douglas Mayle, Chandan Dubey, and Andrey Adaykin
ROBUST EMISSIVITY MEASUREMENT SYSTEM, HP INC
TRUSTWORTHINESS FOR LIGHTWEIGHT DIRECTORY ACCESS PROTOCOL, NIRANJAN M M
Generating Audio-Based User Data Associated with Physical Objects that may be Presented When a Device is Pointed at or Near the Physical Object, Sedou Ramprasad
CALENDAR BASED DATA RATE-LIMITING MECHANISM IN WI-FI DEPLOYMENTS, NIRANJAN M M
REDUCTION OF HANDOVER DURATION FOR LATENCY SENSITIVE APPLICATIONS IN 5G MOBILE NETWORKS, Krushang Shah, Rajaneesh Shetty, and Soundarya Pendyala
MULTIPLE PROVIDER SDN PROVISIONING USING HOLOCHAIN TECHNOLOGY, NIRANJAN M M
PREDICTION OF POST-FEC PERFORMANCE WITHOUT USING FEC SYMBOLS COUNTERS, David Nozadze, Amendra Koul, Mike Sapozhnikov, Upen Reddy Kareti, and Joel Goergen
AERIAL EDGE ORCHESTRATOR, Sudha Katgeri, Lubna Rasheed, and Jasna Jayaraj
APPLICATION CENTRIC GROUPING USING AUTHENTICATION AND KEY MANAGEMENT FOR APPLICATIONS (AKMA) TECHNIQUES, Rajesh I. V and Ram Mohan R
Automated clearing of software source code files using proximity matching and parsing file contents, Armijn Hemel
Process for the preparation of Tapentadol hydrochloride
SMART POWER ON WHEN SPECIFIC USB-C DOCK OR INDUSTRY USB-C DISPLAY CONNECTION, HP INC
Automatically Generating Descriptive Annotations for Participants in a Virtual Meeting, Daniel V. Klein and Igor S. Ramos
5G NETWORK DEPLOYMENTS WITH DE-CENTRALISATION OF POLICIES AND CONFIGURATIONS, NIRANJAN M M