Article
UNIVERSAL PRODUCT ARTIFICIAL NEURAL NETWORK (UPANN), Kate Ligon, Ted Ghose, and Ariel Peterson
LAYER 2 COLLISION AVOIDANCE USING COMPOSED MAC ADDRESS, Thomas Vegas, Anirban Karmakar, Vincent Cuissard, and Loris Gazzarrini
ADJUSTING VIRTUAL BACKGROUND TO CONVEY EMOTIONS, HP INC
A METHOD TO ESTIMATE SKEW FOR IMAGES ACQUIRED VIA IMAGE SCANNERS, HP INC
PROVIDING CENTRALIZED AND RTS/CTS-BASED CHANNEL ACCESS AND RESERVATION, Thomas Vegas, Vincent Cuissard, Loris Gazzarrini, and Anirban Karmakar
MINIMAL ENCRYPTION TO ACHIEVE CONFIDENTIALITY AND POWER SAVING, Thomas Vegas and Anirban Karmakar
A METHOD TO ESTIMATE SKEW FOR IMAGES ACQUIRED VIA IMAGE SCANNERS, HP INC
Receiving Messages on Wearable Devices in Configurable Power Saving Modes, Anonymous
Optimized Emergency Call Handling in NR-5G Only Mode Without Emergency Call Support, Mahesh Telang
MULTI-FACTOR AUTHENTICATION IN A NEXT GENERATION MESH NETWORK, Harbor Dong, Li Zhao, Huimin She, and Wenchuan Ji
Obtaining Accurate Position Data for the PIDF-LO Header in Emergency Calls, Anonymous
Transmitting Reliable Location Information via PIDF-LO in Emergency Calls, Anonymous
HEIGHT DETECTION ROUTINE BETWEEN TWO AXES TO AVOID COMPONENTS DAMAGE, HP INC
Diffused Corrosion Protection on Pressure Control Equipment, Taylor Mozisek, Nicolas Arteaga, and Adam Dyer
DAMPING ELEMENT FOR DOWNHOLDER, Axel Unger
INCREASING TYRE PRESSURE WHILE DRIVING AT HIGH SPEEDS (SYSTEM TO INCREASE DRIVING SAFETY)., Axel Unger
POSSIBILITY OF IDENTIFYING AND DISPLAYING CHARGING CABLES CARRIED IN AN ELECTRIC VEHICLE, Axel Unger
TRUSTED 5G NETWORK DEPLOYMENTS, Niranjan M M
METHOD TO PROVIDE SECURE AND RELIABLE MFA AND SSO USING HYPER LEDGER, Niranjan M M
TRUSTED RPL PROTOCOL FOR FIELD AREA NETWORKS, Niranjan M M
AUTHENTICITY AND LIFETIME OF PRODUCTS, Niranjan M M
METHOD TO SUPPORT IDENTITY PSK, CAPTIVE PORTAL AND ENHANCE ROAMING FEATURES FOR RANDOM MAC ADDRESS CLIENTS, Niranjan M M and Srihari Bhavanasi
TRUSTED VIRTUAL ROUTER REDUNDANCY PROTOCOL, NIRANJAN M M
EFFICIENT DISTRIBUTION OF ROGUE INFORMATION IN SOFTWARE DEFINED WIRELESS NETWORKS, Niranjan M M
TECHNIQUES TO FACILITATE POLICY DRIVEN CONVERSION OF UNICAST 5G SESSIONS TO MULTICAST, Raghavendar Rao Kota, Nithin Chitta, and Srini Irigi
Empty Oven Recognition_ID-05977, Christian Mohr
Rotation block detection_ID-05993, Christian Mohr
Recommender System for Recipes (Netflix Personalization)_ID-05777, Christian Mohr
AGGREGATE COMMUNICATION BETWEEN CONTROL PLANE AND USER PLANE IN A MOBILE NETWORK ENVIRONMENT, Pravin Ajagekar and Suyog Belsare
Bootstrapped Identifier for Recognizing People in a Video, Anonymous
DE-CENTRALISED, AUTHENTICATED AND SECURE COMMUNICATION BETWEEN CONTAINERS, Niranjan M M
AUTOMATIC MEDIA LENGTH DETECTION, HP INC
DETECTING AND PROFILING SLOW FRAMES IN AN INTEGRATED DEVELOPMENT ENVIRONMENT, Adhithya Ramakumar, Phillip Nguyen, Yi Yang, Lily Rapaport, and Shukang Zhou
SHORTEST PATH ASSISTED USER PLANE FUNCTION SELECTION ON 5G SESSION MANAGEMENT FUNCTION, Dennis Lanov
Improving Under-Display Fingerprint Authentication Latency by Normalizing Frame Luminance, Vicky Wen and Sang Young Youn
5G DEPLOYMENT WITH DISTRIBUTED APPROACH FOR NF INSTANCE AND SERVICE DISCOVERY, Niranjan M. M and Nagaraj Kenchaiah
METHOD TO IMPROVE QUALITY OF EXPERIENCE TO 5G USERS IN MULTI-SLICE NETWORK DEPLOYMENTS, Niranjan M M
RESILIENT METHOD TO ENHANCE EFFICIENCY OF INTERNET OF THINGS IN WI-FI6/WI-FI7 DEPLOYMENTS, Niranjan M M
SECURING IN-SITU OAM USING OPTIMISED AND QUANTUM RESISTANT METHOD, Niranjan M M
QUANTUM SECURE MULTICAST, Niranjan M M
Determining Driving Routes that Match User Preferences, Equipment, and Experience, Joe Turner
METHOD TO OPTIMISE DISTRIBUTION OF AUTHENTICATION INFORMATION FOR CLIENT RE-CONNECTIVITY, Niranjan M M and Vijay Kothamasu
AUTHENTICATED AND SECURE SERVICE DISCOVERY USING HOLOCHAIN, Niranjan M M
SECURE METHOD TO DISCOVER MESH ROUTERS IN SOFTWARE-DEFINED WIRELESS MESH NETWORKS, Niranjan M M
METHOD TO PROVIDE TRUSTWORTHY BETWEEN ACCESS POINT AND WIRELESS LAN CONTROLLER, Niranjan M M
Find local food supplier_ID-05997, Christian Mohr
Dishware Recognition_ID-05990, Christian Mohr
Dynamically Adjusting State of Charge and Charging Method to Preserve Lithium-Ion Battery Cell Life, Jon Hurwitz
QUANTUM RESISTANT RADSEC FOR OPENROAMING AND WIRELESS BROADBAND APPLIANCE OPERATIONS, NIRANJAN M M
Unfreezing recognition_ID-05988, Christian Mohr
TRUSTWORTHY ENABLER FOR EOGRE, GRE AND EOIP PROTOCOLS USED ACROSS HETEROGENOUS TECHNOLOGIES, NIRANJAN M M
SECURE PROVENANCE METHOD FOR TRACEABILITY AND TROUBLESHOOTING IN SDN DEPLOYMENTS, NIRANJAN M M
PACKET LOSS DETECTOR AND ANALYSER SERVICE IN 5G DEPLOYMENTS, NIRANJAN M M
ATTESTED PMIPV6 PROTOCOL FOR SEAMLESS HANDOVER IN 5G/LTE/Wi-Fi DEPLOYMENTS, NIRANJAN M M
Process for the preparation of Perampanel, Srinivasan Thirumalai Rajan, Muppa Kishore Kumar, Mummadi Venkatesh and Anugu Praneeth Kumar; R&D Center, MSN Laboratories Private Limited; Hyderabad, India.
METHOD TO PROVIDE TRUSTWORTHINESS TO SGT EXCHANGE PROTOCOL, NIRANJAN M M
REMOTE ATTESTATION TO ENHANCE EMAIL SECURITY, NIRANJAN M M
METHOD TO COUNTER DISTRIBUTED DENIAL OF SERVICE ATTACK IN SEGMENT ROUTING USING HYPERLEDGER, NIRANJAN M M
DETECTION, PREVENTION AND MITIGATION OF ROGUE BASE STATIONS IN 5G NETWORKS, NIRANJAN M M
REDUCING DISTRACTED DRIVING, Ravi Soma
METHOD TO EFFICIENTLY UPGRADE MESH ROUTERS IN SOFTWARE-DEFINED WIRELESS MESH NETWORK, NIRANJAN M M
Navigation Suggestions to Select Driving Route with Low Sun Glare, Bruce Bahnsen and Yan Mayster
SOCIAL READING, Dongeek Shin
PRIVACY POLICIES FOR DISTRIBUTED OBJECT-BASED STORAGE IN MULTI-CLOUD DEPLOYMENTS, NIRANJAN M M
METHOD TO SECURELY AUTO-RECOVER THE STRANDED MESH ROUTER IN SOFTWARE-DEFINED WIRELESS MESH NETWORK DEPLOYMENTS, NIRANJAN M M
Contextual Proactive Suggestions for Custom Commands for Vehicle Components, Ankur Aggarwal, Priyank Devpura, Amit Singhal, Yao Lin, Douglas Mayle, Chandan Dubey, and Andrey Adaykin
ROBUST EMISSIVITY MEASUREMENT SYSTEM, HP INC
TRUSTWORTHINESS FOR LIGHTWEIGHT DIRECTORY ACCESS PROTOCOL, NIRANJAN M M
Generating Audio-Based User Data Associated with Physical Objects that may be Presented When a Device is Pointed at or Near the Physical Object, Sedou Ramprasad
CALENDAR BASED DATA RATE-LIMITING MECHANISM IN WI-FI DEPLOYMENTS, NIRANJAN M M
REDUCTION OF HANDOVER DURATION FOR LATENCY SENSITIVE APPLICATIONS IN 5G MOBILE NETWORKS, Krushang Shah, Rajaneesh Shetty, and Soundarya Pendyala
MULTIPLE PROVIDER SDN PROVISIONING USING HOLOCHAIN TECHNOLOGY, NIRANJAN M M
PREDICTION OF POST-FEC PERFORMANCE WITHOUT USING FEC SYMBOLS COUNTERS, David Nozadze, Amendra Koul, Mike Sapozhnikov, Upen Reddy Kareti, and Joel Goergen
AERIAL EDGE ORCHESTRATOR, Sudha Katgeri, Lubna Rasheed, and Jasna Jayaraj
APPLICATION CENTRIC GROUPING USING AUTHENTICATION AND KEY MANAGEMENT FOR APPLICATIONS (AKMA) TECHNIQUES, Rajesh I. V and Ram Mohan R
Automated clearing of software source code files using proximity matching and parsing file contents, Armijn Hemel
Process for the preparation of Tapentadol hydrochloride
SMART POWER ON WHEN SPECIFIC USB-C DOCK OR INDUSTRY USB-C DISPLAY CONNECTION, HP INC
Automatically Generating Descriptive Annotations for Participants in a Virtual Meeting, Daniel V. Klein and Igor S. Ramos
5G NETWORK DEPLOYMENTS WITH DE-CENTRALISATION OF POLICIES AND CONFIGURATIONS, NIRANJAN M M
NOTEBOOK PET MODE, HP INC
An In-Loop & In-Place Temporal Filtering For Real-Time Applications, Yunqing Wang
Processes For The Preparation of ({(12aR)-12-[(11S)-7,8-difluoro-6,11-dihydrodibenzo[b,e]thiepin-11-yl]-6,8-dioxo-3,4,6,8,12,12a-hexahydro-1H-[1,4]oxazino[3,4-c]pyrido[2,1-f][1,2,4]triazin-7-yl}oxy)methyl methyl carbonate, Srinivasan Thirumalai Rajan, Sajja Eswaraiah, Ghojala Venkat Reddy, and Kommera Rajashekar
CONTROL PLANE CONVERGENCE MEASUREMENT IN SD-WAN FABRIC, Eugene Khabarov
L2VPN Pseudowire status notification in BGP-AD VPLS Environment, Anonymous
Decoders that Model Unknown Entities, Leonid Velikovich and Petar Aleksic
Use of Language Models to Improve Automatic Speech Recognition, Pawel Janus, Agoston Weisz, Aurelien Boffy, and Miroslaw Michalski
AUTOMATIC COLOR UNIFORMITY CHECK WITH INTERGRATED SCANNER DEVICE, HP INC
AUDITING CONSTRUCTION QUALITY USING SATELLITE IMAGE TELEMETRY, Ganesh Kondaveeti, Raghu Rajendra Arur, Priyanka Bansal, Jayashree Panda, and Poornima Angaragatti
NEED-BASED DYNAMIC RECONFIGURATION OF NETWORK SLICE USING A FLOATING SLICE AND A CROSS-DOMAIN ORCHESTRATOR, Soundarya Pendyala, Rajaneesh Shetty, Krushang Shah, and John Mullooly
Energy Optimization and Transfer in Electric Vehicles via Mechanical Coupling, Brian Shucker and Yan Mayster
ENABLING AND INTEGRATING DYNAMIC TELEPROMPTING CAPABILITIES FOR ONLINE MEETINGS, Gonzalo Salgueiro, Derek Engi, Julie Allen, Pascale Delaunay, and Paul Giralt
Using the Exponential Mechanism to Compute Differentially Private Reach Curves, Matthew Clegg
Pairwise Union Overlap Model for Estimating Reach Surfaces, Matthew Clegg
Generalized Mixture Overlap Model for Estimating Reach Surfaces, Matthew Clegg and Jiayu Peng
Mitigating the effects of eventual consistency of DNS records on the DNS Provider Discovery mechanism in the Domain Connect specification, Aditya Gopalakrishnan and Navneet Goel
TOP COVER PRECISE MANUFACTURING: DESIGN, TRIMMING AND POSITIONING, HP INC