Follow

Article

PDF

Class-based Language Model for Domain-specific Speech Recognition, Anonymous

PDF

System and method to provide safety zones in a virtual workplace, Anonymous Anonymous

PDF

STRUCTURED FLOW LABEL, Clarence Filsfils, Pablo Camarillo, Francois Clad, and Ahmed Abdelsalam

PDF

Classifying Augmented Reality (AR) Effects, Anonymous Anonymous

PDF

Nearest-neighbor based Manifold Expansion Technique for Active Learning, Anonymous Anonymous

PDF

Detecting Change in Battery Condition and Preventing Damage Using Integrated Sensors, N/A

PDF

Lighting control with WiFi/Bluetooth device scanner, Riku Immonen

PDF

Detection of Automated Facial Beautification by a Camera Application by Comparing a Face to a Rearranged Face, Clemenz Portmann, Yuriy Romanenko, and Vinit Modi

PDF

IMAGE FORMING APPARATUS USING FRAMELESS MOTOR, HP INC

PDF

PROCESS TO LOAD A FILTER WITH RELIABLE SEALING, HP INC

PDF

POWDER RATHOLES DETECTION SYSTEM FOR 3D PRINTING SYSTEM, HP INC

PDF

SEMI-AUTOMATED DECACKING SYSTEM FOR 3D PRINTER, HP INC

PDF

READING HIDDEN META-INFORMATION USING THERMAL TECHNOLOGY, HP INC

PDF

Indicating Remaining Battery Life in Terms of a Number of Activities That Can be Performed before Power is Depleted, Alexandru Damian and Victor Carbune

PDF

Personalized Augmented Reality Content Delivery Using Computer Vision, Aiko Nakano and Diane Wang

PDF

Providing Informative Nutrition Facts for Food Ordering, Xinru Yang, Mingtong Wu, and Xingyue Chen

PDF

ASIC-FRIENDLY SRV6-BASED SD-WAN SERVICE THEFT PREVENTION MECHANISM, Clarence Filsfils and Pablo Camarillo

PDF

USING CLUSTERING ALGORITHM AND FOG COMPUTING FOR EN-ROUTE FILTERING IN LOW POWER AND LOSS NETWORKS, Lele Zhang, Akram Sheriff, and Chuanwei Li

PDF

Surface Positioning Sensor For Contact Between Unrestrained Objects, Ryan Ehrenreich, Stuart Scollay, and Allison Juhasz

PDF

Limiting Application Access to Sensitive Data and Resources Through Use of a Sensitive Data Sandbox, Russell Quong

PDF

SPRING-LOADED SELF-ALIGNING LIGHTPIPE, Ben Coder, Vic Chia, George Curtis, and Ed Kliewer

PDF

IMPLEMENTING GMP-SEC USING STUFFING BYTES TO PROVIDE SECURITY OVER 400ZR AND OTHER OPTICAL STANDARDS, Gilberto Loprieno, Davide Codella, and Emanuele Giacometti

PDF

SAFEGUARDING AGAINST IMPROPER CONFIGURATIONS FOR LORAWAN GATEWAYS, Su Xia, Christine Hwang, Bob Lo, Xiaochen Cao, and Simarpreet Kaur

PDF

METHOD AND SYSTEM FOR DETECTING A PROCESS OR ACTIVITY USING RECURRENT AND CONVOLUTIONAL 1D NEURAL NETWORKS, Andrey Kvasyuk, Hazim Dahir, and Omar Santos

PDF

HYPERVISOR-AGNOSTIC SYSTEM AND METHOD FOR MODIFICATION OF SNAPSHOT FILES FOR RECOVERY, Mayuresh Vartak, Geetha Srikantan, Vishwas Srinivasan, Harpreet Gandhi, and Swapnil Daingade

PDF

ACTIVE LOCAL DIMMING ON DISPLAY BY MAGNET OPTICAL SHUTTER, HP INC

PDF

TRANSFER YOUR SECURITY FILE WITH SECURITY MOUSE BETWEEN YOUR DEVICES, HP INC

PDF

USB-C ALT-MODE AUTO-DISABLED WITH CPU GTO, HP INC

PDF

DISPLAY MONITOR IDENTIFIER, HP INC

PDF

SENDING INFORMATION DISPLAYED ON A SCREEN SAVER ACCORDING TO USER INPUT FOR GETTING OUT OF THE SCREEN SAVER MODE, HP INC

PDF

TO IMPLEMENT MINI-FAN ON MICE FOR ADHERING ONTO THE TILT SURFACE, HP INC

PDF

ROTATABLE SHIELDING CAN DESIGN, HP INC

PDF

M.2 NSFF CONNECTOR FOR DOUBLE SIDE, HP INC

PDF

NOTOEBOOK EDGE-SENSING FEATURE FOR USER EXPERIENCE ENHANCED, HP INC

PDF

A TBT eGFX MONITOR TOPOLOGY, WHICH ABLE TO SUPPORT OPTIONAL eGFX CARD BE AND SUPPORT BASIC DISPLAY FUNCTION WITH SAME USB TYPE-C CONNECTOR WHEN CONNECTING NON-TBT HOST, HP INC

PDF

TWO WAY HEADSET AUDIO USAGE IN VR, HP INC

PDF

INTEGRATION OF DISPLAY WITH CAMERA CABLE, HP INC

PDF

GESTURE AND VOICE THROUGH WIRELESS MICROPHONE DEVICE, HP INC

PDF

SYSTEM APPROACH TO COMPENSATE THE BRIGHTNESS NON-UNIFORMITY OF LOCAL DIMMING DISPLAY, HP INC

PDF

ENHANCED SYSTEM ERRORS FOR IMPROVING FIELD SERVICE SUPPORT AND CUSTOMER ISSUES REPORTING, HP INC

PDF

DUAL CAP HINGE DESIGN ON COMMON TANK, HP INC

PDF

ROBUST DECISION FOREST INFERENCE ALGORITHM IN PRESENCE OF MISSING FEATURE VALUES, Jan Brabec and Cenek Skarda

PDF

Offline Mobile Payments Using Public Key Cryptography, Sandro Feuz and Thomas Deselaers

PDF

Conversational News Interaction Using Indexing and Linking, Gozde Oznur and T.V Raman

PDF

Graduation Hat Microphone for Waterproof Top Port Microphones, Yuyan Hua, Carl Philip Taussig, Shu-Yu Chou, and Doug Kenneth Hogue

PDF

STRATIFIED HAIPIN CONDUCTORS FOR REDUCTION OF EDDY CURRENTS, Verena Blunder

PDF

COOLING STAMP, Verena Blunder

PDF

TRIPODE JOINT KEY, Verena Blunder

PDF

DOUBLE FORK GUIDE FOR HEAVY-DUTY OPERATING PARTS, Verena Blunder

PDF

CONTROL LOOP INJECTION MOULDING PARAMETERS, Verena Blunder

PDF

INTEGRATED APPARATUS TO VALIDATE AND TEST LEDS AND TRANSCEIVER PORTS, Min Zhu, Hanqin Ye, Brice Achkir, and Jason Zhang

PDF

IDENTIFYING APPLICATION AND TRAFFIC PATTERNS CONTRIBUTING TO MICROBURSTS AND CONGESTION IN DATA CENTER NETWORKS, Saravanan Sampathkumar, Ajay Modi, Sandeep Sreerangam, Umamaheswararao Karyampudi, and Ashish Singh

PDF

CHANGING AN ONLINE VIDEO MEETING BACKGROUND IN REAL-TIME USING DEEP LEARNING, Barrie Chen, Iris Qian, and Richard Cai

PDF

Method and Apparatus for the Collection and Analysis of Viscous Fluids, Herb Abrams

PDF

Scheduling policy for burst multithreading, N/A

PDF

ROBUST MEDIA ROLL PARKING CONTROL, HP INC

PDF

A FAILURE PREDICTIVE ALGORITHM USING SEQUENCE OF EVENT CODES WITH A DEEP LEARNING MODEL (LSTM), HP INC

PDF

COST SAVING BY REDUCING ONE OF THE MULTIPLEXERS REQUIRED TO ENABLE DOCKED PRE-BOOT EXTERNAL DISPLAY SUPPORT, HP INC

PDF

EASY PLUG-IN INK COLLECTOR MODULE WITH MAGNETS FOR TEXTILE LARGE FORMAT PRINTER, HP INC

PDF

HIGH CAPACITY INK COLLECTOR FOR TEXTILE PRINTING ON POROUS MEDIAS BASED ON SLOPING PLATES, HP INC

PDF

A ZERO CROSS DETECTION METHOD FOR AC POWER CONVERTERS BASED ON AN EXTENDED KALMAN FILTER, HP INC

PDF

FOLDABLE AND DUAL DISPLAY NOTEBOOK, HP INC

PDF

I2C BASED SECURITY INK SUPPLY SMART-CHIP RECOGNITION, HP INC

PDF

Graphical Augmentation of Message Content, Gaurav Menghani and Sean McCabe

PDF

System and Architecture of a Quantum Key Distribution (QKD) Service over SDN, Santanu Ganguly

PDF

Supply Chain Verification of Hardware Components Using Open-Source Root of Trust, Vadim Sukhomlinov, Marius Schilder, Andrey Pronin, and Randall Spangler

PDF

Security Key with Data Scanning, InVue Security Products Inc.

PDF

SYSTEMS AND METHODS FOR PROTECTING RETAIL DISPLAY MERCHANDISE FROM THEFT, InVue Security Products Inc.

PDF

TINTEGRATED APPARATUS TO VALIDATE AND TEST LEDS AND TRANSCEIVER PORTS, Min Zhu, Hanqin Ye, Brice Achkir, and Jason Zhang

PDF

METHOD FOR FAST BOOTSTRAP AND LOSS RECOVERY FOR CLIENTS CONNECTED TO A SELECTIVE FORWARDING UNIT (SFU), Jacques Samain, Mohammed Hawari, and Andre Surcouf

PDF

HIGH RESOLUTION EYE TRACKING CAMERA ENABLING A FOVEATED IMAGING FOR VIDEO COLLABORATION DEVICES, Farhad Abbassi Gholmansaraei

PDF

SRV6/BITMASK DATAPLANE SIGNALED SEAMLESS FAAS/SERVERLESS FUNCTION DEPLOYMENT, Nagendra Kumar Nainar and Carlos M. Pignataro

PDF

USING SEQUENTIAL ANALYSIS AND SEARCH SPACE MAPPING MACHINE LEARNING TECHNIQUES FOR TROUBLESHOOTING A SOFTWARE DEFINED NETWORK OR A NETWORK FUNCTION VIRTUALIZATION BASED NETWORK, Sarthak Sharma and Lovepreet Singh

PDF

DYNAMIC, PER-TENANT ENCRYPTION USING SMART NETWORK INTERFACE CARDS, Kyle Mestery, Ian Wells, and Grzegorz Duraj

PDF

Automatically Changing Accessibility Settings on an Electronic Device Responsive to Detecting the Presence of a Hearing Device, Rachel Hausmann and Collin Irwin

PDF

Data compression using pre-generated dictionaries, Simon Cooke

PDF

ACCESS POINT ON ACCESS POINT DOCKING AND CONTROL AND PROVISIONING OF WIRELESS ACCESS POINTS (CAP-WAP) TUNNELING, Prabudas Varadarajan, Samir Patro, and Rashmi Ramesh

PDF

Automatic creation of apps using images of arranged physical media, Collin Irwin, Xiaosa Zhao, Jo Chuang, and Christopher Michael Hall

PDF

AIR GESTURE RECOGNITION, Jung Hong, Xu Guo, and Jove Yuan

PDF

Assisted digital input for paper forms, Marius Sajgalik and Victor Carbune

PDF

Efficient wireless charging of peripheral devices, Liang Jia and Yungchih Chen

PDF

Machine-Learning Based Evaluation of Access Control Lists to Identify Anomalies, Alejo Grigera Sutro

PDF

INTELLIGENTLY LOCKING A DEVICE BASED ON CONTEXTUAL SIGNALS, Jonathan D. Hurwitz and Christina Gilbert

PDF

INTERACTIVELY CONNECTING CORPORATE POLICY AND PROCESS TO POLICY CONSUMERS, Angie Szabo, Swarupa Reddy, and Alex Gregory

PDF

RECONSTRUCTION OF ENTITY LIFETIME SUMMARIES FROM AUTOSUPPORT (ASUP) CONFIGURATION AND LOGS, Geetha Srikantan

PDF

AUTOMATIC LINECARD (LC) CAPABILITY DETECTION, Stefano Binetti, Richard Moses S, and Davide Sirtori

PDF

INTENT-AWARE FLOW REDIRECT USING SINGLE-HOP INTERNET CONTROL MESSAGE PROTOCOL (ICMP) EXTENSION, Carlos M. Pignataro and Nagendra Kumar Nainar

PDF

METHODS AND APPARATUS FOR INTENT AND CONTEXT-BASED AD-HOC DATA DRIVEN REPORTING AND VISUALIZATION, Plamen Nedeltchev, Madhuri Garikapati, Eric Kroll, and Mani Kesavan

PDF

AUTOMATED AND REACTIVE MECHANISM IN CONNECTIVITY FAULT MANAGEMENT (CFM) WITH AN ON-DEVICE EXPERT SYSTEM, Karthik babu Harichandra Babu, Peter Jones, Peter Van Horne, and Ananthakrishnan Rajamani

PDF

USING A CLOUD-BASED ENTERPRISE NETWORK SECURITY SYSTEM TO PROVIDE DECENTRALIZED BUT UNIFIED GENERAL DATA PROTECTION REGULATION (GDPR) CONSENT MANAGEMENT, Thomas Vegas, Anirban Karmakar, and Giacomo Trifilo

PDF

Dot projector based on phase diffuser, John D. Perreault

PDF

Recovery and upgrade of a device using an auxiliary device, Sudha Broslawsky, Jes Klinke, Shelley Chen, Howard Lee, and Julius Werner

PDF

Airship-based security and monitoring with machine learning, Yan Mayster and Brian Shucker

PDF

PROTECTING AGAINST MALICIOUS LOGINS ON VIRTUAL MACHINES USING BLOCKCHAIN, Sarthak Sharma, Lovepreet Singh, and Yegappan Lakshmanan

PDF

TOOL-FREE 3D PRINTED THREADED UNION METHOD WITH REMOVABLE TIGHTENING ACCESSORY, HP INC

PDF

Overhead Collision Alerts and Overhead-obstacle Aware Navigation Planning Using Onboard Sensors and Vehicle-to-Vehicle Communication, Yan Mayster and Brian Shucker

PDF

Distributed multi-bucket sampling, Richard Steven Farnsworth

PDF

OPTIMIZED SIMULTANEOUS AUTHENTICATION OF EQUALS (SAE) IDENTITY PRE-SHARED KEY (IPSK), Abhishek Dhammawat, Shreshta Besagarahalli Manu, Namsoo Kim, and Mansi Jain

PDF

Virtual Reality (VR) Screenshot, Anonymous Anonymous

PDF

A Head Mounted Capture System, Anonymous Anonymous