Follow

Article

PDF

Android Security, Nancy Mehra

PDF

TECHNIQUES TO DETECT NEARBY WORKERS AND ALLOW INTERACTIONS THROUGH ASSET TRACKING SYSTEMS FOR SENSOR FAILURE SCENARIOS, Shridurgha Janakiraman

PDF

SECURING CONNECTIVITY FAULT MANAGEMENT (CFM) CONTROL PACKETS USING STAMPED PASSPORT ATTESTATION, Karthik Babu Harichandra Babu, Eric Voit, and Sujal Sheth

PDF

An improved process for the preparation of Cysteamine Bitartrate, Srinivasan Thirumalai Rajan

PDF

Process for the preparation of 5-[2-[4-(1,2-benzisothiazol-3-yl)-1-piperazinyl]-ethyl]-6-chloro-1,3­dihydro-2H-indol-2-one, methanesulfonate, trihydrate, Srinivasan Thirumalai Rajan

PDF

Secure Execution of JSONP Scripts within a Sandbox, Sebastian Lekies

PDF

Invoking Visual Search With Device Camera Using Intuitive Physical Gestures, Brett Aladdin Barros, Ali Stanfield, Bo Brinkman, Nada Elassal, and Paulo Coelho

PDF

Fraud Mitigation On Digital Payment Platforms, Santhosh Kumar Edukulla

PDF

Drive-Through Covered Charging Station for Battery-Powered Vehicles, Karl Eric Schrader

PDF

METHODS TO IMPROVE EFFICIENCY OF HIGHLY-RELIABLE / ULTRA-RELIABLE APPLICATIONS USING COORDINATED MULTI-POINT TECHNIQUES, Mukesh Taneja, Vimal Srivastava, and Indermeet Gandhi

PDF

Humidity Condenser for potable and non potable water generation, and water-metal-ground heatsink, Luca Aiello

PDF

SELF-ADAPTIVE ANOMALY DETECTION WITH DEEP REINFORCEMENT LEARNING AND TOPOLOGY, Qihong Shao and Carlos M. Pignataro

PDF

Hybrid Additive Manufacturing, Jiri Konvicny and Lars Rossing

PDF

Deterministic Stack Scanning to Prevent Dangling or Use-after-Free Pointers, Kentaro Hara

PDF

Locating and Securing Use-After-Free Pointers, Kentaro Hara

PDF

Computing a distance between a source code directory and another source code directory, Armijn Hemel

PDF

IN-VEHICLE LOCALIZATION OF A COMPUTING DEVICE, D Shin, Wei Li, and Jian Guo

PDF

Searching For An Element In An Unsorted list, punarjeewa abeysekera

PDF

Image Region-Snapping Based on Touch-and-Hold and Drag Gestures, Brett Aladdin Barros and Paulo Coelho

PDF

Automating Scroll Performance Management via Interlaced Operation Execution, Sylvia Nguessan

PDF

VIRTUAL KEYBOARD WITH INTEGRATED SUGGESTION FEATURES, Jenny Chin, Chenxi Ni, Kohsuke Yatoh, Adrien Olczak, Adrian Pittman, Yuqing Zhu, Akshay Kannan, and Sam Jaffee

PDF

User Authentication to Provide a Secure Cloud Clipboard, Brett Aladdin Barros and Alexander James Faaborg

PDF

Determining Original Sources of Online Content, Irina Blok and Robert Benea

PDF

Destination Search With User-specified Constraints, Lingyi Zhang and Cliff Chin Ngai Sze

PDF

Refinement of Embedded Payment Links via User Reports, Hailun Zhu, Guiheng Zhou, Chun Fan, and Fausto Araujo

PDF

Automatic Sanitization of Use-After-Free Pointers, Kentaro Hara

PDF

Detecting Dangling Pointers Using Embedded Metadata, Kentaro Hara and Benoît Lizé

PDF

Proximity-based Triggering of Screen Restrictions to Avoid Eye Strain, Eric Liu

PDF

Robotic Forensic Analysis Tool for Multiple Parameter Sensing, Anonymous

PDF

Predictive Road Safety Alert System, N/A

PDF

Keyboard and Mouse Input for Controlling a Remote Machine via A Mobile Device, Erik Jensen

PDF

OPERATING SYSTEM AND METHOD PROVIDING FOR VIRTUAL DESKS, Elle Zadina, Trevor James Claiborne, Gary Hyun Jin Kim, Nikhil Siva Subash, Ahmed Fakhry, and Mike Ho

PDF

Finding out how close source code files are to files in the Git version control system., Armijn Hemel

PDF

Optimized Decision Making in the Power Industry Using Machine Learning, Yixin Wang and Xin Li

PDF

Use of Machine Learning To Generate Estimates of Code Review Time and Effort, Marko Ivanković and Goran Petrovic

PDF

Identification of Low-value Code to Improve Efficiency of Automated Code Analysis, Marko Ivanković and Goran Petrovic

PDF

Secure Communication Using Deterministic Key Rotation Over Elliptic Curves, Ismail Turk

PDF

Application of Ultrafast and CO2 Lasers for Cutting Waveguides, Moez Haque, Saeid Rezaei, and Victor Isbrucker

PDF

SPONSORED NEXT STEPS IN SEARCH ENGINE, Lakshmi Kumar Dabbiru, Hinali Marfatia, Ramakrishnan Kandhan, Chalmers Wang, Gang Wu, Senthil Hariramasamy, and Abhineet Bhardwaj

PDF

AN INTEGRATED ANTENNA DESIGN NEARBY THE LAPTOP COMPUTER CLICK PAD, HP INC

PDF

A NOVEL INTER-PERSONAL AREA NETWORK COMMUNICATION MECHANISM FOR LARGE-SCALE LOW-POWER AND LOSSY NETWORKS, Huimin She, Harbor Dong, Chuanwei Li, and Feiliang Wang

PDF

MECHANISM TO SPEED UP SECURE COMMUNICATION HANDSHAKES IN CONSTRAINED CONDITIONS, Panos Kampanakis and Rupak Chandra

PDF

ENHANCED NETWORK SLICING FOR INDUSTRIAL AND ENERGY PROTOCOLS, Pascal Thubert, Patrick Wetterwald, Jonas Zaddach, and Eric Levy-Abegnoli

PDF

ADAPTIVE MODELS FOR NEXT GENERATION WIDE AREA NETWORKS, Balaji Sundararajan, Brandon Lynch, Gayathri Chandrasekaran, Reuel Gatus, and Zaheer Aziz

PDF

Individualized Lifelong Learning and Career Portal, Krishna Chytanya Ayyagari

PDF

Novel polymorphs of Lorlatinib and their processes for the preparation thereof, MSN Laboratories Private Limited, R&D Center

PDF

A process for the preparation of Indoximod, Srinivasan Thirumalai Rajan

PDF

DOCKING STATION WITH ON-DEMAND PHYSICAL MEMORY (RAM) ENHANCE PROCESSING POWER AND USER EXPERIENCE, HP INC

PDF

LATERAL SKEW COMPENSATION DIAGNOSTIC PLOT FOR PRINTER SHEET FEEDER ACCESSORY, HP INC

PDF

DYNAMIC MEMORY MANAGEMENT WITH REDUCED FRAGMENTATION USING THE BEST-FIT APPROACH, HP INC

PDF

PRINT YOUR BEAUTY, HP INC

PDF

Docking and Bridging Devices, Amelia Schladow, Philip Dam Roadley-Battin, Tyler John Gough, Seth Ryan Benson, and Matthew Sibigtroth

PDF

A New Method for Provenance Determination of Metals by Analyzing Samples using Process of Electromigration, Anonymous

PDF

Document-level Contextual Help for Terms and Abbreviations, Muralidharan Sundararajan

PDF

Combined Aluminum Roll-Formed Profiles, Axel Arthur Foerderreuther, Alexander Gaida, and Thorolf Gerhard Schulte

PDF

NOVEL SECURED INTER-PERSONAL AREA NETWORK GROUP MANAGEMENT IN LOW-POWER AND LOSSY NETWORKS, Nan Yi, Wenjia Wu, Huimin She, and Lele Zhang

PDF

METHOD AND SYSTEM FOR FACILITATING ENHANCED SECURITY IN CONNECTED ENVIRONMENTS FOR IOT DEVICES, HARISH MURALI

PDF

Driving Quality Evaluation and Advice Integrated in Navigation Application, N/A

PDF

Inferring Duplicate Data Traffic in Backbone Networks, Anonymous

PDF

WATER DETECTION WINDOW REGULATOR, Axel Unger

PDF

STATOR WITH VARIABLE CONDUCTOR CROSS-SECTIONS IN, Axel Unger

PDF

PLASTIC CLIP FOR INTEGRATION ON HOLDER GEOMETRIES, Axel Unger

PDF

MASSAGE CONTROL VIA THE STEERING WHEEL, Axel Unger

PDF

DYNAMIC WORK LISTS IN A MODULAR ASSEMBLY SYSTEM, Axel Unger

PDF

AUTOMATIC HIDING OF PARKING SPACES, Axel Unger

PDF

ADAPTIVE SCENTING, Axel Unger

PDF

EMBEDDED BACKUP PATH INFORMATION FOR STATELESS SRV6 MICRO SEGMENT IDENTIFIER NODE PROTECTION, Nagendra Kumar Nainar, Kamran Raza, Carlos M. Pignataro, and Rajiv Asati

PDF

New Tip Topography for Aluminum Resistance Spot Welding, Feng Wu

PDF

BGP-MVPN SOURCE DISCOVERY FOR MULTIPLE RENDEZVOUS POINTS, Aswin Kuppusami, Vengada Prasad Govindan, and Mani Panchanathan

PDF

Reducing stress in 3D objects made using Fused Filament Fabrication, Tim Kuipers and Johan Versteegh

PDF

MERCHANDISE DISPLY SECURITY SYSTEM, InVue Security Products Inc.

PDF

Sacrificial Process For Silicon Microchannel Wafer Enablement, N/A

PDF

AUTONOMOUS MONITORING OF BLOOD ALCOHOL CONTENT, Yun Sun Lee, Luke Brantingham, Aaditya Kandibanda, and Kavinaath Murugan

PDF

MULTIVARIATE TIME SERIES UNSUPERVISED ANOMALY DETECTION AND DIAGNOSIS IN 5G NETWORKS, Sreyan Ghosh, Sakshi ., and Vijay Kataria

PDF

Health and Safety Reminders Via Augmented Reality Glasses, Ruofei Du and Shengzhi Wu

PDF

Remote Creation and Editing of Augmented Reality Content Using Cloud Anchors, Yen-Lin Chen, Shengzhi Wu, and Peter Tan

PDF

Dynamic Acoustic Transparency Control System, Guohua Sun, Leng Ooi, and Jae Lee

PDF

Identifying Speakers and Limiting Displayed Transcription to Select Speakers, N/A

PDF

Route Selection Based On Safety Parameters, N/A

PDF

Household appliance, Christian Mohr

PDF

AN ACCELERATED PEER-TO-PEER (P2P) COMMUNICATION METHOD FACILITATED BY REUSING EXISTING P2P PATHS FOR LOW-POWER AND LOSSY NETWORKS, Huimin She, Harbor Dong, Wenjia Wu, and Nan Yi

PDF

Contextual Suggestions Based on Driving Stage and Context, Sriram Natarajan and Dharminder Singh

PDF

Predicting Content Views Using Finite Integrals, Brian Mulford, Michael de Ridder, Colby Ranger, T. J. Gaffney, and Jay Mithani

PDF

DISPLAYING INFORMATION RELATING TO SELECTED TEXT, Lukas Zilka, Jacek Jurewicz, Abodunrinwa Toki, and Jan Althaus

PDF

MULTIVARIATE TIME SERIES UNSUPERVISED ANOMALY DETECTION AND DIAGNOSIS IN 5G NETWORKS, Sreyan Ghosh and Vijay Kataria

PDF

Gesture Disambiguation in Operating Systems, Jaeheon Yi

PDF

Readability Enhancements for Device Displays used in Bright-Lighting Conditions, Sangmoo Choi and Jyothi Karri

PDF

User Terminal Beam Steering System, Ming Sun

PDF

Precise Assembling of Complex 3D Structures, Anonymous

PDF

Household appliance, Christian Mohr

PDF

Adaptive RF Pigtail Probe Modeling for De-embedding of RF Measurements, Yu-Kai Hung, Victor Chang, Hsin-Hung Wu, and Ting-Yu Guu

PDF

Automatic Delivery of Machine Learning Models to User Device to Enable App Features, Keun Soo Yim and Neha Pattan

PDF

Use of Augmented Reality to Enable Comparisons between Physical and Virtual Objects, Alexander James Faaborg and Brett Barros

PDF

WAKE FROM CAMERA SHUTTER WHEN NOTEBOOK IS IN TABLET MODE, HP INC

PDF

SURE USB-C POWER SOURCE DETECTION, HP INC

PDF

PROCEDURALLY GENERATING ARTIFICIAL PHOTOS OF TEXT DOCUMENTS IN VARIOUS BACKGROUNDS, HP INC

PDF

FEDERATED DATA ACCESS, HP INC

PDF

REDUCED ATTACK SURFACE BY MOVING THE USB PORT DISABLE DURING PRE EFI-INITIALIZATION (PEI) PHASE, HP INC

PDF

Improving Query Suggestions Based On Search Box Edits, Cliff Chin Ngai Sze and Lingyi Zhang

PDF

Personal Finance Goals Creation and Progress Tracking Using A Payment Application, Michael Hopkins, Sergio Alves, Diane Spengel, and Bruno Martins