Follow

Article

PDF

Finding (partial) code clones at method level in Android programs without access to source code to detect copyright infringements or security issues, Armijn Hemel

PDF

Device to apply heat to burn hairs and dirt that clog wheels of suitcases/walkers/strollers/rollators/chairs, Armijn Hemel

PDF

SECURE INTERNET OF THINGS (IOT) FIRMWARE UPGRADES IN A WIRELESS NETWORK, Vinay Saini, Jerome Henry, Sowbhagya H. S, and Robert Barton

PDF

Wireless Charging Through a Collapsible Mobile Device Grip, Christina Gilbert

PDF

Casting Virtual Reality (VR) Content Over A Network, Anonymous

PDF

Systems and methods for targeting with a mobile device in a virtual environment, Anonymous Anonymous

PDF

DISASTER MANAGEMENT SYSTEM USING NETWORK SNAPSHOT IN LOW POWER AND LOSSY NETWORKS (LLNS), Lele Zhang, Chuanwei Li, Xiang Fang, and Xiaopu Zhang

PDF

SYSTEM AND METHOD OF LINK PROTECTION FOR FIBER OPTICS, Amitesh Shukla, Manish Jhanji, and Vinod Cherukatt

PDF

Fingerprint-Matching Algorithm Using Polar Shapelets, Firas Sammoura and Jean-Marie Bussat

PDF

OPTICAL SAFETY AND CONNECTIONS VERIFICATION, Luca Gumier, Stefano Piciaccia, and Mauro Brunella

PDF

IMPROVING EFFICIENCY OF CITIZENS BROADBAND RADIO SERVICE DUAL CONNECTIVITY AND CITIZENS BROADBAND RADIO SERVICE / WIRELESS LOCAL AREA NETWORK RADIO LEVEL INTEGRATION AND INTERWORKING, Mukesh Taneja and Indermeet Gandhi

PDF

EMAIL VERIFICATION SERVICE USING BLOCKCHAIN, Arun Varghese

PDF

EFFICIENT HANDLING OF 5G/4G NETWORK INITIATED PAGING, Prakash Suthar, Aeneas Dodd-Noble, and Raghavendra Suryanarayanarao

PDF

Ads that verify user age, John Nicholas Dukellis and Derek Butcher

PDF

Embossed audio tag activated by touch, Sebastien de la Bastie

PDF

Integrated wireless slot antenna and piezo buzzer, Jerry W. Kuo, David W. Poole, Andrew J. Sutter, and Wei Li

PDF

Runtime-configured state-machine control of program logging, Christopher J. Phoenix

PDF

Bot for order placement and pickup, N/A

PDF

Dynamically updated personalized recommendations for broadcast television, Marcos Calvo and Joan Pastor

PDF

MULTIPLEXING INK SUPPLY SLOT DETECTION, HP INC

PDF

SHARPNESS ENHANCEMENT USING DUAL DROP WEIGHT SINGLE DENSITY PRINTHEADS, HP INC

PDF

CLOUD DYNAMIC LANGUAGE LOCALIZATION ARCHITECTURE FOR SUBSTRATES, HP INC

PDF

Securing cables through desk holes with customizable locations and sizes, Daniel Soohyun Lee and Mike Gainer

PDF

OPTIMIZING GUARANTEED FLOW BIT RATE / GUARANTEED BIT RATE RESOURCE RESERVATION AT RADIO ACCESS NETWORK, Raghunadha Reddy, Sandeep Dasgupta, Somaraju Kaki, and Sateesh Reddy Mommidi

PDF

TIMELY DELIVERY OF POWER OUTAGE NOTIFICATIONS IN LOW-POWER AND LOSSY NETWORKS, Huimin She, Feiliang Wang, Chuanwei Li, and Wenjia Wu

PDF

Discreet Dialogues During a Conference Using Stereo Audio Mixing Capabilities, Jerremy ZRIHEN

PDF

Efficient, low-cost techniques to verify carrier aggregation in mobile devices, Fei He, Max Sun, Jie Song, and Shawn Yang

PDF

Private Conversion During a Conference Using Stereo Audio Mixing Capabilities, Jerremy ZRIHEN

PDF

Protecting User Privacy by Monitoring API Queries, Matthew Sharifi and Bernhard Seefeld

PDF

SPAM IDENTIFICATION USING SET-COVER ALGORITHM ON A CHANNEL SIMILARITY GRAPH, Alexandru Moșoi and Andreas Noever

PDF

Multi-antenna switch control in 5G, Vimal Natarajan, John Daugherty, Gregory Black, and Eddie Burgess

PDF

Optimize Wireless Local Area Networks for Voice and Video Call, Kai Shi, Ning Zhang, and Ahmed ElArabawy

PDF

DYNAMICAL LINK METRIC ADJUSTMENT USING CLASSIFICATION AND REGRESSION TREE (CART) AND SOFTWARE DEFINED NETWORKING (SDN) TECHNOLOGIES, Lele Zhang, Yajun Xia, Jim Lu, and Yinfang Wang

PDF

DETECTING PACKET LOSS ON RTP STREAMS LEVERAGING CLOUD SCALE ASIC FLOW TABLES, Rahul Parameswaran, Ammar Latif, Roshini Paul, Sunil Gudurvalmiki, and Sandeep Bharadwaj

PDF

CONNECTING DRONE DEVICES USING DIFFERENT CELLULAR TECHNOLOGIES ACROSS GEOGRAPHIES WITH CONTROL CENTER, Praveena Sridhar and Salahuddin Kamran

PDF

BLOCKCHAIN FOR MULTIPARTY, LARGE-SCALE AUTONOMOUS VEHICLE MANAGEMENT, Jeffery Klopfenstein

PDF

A NOVEL TECHNIQUE TO PERFORM LARGE FILE UPDATES ON INTERNET OF THINGS (IOT) DEVICES USING BLOCK CHAIN IN LOW-POWER AND LOSSY NETWORKS (LLNS), Lele Zhang, Chuanwei Li, Yinfang Wang, and Li Zhao

PDF

Method for Enabling Split-Screen Gaming from a Touch-Enabled Device, Leon Bayliss

PDF

NETWORK CONNECTIVITY QUALITY - USER INTERFACE ICONS AND REPORTS, Ning Zhang and Sat K

PDF

SYNCHRONIZATION OF FREQUENCY-HOPPING SCHEDULING IN A FREQUENCY-HOPPING SPREAD SPECTRUM (FHSS) SYSTEM, Wenjia Wu, Ling Wei, Chuanwei Li, and Li Zhao

PDF

Voice interaction to send a screenshot and audio recording to another user to ask for help, Alena Fong and Nik Hanselmann

PDF

Novel legacy A-C cable with the capability of predicting abnormal charging, Hsu HungChe, Chang ChiaMing, Liao WeiChih, Lin ShihPing, and Pan ChungYi

PDF

Triggering context-appropriate reminders dependent on user activities, Victor Cărbune, Andrii Maksai, and Sandro Feuz

PDF

IDPA-SYSTEM - INTELLIGENT DAMAGE PROTECTION ASSIST, Verena Blunder

PDF

FOUR STROKE ENGINE DESIGNED FOR FAULT-TOLERANT OPERATION AND HIGH FUEL EFFICIENCY, Verena Blunder

PDF

FASTENING SYSTEM FOR CHARGING CABLES ON ELECTRICALLY OR PARTIALLY ELECTRICALLY OPERATED VEHICLES, Verena Blunder

PDF

EXTENSION OF THE SELECTOR SWITCH BY AN ACCESSORY PART, Verena Blunder

PDF

INTELLIGENT TRAFFIC DELINEATORS, Verena Blunder

PDF

NOVEL TECHNIQUES TO DISTINGUISH FADING FOR ADAPTIVE MODULATION IN A LOW POWER AND LOSSY NETWORK (LLN), Wenjia Wu, Pascal Thubert, Ling Wei, and Li Zhao

PDF

A personal safety monitor for hands, Anonymous Anonymous

PDF

Detecting hardware damage using a resistive grid, Jonathan D. Hurwitz and Christina L. Gilbert

PDF

Automatic detection of spurious touch inputs, Jon Napper and Omri Amarilio

PDF

ERASURE OF DEVICE DATA UPON DETECTION OF UNDERWATER SUBMERSION, Nabil Shahid and Tony Lai

PDF

MEDIA AUTHENTICATION VIA BLOCKCHAIN, Logan Sweet

PDF

HANDHELD INKJET CODER WITH 22 mm PRINT SWATH AND SEPARATE INK SUPPLY, HP INC

PDF

SERVICE REQUEST SPEND BASED DATA-DRIVEN TECHNICAL DEBT CHARACTERIZATION IN COMPLEX SOFTWARE SYSTEMS, Abhishek Pathak, Kaarthik Sivakumar, Laxmi Mukund, and Ashok Gowda

PDF

SWIFT NODE MIGRATION MECHANISMS FOR LOW POWER AND LOSSY NETWORKS, Dapeng Zhu, Xiaopu Zhang, Yuping Wang, and Caijun Jiang

PDF

User account suggestions for access-restricted online resources, Christina L. Gilbert and Jonathan D. Hurwitz

PDF

Achieving network safety by continuously limiting authorization rates, N/A

PDF

XR Extensions, Anonymous Anonymous

PDF

NEW MIDDLE CONSOLE – DESIGNED AS A LARGE CONTINUOUS SHELF + MOUNTING POSSIBILITY, Verena Blunder

PDF

Shell Multitasking, Anonymous Anonymous

PDF

ALERT THE USER ON UNSECURE PRINT, HP INC

PDF

MOBILE PHONE BASED MEDIA SIZE AND COUNT, HP INC

PDF

AUTOMATIC PRINTER PERSISTENT CONNECTION MANAGEMENT BY MEANS OF MACHINE LEARNING, HP INC

PDF

Method to Decrease the Vertical Distance in Wireless Charging

PDF

Anchoring, Anonymous Anonymous

PDF

SYSTEM AND METHOD TO IMPROVE HUMAN FACE QUALITY IN A TELEPRESENCE, HP INC

PDF

High-density voltage regulator using multi-fed polygon inductor, N/A

PDF

Insertion girdle for dual in-line memory modules, N/A

PDF

Utilizing Eye-Tracking to Develop Contextual Suggestions, Jeff Palm

PDF

Switched tank converter with coupled inductors, N/A

PDF

Classifying SSD input-output streams to optimize storage overprovisioning, Bin Tan, Narges Shahidi, and Manuel Benitez

PDF

Poll-optimized adaptation of PCI-express, N/A

PDF

Emulating WiFi networks for latency-sensitive applications, N/A

PDF

Reducing test runtimes by saving and restoring machine state, Vishal Sethia and Thomas Knych

PDF

Answering user queries based on aggregate information, Ashish Duggal

PDF

Reducing warpage in foldable OLED screens, Wenli Tan, Davis Ou, and Chun Tseng

PDF

Intuitive scrolling for feed-based applications, Jordan Bayliss-McCulloch and Christopher Halaska

PDF

Expediting and Enhancing User Interaction with Interactive Voice Response Systems Utilizing Machine Learning, Siddartha Janga

PDF

CONSUMPTION REPORT FOR IMPROVING DIGITAL MEDIA LITERACY, Anonymous Anonymous

PDF

PANIC WORD, Tajinder Gadh and Marc Stogaitis

PDF

Motorized Wireless-Charging Pad that Uses Magnetic Field Detection, Haoxiang Yang, Liyu Yang, Liang Jia, and Rob Shone

PDF

Implementing Transmitter Current Limit During Wireless Charging, Liang Jia and Nagesh Polu

PDF

Radio Interference Resistant Determination of a Geolocation Using a Multi-Frequency Global Navigation Satellite System Receiver, Jing Liang and Nicholas M. McDonnell

PDF

NESTED BIT INDEX EXPLICIT REPLICATION HEADER BASED SCALABLE SEAMLESS BIDIRECTIONAL FORWARDING DETECTION MULTIPOINT PATH VALIDATION VIA CONTROLLED RESPONDERS, Nagendra Kumar Nainar, Carlos M. Pignataro, Reshad Rahman, and Ijsbrand Wijnands

PDF

Storing non-overlapped data streams in solid-state drives, Bin Tan, Narges Shahidi, and Manuel Benitez

PDF

LIFT SCREW FIXTURE FOR BOARD TO BOARD MODULE, HP INC

PDF

TOUCH PAD EMBEDDED IN HMD DEVICE, HP INC

PDF

SLIM ODD, HP INC

PDF

ELECTRICAL FAN DUCT, AIR BAFFLE POSITIONING DETECTION, HP INC

PDF

FLEXIBLE EMBEDDED TOUCH PANEL SUPPORT VIA PANEL'S EDID, HP INC

PDF

RANDOM FORESTS BASED ON DYNAMIC NETWORK PARAMETERS IN LOW POWER AND LOSSY NETWORKS, Li Zhao, Chuanwei Li, Lele Zhang, and Yinfang Wang

PDF

Automated store planogram generation and maintenance, Samrat Saha

PDF

Extending video games by using machine learning, Leon Nicholls

PDF

Live migration of cloud clients that have PCIe devices, Benjamin Serebrin, Grigory Makarevich, and Eric Northup

PDF

Multi-Input 3D Photos, Anonymous Anonymous

PDF

GROUPING NARROWBAND INTERNET OF THINGS END POINTS WITH CONTROL PACKETS BASED ON MULTICAST PACKET DELIVERY FUNCTIONALITY FROM ENODEB, Akram Sheriff, Santosh Patil, Jerome Henry, and John Graybeal

PDF

3D PRINTED PRIMER LATCH, HP INC

PDF

TELEPHONE NUMBER ANTI-SPOOFING SYSTEM, Jian Yao and Dimitris Dimitropoulos