Article
Recognizing a natural language or language class in source code files, Armijn Hemel
Using build identifiers to fingerprint ELF binaries and link to build information without having access to source code, Armijn Hemel
PCA (Printed Circuit Assembly) and Electronic Devices Cleaning Station, Joel J. Castillo
Automatic dating of videos based on matching photos, Rainer Vincent Mager
NOTIFICATION OUTPUT VIA WATCH BEZEL, Aleksandr Rozman
Controlling access by tagging data, Juan Vasquez and Jesper Johansson
Detection of counterfeit silicon, Miguel Osorio Lozano and Sean Keys
Challenge keyword generation for voice-based authentication, Shuyang Chen and Nicholas Felker
ADVISING USERS IN A MEETING WHAT WAS LAST SAID BEFORE A CALL DROP, Jonathan Rosenberg
SERVICE LAYER DEPENDENCY MAPPING BASED HEATMAP FOR FAULT ISOLATION, Carlos M. Pignataro, Nagendra Kumar Nainar, and Alejandro Eguiarte
Determining region-of-interest based on motion patterns, Ruiduo Yang
Image recognition for consumer shopping applications, Jibing Wang, Erik Stauffer, and Aamir Akram
INTELLIGENT PRESENTATION SLIDE ASSISTANT, Sammy El Ghazzal and Sandro Feuz
Process of Improving Software Engineering Predictability with Business Benefits, Ravi Saxena and Atul Deshpande
Automatic extraction and provision of coupon codes for online shopping, Matthew Sharifi
Transmit power setting based on dynamic SAR, Qi Jiang, Paul Husted, Srenik Mehta, and Nihar Jindal
Turning off or dimming a device screen based on user attention, Vidhya Navalpakkam, Tomer Shekel, and Dmitry Lagun
Verified revenue sharing between distributor OEM and app developers, John Dukellis
Smart auto-deactivation of device airplane mode, Gregory B. Roth
PCIe Riser Extension Assembly, Rick Salmonson, Troy Oxby, Larry Briski, Robert Normand, Russell Stacy, and Jeffrey Glanzman
Internet of Things Construction Monitors, Thomas A. Stern
CONNECTIVITY ASSESSMENT SURVEY FOR TECHNOLOGY EMERGENCY RESPONSE (CASTER), Rakesh Bharania, Chandler Johnson, and Dustin Li
A Novel Approach to Measure Code Coverage for a Typical OS Deployment Tool, Debdipta Ghosh
Item recommendations for cache and synchronization of application stores, Wei Chai, Zhiwei Gu, Sundeep Sancheti, and Yilan Liu
App distribution via affiliate marketing on social media, Sissie Hsiao, Tuna Toksoz, and John Dukellis
Embedded Ready To Use Hybrid Mesh Network For IoT Applications, Jérôme ELLEOUET and Emmanuel HELBERT
Web-based currency for online content and transactions, Kentaro Hara
Direct I/O solution for Containerized HPUX, Maheshwara Aithal, Dinesh Thanumoorthy, and Harish K
Fast & Scalable I/O for Emulated HPUX, Maheshwara Aithal, Dinesh Thanumoorthy, and Ranjith VK
A novel encoding & alignment of Histograms of referential integrity columns for scalable data generation, Suresh Soundararajan
New GPU Standard PCIe Card Holder Design, Tim Ko
Mounting Methods for JEDEC Standard Energy Cell, John Norton and David Thomas Byargeon
Lock Mechanism Design, Michelle Chen
Reducing Memory Footprint for In-Memory Root Filesystem (TMPFS), Erik Jacobson, Paul Schliep, and Christopher Holmes
VOICE OVER LONG TERM EVOLUTION SERVICE QUALITY MEASUREMENTS AND DIAGNOSTICS USING MACHINE LEARNING TECHNIQUES, Sri Gundavelli, Dhananjay Patki, Vimal Srivastava, and Amarnath Reddy Nagireddy
USING DEVICE MOVEMENT FOR MULTI-FACTOR COMPUTING DEVICE AUTHENTICATION, Isaac Andres
TECHNIQUES FOR EFFICIENT AND CONSISTENT HASHING WITH OPTIMAL FAIRNESS FOR FLOW DISTRIBUTION AND LOAD-BALANCING, Pierre Pfister, Mark Townsley, Yoann Desmouceaux, and Aloys Augustin
REAL-TIME NETWORK EVENT CORRELATION BASED ON DEPENDENCY GRAPH FOR NETWORK ISSUE ROOT CAUSING, Alok Kumar Sinha, Zach Cherian, and Kaushik Dam
NON-ORTHOGONAL MULTIPLE ACCESS FOR COLLISION AVOIDANCE IN LOW-POWER AND LOSSY NETWORKS, Ling Wei, Huimin She, Chuanwei Li, and Lele Zhang
Battery charge level based on power source availability, Thierry Strudel
Heat removal from high temperature hardware while shielding electromagnetic interference, Yao Xue and Eugene Fox
HEURISTIC ALGORITHM FOR SPANNING TREE PROTOCOL ROOT BRIDGE DETERMINATION, Michael Michaelides and Arabinda Samantaray
PROXY MONITORING OF SESSION STATE FOR SHARED FATE ENTITIES, Stefan Olofsson and Khalid Raza
Operator Drowsiness Test, Robin Dua, Andrei Broder, and Vidhya Navalpakkam
Delayed predicate algorithm evaluation in hybrid answer set programming (ASP), Alex Brik and Jori Bomanson
FIRMWARE COMPRESSION MECHANISM FOR SPEEDING UP FIRMWARE UPDATING IN A RESOURCE RESTRICTED NETWORK, Yinfang Wang, Chuanwei Li, Feiliang Wang, and Yajun Xia
A DEEP GAUSSIAN MIXTURE MODEL APPROACH TO SCORING BASED ON FEEDBACK, Pranjal Daga and Antonio Nucci
AUTOMATED FAILURE PREDICTION AND SELF-HEALING OF EDGE DEVICES IN INTERNET OF THINGS INFRASTRUCTURE, Lalit Jain, Nirup Pothireddy, Sai Kiran Reddy Malikireddy, Vivek Parekh, Bipin Algubelli, Chandra Veluru, and Dileep Kumar
Applying Machine Learning to Determine Documents Related to Email, Cayden Meyer, Harold Kim, and Alan Green
PERFORMANCE DELAY MEASUREMENT AND FAULT DETECTION OF SR / SRV6 TE POLICIES IN SOFTWARE DEFINED NETWORKS, Clarence Filsfils, Rakesh Gandhi, Tarek Saad, Patrick Khordoc, and Sagar Soni
Updating Content Item Delivery Criteria Based On User Interaction, Anonymous
Sound-based Classifier for Domain Specific Language Model Selection, Anonymous
Augmented Reality Dance Instructions, Anonymous
Maximum Power Point Tracking Using Test Cell(s) in Solar Array(s), Anonymous
Maximum Power Point Tracking Using a DC-DC Converter Coupled to Photovoltaic Cells and a Battery, Anonymous
Peer Node Eviction in Wireless Mesh Networks, Javier Cardona
Person Identification and Displaying AR Banners, Anonymous
A Wearable Emotion Detection and Video/Image Recording System, Anonymous
AIRSPEED MEASUREMENT DEVICE FOR SLOW AIRCRAFT
Verifying authenticity of digital images using digital signatures, Neil Dhillon and Tanmay Wadhwa
PERFORMANCE DELAY MEASUREMENT AND FAULT DETECTION OF SR / SRV6 TE POLICIES IN SOFTWARE DEFINED NETWORKS, Clarence Filsfils, Rakesh Gandhi, Tarek Saad, Patrick Khordoc, and Sagar Soni
Visual match of emails or landing pages to detect phishing, Kuntal Sengupta and Vijay Eranti
Using machine learning to improve image storage and recall, Mary Witkowski, Kristina Bohl, and Raja Ratna Murthy Ayyagar
Spatially optimized wireless multicast networks with guaranteed bit-rate, Paul Heninwolf and Daniel Fernandes Barros
Guided capture for improved composition of group photographs, Zoltan Egyed
Remote ranging using vibrations and ultrasonic transmission, n/a
Measuring end-to-end latency of fingerprint authenticators, Jose Rodriguez and Firas Sammoura
Handcrafting visual features of emails or landing pages to detect phishing, Kuntal Sengupta and Vijay Eranti
Mixed Reality Interaction With Physical Keyboard, Anonymous
Automatic Removal Of Artifacts In 360° Videos, Anonymous
Projection Agnostic Quality Metric For 360° Images, Anonymous
User Identification Across Online Providers, Anonymous
Selective Content Delivery Based On Content Emotion, Anonymous
Attribute Prediction Based On Online Connections, Anonymous
User Emotion Based Selective Delivery Of Content, Anonymous
Smart Text Tool For Capturing And Sharing Visual Content
Automated Augmented Reality Context Stickers
Capture Modes, Filters And Frames For Visual Content
Tool For Measuring End To End Latency, Michal Kielan, Jose M. Gonzalez, and Michal Godek
Streaming Rate Based Playback Speed Control For Live Video
Simulating web page loading performance, Patrick Hulce
ON-DEVICE ANALYTICS: DATA COLLECTION, REPRESENTATION, AND FEEDBACK LOOP, Vishal Murgai, Nikul Bhatt, and Srinivas Addanki
ADVERTISING SOFTWARE/SECURITY USAGE DESCRIPTIONS WITH POLICY RESPONSE, Eliot Lear, Brian Weis, Chris Steck, and Nancy Cam-Winget
OBFUSCATION AND ANONYMIZATION TECHNIQUES FOR NETWORK DATA SETS FOR MACHINE LEARNING, Ralf Rantzau, Sebastian Jeuk, and Gonzalo Salgueiro
PROVISIONING DAY-ZERO CONFIGURATIONS THROUGH PASSIVE RADIO-FREQUENCY IDENTIFICATION, Santosh Patil, Shyam Vaidyanathan, Prashant Kumar, and Manoj Gupta
VISUALIZATION FOR IDENTIFYING SERVICE RESPONSES, Wagesh Kulkarni, Rakesh Sharma, and Hitesh Manwar
IDENTIFYING AI PARTICIPANTS IN CALLS AND ESCALATING AI-ONLY CALLS INTO AN OPTIMIZED MACHINE COMMUNICATION MODE, Denis Savostiyanov and Rob Hanton
MACHINE LEARNING FRAMEWORK FOR PRIORITIZING LOCATION MEASUREMENTS OF MULTIPLE DEVICES, Xu Zhang, Huy Tran, Matt Silverman, Abhishek Mukherji, Vinay Raghuram, Abhishek Bhattacharyya, and Santosh Pandey
METHOD OF PASSIVE PARTICIPANT TRACKING IN VIDEO CONFERENCE, Morgan Fang, Yasi Xi, Zhaocai Wang, and Janus Wang
Device History Recall Optimization with Virtual, Locally-Stored Acquisition Databases Using Previously Encountered Communication Access Points and Services, Jibing Wang, Qin Zhang, and Srinivasa Prasad Vangaru
Crowdsourced market research and survey completion using intelligent conversational assistants, Reena Singhal Lee
Lightfield Compression Using Commodity Hardware Video Codecs, Sai Deng, Pavel Krajcevski, Matthew Pharr, and Stuart Abercrombie
Micro Touchpad for Wearables, Chun Yat Li, Guangzhe Cui, and Debanjan Mukherjee
PATH INFORMATION-DRIVEN QUIC PATH_CHALLENGE TO OPTIMIZE PATH SELECTION IN 5G NETWORKS, Sebastian Jeuk, Gonzalo Salgueiro, and David Hanes
Techniques for Checking As-Worn Alignment of Eyewear with Display Optics or Progressive Prescription Lenses, Ozan Cakmakci, John Stuart Fitch, Vladimir Krneta, and David Hoffman
WiFi network selection based on RSSI velocity, Rebecca Silberstein
COGNITIVE CLOUD COLLABORATION, M. David Hanes, Sebastian Jeuk, Gonzalo Salgueiro, and Chuck Byers
Mechanical controller for a smartphone, Gökhan Bakir and Joseph Lange
Asymmetric PCIe, Nishant Patil