Article
Enhanced Whiteboard Capture for Chat, Anon ymous
Geofence-based Access to Parked Calls, Anon ymous
FABRIC AS STORAGE TO AVOID DOWNLOAD FAILURE ON MULTIPLE DEVICES AT BRANCH/DATA CENTERS, Balaji Sundararajan, Ankush Verma, Preety Mordani, Igor Manassypov, Rohan Karamandi, Anand Oswal, Mouli Balasubramanian, and Sireesha Todeti
Obfuscating and Deobfuscating Code Jump Addresses via Readable Memory, Aaron Vaage
Class-based Language Model for Domain-specific Speech Recognition, Anonymous
System and method to provide safety zones in a virtual workplace, Anonymous Anonymous
STRUCTURED FLOW LABEL, Clarence Filsfils, Pablo Camarillo, Francois Clad, and Ahmed Abdelsalam
Classifying Augmented Reality (AR) Effects, Anonymous Anonymous
Nearest-neighbor based Manifold Expansion Technique for Active Learning, Anonymous Anonymous
Detecting Change in Battery Condition and Preventing Damage Using Integrated Sensors, N/A
Lighting control with WiFi/Bluetooth device scanner, Riku Immonen
Detection of Automated Facial Beautification by a Camera Application by Comparing a Face to a Rearranged Face, Clemenz Portmann, Yuriy Romanenko, and Vinit Modi
IMAGE FORMING APPARATUS USING FRAMELESS MOTOR, HP INC
PROCESS TO LOAD A FILTER WITH RELIABLE SEALING, HP INC
POWDER RATHOLES DETECTION SYSTEM FOR 3D PRINTING SYSTEM, HP INC
SEMI-AUTOMATED DECACKING SYSTEM FOR 3D PRINTER, HP INC
READING HIDDEN META-INFORMATION USING THERMAL TECHNOLOGY, HP INC
Indicating Remaining Battery Life in Terms of a Number of Activities That Can be Performed before Power is Depleted, Alexandru Damian and Victor Carbune
Personalized Augmented Reality Content Delivery Using Computer Vision, Aiko Nakano and Diane Wang
Providing Informative Nutrition Facts for Food Ordering, Xinru Yang, Mingtong Wu, and Xingyue Chen
ASIC-FRIENDLY SRV6-BASED SD-WAN SERVICE THEFT PREVENTION MECHANISM, Clarence Filsfils and Pablo Camarillo
USING CLUSTERING ALGORITHM AND FOG COMPUTING FOR EN-ROUTE FILTERING IN LOW POWER AND LOSS NETWORKS, Lele Zhang, Akram Sheriff, and Chuanwei Li
Surface Positioning Sensor For Contact Between Unrestrained Objects, Ryan Ehrenreich, Stuart Scollay, and Allison Juhasz
Limiting Application Access to Sensitive Data and Resources Through Use of a Sensitive Data Sandbox, Russell Quong
SPRING-LOADED SELF-ALIGNING LIGHTPIPE, Ben Coder, Vic Chia, George Curtis, and Ed Kliewer
IMPLEMENTING GMP-SEC USING STUFFING BYTES TO PROVIDE SECURITY OVER 400ZR AND OTHER OPTICAL STANDARDS, Gilberto Loprieno, Davide Codella, and Emanuele Giacometti
SAFEGUARDING AGAINST IMPROPER CONFIGURATIONS FOR LORAWAN GATEWAYS, Su Xia, Christine Hwang, Bob Lo, Xiaochen Cao, and Simarpreet Kaur
METHOD AND SYSTEM FOR DETECTING A PROCESS OR ACTIVITY USING RECURRENT AND CONVOLUTIONAL 1D NEURAL NETWORKS, Andrey Kvasyuk, Hazim Dahir, and Omar Santos
HYPERVISOR-AGNOSTIC SYSTEM AND METHOD FOR MODIFICATION OF SNAPSHOT FILES FOR RECOVERY, Mayuresh Vartak, Geetha Srikantan, Vishwas Srinivasan, Harpreet Gandhi, and Swapnil Daingade
ACTIVE LOCAL DIMMING ON DISPLAY BY MAGNET OPTICAL SHUTTER, HP INC
TRANSFER YOUR SECURITY FILE WITH SECURITY MOUSE BETWEEN YOUR DEVICES, HP INC
USB-C ALT-MODE AUTO-DISABLED WITH CPU GTO, HP INC
DISPLAY MONITOR IDENTIFIER, HP INC
TO IMPLEMENT MINI-FAN ON MICE FOR ADHERING ONTO THE TILT SURFACE, HP INC
ROTATABLE SHIELDING CAN DESIGN, HP INC
M.2 NSFF CONNECTOR FOR DOUBLE SIDE, HP INC
NOTOEBOOK EDGE-SENSING FEATURE FOR USER EXPERIENCE ENHANCED, HP INC
TWO WAY HEADSET AUDIO USAGE IN VR, HP INC
INTEGRATION OF DISPLAY WITH CAMERA CABLE, HP INC
GESTURE AND VOICE THROUGH WIRELESS MICROPHONE DEVICE, HP INC
SYSTEM APPROACH TO COMPENSATE THE BRIGHTNESS NON-UNIFORMITY OF LOCAL DIMMING DISPLAY, HP INC
ENHANCED SYSTEM ERRORS FOR IMPROVING FIELD SERVICE SUPPORT AND CUSTOMER ISSUES REPORTING, HP INC
DUAL CAP HINGE DESIGN ON COMMON TANK, HP INC
ROBUST DECISION FOREST INFERENCE ALGORITHM IN PRESENCE OF MISSING FEATURE VALUES, Jan Brabec and Cenek Skarda
Offline Mobile Payments Using Public Key Cryptography, Sandro Feuz and Thomas Deselaers
Conversational News Interaction Using Indexing and Linking, Gozde Oznur and T.V Raman
Graduation Hat Microphone for Waterproof Top Port Microphones, Yuyan Hua, Carl Philip Taussig, Shu-Yu Chou, and Doug Kenneth Hogue
STRATIFIED HAIPIN CONDUCTORS FOR REDUCTION OF EDDY CURRENTS, Verena Blunder
COOLING STAMP, Verena Blunder
TRIPODE JOINT KEY, Verena Blunder
DOUBLE FORK GUIDE FOR HEAVY-DUTY OPERATING PARTS, Verena Blunder
CONTROL LOOP INJECTION MOULDING PARAMETERS, Verena Blunder
INTEGRATED APPARATUS TO VALIDATE AND TEST LEDS AND TRANSCEIVER PORTS, Min Zhu, Hanqin Ye, Brice Achkir, and Jason Zhang
IDENTIFYING APPLICATION AND TRAFFIC PATTERNS CONTRIBUTING TO MICROBURSTS AND CONGESTION IN DATA CENTER NETWORKS, Saravanan Sampathkumar, Ajay Modi, Sandeep Sreerangam, Umamaheswararao Karyampudi, and Ashish Singh
CHANGING AN ONLINE VIDEO MEETING BACKGROUND IN REAL-TIME USING DEEP LEARNING, Barrie Chen, Iris Qian, and Richard Cai
Method and Apparatus for the Collection and Analysis of Viscous Fluids, Herb Abrams
Scheduling policy for burst multithreading, N/A
ROBUST MEDIA ROLL PARKING CONTROL, HP INC
A FAILURE PREDICTIVE ALGORITHM USING SEQUENCE OF EVENT CODES WITH A DEEP LEARNING MODEL (LSTM), HP INC
EASY PLUG-IN INK COLLECTOR MODULE WITH MAGNETS FOR TEXTILE LARGE FORMAT PRINTER, HP INC
HIGH CAPACITY INK COLLECTOR FOR TEXTILE PRINTING ON POROUS MEDIAS BASED ON SLOPING PLATES, HP INC
A ZERO CROSS DETECTION METHOD FOR AC POWER CONVERTERS BASED ON AN EXTENDED KALMAN FILTER, HP INC
FOLDABLE AND DUAL DISPLAY NOTEBOOK, HP INC
I2C BASED SECURITY INK SUPPLY SMART-CHIP RECOGNITION, HP INC
Graphical Augmentation of Message Content, Gaurav Menghani and Sean McCabe
System and Architecture of a Quantum Key Distribution (QKD) Service over SDN, Santanu Ganguly
Supply Chain Verification of Hardware Components Using Open-Source Root of Trust, Vadim Sukhomlinov, Marius Schilder, Andrey Pronin, and Randall Spangler
Security Key with Data Scanning, InVue Security Products Inc.
SYSTEMS AND METHODS FOR PROTECTING RETAIL DISPLAY MERCHANDISE FROM THEFT, InVue Security Products Inc.
TINTEGRATED APPARATUS TO VALIDATE AND TEST LEDS AND TRANSCEIVER PORTS, Min Zhu, Hanqin Ye, Brice Achkir, and Jason Zhang
METHOD FOR FAST BOOTSTRAP AND LOSS RECOVERY FOR CLIENTS CONNECTED TO A SELECTIVE FORWARDING UNIT (SFU), Jacques Samain, Mohammed Hawari, and Andre Surcouf
HIGH RESOLUTION EYE TRACKING CAMERA ENABLING A FOVEATED IMAGING FOR VIDEO COLLABORATION DEVICES, Farhad Abbassi Gholmansaraei
SRV6/BITMASK DATAPLANE SIGNALED SEAMLESS FAAS/SERVERLESS FUNCTION DEPLOYMENT, Nagendra Kumar Nainar and Carlos M. Pignataro
USING SEQUENTIAL ANALYSIS AND SEARCH SPACE MAPPING MACHINE LEARNING TECHNIQUES FOR TROUBLESHOOTING A SOFTWARE DEFINED NETWORK OR A NETWORK FUNCTION VIRTUALIZATION BASED NETWORK, Sarthak Sharma and Lovepreet Singh
DYNAMIC, PER-TENANT ENCRYPTION USING SMART NETWORK INTERFACE CARDS, Kyle Mestery, Ian Wells, and Grzegorz Duraj
Automatically Changing Accessibility Settings on an Electronic Device Responsive to Detecting the Presence of a Hearing Device, Rachel Hausmann and Collin Irwin
Data compression using pre-generated dictionaries, Simon Cooke
ACCESS POINT ON ACCESS POINT DOCKING AND CONTROL AND PROVISIONING OF WIRELESS ACCESS POINTS (CAP-WAP) TUNNELING, Prabudas Varadarajan, Samir Patro, and Rashmi Ramesh
Automatic creation of apps using images of arranged physical media, Collin Irwin, Xiaosa Zhao, Jo Chuang, and Christopher Michael Hall
AIR GESTURE RECOGNITION, Jung Hong, Xu Guo, and Jove Yuan
Assisted digital input for paper forms, Marius Sajgalik and Victor Carbune
Efficient wireless charging of peripheral devices, Liang Jia and Yungchih Chen
Machine-Learning Based Evaluation of Access Control Lists to Identify Anomalies, Alejo Grigera Sutro
INTELLIGENTLY LOCKING A DEVICE BASED ON CONTEXTUAL SIGNALS, Jonathan D. Hurwitz and Christina Gilbert
INTERACTIVELY CONNECTING CORPORATE POLICY AND PROCESS TO POLICY CONSUMERS, Angie Szabo, Swarupa Reddy, and Alex Gregory
RECONSTRUCTION OF ENTITY LIFETIME SUMMARIES FROM AUTOSUPPORT (ASUP) CONFIGURATION AND LOGS, Geetha Srikantan
AUTOMATIC LINECARD (LC) CAPABILITY DETECTION, Stefano Binetti, Richard Moses S, and Davide Sirtori
INTENT-AWARE FLOW REDIRECT USING SINGLE-HOP INTERNET CONTROL MESSAGE PROTOCOL (ICMP) EXTENSION, Carlos M. Pignataro and Nagendra Kumar Nainar
METHODS AND APPARATUS FOR INTENT AND CONTEXT-BASED AD-HOC DATA DRIVEN REPORTING AND VISUALIZATION, Plamen Nedeltchev, Madhuri Garikapati, Eric Kroll, and Mani Kesavan
AUTOMATED AND REACTIVE MECHANISM IN CONNECTIVITY FAULT MANAGEMENT (CFM) WITH AN ON-DEVICE EXPERT SYSTEM, Karthik babu Harichandra Babu, Peter Jones, Peter Van Horne, and Ananthakrishnan Rajamani
USING A CLOUD-BASED ENTERPRISE NETWORK SECURITY SYSTEM TO PROVIDE DECENTRALIZED BUT UNIFIED GENERAL DATA PROTECTION REGULATION (GDPR) CONSENT MANAGEMENT, Thomas Vegas, Anirban Karmakar, and Giacomo Trifilo
Dot projector based on phase diffuser, John D. Perreault
Recovery and upgrade of a device using an auxiliary device, Sudha Broslawsky, Jes Klinke, Shelley Chen, Howard Lee, and Julius Werner
Airship-based security and monitoring with machine learning, Yan Mayster and Brian Shucker
PROTECTING AGAINST MALICIOUS LOGINS ON VIRTUAL MACHINES USING BLOCKCHAIN, Sarthak Sharma, Lovepreet Singh, and Yegappan Lakshmanan
TOOL-FREE 3D PRINTED THREADED UNION METHOD WITH REMOVABLE TIGHTENING ACCESSORY, HP INC
Overhead Collision Alerts and Overhead-obstacle Aware Navigation Planning Using Onboard Sensors and Vehicle-to-Vehicle Communication, Yan Mayster and Brian Shucker