Article
Software service for facilitating unbiased ratings, Tuna Toksoz and John Dukellis
Machine learning to optimize controlled experiments, Neil Hoyne
Conversion detection for improved online ad selection, Stephen Hsu, Eric J. Kolb, and Steven T. Dieter
Machine-learned alt text for images and videos, Sandro Feuz and Mohammadamin Barekatain
Web search of mathematical expressions, Victor Cărbune and Thomas Deselaers
Context-dependent output volume for voice-controlled virtual assistant, Victor Cărbune and Thomas Deselaers
Fast WiFi scanning, Jiwoong Lee
Task completion by seeking input from multiple parties, Matthew Sharifi
Providing contextual information for multi-party chats, Sammy El Ghazzal and Sandro Feuz
SAFE UNROUTED ADDRESSING IN A CLOUD OR DATACENTER NETWORK, Kyle Mestery and Ian Wells
WIRELESS MESH NETWORK FAULT DIAGNOSIS AND MANAGEMENT BASED ON BINARY TREE BASED SUPPORT VECTOR MACHINE, Lele Zhang, Chuanwei Li, Huimin She, and Li Zhao
Method for Filtering Displayed Content Based on Occupants, Scott Randolph, Bradley Stenning, and Steve Paik
DETERMINING BREAKPOINTS IN MEDIA CONTENT, Migle Padegimaite and Sammy El Ghazzal
Method for Filtering Displayed Content Based on Occupants, Scott Randolph, Bradley Stenning, and Steve Steve
Automating last-mile power connection discovery in datacenters, N/A
Translation of Electronic Dialogs
AUTOMATIC DUBBING OF VIDEOS WITH MULTIPLE SPEAKERS, Sandro Feuz and Mohammadamin Barekatain
Securing private images on user devices, Linden Evans and Laura Paragano
SYSTEMS AND METHODS FOR PREDICTING ONLINE VIDEO METRICS, Aaron Shon, Charles Johan Larsson Tibell, and Axel Erik Olov Henriksson
MACHINE-LEARNING OF LEADING INDICATORS FROM A PLURALITY OF SERVICES TO PERFORM MEMORY MANAGEMENT ON ANOTHER PLURALITY OF SERVICES WITH CORRELATING MEMORY USAGE PROFILE, Jayesh Wadikar, Pok Wong, Ajay Madhavan, and Smruti Lele
MACHINE LEARNING BASED TECHNIQUE TO DYNAMICALLY ALLOCATE A NETWORK SLICE BASED ON USER EQUIPMENT TYPE AND NETWORK SLICE SELECTION FUNCTION FACTOR FOR 5G WIRELESS INTERNET OF THINGS NETWORKS, Akram Sheriff, Santosh Patil, M. David Hanes, and Gonzalo Salgueiro
DYNAMIC RE-CALIBRATION OF LOCATION USING ACTIVE SENSORS AND BEHAVIORAL ANALYTICS, Robert Barton, Jerome Henry, and Vishal Desai
Virtual Reality in Nuisance Protection, Anonymous
Hand of the Invisible Poet, Anonymous
Motion Sickness Mitigation Using VR/AR Devices, Anonymous
INTERNET PROTOCOL VERSION 6 PREFIX COLORING IN SOFTWARE DEFINED ACCESS FABRIC FOR DIFFERENTIATED POLICY ENFORCEMENT, Sri Gundavelli, Shree Murthy, Sudhir Jain, and Indermeet Gandhi
Gesture Text Input, Anonymous Anonymous
ACCESS POINT TRANSMISSION OPTIMIZATIONS USING MACHINE LEARNING BASED TRAFFIC CLASSIFICATION, Vincent Cuissard, Amine Choukir, Domenico Ficara, and Salvatore Valenza
Content provenance attribution and verification via blockchain certification, Daniel Golovin and Daniel Klein
Enhanced electronic whiteboard, David Tigges
Enhancing user interface accessibility using computer vision, Juhyun Lee
Automated end-to-end instrumentation and testing of mobile device camera, Yu Zhong, Gregory Eitzmann, and Kenneth Goldman
Visualizing classifier performance, Lori Levy and John Burge
Event Scheduling and Time Zone Management for Online Calendars, Steffen Meschkat
A REINFORCEMENT LEARNING (RL) MODEL FOR DYNAMIC OPTIMIZATION OF SWITCH PORT/QUEUE BUFFER ALLOCATION, Imran Pasha
SYSTEM FOR SUPPLYING HIGH SHEAR STARCH TO A GYPSUM BOARD MACHINE AND METHODS OF MANUFACTURING GYPSUM BOARD USING HIGH SHEAR STARCH, National Gypsum Company
RATIONALIZED CLUSTERING IN MACHINE LEARNING, Diveplane Corporation and Christopher Hazard PhD
RATIONALIZED CLUSTERING IN MACHINE LEARNING, Diveplane Corporation
WIRELESS NETWORK LOAD CORROBORATION USING MACHINE LEARNING (ML) BASED VIDEO ANALYTICS, Smruti Lele, Samer Salam, Ajay Madhavan, and Jayesh Wadikar
AUTOMATED CLIENT CLASSIFICATION AND POLICY ENFORCEMENT THROUGH CLOUD APPLICATION PROGRAMMING INTERFACE GATEWAY, Xueqiang Ma, Kumar Sankaralingam, Shubhojit Chattopadhyay, and Kalyan Ghosh
Retrospective ads to obtain user feedback, Tuna Toksoz and John Dukellis
Obtaining content quality feedback by placing content in advertisements, Tuna Toksoz and John Dukellis
DATA-DRIVEN CHARACTERIZATION OF TECHNICAL DEBT IN A COMPLEX INFORMATION SYSTEM, Abhishek Pathak, Hossein Moosavi Kooshki, Mazhar Haque, and Girish Babu
Enabling poll surveys via in-app advertisements, Tuna Toksoz and John Dukellis
Ad network speed comparison tool, Tuna Toksoz and John Dukellis
Re-engagement ads with real-time leaderboard information, Tuna Toksoz and John Dukellis
Layering incentives during idle time after user action in rewarded ads, Tuna Toksoz and John Dukellis
Automated insertion and testing of ads, Tuna Toksoz, John Dukellis, Edward Weng, and Boubou Guiro
Personalized re-engagement ads, Tuna Toksoz and John Dukellis
Crowd-sourced verification of content, Tuna Toksoz and John Dukellis
Rewarded tasks for reducing ad fraud, Tuna Toksoz and John Dukellis
Unbiased review of apps, Tuna Toksoz and John Dukellis
Automated online product ads, Tuna Toksoz and John Dukellis
Incentivizing users to watch ads, Tuna Toksoz and John Dukellis
Ads that encourage users to take health breaks, Tuna Toksoz and John Dukellis
Generating cryptographic initialization vectors from SSD wear metrics, Michael William Paddon
Fast recalibration of test and measurement equipment, Fei He
Arbitrary precision user settings, Sandro Feuz and Thomas Deselaers
SYSTEM AND METHOD FOR CAMERA CHARACTERIZATION, Edward Chang and Boyd Fowler
SYNCHRONIZED MULTIPLE AMBIENT DISPLAYS, Adam Glazier and Adam Champy
SECOND SCREEN IN-CALL EXPERIENCE, Boris Khvostichenko
Smart Bed, Jason Wheeler and Ankita Goel
METHOD FOR MONETIZING USER-GENERATED PHOTOS IN TARGETED DISPLAY ADVERTISING, Jason Karsh
METHOD FOR SWAPPING OUT USER-GENERATED PHOTOS WITH HIGH QUALITY PHOTOS, Jason Karsh and Brian Hendricks
FACE DETECTION SYSTEM, Deepak Chandra and Brandon Barbello
MICROPHONE INPUT FOR ACCESSIBILITY SERVICE, Anna Galusza
OPTIMIZING UPWARD LOAD BALANCING FOR LOSSY AND LOW-POWER NETWORKS, Lele Zhang, Yajun Xia, Yinfang Wang, and Feiliang Wang
LOCK MECHANISM FOR MERCHANDISE SECURITY SYSTEM, InVue Security Products Inc.
MECHANISM FOR TRUE OPINION SHARING, Chien Liang Lin
MONITORING OF FEATURE-DISTRIBUTION SHIFT IN PRODUCTION ENVIRONMENT, Jan Brabec, Lukas Machlica, and Cenek Skarda
IMPROVING THE PERFORMANCE OF DATA STREAMS IN LOSSY AND LOW-POWER NETWORKS, Wenjia Wu, Nan Yi, Feiliang Wang, and Wenchuan Ji
2D PRINT SURFACE FOR A 3D PRINTER, HP INC
CONSTANT CHAMBER ILLUMINATION OF 3D PRINTING PRINTZONE, HP INC
KEYBOARD STIFFENING AND SKEW REDUCTION METHOD, HP INC
REMOTELY CONTROLLED CHAIN OF MULTI-SENSING DEVICES, HP INC
ELECTROSTATIC DISCHARGE SYSTEM FOR MODULAR SENSOR DEVICE, HP INC
DEFINING CONTAINERS OF PART VOXELIZATIONS IN A 3D PRINTER, HP INC
PLATFORM FOREIGN OBJECT DETECTION SYSTEM, HP INC
A PRECISE AND INEXPENSIVE ELECTRONIC FUSE/ELECTRONIC SWITCH SOLUTION, HP INC
A CROWBAR CIRCUIT WITH OVERVOLTAGE ACTIVATION INDICATION, HP INC
FUSING MODULE PARTICLES DETECTION, HP INC
THERMAL BOOST FAN CONCEPT, HP INC
METHOD AND APPARATUS FOR 3D PRINTER LEVELING ON IRREGULAR FLOORS, HP INC
Method Of Caching Ad Requests In Ad Serving Systems, Tuna Toksoz and William Coster
WIRELESS SYNCHRONIZATION OF MULTI-PROTOCOL ACCESS POINTS, Fred Anderson, Paul Stager, and Matt Silverman
Distributed Transfer Learning on Embedded Devices, Hanumant Prasad Singh
Reinforcement Learning as a Basis for Optimization of Operating Systems, Mark Schott
DEVICE FOR MOVING A CONFIRMATION DEVICE – RACK PRINCIPLE, Verena Schwaiger
DEVICE FOR MOVING A CONFIRMATION DEVICE - SPINDLE, Verena Schwaiger
PRODUCTION OF CUSTOMER REQUIRED INDIVIDUALIZED „HYBRID“-DECORATIVE PARTS OF WHEELS THROUGH THE COMBINATION OF INJECTION MOLDING TECHNIQUE AND ADDI, Verena Schwaiger
DEVICE FOR STORING AN OPERATING DEVICE - PRINCIPLE OF TURNING CIRCLES, Verena Schwaiger
SAFE COMPONENT EXCHANGE IN THE TIVOIZED SYSTEM, Verena Schwaiger
PROVIDING REFERENCE CLIENT PERSPECTIVE FOR ENHANCED RADIO FREQUENCY AND ASSURANCE FUNCTION, Indermeet Gandhi, Min Se Kim, Taranpreet Kohli, and Gal Katz
“FAST TRANSITION” INTO WIRELESS NETWORK USING 5G SECURITY CONTEXT, Indermeet Gandhi
AUTOMATIC BINDING OF VIRTUAL INTERNET PROTOCOL ADDRESS TO THE APPROPRIATE INTERFACE, Ravi Kumar Vadapalli, Srinivas Jakkam Shivaji, and Kousik Nandy
On-demand Multi-factor Authentication for Automated Assistant Interactions, Lilin Wang, David Roy Schairer, and Mark Spates IV
Using Propagation Delay in Weighted Decision Routing Algorithms, Nicholas George McDonald
A System And Method For Task Management, Liya Ophir, Clifford Stein, Christopher Rohrs, Talia Swann Sternberg, Ryan Muller, and Michael Baldwin
REINFORCEMENT LEARNING BASED RECOMMENDATION SYSTEM FOR SOFTWARE UPGRADES, Parth Gaggar, Mansi Goel, Chandra Kamatam, and Srinivasa Rao Aravilli