Article
Indicating Remaining Battery Life in Terms of a Number of Activities That Can be Performed before Power is Depleted, Alexandru Damian and Victor Carbune
Personalized Augmented Reality Content Delivery Using Computer Vision, Aiko Nakano and Diane Wang
Providing Informative Nutrition Facts for Food Ordering, Xinru Yang, Mingtong Wu, and Xingyue Chen
ASIC-FRIENDLY SRV6-BASED SD-WAN SERVICE THEFT PREVENTION MECHANISM, Clarence Filsfils and Pablo Camarillo
USING CLUSTERING ALGORITHM AND FOG COMPUTING FOR EN-ROUTE FILTERING IN LOW POWER AND LOSS NETWORKS, Lele Zhang, Akram Sheriff, and Chuanwei Li
Surface Positioning Sensor For Contact Between Unrestrained Objects, Ryan Ehrenreich, Stuart Scollay, and Allison Juhasz
Limiting Application Access to Sensitive Data and Resources Through Use of a Sensitive Data Sandbox, Russell Quong
SPRING-LOADED SELF-ALIGNING LIGHTPIPE, Ben Coder, Vic Chia, George Curtis, and Ed Kliewer
IMPLEMENTING GMP-SEC USING STUFFING BYTES TO PROVIDE SECURITY OVER 400ZR AND OTHER OPTICAL STANDARDS, Gilberto Loprieno, Davide Codella, and Emanuele Giacometti
SAFEGUARDING AGAINST IMPROPER CONFIGURATIONS FOR LORAWAN GATEWAYS, Su Xia, Christine Hwang, Bob Lo, Xiaochen Cao, and Simarpreet Kaur
METHOD AND SYSTEM FOR DETECTING A PROCESS OR ACTIVITY USING RECURRENT AND CONVOLUTIONAL 1D NEURAL NETWORKS, Andrey Kvasyuk, Hazim Dahir, and Omar Santos
HYPERVISOR-AGNOSTIC SYSTEM AND METHOD FOR MODIFICATION OF SNAPSHOT FILES FOR RECOVERY, Mayuresh Vartak, Geetha Srikantan, Vishwas Srinivasan, Harpreet Gandhi, and Swapnil Daingade
ACTIVE LOCAL DIMMING ON DISPLAY BY MAGNET OPTICAL SHUTTER, HP INC
TRANSFER YOUR SECURITY FILE WITH SECURITY MOUSE BETWEEN YOUR DEVICES, HP INC
USB-C ALT-MODE AUTO-DISABLED WITH CPU GTO, HP INC
DISPLAY MONITOR IDENTIFIER, HP INC
TO IMPLEMENT MINI-FAN ON MICE FOR ADHERING ONTO THE TILT SURFACE, HP INC
ROTATABLE SHIELDING CAN DESIGN, HP INC
M.2 NSFF CONNECTOR FOR DOUBLE SIDE, HP INC
NOTOEBOOK EDGE-SENSING FEATURE FOR USER EXPERIENCE ENHANCED, HP INC
TWO WAY HEADSET AUDIO USAGE IN VR, HP INC
INTEGRATION OF DISPLAY WITH CAMERA CABLE, HP INC
GESTURE AND VOICE THROUGH WIRELESS MICROPHONE DEVICE, HP INC
SYSTEM APPROACH TO COMPENSATE THE BRIGHTNESS NON-UNIFORMITY OF LOCAL DIMMING DISPLAY, HP INC
ENHANCED SYSTEM ERRORS FOR IMPROVING FIELD SERVICE SUPPORT AND CUSTOMER ISSUES REPORTING, HP INC
DUAL CAP HINGE DESIGN ON COMMON TANK, HP INC
ROBUST DECISION FOREST INFERENCE ALGORITHM IN PRESENCE OF MISSING FEATURE VALUES, Jan Brabec and Cenek Skarda
Offline Mobile Payments Using Public Key Cryptography, Sandro Feuz and Thomas Deselaers
Conversational News Interaction Using Indexing and Linking, Gozde Oznur and T.V Raman
Graduation Hat Microphone for Waterproof Top Port Microphones, Yuyan Hua, Carl Philip Taussig, Shu-Yu Chou, and Doug Kenneth Hogue
STRATIFIED HAIPIN CONDUCTORS FOR REDUCTION OF EDDY CURRENTS, Verena Blunder
COOLING STAMP, Verena Blunder
TRIPODE JOINT KEY, Verena Blunder
DOUBLE FORK GUIDE FOR HEAVY-DUTY OPERATING PARTS, Verena Blunder
CONTROL LOOP INJECTION MOULDING PARAMETERS, Verena Blunder
INTEGRATED APPARATUS TO VALIDATE AND TEST LEDS AND TRANSCEIVER PORTS, Min Zhu, Hanqin Ye, Brice Achkir, and Jason Zhang
IDENTIFYING APPLICATION AND TRAFFIC PATTERNS CONTRIBUTING TO MICROBURSTS AND CONGESTION IN DATA CENTER NETWORKS, Saravanan Sampathkumar, Ajay Modi, Sandeep Sreerangam, Umamaheswararao Karyampudi, and Ashish Singh
CHANGING AN ONLINE VIDEO MEETING BACKGROUND IN REAL-TIME USING DEEP LEARNING, Barrie Chen, Iris Qian, and Richard Cai
Method and Apparatus for the Collection and Analysis of Viscous Fluids, Herb Abrams
Scheduling policy for burst multithreading, N/A
ROBUST MEDIA ROLL PARKING CONTROL, HP INC
A FAILURE PREDICTIVE ALGORITHM USING SEQUENCE OF EVENT CODES WITH A DEEP LEARNING MODEL (LSTM), HP INC
EASY PLUG-IN INK COLLECTOR MODULE WITH MAGNETS FOR TEXTILE LARGE FORMAT PRINTER, HP INC
HIGH CAPACITY INK COLLECTOR FOR TEXTILE PRINTING ON POROUS MEDIAS BASED ON SLOPING PLATES, HP INC
A ZERO CROSS DETECTION METHOD FOR AC POWER CONVERTERS BASED ON AN EXTENDED KALMAN FILTER, HP INC
FOLDABLE AND DUAL DISPLAY NOTEBOOK, HP INC
I2C BASED SECURITY INK SUPPLY SMART-CHIP RECOGNITION, HP INC
Graphical Augmentation of Message Content, Gaurav Menghani and Sean McCabe
System and Architecture of a Quantum Key Distribution (QKD) Service over SDN, Santanu Ganguly
Supply Chain Verification of Hardware Components Using Open-Source Root of Trust, Vadim Sukhomlinov, Marius Schilder, Andrey Pronin, and Randall Spangler
Security Key with Data Scanning, InVue Security Products Inc.
SYSTEMS AND METHODS FOR PROTECTING RETAIL DISPLAY MERCHANDISE FROM THEFT, InVue Security Products Inc.
TINTEGRATED APPARATUS TO VALIDATE AND TEST LEDS AND TRANSCEIVER PORTS, Min Zhu, Hanqin Ye, Brice Achkir, and Jason Zhang
METHOD FOR FAST BOOTSTRAP AND LOSS RECOVERY FOR CLIENTS CONNECTED TO A SELECTIVE FORWARDING UNIT (SFU), Jacques Samain, Mohammed Hawari, and Andre Surcouf
HIGH RESOLUTION EYE TRACKING CAMERA ENABLING A FOVEATED IMAGING FOR VIDEO COLLABORATION DEVICES, Farhad Abbassi Gholmansaraei
SRV6/BITMASK DATAPLANE SIGNALED SEAMLESS FAAS/SERVERLESS FUNCTION DEPLOYMENT, Nagendra Kumar Nainar and Carlos M. Pignataro
USING SEQUENTIAL ANALYSIS AND SEARCH SPACE MAPPING MACHINE LEARNING TECHNIQUES FOR TROUBLESHOOTING A SOFTWARE DEFINED NETWORK OR A NETWORK FUNCTION VIRTUALIZATION BASED NETWORK, Sarthak Sharma and Lovepreet Singh
DYNAMIC, PER-TENANT ENCRYPTION USING SMART NETWORK INTERFACE CARDS, Kyle Mestery, Ian Wells, and Grzegorz Duraj
Automatically Changing Accessibility Settings on an Electronic Device Responsive to Detecting the Presence of a Hearing Device, Rachel Hausmann and Collin Irwin
Data compression using pre-generated dictionaries, Simon Cooke
ACCESS POINT ON ACCESS POINT DOCKING AND CONTROL AND PROVISIONING OF WIRELESS ACCESS POINTS (CAP-WAP) TUNNELING, Prabudas Varadarajan, Samir Patro, and Rashmi Ramesh
Automatic creation of apps using images of arranged physical media, Collin Irwin, Xiaosa Zhao, Jo Chuang, and Christopher Michael Hall
AIR GESTURE RECOGNITION, Jung Hong, Xu Guo, and Jove Yuan
Assisted digital input for paper forms, Marius Sajgalik and Victor Carbune
Efficient wireless charging of peripheral devices, Liang Jia and Yungchih Chen
Machine-Learning Based Evaluation of Access Control Lists to Identify Anomalies, Alejo Grigera Sutro
INTELLIGENTLY LOCKING A DEVICE BASED ON CONTEXTUAL SIGNALS, Jonathan D. Hurwitz and Christina Gilbert
INTERACTIVELY CONNECTING CORPORATE POLICY AND PROCESS TO POLICY CONSUMERS, Angie Szabo, Swarupa Reddy, and Alex Gregory
RECONSTRUCTION OF ENTITY LIFETIME SUMMARIES FROM AUTOSUPPORT (ASUP) CONFIGURATION AND LOGS, Geetha Srikantan
AUTOMATIC LINECARD (LC) CAPABILITY DETECTION, Stefano Binetti, Richard Moses S, and Davide Sirtori
INTENT-AWARE FLOW REDIRECT USING SINGLE-HOP INTERNET CONTROL MESSAGE PROTOCOL (ICMP) EXTENSION, Carlos M. Pignataro and Nagendra Kumar Nainar
METHODS AND APPARATUS FOR INTENT AND CONTEXT-BASED AD-HOC DATA DRIVEN REPORTING AND VISUALIZATION, Plamen Nedeltchev, Madhuri Garikapati, Eric Kroll, and Mani Kesavan
AUTOMATED AND REACTIVE MECHANISM IN CONNECTIVITY FAULT MANAGEMENT (CFM) WITH AN ON-DEVICE EXPERT SYSTEM, Karthik babu Harichandra Babu, Peter Jones, Peter Van Horne, and Ananthakrishnan Rajamani
USING A CLOUD-BASED ENTERPRISE NETWORK SECURITY SYSTEM TO PROVIDE DECENTRALIZED BUT UNIFIED GENERAL DATA PROTECTION REGULATION (GDPR) CONSENT MANAGEMENT, Thomas Vegas, Anirban Karmakar, and Giacomo Trifilo
Dot projector based on phase diffuser, John D. Perreault
Recovery and upgrade of a device using an auxiliary device, Sudha Broslawsky, Jes Klinke, Shelley Chen, Howard Lee, and Julius Werner
Airship-based security and monitoring with machine learning, Yan Mayster and Brian Shucker
PROTECTING AGAINST MALICIOUS LOGINS ON VIRTUAL MACHINES USING BLOCKCHAIN, Sarthak Sharma, Lovepreet Singh, and Yegappan Lakshmanan
TOOL-FREE 3D PRINTED THREADED UNION METHOD WITH REMOVABLE TIGHTENING ACCESSORY, HP INC
Overhead Collision Alerts and Overhead-obstacle Aware Navigation Planning Using Onboard Sensors and Vehicle-to-Vehicle Communication, Yan Mayster and Brian Shucker
Distributed multi-bucket sampling, Richard Steven Farnsworth
OPTIMIZED SIMULTANEOUS AUTHENTICATION OF EQUALS (SAE) IDENTITY PRE-SHARED KEY (IPSK), Abhishek Dhammawat, Shreshta Besagarahalli Manu, Namsoo Kim, and Mansi Jain
Virtual Reality (VR) Screenshot, Anonymous Anonymous
A Head Mounted Capture System, Anonymous Anonymous
On-demand content generation and insertion during content consumption, Victor Carbune and Alex Damian
AUTHENTICATION OF APPLICATION FLOWS IN SOFTWARE DEFINED NETWORK DEPLOYMENTS USING A TRANSACTION MODEL, Niranjan M. M and Nagaraj Kenchaiah
NODE AND SERVICE DISCOVERY IN WIRELESS LOCAL AREA NETWORK CONTROLLER CLUSTER ARCHITECTURES USING HYPERLEDGER, Niranjan M. M, Nagaraj Kenchaiah, Vijay Kothamasu, and Ramachandra Murthy
TRUSTWORTHINESS AMONG CONTROLLERS AND SWITCHES IN MULTI-PROVIDER SOFTWARE DEFINED NETWORK DEPLOYMENTS USING A TRUSTED PLATFORM MODULE (TPM) AND SECURE LEDGER, Niranjan M. M and Nagaraj Kenchaiah
SECURE AND EFFICIENT METHOD TO DISTRIBUTE CONFIGURATIONS IN WIRELESS CLUSTER DEPLOYMENTS USING HYPER LEDGER, Niranjan M. M and Nagaraj Kenchaiah
DYNAMIC AND CUSTOMER TAILORED CONSUMABLE LIFE PROJECTION MESSAGING, HP INC
CUSTOMIZED PRINTED HANDOUTS FOR SALES PROSPECTS, HP INC
OFFLINE CABLE DETECTION METHOD, HP INC
COMMUNICATION BUS FOR EMBEDDED SENSOR SYSTEMS, HP INC
HARDWARE SECURITY-BASED DATA CONTENT PROTECTION, HP INC
PCle GEN4 AND PCle GEN3/SATA DEVICES SWITCHING SCHEME, HP INC
USING BUILD-IN MIC TO DETECT AIRPLANE MODE BY HEARING BACKGROUND NOISE, HP INC
Insult detection and filtering, Christina Abboud and Jyrki Alakuijala