Article
ROTATABLE SHIELDING CAN DESIGN, HP INC
M.2 NSFF CONNECTOR FOR DOUBLE SIDE, HP INC
NOTOEBOOK EDGE-SENSING FEATURE FOR USER EXPERIENCE ENHANCED, HP INC
TWO WAY HEADSET AUDIO USAGE IN VR, HP INC
INTEGRATION OF DISPLAY WITH CAMERA CABLE, HP INC
GESTURE AND VOICE THROUGH WIRELESS MICROPHONE DEVICE, HP INC
SYSTEM APPROACH TO COMPENSATE THE BRIGHTNESS NON-UNIFORMITY OF LOCAL DIMMING DISPLAY, HP INC
ENHANCED SYSTEM ERRORS FOR IMPROVING FIELD SERVICE SUPPORT AND CUSTOMER ISSUES REPORTING, HP INC
DUAL CAP HINGE DESIGN ON COMMON TANK, HP INC
ROBUST DECISION FOREST INFERENCE ALGORITHM IN PRESENCE OF MISSING FEATURE VALUES, Jan Brabec and Cenek Skarda
Offline Mobile Payments Using Public Key Cryptography, Sandro Feuz and Thomas Deselaers
Conversational News Interaction Using Indexing and Linking, Gozde Oznur and T.V Raman
Graduation Hat Microphone for Waterproof Top Port Microphones, Yuyan Hua, Carl Philip Taussig, Shu-Yu Chou, and Doug Kenneth Hogue
STRATIFIED HAIPIN CONDUCTORS FOR REDUCTION OF EDDY CURRENTS, Verena Blunder
COOLING STAMP, Verena Blunder
TRIPODE JOINT KEY, Verena Blunder
DOUBLE FORK GUIDE FOR HEAVY-DUTY OPERATING PARTS, Verena Blunder
CONTROL LOOP INJECTION MOULDING PARAMETERS, Verena Blunder
INTEGRATED APPARATUS TO VALIDATE AND TEST LEDS AND TRANSCEIVER PORTS, Min Zhu, Hanqin Ye, Brice Achkir, and Jason Zhang
IDENTIFYING APPLICATION AND TRAFFIC PATTERNS CONTRIBUTING TO MICROBURSTS AND CONGESTION IN DATA CENTER NETWORKS, Saravanan Sampathkumar, Ajay Modi, Sandeep Sreerangam, Umamaheswararao Karyampudi, and Ashish Singh
CHANGING AN ONLINE VIDEO MEETING BACKGROUND IN REAL-TIME USING DEEP LEARNING, Barrie Chen, Iris Qian, and Richard Cai
Method and Apparatus for the Collection and Analysis of Viscous Fluids, Herb Abrams
Scheduling policy for burst multithreading, N/A
ROBUST MEDIA ROLL PARKING CONTROL, HP INC
A FAILURE PREDICTIVE ALGORITHM USING SEQUENCE OF EVENT CODES WITH A DEEP LEARNING MODEL (LSTM), HP INC
EASY PLUG-IN INK COLLECTOR MODULE WITH MAGNETS FOR TEXTILE LARGE FORMAT PRINTER, HP INC
HIGH CAPACITY INK COLLECTOR FOR TEXTILE PRINTING ON POROUS MEDIAS BASED ON SLOPING PLATES, HP INC
A ZERO CROSS DETECTION METHOD FOR AC POWER CONVERTERS BASED ON AN EXTENDED KALMAN FILTER, HP INC
FOLDABLE AND DUAL DISPLAY NOTEBOOK, HP INC
I2C BASED SECURITY INK SUPPLY SMART-CHIP RECOGNITION, HP INC
Graphical Augmentation of Message Content, Gaurav Menghani and Sean McCabe
System and Architecture of a Quantum Key Distribution (QKD) Service over SDN, Santanu Ganguly
Supply Chain Verification of Hardware Components Using Open-Source Root of Trust, Vadim Sukhomlinov, Marius Schilder, Andrey Pronin, and Randall Spangler
Security Key with Data Scanning, InVue Security Products Inc.
SYSTEMS AND METHODS FOR PROTECTING RETAIL DISPLAY MERCHANDISE FROM THEFT, InVue Security Products Inc.
TINTEGRATED APPARATUS TO VALIDATE AND TEST LEDS AND TRANSCEIVER PORTS, Min Zhu, Hanqin Ye, Brice Achkir, and Jason Zhang
METHOD FOR FAST BOOTSTRAP AND LOSS RECOVERY FOR CLIENTS CONNECTED TO A SELECTIVE FORWARDING UNIT (SFU), Jacques Samain, Mohammed Hawari, and Andre Surcouf
HIGH RESOLUTION EYE TRACKING CAMERA ENABLING A FOVEATED IMAGING FOR VIDEO COLLABORATION DEVICES, Farhad Abbassi Gholmansaraei
SRV6/BITMASK DATAPLANE SIGNALED SEAMLESS FAAS/SERVERLESS FUNCTION DEPLOYMENT, Nagendra Kumar Nainar and Carlos M. Pignataro
USING SEQUENTIAL ANALYSIS AND SEARCH SPACE MAPPING MACHINE LEARNING TECHNIQUES FOR TROUBLESHOOTING A SOFTWARE DEFINED NETWORK OR A NETWORK FUNCTION VIRTUALIZATION BASED NETWORK, Sarthak Sharma and Lovepreet Singh
DYNAMIC, PER-TENANT ENCRYPTION USING SMART NETWORK INTERFACE CARDS, Kyle Mestery, Ian Wells, and Grzegorz Duraj
Automatically Changing Accessibility Settings on an Electronic Device Responsive to Detecting the Presence of a Hearing Device, Rachel Hausmann and Collin Irwin
Data compression using pre-generated dictionaries, Simon Cooke
ACCESS POINT ON ACCESS POINT DOCKING AND CONTROL AND PROVISIONING OF WIRELESS ACCESS POINTS (CAP-WAP) TUNNELING, Prabudas Varadarajan, Samir Patro, and Rashmi Ramesh
Automatic creation of apps using images of arranged physical media, Collin Irwin, Xiaosa Zhao, Jo Chuang, and Christopher Michael Hall
AIR GESTURE RECOGNITION, Jung Hong, Xu Guo, and Jove Yuan
Assisted digital input for paper forms, Marius Sajgalik and Victor Carbune
Efficient wireless charging of peripheral devices, Liang Jia and Yungchih Chen
Machine-Learning Based Evaluation of Access Control Lists to Identify Anomalies, Alejo Grigera Sutro
INTELLIGENTLY LOCKING A DEVICE BASED ON CONTEXTUAL SIGNALS, Jonathan D. Hurwitz and Christina Gilbert
INTERACTIVELY CONNECTING CORPORATE POLICY AND PROCESS TO POLICY CONSUMERS, Angie Szabo, Swarupa Reddy, and Alex Gregory
RECONSTRUCTION OF ENTITY LIFETIME SUMMARIES FROM AUTOSUPPORT (ASUP) CONFIGURATION AND LOGS, Geetha Srikantan
AUTOMATIC LINECARD (LC) CAPABILITY DETECTION, Stefano Binetti, Richard Moses S, and Davide Sirtori
INTENT-AWARE FLOW REDIRECT USING SINGLE-HOP INTERNET CONTROL MESSAGE PROTOCOL (ICMP) EXTENSION, Carlos M. Pignataro and Nagendra Kumar Nainar
METHODS AND APPARATUS FOR INTENT AND CONTEXT-BASED AD-HOC DATA DRIVEN REPORTING AND VISUALIZATION, Plamen Nedeltchev, Madhuri Garikapati, Eric Kroll, and Mani Kesavan
AUTOMATED AND REACTIVE MECHANISM IN CONNECTIVITY FAULT MANAGEMENT (CFM) WITH AN ON-DEVICE EXPERT SYSTEM, Karthik babu Harichandra Babu, Peter Jones, Peter Van Horne, and Ananthakrishnan Rajamani
USING A CLOUD-BASED ENTERPRISE NETWORK SECURITY SYSTEM TO PROVIDE DECENTRALIZED BUT UNIFIED GENERAL DATA PROTECTION REGULATION (GDPR) CONSENT MANAGEMENT, Thomas Vegas, Anirban Karmakar, and Giacomo Trifilo
Dot projector based on phase diffuser, John D. Perreault
Recovery and upgrade of a device using an auxiliary device, Sudha Broslawsky, Jes Klinke, Shelley Chen, Howard Lee, and Julius Werner
Airship-based security and monitoring with machine learning, Yan Mayster and Brian Shucker
PROTECTING AGAINST MALICIOUS LOGINS ON VIRTUAL MACHINES USING BLOCKCHAIN, Sarthak Sharma, Lovepreet Singh, and Yegappan Lakshmanan
TOOL-FREE 3D PRINTED THREADED UNION METHOD WITH REMOVABLE TIGHTENING ACCESSORY, HP INC
Overhead Collision Alerts and Overhead-obstacle Aware Navigation Planning Using Onboard Sensors and Vehicle-to-Vehicle Communication, Yan Mayster and Brian Shucker
Distributed multi-bucket sampling, Richard Steven Farnsworth
OPTIMIZED SIMULTANEOUS AUTHENTICATION OF EQUALS (SAE) IDENTITY PRE-SHARED KEY (IPSK), Abhishek Dhammawat, Shreshta Besagarahalli Manu, Namsoo Kim, and Mansi Jain
Virtual Reality (VR) Screenshot, Anonymous Anonymous
A Head Mounted Capture System, Anonymous Anonymous
On-demand content generation and insertion during content consumption, Victor Carbune and Alex Damian
AUTHENTICATION OF APPLICATION FLOWS IN SOFTWARE DEFINED NETWORK DEPLOYMENTS USING A TRANSACTION MODEL, Niranjan M. M and Nagaraj Kenchaiah
NODE AND SERVICE DISCOVERY IN WIRELESS LOCAL AREA NETWORK CONTROLLER CLUSTER ARCHITECTURES USING HYPERLEDGER, Niranjan M. M, Nagaraj Kenchaiah, Vijay Kothamasu, and Ramachandra Murthy
TRUSTWORTHINESS AMONG CONTROLLERS AND SWITCHES IN MULTI-PROVIDER SOFTWARE DEFINED NETWORK DEPLOYMENTS USING A TRUSTED PLATFORM MODULE (TPM) AND SECURE LEDGER, Niranjan M. M and Nagaraj Kenchaiah
SECURE AND EFFICIENT METHOD TO DISTRIBUTE CONFIGURATIONS IN WIRELESS CLUSTER DEPLOYMENTS USING HYPER LEDGER, Niranjan M. M and Nagaraj Kenchaiah
DYNAMIC AND CUSTOMER TAILORED CONSUMABLE LIFE PROJECTION MESSAGING, HP INC
CUSTOMIZED PRINTED HANDOUTS FOR SALES PROSPECTS, HP INC
OFFLINE CABLE DETECTION METHOD, HP INC
COMMUNICATION BUS FOR EMBEDDED SENSOR SYSTEMS, HP INC
HARDWARE SECURITY-BASED DATA CONTENT PROTECTION, HP INC
PCle GEN4 AND PCle GEN3/SATA DEVICES SWITCHING SCHEME, HP INC
USING BUILD-IN MIC TO DETECT AIRPLANE MODE BY HEARING BACKGROUND NOISE, HP INC
Insult detection and filtering, Christina Abboud and Jyrki Alakuijala
Browser with smart search in page button, Benjamin Azose and Kathleen Brennan, PhD
OPTIMIZED SIMULTANEOUS AUTHENTICATION OF EQUALS (SAE) IDENTITY PRE-SHARED KEY (IPSK), Abhishek Dhammawat, Shreshta Besagarahalli Manu, Namsoo Kim, and Mansi Jain
MACHINE LEARNING ASSISTED QUICK EYESCAN (MLAQE) FOR SIGNAL INTEGRITY CHECK, Jim Xu, Sreenivasa Rao Bandlamudi, Ankit Sood, Vinit Bansal, Ravi Eda, and Arun Singh
Directing users to an available parking spot at an optimal location near the destination, Adalberto Foresti
SEGMENT ROUTING POLICIES WITH BUILT-IN RESILIENCY, Clarence Filsfils, Zafar Ali, Swadesh Agrawal, Francois Clad, Jose Liste, and Jiri Chaloupka
Smart dispensers to optimize restocking process, Kenneth M. Schow
Motion activated wireless reconnection, Jonathan D. Hurwitz
BRIDGE DEVICES FOR WIRELESS PROJECTION OF VEHICLE OPERATING SYSTEMS, Sriram Viswanathan, Eugene Koh, Haris Ramic, Mickey Kataria, and Zhen Yu Song
MODELING STATISTICALLY SIGNIFICANT PROPENSITY CONTROLS, Brian Mulford, Yueheng Du, and Colby Ranger
SYSTEM FOR AUTOMOTIVE DATA MANAGEMENT, Carsten Isert, Tobias Haamel, Ram Bulantnikov, and John Patterson
INTELLIGENT SIM SWITCHING IN A MULTI-SIM COMPUTING DEVICE, Shivank Nayak, Sooraj Sasindran, and Jayachandran Chinnakkannu
Peeking user interface for foldable devices, Yameng Lee Thorp and Hideaki Matsui
HEIGHTENED SECURITY MEASURES FOR MARKED APPLICATIONS, Rachel Hausmann and Collin Irwin
Inserting multimedia content captured by one device into a document on another device, Thomas Deselaers and Victor Carbune
SUGGESTING TITLES FOR AUDIO RECORDINGS, Itay Inbar, Amit Pitaru, Isaac Blankensmith, Dror Ayalon, Tiago Camolesi, Guilherme Santos, James Lemieux, Sherry Lin, and Jason Cho
EFFICIENT WIRELESS NETWORK SCANS FOR COMPUTING DEVICES, Kai Shi and Kumar Anand
GESTURE BASED ACTIVATION OF PRIVATE MODE, Nabil Shahid