Article
ROBUST MEDIA ROLL PARKING CONTROL, HP INC
A FAILURE PREDICTIVE ALGORITHM USING SEQUENCE OF EVENT CODES WITH A DEEP LEARNING MODEL (LSTM), HP INC
EASY PLUG-IN INK COLLECTOR MODULE WITH MAGNETS FOR TEXTILE LARGE FORMAT PRINTER, HP INC
HIGH CAPACITY INK COLLECTOR FOR TEXTILE PRINTING ON POROUS MEDIAS BASED ON SLOPING PLATES, HP INC
A ZERO CROSS DETECTION METHOD FOR AC POWER CONVERTERS BASED ON AN EXTENDED KALMAN FILTER, HP INC
FOLDABLE AND DUAL DISPLAY NOTEBOOK, HP INC
I2C BASED SECURITY INK SUPPLY SMART-CHIP RECOGNITION, HP INC
Graphical Augmentation of Message Content, Gaurav Menghani and Sean McCabe
System and Architecture of a Quantum Key Distribution (QKD) Service over SDN, Santanu Ganguly
Supply Chain Verification of Hardware Components Using Open-Source Root of Trust, Vadim Sukhomlinov, Marius Schilder, Andrey Pronin, and Randall Spangler
Security Key with Data Scanning, InVue Security Products Inc.
SYSTEMS AND METHODS FOR PROTECTING RETAIL DISPLAY MERCHANDISE FROM THEFT, InVue Security Products Inc.
TINTEGRATED APPARATUS TO VALIDATE AND TEST LEDS AND TRANSCEIVER PORTS, Min Zhu, Hanqin Ye, Brice Achkir, and Jason Zhang
METHOD FOR FAST BOOTSTRAP AND LOSS RECOVERY FOR CLIENTS CONNECTED TO A SELECTIVE FORWARDING UNIT (SFU), Jacques Samain, Mohammed Hawari, and Andre Surcouf
HIGH RESOLUTION EYE TRACKING CAMERA ENABLING A FOVEATED IMAGING FOR VIDEO COLLABORATION DEVICES, Farhad Abbassi Gholmansaraei
SRV6/BITMASK DATAPLANE SIGNALED SEAMLESS FAAS/SERVERLESS FUNCTION DEPLOYMENT, Nagendra Kumar Nainar and Carlos M. Pignataro
USING SEQUENTIAL ANALYSIS AND SEARCH SPACE MAPPING MACHINE LEARNING TECHNIQUES FOR TROUBLESHOOTING A SOFTWARE DEFINED NETWORK OR A NETWORK FUNCTION VIRTUALIZATION BASED NETWORK, Sarthak Sharma and Lovepreet Singh
DYNAMIC, PER-TENANT ENCRYPTION USING SMART NETWORK INTERFACE CARDS, Kyle Mestery, Ian Wells, and Grzegorz Duraj
Automatically Changing Accessibility Settings on an Electronic Device Responsive to Detecting the Presence of a Hearing Device, Rachel Hausmann and Collin Irwin
Data compression using pre-generated dictionaries, Simon Cooke
ACCESS POINT ON ACCESS POINT DOCKING AND CONTROL AND PROVISIONING OF WIRELESS ACCESS POINTS (CAP-WAP) TUNNELING, Prabudas Varadarajan, Samir Patro, and Rashmi Ramesh
Automatic creation of apps using images of arranged physical media, Collin Irwin, Xiaosa Zhao, Jo Chuang, and Christopher Michael Hall
AIR GESTURE RECOGNITION, Jung Hong, Xu Guo, and Jove Yuan
Assisted digital input for paper forms, Marius Sajgalik and Victor Carbune
Efficient wireless charging of peripheral devices, Liang Jia and Yungchih Chen
Machine-Learning Based Evaluation of Access Control Lists to Identify Anomalies, Alejo Grigera Sutro
INTELLIGENTLY LOCKING A DEVICE BASED ON CONTEXTUAL SIGNALS, Jonathan D. Hurwitz and Christina Gilbert
INTERACTIVELY CONNECTING CORPORATE POLICY AND PROCESS TO POLICY CONSUMERS, Angie Szabo, Swarupa Reddy, and Alex Gregory
RECONSTRUCTION OF ENTITY LIFETIME SUMMARIES FROM AUTOSUPPORT (ASUP) CONFIGURATION AND LOGS, Geetha Srikantan
AUTOMATIC LINECARD (LC) CAPABILITY DETECTION, Stefano Binetti, Richard Moses S, and Davide Sirtori
INTENT-AWARE FLOW REDIRECT USING SINGLE-HOP INTERNET CONTROL MESSAGE PROTOCOL (ICMP) EXTENSION, Carlos M. Pignataro and Nagendra Kumar Nainar
METHODS AND APPARATUS FOR INTENT AND CONTEXT-BASED AD-HOC DATA DRIVEN REPORTING AND VISUALIZATION, Plamen Nedeltchev, Madhuri Garikapati, Eric Kroll, and Mani Kesavan
AUTOMATED AND REACTIVE MECHANISM IN CONNECTIVITY FAULT MANAGEMENT (CFM) WITH AN ON-DEVICE EXPERT SYSTEM, Karthik babu Harichandra Babu, Peter Jones, Peter Van Horne, and Ananthakrishnan Rajamani
USING A CLOUD-BASED ENTERPRISE NETWORK SECURITY SYSTEM TO PROVIDE DECENTRALIZED BUT UNIFIED GENERAL DATA PROTECTION REGULATION (GDPR) CONSENT MANAGEMENT, Thomas Vegas, Anirban Karmakar, and Giacomo Trifilo
Dot projector based on phase diffuser, John D. Perreault
Recovery and upgrade of a device using an auxiliary device, Sudha Broslawsky, Jes Klinke, Shelley Chen, Howard Lee, and Julius Werner
Airship-based security and monitoring with machine learning, Yan Mayster and Brian Shucker
PROTECTING AGAINST MALICIOUS LOGINS ON VIRTUAL MACHINES USING BLOCKCHAIN, Sarthak Sharma, Lovepreet Singh, and Yegappan Lakshmanan
TOOL-FREE 3D PRINTED THREADED UNION METHOD WITH REMOVABLE TIGHTENING ACCESSORY, HP INC
Overhead Collision Alerts and Overhead-obstacle Aware Navigation Planning Using Onboard Sensors and Vehicle-to-Vehicle Communication, Yan Mayster and Brian Shucker
Distributed multi-bucket sampling, Richard Steven Farnsworth
OPTIMIZED SIMULTANEOUS AUTHENTICATION OF EQUALS (SAE) IDENTITY PRE-SHARED KEY (IPSK), Abhishek Dhammawat, Shreshta Besagarahalli Manu, Namsoo Kim, and Mansi Jain
Virtual Reality (VR) Screenshot, Anonymous Anonymous
A Head Mounted Capture System, Anonymous Anonymous
On-demand content generation and insertion during content consumption, Victor Carbune and Alex Damian
AUTHENTICATION OF APPLICATION FLOWS IN SOFTWARE DEFINED NETWORK DEPLOYMENTS USING A TRANSACTION MODEL, Niranjan M. M and Nagaraj Kenchaiah
NODE AND SERVICE DISCOVERY IN WIRELESS LOCAL AREA NETWORK CONTROLLER CLUSTER ARCHITECTURES USING HYPERLEDGER, Niranjan M. M, Nagaraj Kenchaiah, Vijay Kothamasu, and Ramachandra Murthy
TRUSTWORTHINESS AMONG CONTROLLERS AND SWITCHES IN MULTI-PROVIDER SOFTWARE DEFINED NETWORK DEPLOYMENTS USING A TRUSTED PLATFORM MODULE (TPM) AND SECURE LEDGER, Niranjan M. M and Nagaraj Kenchaiah
SECURE AND EFFICIENT METHOD TO DISTRIBUTE CONFIGURATIONS IN WIRELESS CLUSTER DEPLOYMENTS USING HYPER LEDGER, Niranjan M. M and Nagaraj Kenchaiah
DYNAMIC AND CUSTOMER TAILORED CONSUMABLE LIFE PROJECTION MESSAGING, HP INC
CUSTOMIZED PRINTED HANDOUTS FOR SALES PROSPECTS, HP INC
OFFLINE CABLE DETECTION METHOD, HP INC
COMMUNICATION BUS FOR EMBEDDED SENSOR SYSTEMS, HP INC
HARDWARE SECURITY-BASED DATA CONTENT PROTECTION, HP INC
PCle GEN4 AND PCle GEN3/SATA DEVICES SWITCHING SCHEME, HP INC
USING BUILD-IN MIC TO DETECT AIRPLANE MODE BY HEARING BACKGROUND NOISE, HP INC
Insult detection and filtering, Christina Abboud and Jyrki Alakuijala
Browser with smart search in page button, Benjamin Azose and Kathleen Brennan, PhD
OPTIMIZED SIMULTANEOUS AUTHENTICATION OF EQUALS (SAE) IDENTITY PRE-SHARED KEY (IPSK), Abhishek Dhammawat, Shreshta Besagarahalli Manu, Namsoo Kim, and Mansi Jain
MACHINE LEARNING ASSISTED QUICK EYESCAN (MLAQE) FOR SIGNAL INTEGRITY CHECK, Jim Xu, Sreenivasa Rao Bandlamudi, Ankit Sood, Vinit Bansal, Ravi Eda, and Arun Singh
Directing users to an available parking spot at an optimal location near the destination, Adalberto Foresti
SEGMENT ROUTING POLICIES WITH BUILT-IN RESILIENCY, Clarence Filsfils, Zafar Ali, Swadesh Agrawal, Francois Clad, Jose Liste, and Jiri Chaloupka
Smart dispensers to optimize restocking process, Kenneth M. Schow
Motion activated wireless reconnection, Jonathan D. Hurwitz
BRIDGE DEVICES FOR WIRELESS PROJECTION OF VEHICLE OPERATING SYSTEMS, Sriram Viswanathan, Eugene Koh, Haris Ramic, Mickey Kataria, and Zhen Yu Song
MODELING STATISTICALLY SIGNIFICANT PROPENSITY CONTROLS, Brian Mulford, Yueheng Du, and Colby Ranger
SYSTEM FOR AUTOMOTIVE DATA MANAGEMENT, Carsten Isert, Tobias Haamel, Ram Bulantnikov, and John Patterson
INTELLIGENT SIM SWITCHING IN A MULTI-SIM COMPUTING DEVICE, Shivank Nayak, Sooraj Sasindran, and Jayachandran Chinnakkannu
Peeking user interface for foldable devices, Yameng Lee Thorp and Hideaki Matsui
HEIGHTENED SECURITY MEASURES FOR MARKED APPLICATIONS, Rachel Hausmann and Collin Irwin
Inserting multimedia content captured by one device into a document on another device, Thomas Deselaers and Victor Carbune
SUGGESTING TITLES FOR AUDIO RECORDINGS, Itay Inbar, Amit Pitaru, Isaac Blankensmith, Dror Ayalon, Tiago Camolesi, Guilherme Santos, James Lemieux, Sherry Lin, and Jason Cho
EFFICIENT WIRELESS NETWORK SCANS FOR COMPUTING DEVICES, Kai Shi and Kumar Anand
GESTURE BASED ACTIVATION OF PRIVATE MODE, Nabil Shahid
A METHOD TO PROVIDE PRINT CONTROL OVER HETEROGENEOUS 3D PRINT BUCKETS, HP INC
SEMI-AUTO REEL TO REEL INSTALL OF NEW WEB WIPE FOR 3D PRINTER AND WIDE FORMAT PRINTERS, HP INC
IDENTIFY PRINT QUALITY OR SUB-SYSTEM DEGRADATION ISSUES FOR 3D PRINTERS USING LAYER TIME ANALYSIS, HP INC
CONSTANT PRESSURE VALVE TO COMPENSATE EXTRACTION SYSTEM PRESSURE VARIATIONS, HP INC
AUTOMATIC ARCH RECOVERY FOR 3D POWDER LOADING SYSTEMS, HP INC
A JOB TREE STRUCTURE TO TRACK AUTO GENERATED BUILD ENVELOPE STATUS AND CONSUMPTION, HP INC
IMPROVING 3D PRINTED PART QUALITY USING ARTIFICAL NEURAL NETWORKS OF THE GENERATIVE ADVERSARIAL TYPE, HP INC
DYNAMIC SYSTEM TO RAISE THE BUILD UNIT PLATFORM DURING UNCAKING, HP INC
AUTOMATIC GENERATION OF 3D CAMOUFLAGE AND OTHER PATTERNS, HP INC
EXTERNAL HEATING DEVICE TO FACILITATE UNPACKING PROCESS IN POWDER PROCESSING STATION, HP INC
FAST CLEANING ROLL SNAPPING INSTALLATION SYSTEM SOLUTION FOR 3D AND LARGE FORMAT PRINTERS, HP INC
Return-Oriented Programming Detection and Prevention Utilizing a Hardware and Software Adaptation, Alex Levin
Dot Product Matrix Compression for Machine Learning, Anonymous
A SOULTION WITH STEALTH FASTENER FOR COSMETIC ENHANCEMENT, HP INC
Improved Message Facilitator For On-Time And Quick Response, Amy Zhang and Cliff Sze
CAMERA TEST STATION AND PALLET DESIGN FOR MEASURING 3D PRINT POWDER, HP INC
PREHEATED AIR INLETS FOR ADDITIVE MANUFACTURING, HP INC
CUSTOMIZABLE FLASH FOR COMPUTING DEVICES, Chuck Woodhull
Triggering alarms at dynamic and flexible times based on external factors, Sandro Feuz and Thomas Deselaers
EFFICIENT CELLULAR RADIO ACCESS MANAGEMENT FOR MOBILE COMPUTING DEVICES, Meng Wang
CAMERA PRIVACY SLIDER SHUTTER DESIGN, HP INC
SIMPLIFY SCREW FIXED DESIGN FOR THIN/LIGHT/NARROW DOWN OF PRODUCT, HP INC