Article
Using Computer Vision To Label And Search A Physical Space, Hauke Heibel, Damon Kohler, Stefan Hinterstoisser, Martin Bokeloh, and Jürgen Sturm
Smart email send scheduling, Ashish Duggal
ZIF connector with open end for FPC pass-through, David Rosen
SUPPLY CHAIN TRUST AS A SERVICE USING TRUST MANAGEMENT IN BLOCKCHAIN AND INTERNET OF THINGS TO PROVIDE REPUTATION SCORES FOR SUPPLY CHAIN ENTITIES, Johnson Manuel-Devadoss
Selective notifications based on location and calendar information, Jeff Palm
Fast Adaptive Voltage and Boost Frequencies for Central Processing Units, Derek Basehore, Nick Sanders, Stephen Boyd, Sonny Rao, and Alex Levin
ENHANCED TELEPHONY USING HUMAN INAUDIBLE DATA OVER VOICE CHANNEL, Asher Segel-Brown, Stefan Zinke-Allmang, and Honna Segel
Automated image retargeting at scale using a generative adversarial network, Jingbin Wang, Ramin Zabih, Chen Wang, Richard Strong Bowen, and Michael Wilber
Spoof Detection for Fingerprint Sensors, Firas Sammoura and Jean-Marie Bussat
Virtual assistant for planning and booking holiday trips, Miglė Padegimaitė and Sandro Feuz
Automatic Design of Neural Architectures for Recommendation and Ranking Tasks, Anonymous
Counterfeit Good Detection Using Radar, Nikesh Tayi Dhar and Jaime Lien
Preprocessing Logic to Enhance Videotelephony Services During Suboptimal Network Conditions, Chinmay Dhodapkar
Augmented reality immersion adjustment, Lachlan "Locke" Dunn
Change detection for optimized semantic video analysis, Elly Nattinger and Austin McCasland
Coupling thermal subsystems on head-mounted displays, Matthew Valente and Srivatsan Ravindran
Stabilizing augmented reality reticles, Xavier Benavides Palos and Bryan Woods
Multifactor technique to bookmark and shop items from a screenshot, Diane Wang and Aiko Nakano
Robust ADHD testing by applying clustering techniques to survey responses or speech data, Lingyi Zhang and Cliff Chin Ngai Sze
Object recognition based contextual responses to user queries, Aiko Nakano
Dynamically generated and targeted augmented reality shopping campaigns, Aiko Nakano, Diane Wang, and Max Spear
Adjusting the rotation speed of a 3D object according to zoom level, Xavier Benavides Palos and Anshuman Kumar
Operational rules to manage power consumption for content display, Katie Leah Roberts-Hoffman and Gregory Granito
Approximating 3D poly mesh virtual objects with primitive shape colliders, Chloe Snyder, Alper Gungormusler, Andrew Allen, Aleksandr Ayvazov, and Dobromir Yordanov
Controlling the density of user-generated content in augmented reality, Austin McCasland, Elly Nattinger, and Seth Raphael
Network-connected Locker Kiosk for Device Delivery, Anonymous
Capture Camera Movement Compensation for Display of 3D Video in Virtual Reality, Anonymous
Voice interface for interaction with notifications, Victor Cărbune and Thomas Deselaers
Secure and user-friendly display of schedule in a meeting room, Alessandro Pelosi
Virtual Assistant Toy Block With Scanner And Display, N/A
Output-Dependent Access Control, Brett Krueger
Toy robot with customized virtual assistant personality, N/A
Virtual assistant user interface with customizable personality, N/A
Embedded tool for self-directed sales and onboarding, David Tigges
LOAD-BALANCING STRATEGY IN ROUTING PROTOCOL FOR LOW-POWER AND LOSSY NETWORKS BY EXPLOITING MULTIPLE PARENTS, Lele Zhang, Sam Gao, Chuanwei Li, and Xiang Fang
BEHAVIORAL ANALYTICS FOR FIREWALL POLICY RECOMMENDATION AND TUNING, Raghunath Kulkarni and Prapanch Ramamoorthy
SECURE INTERNET OF THINGS ONBOARDING USING PUBLIC KEY CRYPTOGRAPHY AND DIFFIE-HELLMAN INTEGRATED ENCRYPTION SCHEME, Niranjan M. M, Nagaraj Kenchaiah, Ramachandra Murthy, and Vijay Kothamasu
MEDIA ACCESS CONTROL SECURITY KEY DISTRIBUTION USING BLOCKCHAIN AND PUBLIC KEY CRYPTOGRAPHY, Niranjan M. M, Nagaraj Kenchaiah, and Vijay Kothamasu
Content provisioning based on aesthetic qualities, Eugenio J. Marchiori, Abhijit Chandgadkar, and Rick Earnshaw
Press-fit hinge and magnesium alloy enclosure for laptop cover attachment, Molly McShane, Karabo Tshweneyagae, Eugene Fox, and Roger Hsu
MERCHANDISE SECURITY DEVICES FOR USE WITH ELECTRONIC KEY, InVue Security Products Inc.
SYSTEMS AND METHODS FOR PROTECTING RETAIL DISPLAY MERCHANDISE FROM THEFT, InVue Security Products Inc.
Providing Real-Time Captured Information Input to a Machine-Learned Model to Improve Query Services, Perumaal Shanmugam, Felipe Leme, and Julian Odell
Signal Quality-Based Buffering of Media Data Using an Intermediate Device, Jonathan Hurwitz
ROBO-CALLING PREVENTION WITH SOFTWARE-DEFINED NETWORKING IN A WIDE AREA NETWORK POLICY FOR UNIFIED COMMUNICATION, Balaji Sundararajan, Anand Oswal, Vivek Agarwal, Rong Wang, and Palak Desai
TUR AS AN INPUT DEVICE TO COMMUNICATE WITH THE PRINTER, HP INC
AUTOMATIC DOCUMENT SCAN FROM FLATBED, HP INC
AUTOMATIC MICRO-RECIRCULATION CALIBRATION, HP INC
POST ERROR INDICATION IN UEFI DRIVER MODEL DRIVERS, HP INC
NEW BOTTOM EMISSION OLED STRUCTURE TO ENHANCE OUT-COUPLING EFFICIENCY, HP INC
EFFECTIVE HEAT DISSIPATED PANEL STRESS ABSORBER ON Mg/Al ALLOY ENCLOSURE, HP INC
Automatic Detection of Video Properties for Playback in Virtual Reality, Anonymous
Page Navigation For Virtual Assistants Based On A Knowledge Graph, Thierry Coppey and Victor Carbune
Frame For Electronic Device Case, Nick Gillett and James Tanner
JAVA INSTRUMENTATION OPTIMIZATION TECHNIQUES, Ted Hulick
MEASURING AND VISUALIZING USER SENTIMENT CHANGES OVER MULTIPLE CHANNELS, Xinjun Zhang, Qihong Shao, Changyong Zhao, and Antonio Nucci
CUPHOLDER WITH INDIVIDUAL TEMPERATURE CONTROL, Verena Blunder
TIMELY REQUEST OF DRIVERLESS TRANSPORT VEHICLES IN A MODULAR ASSEMBLY SYSTEM, Verena Blunder
WATER RIPPLES EFFECT IN 3D WITH ENCLOSED FRONT GRILL, Verena Blunder
ANY POSITIONING POSSIBILITY FOR HOLES, BREAKTHROUGHS, PINS, BRACKETS AND HOLDERS THROUGH THE USE OF TWO ECCENTRIC DISCS, Verena Blunder
The Use of Discontiguous Interposers to Stack Multiple Printed Circuit Boards, Reza Ghajar and Vijay L. Asrani
Low Power State To Avoid Battery Damage Due To Excessive Drain, Daisuke Nojiri
Adapter With Power Allocable Among Multiple Output Ports, Chao Fei, Honggang Sheng, Doug Osterhout, and Srikanth Lakshmikanthan
Adaptive Biasing Of Radio-Frequency Power Amplifiers, Ming Sun, Fei He, and Mike Kincaid
SWITCH STRATEGY FOR SMART UTILITY NETWORK ORTHOGONAL FREQUENCY-DIVISION MULTIPLEXING PHY BASED ON REINFORCEMENT LEARNING IN LOW-POWER AND LOSSY NETWORKS, Ling Wei, Wenjia Wu, Chuanwei Li, and Leo Yu
Adhesive System With Superior Drop And Creep Performance, Yiwen Wu and Xiaoping Qin
Warning Mobile Device Camera Users of Potential Dangers, N/A
DISTRIBUTED DESTINATION ADVERTISEMENT OBJECT (DAO) PROJECTION FOR PEER-TO-PEER ROUTING IN LOW POWER AND LOSSY NETWORKS (LLNS), Huimin She, Pascal Thubert, Harbor Dong, and Li Zhao
DISTRIBUTED LEDGER ADDRESSING, Jeff Venable
SELF-ORGANIZING MESHES USING DISTRIBUTED LEDGER SYSTEMS, Jeff Venable, Greg Shepherd, Alok Nikhil, Ralf Rantzau, and Ijsbrand Wijnands
Providing Event Search Results In A Map, Akash Nanavati, Andrew Levine, Aniket Ray, I-Kuei Chen, Andrew Duchi, and Bharat Kalyanpur
Apparel Information Sharing And Discovery Tool, Sandro Feuz and Miglė Padegimaitė
Intelligent Signal Collection for Detection of Automated Interactive Session, Anonymous
ADAPTIVE BANDWIDTH USAGE IN SDWAN, Uni Chen, Alan Xiao-Rong Wang, Jingxia Xia, and Jiaoming Li
Counting Video Ad Opportunities Using The Durations Of Ads And Ad Breaks, Matt Ross and Zhen Guo
Providing Targeted Event Recommendations, Henry Scott-Green and Devvret Rishi
Utilizing a Set of Processed First Frames for Expediting the Settling of Image-Processing Settings, Ruiduo Yang and YiChang Shih
Measuring Stereo Camera Alignment Using Depth Map Smoothness, Edward T. Chang
Face Recognition for Fast Information Retrieval and Record Lookup, Joseph Edwin Johnson Jr., Rafael Blanes, Daniel Sheng, and Arjun Narayanan
Camera Capture and Frame-Rate Synchronization in a Multi-Camera System, Chris Ye, Sam Chang, Donghui Han, Wen Yu Chien, and Zhijun He
Logical Camera Module for a Heterogeneous Camera System, Zhijun He, Donghui Han, Sam Chang, Colin Ko, Wen Yu Chien, and Michael Schoenberg
Hyperspectral Data Fusion for Multifactor Face-Based Authentication, Sean Korphi and Vincent Mei
mmWave Radar Return for Characterization of Burned Skin, Sean Korphi and Vincent Mei
Perceptual Correction of Touch Contact Locations, Philip Quinn
Automatic Display Brightness Control with Multiple Sensors, Jung Ook Hong, Yi Zhang, and Andrew Lehmer
Volume Control Based on a Determined Context, Alok Chandel and Kaycie Nakata
CPU based throttling for a multi-tenancy platform, Anonymous Anonymous
Secure Crowd-sourced Photography, Anonymous Anonymous
Switching of control inputs modes for a wearable display device, Anonymous Anonymous
Pre-Provisioning For Protected Content Playback In Closed Network Environments, Xiaohan Wang
SEAMLESS INTEGRATION BETWEEN ETHERNET VIRTUAL PRIVATE NETWORK FLEXIBLE CROSS-CONNECT AND LEGACY VIRTUAL PRIVATE WIRE SERVICE, Patrice Brissette, Luc Andre Burdet, and Riggs Goodman
DETECTING A VEHICLE CRASH USING A MOBILE COMPUTING DEVICE, Marc Stogaitis
METHOD TO INCREASE NAVIGATION LOCATION ACCURACY WITH A TARGET ENDPOINT, Jonathan Hurwitz
MECHANISMS TO ADDRESS PERSONAL AREA NETWORK (PAN) CHANGE FAILURES, Yajun Xia, Feiliang Wang, Chuanwei Li, and Veselin Ganev
INTELLIGENT FLASH ASSIST, Verena Blunder
Public Land Mobile Network Selection During International Roaming, Stan Lin, Taylor Lo, Rukun Mao, Terry Chiu, Lynn Lu, and Shivank Nayak
OPTIMIZATION OF LONG RANGE WIDE AREA NETWORK DEVICE SPREADING FACTORS BASED ON PREDICTED LOCATION, Stephan Friedl and Norbert Heusser
SONG SENTIMENT RECOGNITION BASED ON IMPLICIT USER FEEDBACK, Joseph Edwin Johnson Jr., Shiblee Hasan, and Chris Hluchan
Classifying and Separating Messages, Alerts, and Notifications, Yameng Lee Thorp and Hideaki Matsui