Article
Multifactor technique to bookmark and shop items from a screenshot, Diane Wang and Aiko Nakano
Robust ADHD testing by applying clustering techniques to survey responses or speech data, Lingyi Zhang and Cliff Chin Ngai Sze
Object recognition based contextual responses to user queries, Aiko Nakano
Dynamically generated and targeted augmented reality shopping campaigns, Aiko Nakano, Diane Wang, and Max Spear
Adjusting the rotation speed of a 3D object according to zoom level, Xavier Benavides Palos and Anshuman Kumar
Operational rules to manage power consumption for content display, Katie Leah Roberts-Hoffman and Gregory Granito
Approximating 3D poly mesh virtual objects with primitive shape colliders, Chloe Snyder, Alper Gungormusler, Andrew Allen, Aleksandr Ayvazov, and Dobromir Yordanov
Controlling the density of user-generated content in augmented reality, Austin McCasland, Elly Nattinger, and Seth Raphael
Network-connected Locker Kiosk for Device Delivery, Anonymous
Capture Camera Movement Compensation for Display of 3D Video in Virtual Reality, Anonymous
Voice interface for interaction with notifications, Victor Cărbune and Thomas Deselaers
Secure and user-friendly display of schedule in a meeting room, Alessandro Pelosi
Virtual Assistant Toy Block With Scanner And Display, N/A
Output-Dependent Access Control, Brett Krueger
Toy robot with customized virtual assistant personality, N/A
Virtual assistant user interface with customizable personality, N/A
Embedded tool for self-directed sales and onboarding, David Tigges
LOAD-BALANCING STRATEGY IN ROUTING PROTOCOL FOR LOW-POWER AND LOSSY NETWORKS BY EXPLOITING MULTIPLE PARENTS, Lele Zhang, Sam Gao, Chuanwei Li, and Xiang Fang
BEHAVIORAL ANALYTICS FOR FIREWALL POLICY RECOMMENDATION AND TUNING, Raghunath Kulkarni and Prapanch Ramamoorthy
SECURE INTERNET OF THINGS ONBOARDING USING PUBLIC KEY CRYPTOGRAPHY AND DIFFIE-HELLMAN INTEGRATED ENCRYPTION SCHEME, Niranjan M. M, Nagaraj Kenchaiah, Ramachandra Murthy, and Vijay Kothamasu
MEDIA ACCESS CONTROL SECURITY KEY DISTRIBUTION USING BLOCKCHAIN AND PUBLIC KEY CRYPTOGRAPHY, Niranjan M. M, Nagaraj Kenchaiah, and Vijay Kothamasu
Content provisioning based on aesthetic qualities, Eugenio J. Marchiori, Abhijit Chandgadkar, and Rick Earnshaw
Press-fit hinge and magnesium alloy enclosure for laptop cover attachment, Molly McShane, Karabo Tshweneyagae, Eugene Fox, and Roger Hsu
MERCHANDISE SECURITY DEVICES FOR USE WITH ELECTRONIC KEY, InVue Security Products Inc.
SYSTEMS AND METHODS FOR PROTECTING RETAIL DISPLAY MERCHANDISE FROM THEFT, InVue Security Products Inc.
Providing Real-Time Captured Information Input to a Machine-Learned Model to Improve Query Services, Perumaal Shanmugam, Felipe Leme, and Julian Odell
Signal Quality-Based Buffering of Media Data Using an Intermediate Device, Jonathan Hurwitz
ROBO-CALLING PREVENTION WITH SOFTWARE-DEFINED NETWORKING IN A WIDE AREA NETWORK POLICY FOR UNIFIED COMMUNICATION, Balaji Sundararajan, Anand Oswal, Vivek Agarwal, Rong Wang, and Palak Desai
TUR AS AN INPUT DEVICE TO COMMUNICATE WITH THE PRINTER, HP INC
AUTOMATIC DOCUMENT SCAN FROM FLATBED, HP INC
AUTOMATIC MICRO-RECIRCULATION CALIBRATION, HP INC
POST ERROR INDICATION IN UEFI DRIVER MODEL DRIVERS, HP INC
NEW BOTTOM EMISSION OLED STRUCTURE TO ENHANCE OUT-COUPLING EFFICIENCY, HP INC
EFFECTIVE HEAT DISSIPATED PANEL STRESS ABSORBER ON Mg/Al ALLOY ENCLOSURE, HP INC
Automatic Detection of Video Properties for Playback in Virtual Reality, Anonymous
Page Navigation For Virtual Assistants Based On A Knowledge Graph, Thierry Coppey and Victor Carbune
Frame For Electronic Device Case, Nick Gillett and James Tanner
JAVA INSTRUMENTATION OPTIMIZATION TECHNIQUES, Ted Hulick
MEASURING AND VISUALIZING USER SENTIMENT CHANGES OVER MULTIPLE CHANNELS, Xinjun Zhang, Qihong Shao, Changyong Zhao, and Antonio Nucci
CUPHOLDER WITH INDIVIDUAL TEMPERATURE CONTROL, Verena Blunder
TIMELY REQUEST OF DRIVERLESS TRANSPORT VEHICLES IN A MODULAR ASSEMBLY SYSTEM, Verena Blunder
WATER RIPPLES EFFECT IN 3D WITH ENCLOSED FRONT GRILL, Verena Blunder
ANY POSITIONING POSSIBILITY FOR HOLES, BREAKTHROUGHS, PINS, BRACKETS AND HOLDERS THROUGH THE USE OF TWO ECCENTRIC DISCS, Verena Blunder
The Use of Discontiguous Interposers to Stack Multiple Printed Circuit Boards, Reza Ghajar and Vijay L. Asrani
Low Power State To Avoid Battery Damage Due To Excessive Drain, Daisuke Nojiri
Adapter With Power Allocable Among Multiple Output Ports, Chao Fei, Honggang Sheng, Doug Osterhout, and Srikanth Lakshmikanthan
Adaptive Biasing Of Radio-Frequency Power Amplifiers, Ming Sun, Fei He, and Mike Kincaid
SWITCH STRATEGY FOR SMART UTILITY NETWORK ORTHOGONAL FREQUENCY-DIVISION MULTIPLEXING PHY BASED ON REINFORCEMENT LEARNING IN LOW-POWER AND LOSSY NETWORKS, Ling Wei, Wenjia Wu, Chuanwei Li, and Leo Yu
Adhesive System With Superior Drop And Creep Performance, Yiwen Wu and Xiaoping Qin
Warning Mobile Device Camera Users of Potential Dangers, N/A
DISTRIBUTED DESTINATION ADVERTISEMENT OBJECT (DAO) PROJECTION FOR PEER-TO-PEER ROUTING IN LOW POWER AND LOSSY NETWORKS (LLNS), Huimin She, Pascal Thubert, Harbor Dong, and Li Zhao
DISTRIBUTED LEDGER ADDRESSING, Jeff Venable
SELF-ORGANIZING MESHES USING DISTRIBUTED LEDGER SYSTEMS, Jeff Venable, Greg Shepherd, Alok Nikhil, Ralf Rantzau, and Ijsbrand Wijnands
Providing Event Search Results In A Map, Akash Nanavati, Andrew Levine, Aniket Ray, I-Kuei Chen, Andrew Duchi, and Bharat Kalyanpur
Apparel Information Sharing And Discovery Tool, Sandro Feuz and Miglė Padegimaitė
Intelligent Signal Collection for Detection of Automated Interactive Session, Anonymous
ADAPTIVE BANDWIDTH USAGE IN SDWAN, Uni Chen, Alan Xiao-Rong Wang, Jingxia Xia, and Jiaoming Li
Counting Video Ad Opportunities Using The Durations Of Ads And Ad Breaks, Matt Ross and Zhen Guo
Providing Targeted Event Recommendations, Henry Scott-Green and Devvret Rishi
Utilizing a Set of Processed First Frames for Expediting the Settling of Image-Processing Settings, Ruiduo Yang and YiChang Shih
Measuring Stereo Camera Alignment Using Depth Map Smoothness, Edward T. Chang
Face Recognition for Fast Information Retrieval and Record Lookup, Joseph Edwin Johnson Jr., Rafael Blanes, Daniel Sheng, and Arjun Narayanan
Camera Capture and Frame-Rate Synchronization in a Multi-Camera System, Chris Ye, Sam Chang, Donghui Han, Wen Yu Chien, and Zhijun He
Logical Camera Module for a Heterogeneous Camera System, Zhijun He, Donghui Han, Sam Chang, Colin Ko, Wen Yu Chien, and Michael Schoenberg
Hyperspectral Data Fusion for Multifactor Face-Based Authentication, Sean Korphi and Vincent Mei
mmWave Radar Return for Characterization of Burned Skin, Sean Korphi and Vincent Mei
Perceptual Correction of Touch Contact Locations, Philip Quinn
Automatic Display Brightness Control with Multiple Sensors, Jung Ook Hong, Yi Zhang, and Andrew Lehmer
Volume Control Based on a Determined Context, Alok Chandel and Kaycie Nakata
CPU based throttling for a multi-tenancy platform, Anonymous Anonymous
Secure Crowd-sourced Photography, Anonymous Anonymous
Switching of control inputs modes for a wearable display device, Anonymous Anonymous
Pre-Provisioning For Protected Content Playback In Closed Network Environments, Xiaohan Wang
SEAMLESS INTEGRATION BETWEEN ETHERNET VIRTUAL PRIVATE NETWORK FLEXIBLE CROSS-CONNECT AND LEGACY VIRTUAL PRIVATE WIRE SERVICE, Patrice Brissette, Luc Andre Burdet, and Riggs Goodman
DETECTING A VEHICLE CRASH USING A MOBILE COMPUTING DEVICE, Marc Stogaitis
METHOD TO INCREASE NAVIGATION LOCATION ACCURACY WITH A TARGET ENDPOINT, Jonathan Hurwitz
MECHANISMS TO ADDRESS PERSONAL AREA NETWORK (PAN) CHANGE FAILURES, Yajun Xia, Feiliang Wang, Chuanwei Li, and Veselin Ganev
INTELLIGENT FLASH ASSIST, Verena Blunder
Public Land Mobile Network Selection During International Roaming, Stan Lin, Taylor Lo, Rukun Mao, Terry Chiu, Lynn Lu, and Shivank Nayak
OPTIMIZATION OF LONG RANGE WIDE AREA NETWORK DEVICE SPREADING FACTORS BASED ON PREDICTED LOCATION, Stephan Friedl and Norbert Heusser
SONG SENTIMENT RECOGNITION BASED ON IMPLICIT USER FEEDBACK, Joseph Edwin Johnson Jr., Shiblee Hasan, and Chris Hluchan
Classifying and Separating Messages, Alerts, and Notifications, Yameng Lee Thorp and Hideaki Matsui
INTELLIGENT MEDIA CREATION UTILIZING PASSIVE SONG DETECTION, Kody Ferguson
RE-SYNCHRONIZATION OF BATTERY-POWERED EDGE DEVICES IN CHANNEL HOPPING LOW POWER AND LOSSY NETWORKS, Zaochun Zhang, Rui Huang, Xiao Xu, and Xiaopu Zhang
SYSTEMS AND METHODS TO OPTIMIZE THE SIGNALING BETWEEN UPF AND SMF DURING HANDOFF AND EPS-INTERNETWORKING, Ajay Singh Meena, Navneet Priya, and Raghunadha Reddy
Emulating in-cluster networking in an external workstation, Jimmy Cao
Surveys to assess developer perceptions of code complexity, Jason Wilkinson, Jeffrey Warshaw, Elizabeth Kammer, Edward Smith, Ciera Jaspan, Collin Green, and Yvette Nameth
A NOVEL TECHNIQUE TO ENHANCE POWER OUTAGE NOTIFICATION (PON) SUCCESS RATE UNDER A NESTED OUTAGE, Wenjia Wu, Feiliang Wang, Huimin She, and Li Zhao
Automatic grammar enhancement for virtual assistant, Tao Feng and Hongjie Chai
AN IMPROVED ROUTING METRICS ALGORITHM FOR WIRELESS MESH NETWORK USING PAGE RANK THEORY AND LINEAR REGRESSION, Lele Zhang, Pascal Thubert, Chuanwei Li, and Li Zhao
Automatic Alerts Based On Departure From Routine, Lingyi Zhang and Cliff Chin Ngai Sze
TELEPROMPTING SERVICE FOR VIRTUAL MEETING APPLICATIONS, Eric Bellamy
INTELLIGENT TELEPROMPTING SYSTEM FOR DELIVERING PRESENTATIONS, Sandro Feuz and Thomas Deselaers
Measuring The Effectiveness Of Retail Endcaps Using IoT Sensors And Machine Learning, Samrat Saha, Matthew Delacey, Rob Vogelbacher, Logan Vadivelu, and Tom Peterson
Simultaneous Display Of User Interface Text Elements In Multiple Languages, Steffen Meschkat
Predicting The Impact Of Maintenance Work On Networks, N/A
Multilingual User Interface For Collaborative Software, Steffen Meschkat
OVERRIDING DETERMINISTIC FLOWS, Pascal Thubert, Patrick Wetterwald, and Eric Levy-Abegnoli
METADATA DRIVEN USER INTERFACE GENERATOR BASED ON DEVICE TYPE, Jasvinder Bhasin and Ganesha Shankara Bhat