Follow

Article

PDF

Implementing Transmitter Current Limit During Wireless Charging, Liang Jia and Nagesh Polu

PDF

Radio Interference Resistant Determination of a Geolocation Using a Multi-Frequency Global Navigation Satellite System Receiver, Jing Liang and Nicholas M. McDonnell

PDF

NESTED BIT INDEX EXPLICIT REPLICATION HEADER BASED SCALABLE SEAMLESS BIDIRECTIONAL FORWARDING DETECTION MULTIPOINT PATH VALIDATION VIA CONTROLLED RESPONDERS, Nagendra Kumar Nainar, Carlos M. Pignataro, Reshad Rahman, and Ijsbrand Wijnands

PDF

Storing non-overlapped data streams in solid-state drives, Bin Tan, Narges Shahidi, and Manuel Benitez

PDF

LIFT SCREW FIXTURE FOR BOARD TO BOARD MODULE, HP INC

PDF

TOUCH PAD EMBEDDED IN HMD DEVICE, HP INC

PDF

SLIM ODD, HP INC

PDF

ELECTRICAL FAN DUCT, AIR BAFFLE POSITIONING DETECTION, HP INC

PDF

FLEXIBLE EMBEDDED TOUCH PANEL SUPPORT VIA PANEL'S EDID, HP INC

PDF

RANDOM FORESTS BASED ON DYNAMIC NETWORK PARAMETERS IN LOW POWER AND LOSSY NETWORKS, Li Zhao, Chuanwei Li, Lele Zhang, and Yinfang Wang

PDF

Automated store planogram generation and maintenance, Samrat Saha

PDF

Extending video games by using machine learning, Leon Nicholls

PDF

Live migration of cloud clients that have PCIe devices, Benjamin Serebrin, Grigory Makarevich, and Eric Northup

PDF

Multi-Input 3D Photos, Anonymous Anonymous

PDF

GROUPING NARROWBAND INTERNET OF THINGS END POINTS WITH CONTROL PACKETS BASED ON MULTICAST PACKET DELIVERY FUNCTIONALITY FROM ENODEB, Akram Sheriff, Santosh Patil, Jerome Henry, and John Graybeal

PDF

3D PRINTED PRIMER LATCH, HP INC

PDF

TELEPHONE NUMBER ANTI-SPOOFING SYSTEM, Jian Yao and Dimitris Dimitropoulos

PDF

Mitigating Malicious Firmware by Detecting the Removal of a Storage Device, Vadim Sukhomlinov, Andrey Pronin, and Randall Spangler

PDF

PRIVILEGE SPACES FOR SECURE COMMUNICATIONS, Kevin Brune and Eugene Shteyn

PDF

Button Lockout, Anonymous Anonymous

PDF

DETERMINATION AND OPTIMIZATION OF THE TRAFFIC FOOTPRINT, Verena Schwaiger

PDF

DISPLAY OF FOREIGN TURNING INTENTIONS, Verena Schwaiger

PDF

TWO-PIECE CONDUCTIVE BRUSHES FOR DRIVERLESS TRANSPORT SYSTEMS, Verena Schwaiger

PDF

EVENING RUSH HOUR TRAFFIC ASSISTANT, Verena Schwaiger

PDF

FAST, NON-ELECTRICAL MALFUNCTION DETECTION WITHIN POWER ELECTRONIC CONTROL UNITS BY OPTICAL, FREQUENCY, TEMPERATURE AND GAS SENSORS, Verena Schwaiger

PDF

OPERATING CONCEPT FOR AUGMENTED REALITY APPLICATIONS, Verena Schwaiger

PDF

THERMO ACOUSTIC ENCLOSURE FOR ELECTRIFIED VEHICLE DRIVES, Verena Schwaiger

PDF

DYNAMIC TRANSMISSION CONTROL FOR IMPROVING MOBILE DATA USAGE, Tim Lin and Aaron Lee

PDF

AUTOMATED SYSTEM TO ENFORCE ENTERPRISE DEFINED SERVICE LEVEL AGREEMENTS IN A 5G SYSTEM, Indermeet Gandhi, Robert Barton, and Jerome Henry

PDF

Virtual devices as a service, Tracy Wang and Rim Yazigi

PDF

Smart Speech Composition for Augmentative and Alternative Communication Using a Machine-Learned Model, Phil Weaver

PDF

REVERTING ACCIDENTAL KEY TAPS USING CONTEXTUAL BANDITS, Victor Carbune and Alexandru Damian

PDF

DETECTING GESTURES UTILIZING MOTION SENSOR DATA AND MACHINE LEARNING, Michael Xuelin Huang and Shumin Zhai

PDF

PRINT HEAD CONNECTOR PROTECTION TOOL, HP INC

PDF

THE USE OF A HONEYCOMB TO ELIMINATE THE IMPACT OF BACK REFLECTION, HP INC

PDF

HANDLING MULTIPLE PROFILE RESOURCES IN OPEN MATERIALS, HP INC

PDF

SUPPORTING DYNAMIC NETWORK SLICING AND POLICY CREATION FOR END DEVICES IN PRIVATE 5G NETWORKS, Rajesh I. V, Ram Mohan R, Prashanth Patil, Prathap B, and Palanivel Murugan M

PDF

Generating a digest memorable highlights from unstructured messaging conversation, Joseph Edwin Johnson Jr.

PDF

Dynamic adjustment of audio playback speed, Jonathan Heinberg

PDF

Optimal block size determination for application of a transform for file compression, Hui Su

PDF

Using Unlock Codes Associated with a User Profile to Access Applications, Saptarshi Bhattacharya and Shree Madhavapeddi

PDF

PREDICTING FUTURE GLANCE BEHAVIOR FROM GAZE PATTERN HISTORY, Michael Keller

PDF

VEHICLE-TO-EVERYTHING THREAT PROTECTION USING SECURITY INTELLIGENCE ENGINE AND MULTI-ACCESS EDGE COMPUTING, Amitesh Shukla, Manish Jhanji, Satish Kumar Mandavilly, and Rakesh Mishra

PDF

Advertising based on usage characterization of household appliances, Ashish Duggal

PDF

ECONOMY BASED BACKUP MODE TRIGGER, HP INC

PDF

REMOVABLE AUGER FOR 3D PRINTING TO ALLOW A DEEP CLEAN FOR CHANGING THE PRINTING MATERIAL, HP INC

PDF

MULTI-LEVEL HEXAGONAL PATTERNS AS AN OPTIMAL MARKING TECHNIQUES FOR ADDITIVE MANUFACTURING, HP INC

PDF

METHOD AND TOOL FOR SELF-ASSESSMENT ON MATERIAL QUALITY, HP INC

PDF

ARCHIMEDES AUTO CLEANING SYSTEM, HP INC

PDF

PRINT MODE SWAP DUE TO ELECTRICAL FEEDING CONDITIONS, HP INC

PDF

AUTOMATIC POWDER DISCHARGE SYSTEM TO AVOID POWDER AGGLOMERATIONS WHILE LOADING, HP INC

PDF

BEARING COATING TO IMPROVE FATIGUE AND LATERAL FRETING OF A LINEAL GUIDED SYSTEM, REDUCE HERTZ PREASURES AND FRICTION, HP INC

PDF

Handling Overheating in a Wireless-Communication Device, Chih-Hsiang Wu

PDF

SYNCHRONIZATION OF A SLIDE PRESENTATION AND PRESENTATION VIDEO RECORDING, Ludovic Pierre, Kannan Javaprakasam, and David Fan

PDF

Improving device servicing process via standardized codes, Bharat Avasarala Ph.D

PDF

Crowdsourced Categorization of Environmental Noise Data by Wireless-Communication Devices, Tajinder Gadh, Marc Stogaitis, and Praveen Chandran

PDF

AUTO-ROTATE VIDEOS ONLY, Haroon Baig

PDF

DETECTING ATTRIBUTES OF USER INPUTS UTILIZING MOTION SENSOR DATA AND MACHINE LEARNING, Philip Quinn, Michael Xuelin Huang, and Shumin Zhai

PDF

VEHICLE-TO-EVERYTHING THREAT PROTECTION USING SECURITY INTELLIGENCE ENGINE AND MULTI-ACCESS EDGE COMPUTING, Amitesh Shukla, Manish Jhanji, Satish Mandavilly, and Rakesh Mishra

PDF

Using Sensors to Improve User Interaction with Application Notifications, Victor Carbune and Sandro Feuz

PDF

REBOOKING MEETING ROOM WHEN MEETING ROOM BECOMES UNAVAILABLE, Marin Georgiev, Stella Schieffer, Philipp Reichart, Holger Flier, Martin Tritschler, Mohamed Hassan, Markus Vill, Stephan Burkhardt, and André Meyer

Handling Overheating in a Wireless-Communication Device, Chih-Hsiang Wu

PDF

ENHANCING SLICE AWARENESS OF 5G RADIO ACCESS NETWORK USING SELF-ORGANIZING NETWORK, Sushanth C. K, Krishna Prasad Rao, and Vivek Sivadas

PDF

AUTOMATIC RESERVATION SYSTEM FOR SMART CARS, Kathan Shukla

PDF

VOICE UI FOR MULTIPLE AI AGENTS, HP INC

PDF

A WEBSOCKET INDEPENDENT REAL TIME VISUALIZATION OF HIGH FREQUENCY TELEMETRY DATA, HP INC

PDF

PROFILING TOOL FOR TEXTILE MEDIAS, HP INC

PDF

BLOCKOUT GENERATION FOR 5 LAYERS SANDWICH PRINTMODE, HP INC

PDF

SUBSTRATE WITH NON-NEGLIGIBLE THICKNESS LENGTH TRACKING ON HYBRID PRINTERS, HP INC

PDF

VISUAL REPRESENTATION OF AND INTERACTIONS WITH COMPUTING AND NETWORK EQUIPMENT IN A PHYSICAL SPACE, Ashutosh Malegaonkar and Kanwal Komail

PDF

VEHICLE-TO-EVERYTHING THREAT PROTECTION USING SECURITY INTELLIGENCE ENGINE AND MULTI-ACCESS EDGE COMPUTING, Manish Jhanji, Satish Kumar Mandavilly, Rakesh Mishra, and Amitesh Shukla

PDF

SECURE WIRELESS CLIENT ONBOARDING AND SEGMENTATION, Amine Choukir, Roberto Muccifora, Domenico Ficara, Vincent Cuissard, Antonio Trifilo, and Salvatore Valenza

PDF

Voice Service Availability Indication for Data Centric Networks on a Mixed-Use Wireless Device, Sooraj Sasindran and Shivank Nayak

PDF

Transforming Copied Text Based on Paste Destination, Matt Sharifi

PDF

TOWING DEVICE WITH LOADING DEVICE, Verena Schwaiger

PDF

Methods of Detecting and Mitigating Light Contamination in Active Stereo-Cameras, Michael Schoenberg and Charlie Wang

PDF

SELECTION OF SUITABLE MECHANISMS AND ASSOCIATED PARAMETERS FOR A NETWORK SLICE IN A 5G NETWORK USING MACHINE LEARNING APPROACHES, Mukesh Taneja and Sudhir Jain

PDF

DUAL LAYOUT FOR SUPPORTING X16 AND X32 VRAM ON THE SAME PCB BOARD, HP INC

PDF

Persona Profiles for Prioritization of Content Output, Victor Carbune and Pedro Gonnet

PDF

Seamless Role Switch Of Two True Wireless Earbuds Which Is Using Relay Solution, Shijing Xian and Eric MacIntosh

PDF

Goal-based automatic scheduling of joint activities, Adriana Moisil and Aayush Kumar

PDF

SYSTEM AND METHOD FOR EFFICIENT PROCESSING OF OXPd HIDREPORT EVENTS IN A MASSIVE CLOUD-SCALE DEPLOYMENT, HP INC

PDF

EMBEDDING OF PAYLOAD DATA, OVERT SECURITY FEATURES, AND PUBLIC KEY FEATURES INTO AN IMAGE TO LATER VALIDATE THE AUTHENTICITY OF THE IMAGE, HP INC

PDF

Machine learning techniques to automatically advance slides in a presentation, Archie Russell

PDF

Multiplayer games in online ads, Tuna Toksoz and Duke Dukellis

PDF

Continuous game spanning multiple ads with persistent scores, Tuna Toksoz and Duke Dukellis

PDF

Securing IAB SupplyChain objects, Gang Wang and Haskell Garon

PDF

User interface for adaptive and contextual presentation of tasks, Steffen Meschkat and Andrews-junior Kimbembe

PDF

Product package with low-profile paper loop hang tab, Mike Korinek, Roman Ley, and Rex Liang

PDF

User interface with preview of response suggestions, Leon Hong

PDF

METHOD FOR USING SERVO DATA TO ANTICIPATE COMPONENT FAILURE IN MECHANICAL DRIVE SYSTEMS, HP INC

PDF

AN ANTI-TAMPET METHOD TO PROTECT TPM BE HACKING, HP INC

PDF

Service-Oriented Mobile Network Tracking and Guiding, Jim Sun and Aaron Lee

PDF

SHARING CONVERSATION CONTEXT USING CALL TRANSCRIPTS IN REAL-TIME ACROSS TELEPHONY DEVICES, Vikas Vashisht

PDF

Determining the Relevancy of Permissions Requested by an Application Software, Victor Carbune and Sandro Feuz

PDF

Handling a User’s Preferences on Permissions Required by an Application Software, Victor Carbune and Sandro Feuz

PDF

Indoor positioning using WiFi or Bluetooth chirps and phased arrays, Tong Zhang

PDF

PROACTIVE METHOD FOR FASTER REFORMATION IN LOW-POWER AND LOSSY NETWORKS, Xiaopu Zhang, Zaochun Zhang, Caijun Jiang, and Dapeng Zhu

PDF

Device dock with built-in virtual assistant, Leon Hong

PDF

Secure Pairing and Identification of BLE Devices, Adam Rodriguez and David Lazarov