Article
INVISIBLE DISPLAY MODE, HP INC
AUDIO STREAM BLENDING IN MULTI INPUT STREAM HEADSETS, HP INC
INK FLOW CHANNEL ON CAP LIPTO RESOLVE PEN HEALTH ISSUES, HP INC
REAL TIME DISPLAY STABILIZATION, HP INC
Dynamic adjustment of hotword detection threshold, Tanmay Wadhwa and Neil Dhillon
Leveraging app relationships and distribution patterns to identify malicious software, Florian Tramer, Mo Yu, and Sai Deep Tetali
AN ADOPTIVE AND RESILIENT SEGMENT ROUTING VERSION 6 POLICY TO ADDRESS TIGHT SERVICE LEVEL AGREEMENT REQUIREMENTS IN 5G NETWORKS, Clarence Filsfils, Pablo Camarillo, Francois Clad, and Zafar Ali
Stable auto focus re-triggering with hand shake motion compensation, Ruiduo Yang
Parallelizing tests with pessimistic speculative execution, Tavis Ormandy
Browser with smart scrolling based on user context, Matthew Sharifi
Speeding up web page content updates using server-side page versioning, Alessio Centazzo
Automatic problem detection during audio or video call, Dhruv Bakshi and Jakob Foerster
ADJUSTING NETWORK PARAMETERS DYNAMICALLY TO ACCELERATE MESH NETWORK CONVERGENCE, Yinfang Wang, Jim Lu, Chuanwei Li, and Yajun Xia
BEHAVIORAL RANDOM NUMBER GENERATOR IN CRYPTOGRAPHY, David Maluf, Raghuram Sudhaakar, and Pradeep Kathail
Symmetric Ear-Related Ambisonics Rendering, Alper Güngörmüsler and Andrew Allen
Attribution to ad campaigns of user interaction with product demo units, Peter Lewis
Automatic context determination for answering user queries, Ruxandra Davies and Scott Davies
Click-to-call conversion measurement based on transcribing conversation, Alex Jacobson
Countering phishing attacks by automated responses, Brian Shucker and Brian Brewington
Automatic translation in voice calls, Sooraj Sasindran and Naveen Kalla
Automatic removal of unwanted objects from images, Daniel Citron and Lachlan (Locke) Dunn
COMBINING DOMAIN KEYWORDS INTO AUTOMATIC DOCUMENT CLASSIFICATION BY DEEP NEURAL NETWORK, Qian Diao, Abhijit Talathi, Sarah Kuppert, Robert Frost, and Adam Mattern
Thermal Downlink Throttle UE Specific Approach, Blake Kragten, Shivank Nayak, and Siddharth Ray
In-page search over text and images in a web page, Matthew Sharifi
User authentication via lip reading, Horacio Hernan Moraldo
AUTO-RECOVERY OF MICRO-SERVICES IN A LARGE DISTRIBUTED APPLIANCE MODEL, Kshitij Tanay, Raghu Rajendra Arur, and Taj Uddin
VIRTUALIZED INTELLIGENT HONEYPOT AGENT, Plamen Nedeltchev, Mani Kesavan, Hugo Latapie, and Enzo Fenoglio
Visual approach for secure transfer of user credentials, Patrick Georgi
OPTIMIZATION OF CLOUD PLATFORMS, Johnson Manuel-Devadoss, David Stanford, Billie Ansell, Sunil John, Luis Bravo, Miguel Figueroa, and Larone Gardner
INTELLIGENT EDITING ASSISTANT, Emmanuel Arriaga
VERIFIABLY SECURE SESSION INITIATION PROTOCOL REQUESTS, Mark Barrasso
Screen brightness adjustment using machine learning, Sandro Feuz and Thomas Deselaers
RADIOFREQUENCY TRENDS AWARE DYNAMIC BANDWIDTH SELECTION, Santosh Kulkarni, Vishal Desai, Young II Choi, and Pooya Monajemi
Enhanced call quality using user-specific voiceprint model, ChiLin Kuo, HsinHu Wang, SSU-TING TSAI, and Chin-Kuo Huang
A Homotopy Method of Path Analysis for the Purpose of Computing, Lei Liu
Better unpacking binary files using contextual information, Armijn Hemel
Matching Entities On Multiple Platforms Using Graph Bijections, Long Nguyen and Zachary Frazier
Identifying Abusive Videos Inserted In A Video, Filip Pavetic and Roman Vorushin
Design of neural networks based on cost estimation, Yair Movshovitz-Attias, Andrew Poon, Ariel Gordon, and Elad Edwin Tzvi Eban
ZERO-TOUCH BOOTSTRAP OF A NETWORK CONNECTED DEVICE, Owen Friel, Eliot Lear, Jerome Henry, and Stephen Orr
3D Face Messaging On A Watch, Vinay Venkataraman and Eric Caplain
SOFTWARE FOR GUIDED CHASSIS ADJUSTMENT, Verena Schwaiger
SHELF LABEL FLAG, Verena Schwaiger
NATURAL HMI FOR EFFICIENT DRIVING THROUGH PLANTS IN THE CAR, Verena Schwaiger
METHOD AND SYSTEM FOR COMPENSATING YAW RATE CHANGE BY LOAD CHANGE BEFORE OR DURING CORNERING, Verena Schwaiger
EXTENSION OF THE CURRENT FLOW DIAGNOSIS OF THE DC-CHARGING INTERFACE, Verena Schwaiger
CYCLONE SEPARATORS FOR SCREW SYSTEMS, Verena Schwaiger
BIDIRECTIONAL DC WALLBOX WITH DC-BUS INTERFACE AND INTEGRATED BIDIRECTIONAL ENERGY METER, Verena Schwaiger
Detecting the direction of ambient light using an array of photodiodes, Yi Zhang, Seobin Jung, and Kuan-Lin Chen
ENABLING INSTANTANEOUS SWITCH FROM DEFAULT MULTICAST DISTRIBUTION TREE TO DATA MULTICAST DISTRIBUTION TREE FOR MOBILITY AND MULTIHOMING IN ETHERNET VIRTUAL PRIVATE NETWORK TENANT ROUTED MULTICAST, Raunak Banthia, Manoj Pandey, Kesavan Thiruvenkatasamy, Saif Mohammed, and Vikas Ramesh Kamath
A Virtual Call Assistant, Anonymous
Intelligent wireless network selection, Jiwoong Lee
Mode selection for augmented reality application to control access to real-world data, Klaus Weidner
Smart equipment kiosk, Justin Von Kennel
Voice interface responses based on prior user interactions, Minkoo Seo, Brian Spilsbury, Gadi Ben Amram, Joo Hyung Lee, Togan Gencoglu, and Youngchan Park
IDENTIFYING NETWORK FAULTS IN DATA CENTERS USING A COVARIANCE MATRIX, Raghu Rajendra Arur, Nicholas Basker, and Hasmit Grover
Recognizing a natural language or language class in source code files, Armijn Hemel
Using build identifiers to fingerprint ELF binaries and link to build information without having access to source code, Armijn Hemel
PCA (Printed Circuit Assembly) and Electronic Devices Cleaning Station, Joel J. Castillo
Automatic dating of videos based on matching photos, Rainer Vincent Mager
NOTIFICATION OUTPUT VIA WATCH BEZEL, Aleksandr Rozman
Controlling access by tagging data, Juan Vasquez and Jesper Johansson
Detection of counterfeit silicon, Miguel Osorio Lozano and Sean Keys
Challenge keyword generation for voice-based authentication, Shuyang Chen and Nicholas Felker
ADVISING USERS IN A MEETING WHAT WAS LAST SAID BEFORE A CALL DROP, Jonathan Rosenberg
SERVICE LAYER DEPENDENCY MAPPING BASED HEATMAP FOR FAULT ISOLATION, Carlos M. Pignataro, Nagendra Kumar Nainar, and Alejandro Eguiarte
Determining region-of-interest based on motion patterns, Ruiduo Yang
Image recognition for consumer shopping applications, Jibing Wang, Erik Stauffer, and Aamir Akram
INTELLIGENT PRESENTATION SLIDE ASSISTANT, Sammy El Ghazzal and Sandro Feuz
Process of Improving Software Engineering Predictability with Business Benefits, Ravi Saxena and Atul Deshpande
Automatic extraction and provision of coupon codes for online shopping, Matthew Sharifi
Transmit power setting based on dynamic SAR, Qi Jiang, Paul Husted, Srenik Mehta, and Nihar Jindal
Turning off or dimming a device screen based on user attention, Vidhya Navalpakkam, Tomer Shekel, and Dmitry Lagun
Verified revenue sharing between distributor OEM and app developers, John Dukellis
Smart auto-deactivation of device airplane mode, Gregory B. Roth
PCIe Riser Extension Assembly, Rick Salmonson, Troy Oxby, Larry Briski, Robert Normand, Russell Stacy, and Jeffrey Glanzman
Internet of Things Construction Monitors, Thomas A. Stern
CONNECTIVITY ASSESSMENT SURVEY FOR TECHNOLOGY EMERGENCY RESPONSE (CASTER), Rakesh Bharania, Chandler Johnson, and Dustin Li
A Novel Approach to Measure Code Coverage for a Typical OS Deployment Tool, Debdipta Ghosh
Item recommendations for cache and synchronization of application stores, Wei Chai, Zhiwei Gu, Sundeep Sancheti, and Yilan Liu
App distribution via affiliate marketing on social media, Sissie Hsiao, Tuna Toksoz, and John Dukellis
Embedded Ready To Use Hybrid Mesh Network For IoT Applications, Jérôme ELLEOUET and Emmanuel HELBERT
Web-based currency for online content and transactions, Kentaro Hara
Direct I/O solution for Containerized HPUX, Maheshwara Aithal, Dinesh Thanumoorthy, and Harish K
Fast & Scalable I/O for Emulated HPUX, Maheshwara Aithal, Dinesh Thanumoorthy, and Ranjith VK
A novel encoding & alignment of Histograms of referential integrity columns for scalable data generation, Suresh Soundararajan
New GPU Standard PCIe Card Holder Design, Tim Ko
Mounting Methods for JEDEC Standard Energy Cell, John Norton and David Thomas Byargeon
Lock Mechanism Design, Michelle Chen
Reducing Memory Footprint for In-Memory Root Filesystem (TMPFS), Erik Jacobson, Paul Schliep, and Christopher Holmes
VOICE OVER LONG TERM EVOLUTION SERVICE QUALITY MEASUREMENTS AND DIAGNOSTICS USING MACHINE LEARNING TECHNIQUES, Sri Gundavelli, Dhananjay Patki, Vimal Srivastava, and Amarnath Reddy Nagireddy
USING DEVICE MOVEMENT FOR MULTI-FACTOR COMPUTING DEVICE AUTHENTICATION, Isaac Andres
TECHNIQUES FOR EFFICIENT AND CONSISTENT HASHING WITH OPTIMAL FAIRNESS FOR FLOW DISTRIBUTION AND LOAD-BALANCING, Pierre Pfister, Mark Townsley, Yoann Desmouceaux, and Aloys Augustin
REAL-TIME NETWORK EVENT CORRELATION BASED ON DEPENDENCY GRAPH FOR NETWORK ISSUE ROOT CAUSING, Alok Kumar Sinha, Zach Cherian, and Kaushik Dam
NON-ORTHOGONAL MULTIPLE ACCESS FOR COLLISION AVOIDANCE IN LOW-POWER AND LOSSY NETWORKS, Ling Wei, Huimin She, Chuanwei Li, and Lele Zhang
Battery charge level based on power source availability, Thierry Strudel
Heat removal from high temperature hardware while shielding electromagnetic interference, Yao Xue and Eugene Fox
HEURISTIC ALGORITHM FOR SPANNING TREE PROTOCOL ROOT BRIDGE DETERMINATION, Michael Michaelides and Arabinda Samantaray
PROXY MONITORING OF SESSION STATE FOR SHARED FATE ENTITIES, Stefan Olofsson and Khalid Raza