Article
Click-to-call conversion measurement based on transcribing conversation, Alex Jacobson
Countering phishing attacks by automated responses, Brian Shucker and Brian Brewington
Automatic translation in voice calls, Sooraj Sasindran and Naveen Kalla
Automatic removal of unwanted objects from images, Daniel Citron and Lachlan (Locke) Dunn
COMBINING DOMAIN KEYWORDS INTO AUTOMATIC DOCUMENT CLASSIFICATION BY DEEP NEURAL NETWORK, Qian Diao, Abhijit Talathi, Sarah Kuppert, Robert Frost, and Adam Mattern
Thermal Downlink Throttle UE Specific Approach, Blake Kragten, Shivank Nayak, and Siddharth Ray
In-page search over text and images in a web page, Matthew Sharifi
User authentication via lip reading, Horacio Hernan Moraldo
AUTO-RECOVERY OF MICRO-SERVICES IN A LARGE DISTRIBUTED APPLIANCE MODEL, Kshitij Tanay, Raghu Rajendra Arur, and Taj Uddin
VIRTUALIZED INTELLIGENT HONEYPOT AGENT, Plamen Nedeltchev, Mani Kesavan, Hugo Latapie, and Enzo Fenoglio
Visual approach for secure transfer of user credentials, Patrick Georgi
OPTIMIZATION OF CLOUD PLATFORMS, Johnson Manuel-Devadoss, David Stanford, Billie Ansell, Sunil John, Luis Bravo, Miguel Figueroa, and Larone Gardner
INTELLIGENT EDITING ASSISTANT, Emmanuel Arriaga
VERIFIABLY SECURE SESSION INITIATION PROTOCOL REQUESTS, Mark Barrasso
Screen brightness adjustment using machine learning, Sandro Feuz and Thomas Deselaers
RADIOFREQUENCY TRENDS AWARE DYNAMIC BANDWIDTH SELECTION, Santosh Kulkarni, Vishal Desai, Young II Choi, and Pooya Monajemi
Enhanced call quality using user-specific voiceprint model, ChiLin Kuo, HsinHu Wang, SSU-TING TSAI, and Chin-Kuo Huang
A Homotopy Method of Path Analysis for the Purpose of Computing, Lei Liu
Better unpacking binary files using contextual information, Armijn Hemel
Matching Entities On Multiple Platforms Using Graph Bijections, Long Nguyen and Zachary Frazier
Identifying Abusive Videos Inserted In A Video, Filip Pavetic and Roman Vorushin
Design of neural networks based on cost estimation, Yair Movshovitz-Attias, Andrew Poon, Ariel Gordon, and Elad Edwin Tzvi Eban
ZERO-TOUCH BOOTSTRAP OF A NETWORK CONNECTED DEVICE, Owen Friel, Eliot Lear, Jerome Henry, and Stephen Orr
3D Face Messaging On A Watch, Vinay Venkataraman and Eric Caplain
SOFTWARE FOR GUIDED CHASSIS ADJUSTMENT, Verena Schwaiger
SHELF LABEL FLAG, Verena Schwaiger
NATURAL HMI FOR EFFICIENT DRIVING THROUGH PLANTS IN THE CAR, Verena Schwaiger
METHOD AND SYSTEM FOR COMPENSATING YAW RATE CHANGE BY LOAD CHANGE BEFORE OR DURING CORNERING, Verena Schwaiger
EXTENSION OF THE CURRENT FLOW DIAGNOSIS OF THE DC-CHARGING INTERFACE, Verena Schwaiger
CYCLONE SEPARATORS FOR SCREW SYSTEMS, Verena Schwaiger
BIDIRECTIONAL DC WALLBOX WITH DC-BUS INTERFACE AND INTEGRATED BIDIRECTIONAL ENERGY METER, Verena Schwaiger
Detecting the direction of ambient light using an array of photodiodes, Yi Zhang, Seobin Jung, and Kuan-Lin Chen
ENABLING INSTANTANEOUS SWITCH FROM DEFAULT MULTICAST DISTRIBUTION TREE TO DATA MULTICAST DISTRIBUTION TREE FOR MOBILITY AND MULTIHOMING IN ETHERNET VIRTUAL PRIVATE NETWORK TENANT ROUTED MULTICAST, Raunak Banthia, Manoj Pandey, Kesavan Thiruvenkatasamy, Saif Mohammed, and Vikas Ramesh Kamath
A Virtual Call Assistant, Anonymous
Intelligent wireless network selection, Jiwoong Lee
Mode selection for augmented reality application to control access to real-world data, Klaus Weidner
Smart equipment kiosk, Justin Von Kennel
Voice interface responses based on prior user interactions, Minkoo Seo, Brian Spilsbury, Gadi Ben Amram, Joo Hyung Lee, Togan Gencoglu, and Youngchan Park
IDENTIFYING NETWORK FAULTS IN DATA CENTERS USING A COVARIANCE MATRIX, Raghu Rajendra Arur, Nicholas Basker, and Hasmit Grover
Recognizing a natural language or language class in source code files, Armijn Hemel
Using build identifiers to fingerprint ELF binaries and link to build information without having access to source code, Armijn Hemel
PCA (Printed Circuit Assembly) and Electronic Devices Cleaning Station, Joel J. Castillo
Automatic dating of videos based on matching photos, Rainer Vincent Mager
NOTIFICATION OUTPUT VIA WATCH BEZEL, Aleksandr Rozman
Controlling access by tagging data, Juan Vasquez and Jesper Johansson
Detection of counterfeit silicon, Miguel Osorio Lozano and Sean Keys
Challenge keyword generation for voice-based authentication, Shuyang Chen and Nicholas Felker
ADVISING USERS IN A MEETING WHAT WAS LAST SAID BEFORE A CALL DROP, Jonathan Rosenberg
SERVICE LAYER DEPENDENCY MAPPING BASED HEATMAP FOR FAULT ISOLATION, Carlos M. Pignataro, Nagendra Kumar Nainar, and Alejandro Eguiarte
Determining region-of-interest based on motion patterns, Ruiduo Yang
Image recognition for consumer shopping applications, Jibing Wang, Erik Stauffer, and Aamir Akram
INTELLIGENT PRESENTATION SLIDE ASSISTANT, Sammy El Ghazzal and Sandro Feuz
Process of Improving Software Engineering Predictability with Business Benefits, Ravi Saxena and Atul Deshpande
Automatic extraction and provision of coupon codes for online shopping, Matthew Sharifi
Transmit power setting based on dynamic SAR, Qi Jiang, Paul Husted, Srenik Mehta, and Nihar Jindal
Turning off or dimming a device screen based on user attention, Vidhya Navalpakkam, Tomer Shekel, and Dmitry Lagun
Verified revenue sharing between distributor OEM and app developers, John Dukellis
Smart auto-deactivation of device airplane mode, Gregory B. Roth
PCIe Riser Extension Assembly, Rick Salmonson, Troy Oxby, Larry Briski, Robert Normand, Russell Stacy, and Jeffrey Glanzman
Internet of Things Construction Monitors, Thomas A. Stern
CONNECTIVITY ASSESSMENT SURVEY FOR TECHNOLOGY EMERGENCY RESPONSE (CASTER), Rakesh Bharania, Chandler Johnson, and Dustin Li
A Novel Approach to Measure Code Coverage for a Typical OS Deployment Tool, Debdipta Ghosh
Item recommendations for cache and synchronization of application stores, Wei Chai, Zhiwei Gu, Sundeep Sancheti, and Yilan Liu
App distribution via affiliate marketing on social media, Sissie Hsiao, Tuna Toksoz, and John Dukellis
Embedded Ready To Use Hybrid Mesh Network For IoT Applications, Jérôme ELLEOUET and Emmanuel HELBERT
Web-based currency for online content and transactions, Kentaro Hara
Direct I/O solution for Containerized HPUX, Maheshwara Aithal, Dinesh Thanumoorthy, and Harish K
Fast & Scalable I/O for Emulated HPUX, Maheshwara Aithal, Dinesh Thanumoorthy, and Ranjith VK
A novel encoding & alignment of Histograms of referential integrity columns for scalable data generation, Suresh Soundararajan
New GPU Standard PCIe Card Holder Design, Tim Ko
Mounting Methods for JEDEC Standard Energy Cell, John Norton and David Thomas Byargeon
Lock Mechanism Design, Michelle Chen
Reducing Memory Footprint for In-Memory Root Filesystem (TMPFS), Erik Jacobson, Paul Schliep, and Christopher Holmes
VOICE OVER LONG TERM EVOLUTION SERVICE QUALITY MEASUREMENTS AND DIAGNOSTICS USING MACHINE LEARNING TECHNIQUES, Sri Gundavelli, Dhananjay Patki, Vimal Srivastava, and Amarnath Reddy Nagireddy
USING DEVICE MOVEMENT FOR MULTI-FACTOR COMPUTING DEVICE AUTHENTICATION, Isaac Andres
TECHNIQUES FOR EFFICIENT AND CONSISTENT HASHING WITH OPTIMAL FAIRNESS FOR FLOW DISTRIBUTION AND LOAD-BALANCING, Pierre Pfister, Mark Townsley, Yoann Desmouceaux, and Aloys Augustin
REAL-TIME NETWORK EVENT CORRELATION BASED ON DEPENDENCY GRAPH FOR NETWORK ISSUE ROOT CAUSING, Alok Kumar Sinha, Zach Cherian, and Kaushik Dam
NON-ORTHOGONAL MULTIPLE ACCESS FOR COLLISION AVOIDANCE IN LOW-POWER AND LOSSY NETWORKS, Ling Wei, Huimin She, Chuanwei Li, and Lele Zhang
Battery charge level based on power source availability, Thierry Strudel
Heat removal from high temperature hardware while shielding electromagnetic interference, Yao Xue and Eugene Fox
HEURISTIC ALGORITHM FOR SPANNING TREE PROTOCOL ROOT BRIDGE DETERMINATION, Michael Michaelides and Arabinda Samantaray
PROXY MONITORING OF SESSION STATE FOR SHARED FATE ENTITIES, Stefan Olofsson and Khalid Raza
Operator Drowsiness Test, Robin Dua, Andrei Broder, and Vidhya Navalpakkam
Delayed predicate algorithm evaluation in hybrid answer set programming (ASP), Alex Brik and Jori Bomanson
FIRMWARE COMPRESSION MECHANISM FOR SPEEDING UP FIRMWARE UPDATING IN A RESOURCE RESTRICTED NETWORK, Yinfang Wang, Chuanwei Li, Feiliang Wang, and Yajun Xia
A DEEP GAUSSIAN MIXTURE MODEL APPROACH TO SCORING BASED ON FEEDBACK, Pranjal Daga and Antonio Nucci
AUTOMATED FAILURE PREDICTION AND SELF-HEALING OF EDGE DEVICES IN INTERNET OF THINGS INFRASTRUCTURE, Lalit Jain, Nirup Pothireddy, Sai Kiran Reddy Malikireddy, Vivek Parekh, Bipin Algubelli, Chandra Veluru, and Dileep Kumar
Applying Machine Learning to Determine Documents Related to Email, Cayden Meyer, Harold Kim, and Alan Green
PERFORMANCE DELAY MEASUREMENT AND FAULT DETECTION OF SR / SRV6 TE POLICIES IN SOFTWARE DEFINED NETWORKS, Clarence Filsfils, Rakesh Gandhi, Tarek Saad, Patrick Khordoc, and Sagar Soni
Updating Content Item Delivery Criteria Based On User Interaction, Anonymous
Sound-based Classifier for Domain Specific Language Model Selection, Anonymous
Augmented Reality Dance Instructions, Anonymous
Maximum Power Point Tracking Using Test Cell(s) in Solar Array(s), Anonymous
Maximum Power Point Tracking Using a DC-DC Converter Coupled to Photovoltaic Cells and a Battery, Anonymous
Peer Node Eviction in Wireless Mesh Networks, Javier Cardona
Person Identification and Displaying AR Banners, Anonymous
A Wearable Emotion Detection and Video/Image Recording System, Anonymous
AIRSPEED MEASUREMENT DEVICE FOR SLOW AIRCRAFT
Verifying authenticity of digital images using digital signatures, Neil Dhillon and Tanmay Wadhwa