Article
PERFORMANCE DELAY MEASUREMENT AND FAULT DETECTION OF SR / SRV6 TE POLICIES IN SOFTWARE DEFINED NETWORKS, Clarence Filsfils, Rakesh Gandhi, Tarek Saad, Patrick Khordoc, and Sagar Soni
Visual match of emails or landing pages to detect phishing, Kuntal Sengupta and Vijay Eranti
Using machine learning to improve image storage and recall, Mary Witkowski, Kristina Bohl, and Raja Ratna Murthy Ayyagar
Spatially optimized wireless multicast networks with guaranteed bit-rate, Paul Heninwolf and Daniel Fernandes Barros
Guided capture for improved composition of group photographs, Zoltan Egyed
Remote ranging using vibrations and ultrasonic transmission, n/a
Measuring end-to-end latency of fingerprint authenticators, Jose Rodriguez and Firas Sammoura
Handcrafting visual features of emails or landing pages to detect phishing, Kuntal Sengupta and Vijay Eranti
Mixed Reality Interaction With Physical Keyboard, Anonymous
Automatic Removal Of Artifacts In 360° Videos, Anonymous
Projection Agnostic Quality Metric For 360° Images, Anonymous
User Identification Across Online Providers, Anonymous
Selective Content Delivery Based On Content Emotion, Anonymous
Attribute Prediction Based On Online Connections, Anonymous
User Emotion Based Selective Delivery Of Content, Anonymous
Smart Text Tool For Capturing And Sharing Visual Content
Automated Augmented Reality Context Stickers
Capture Modes, Filters And Frames For Visual Content
Tool For Measuring End To End Latency, Michal Kielan, Jose M. Gonzalez, and Michal Godek
Streaming Rate Based Playback Speed Control For Live Video
Simulating web page loading performance, Patrick Hulce
ON-DEVICE ANALYTICS: DATA COLLECTION, REPRESENTATION, AND FEEDBACK LOOP, Vishal Murgai, Nikul Bhatt, and Srinivas Addanki
ADVERTISING SOFTWARE/SECURITY USAGE DESCRIPTIONS WITH POLICY RESPONSE, Eliot Lear, Brian Weis, Chris Steck, and Nancy Cam-Winget
OBFUSCATION AND ANONYMIZATION TECHNIQUES FOR NETWORK DATA SETS FOR MACHINE LEARNING, Ralf Rantzau, Sebastian Jeuk, and Gonzalo Salgueiro
PROVISIONING DAY-ZERO CONFIGURATIONS THROUGH PASSIVE RADIO-FREQUENCY IDENTIFICATION, Santosh Patil, Shyam Vaidyanathan, Prashant Kumar, and Manoj Gupta
VISUALIZATION FOR IDENTIFYING SERVICE RESPONSES, Wagesh Kulkarni, Rakesh Sharma, and Hitesh Manwar
IDENTIFYING AI PARTICIPANTS IN CALLS AND ESCALATING AI-ONLY CALLS INTO AN OPTIMIZED MACHINE COMMUNICATION MODE, Denis Savostiyanov and Rob Hanton
MACHINE LEARNING FRAMEWORK FOR PRIORITIZING LOCATION MEASUREMENTS OF MULTIPLE DEVICES, Xu Zhang, Huy Tran, Matt Silverman, Abhishek Mukherji, Vinay Raghuram, Abhishek Bhattacharyya, and Santosh Pandey
METHOD OF PASSIVE PARTICIPANT TRACKING IN VIDEO CONFERENCE, Morgan Fang, Yasi Xi, Zhaocai Wang, and Janus Wang
Device History Recall Optimization with Virtual, Locally-Stored Acquisition Databases Using Previously Encountered Communication Access Points and Services, Jibing Wang, Qin Zhang, and Srinivasa Prasad Vangaru
Crowdsourced market research and survey completion using intelligent conversational assistants, Reena Singhal Lee
Lightfield Compression Using Commodity Hardware Video Codecs, Sai Deng, Pavel Krajcevski, Matthew Pharr, and Stuart Abercrombie
Micro Touchpad for Wearables, Chun Yat Li, Guangzhe Cui, and Debanjan Mukherjee
PATH INFORMATION-DRIVEN QUIC PATH_CHALLENGE TO OPTIMIZE PATH SELECTION IN 5G NETWORKS, Sebastian Jeuk, Gonzalo Salgueiro, and David Hanes
Techniques for Checking As-Worn Alignment of Eyewear with Display Optics or Progressive Prescription Lenses, Ozan Cakmakci, John Stuart Fitch, Vladimir Krneta, and David Hoffman
WiFi network selection based on RSSI velocity, Rebecca Silberstein
COGNITIVE CLOUD COLLABORATION, M. David Hanes, Sebastian Jeuk, Gonzalo Salgueiro, and Chuck Byers
Mechanical controller for a smartphone, Gökhan Bakir and Joseph Lange
Asymmetric PCIe, Nishant Patil
Ergonomic ESD cart, n/a
Tool for installing and removing dual in-line memory modules, n/a
Fine-grained memory protection, Jose German Rivera
An authoring environment for adaptively formatted text, Lucas Kovar and Shuo Diao
Software service for facilitating unbiased ratings, Tuna Toksoz and John Dukellis
Machine learning to optimize controlled experiments, Neil Hoyne
Conversion detection for improved online ad selection, Stephen Hsu, Eric J. Kolb, and Steven T. Dieter
Machine-learned alt text for images and videos, Sandro Feuz and Mohammadamin Barekatain
Web search of mathematical expressions, Victor Cărbune and Thomas Deselaers
Context-dependent output volume for voice-controlled virtual assistant, Victor Cărbune and Thomas Deselaers
Fast WiFi scanning, Jiwoong Lee
Task completion by seeking input from multiple parties, Matthew Sharifi
Providing contextual information for multi-party chats, Sammy El Ghazzal and Sandro Feuz
SAFE UNROUTED ADDRESSING IN A CLOUD OR DATACENTER NETWORK, Kyle Mestery and Ian Wells
WIRELESS MESH NETWORK FAULT DIAGNOSIS AND MANAGEMENT BASED ON BINARY TREE BASED SUPPORT VECTOR MACHINE, Lele Zhang, Chuanwei Li, Huimin She, and Li Zhao
Method for Filtering Displayed Content Based on Occupants, Scott Randolph, Bradley Stenning, and Steve Paik
DETERMINING BREAKPOINTS IN MEDIA CONTENT, Migle Padegimaite and Sammy El Ghazzal
Method for Filtering Displayed Content Based on Occupants, Scott Randolph, Bradley Stenning, and Steve Steve
Automating last-mile power connection discovery in datacenters, N/A
Translation of Electronic Dialogs
AUTOMATIC DUBBING OF VIDEOS WITH MULTIPLE SPEAKERS, Sandro Feuz and Mohammadamin Barekatain
Securing private images on user devices, Linden Evans and Laura Paragano
SYSTEMS AND METHODS FOR PREDICTING ONLINE VIDEO METRICS, Aaron Shon, Charles Johan Larsson Tibell, and Axel Erik Olov Henriksson
MACHINE-LEARNING OF LEADING INDICATORS FROM A PLURALITY OF SERVICES TO PERFORM MEMORY MANAGEMENT ON ANOTHER PLURALITY OF SERVICES WITH CORRELATING MEMORY USAGE PROFILE, Jayesh Wadikar, Pok Wong, Ajay Madhavan, and Smruti Lele
MACHINE LEARNING BASED TECHNIQUE TO DYNAMICALLY ALLOCATE A NETWORK SLICE BASED ON USER EQUIPMENT TYPE AND NETWORK SLICE SELECTION FUNCTION FACTOR FOR 5G WIRELESS INTERNET OF THINGS NETWORKS, Akram Sheriff, Santosh Patil, M. David Hanes, and Gonzalo Salgueiro
DYNAMIC RE-CALIBRATION OF LOCATION USING ACTIVE SENSORS AND BEHAVIORAL ANALYTICS, Robert Barton, Jerome Henry, and Vishal Desai
Virtual Reality in Nuisance Protection, Anonymous
Hand of the Invisible Poet, Anonymous
Motion Sickness Mitigation Using VR/AR Devices, Anonymous
INTERNET PROTOCOL VERSION 6 PREFIX COLORING IN SOFTWARE DEFINED ACCESS FABRIC FOR DIFFERENTIATED POLICY ENFORCEMENT, Sri Gundavelli, Shree Murthy, Sudhir Jain, and Indermeet Gandhi
Gesture Text Input, Anonymous Anonymous
ACCESS POINT TRANSMISSION OPTIMIZATIONS USING MACHINE LEARNING BASED TRAFFIC CLASSIFICATION, Vincent Cuissard, Amine Choukir, Domenico Ficara, and Salvatore Valenza
Content provenance attribution and verification via blockchain certification, Daniel Golovin and Daniel Klein
Enhanced electronic whiteboard, David Tigges
Enhancing user interface accessibility using computer vision, Juhyun Lee
Automated end-to-end instrumentation and testing of mobile device camera, Yu Zhong, Gregory Eitzmann, and Kenneth Goldman
Visualizing classifier performance, Lori Levy and John Burge
Event Scheduling and Time Zone Management for Online Calendars, Steffen Meschkat
A REINFORCEMENT LEARNING (RL) MODEL FOR DYNAMIC OPTIMIZATION OF SWITCH PORT/QUEUE BUFFER ALLOCATION, Imran Pasha
SYSTEM FOR SUPPLYING HIGH SHEAR STARCH TO A GYPSUM BOARD MACHINE AND METHODS OF MANUFACTURING GYPSUM BOARD USING HIGH SHEAR STARCH, National Gypsum Company
RATIONALIZED CLUSTERING IN MACHINE LEARNING, Diveplane Corporation and Christopher Hazard PhD
RATIONALIZED CLUSTERING IN MACHINE LEARNING, Diveplane Corporation
WIRELESS NETWORK LOAD CORROBORATION USING MACHINE LEARNING (ML) BASED VIDEO ANALYTICS, Smruti Lele, Samer Salam, Ajay Madhavan, and Jayesh Wadikar
AUTOMATED CLIENT CLASSIFICATION AND POLICY ENFORCEMENT THROUGH CLOUD APPLICATION PROGRAMMING INTERFACE GATEWAY, Xueqiang Ma, Kumar Sankaralingam, Shubhojit Chattopadhyay, and Kalyan Ghosh
Retrospective ads to obtain user feedback, Tuna Toksoz and John Dukellis
Obtaining content quality feedback by placing content in advertisements, Tuna Toksoz and John Dukellis
DATA-DRIVEN CHARACTERIZATION OF TECHNICAL DEBT IN A COMPLEX INFORMATION SYSTEM, Abhishek Pathak, Hossein Moosavi Kooshki, Mazhar Haque, and Girish Babu
Enabling poll surveys via in-app advertisements, Tuna Toksoz and John Dukellis
Ad network speed comparison tool, Tuna Toksoz and John Dukellis
Re-engagement ads with real-time leaderboard information, Tuna Toksoz and John Dukellis
Layering incentives during idle time after user action in rewarded ads, Tuna Toksoz and John Dukellis
Automated insertion and testing of ads, Tuna Toksoz, John Dukellis, Edward Weng, and Boubou Guiro
Personalized re-engagement ads, Tuna Toksoz and John Dukellis
Crowd-sourced verification of content, Tuna Toksoz and John Dukellis
Rewarded tasks for reducing ad fraud, Tuna Toksoz and John Dukellis
Unbiased review of apps, Tuna Toksoz and John Dukellis
Automated online product ads, Tuna Toksoz and John Dukellis
Incentivizing users to watch ads, Tuna Toksoz and John Dukellis
Ads that encourage users to take health breaks, Tuna Toksoz and John Dukellis
Generating cryptographic initialization vectors from SSD wear metrics, Michael William Paddon
Fast recalibration of test and measurement equipment, Fei He