Article
Direct I/O solution for Containerized HPUX, Maheshwara Aithal, Dinesh Thanumoorthy, and Harish K
Fast & Scalable I/O for Emulated HPUX, Maheshwara Aithal, Dinesh Thanumoorthy, and Ranjith VK
A novel encoding & alignment of Histograms of referential integrity columns for scalable data generation, Suresh Soundararajan
New GPU Standard PCIe Card Holder Design, Tim Ko
Mounting Methods for JEDEC Standard Energy Cell, John Norton and David Thomas Byargeon
Lock Mechanism Design, Michelle Chen
Reducing Memory Footprint for In-Memory Root Filesystem (TMPFS), Erik Jacobson, Paul Schliep, and Christopher Holmes
VOICE OVER LONG TERM EVOLUTION SERVICE QUALITY MEASUREMENTS AND DIAGNOSTICS USING MACHINE LEARNING TECHNIQUES, Sri Gundavelli, Dhananjay Patki, Vimal Srivastava, and Amarnath Reddy Nagireddy
USING DEVICE MOVEMENT FOR MULTI-FACTOR COMPUTING DEVICE AUTHENTICATION, Isaac Andres
TECHNIQUES FOR EFFICIENT AND CONSISTENT HASHING WITH OPTIMAL FAIRNESS FOR FLOW DISTRIBUTION AND LOAD-BALANCING, Pierre Pfister, Mark Townsley, Yoann Desmouceaux, and Aloys Augustin
REAL-TIME NETWORK EVENT CORRELATION BASED ON DEPENDENCY GRAPH FOR NETWORK ISSUE ROOT CAUSING, Alok Kumar Sinha, Zach Cherian, and Kaushik Dam
NON-ORTHOGONAL MULTIPLE ACCESS FOR COLLISION AVOIDANCE IN LOW-POWER AND LOSSY NETWORKS, Ling Wei, Huimin She, Chuanwei Li, and Lele Zhang
Battery charge level based on power source availability, Thierry Strudel
Heat removal from high temperature hardware while shielding electromagnetic interference, Yao Xue and Eugene Fox
HEURISTIC ALGORITHM FOR SPANNING TREE PROTOCOL ROOT BRIDGE DETERMINATION, Michael Michaelides and Arabinda Samantaray
PROXY MONITORING OF SESSION STATE FOR SHARED FATE ENTITIES, Stefan Olofsson and Khalid Raza
Operator Drowsiness Test, Robin Dua, Andrei Broder, and Vidhya Navalpakkam
Delayed predicate algorithm evaluation in hybrid answer set programming (ASP), Alex Brik and Jori Bomanson
FIRMWARE COMPRESSION MECHANISM FOR SPEEDING UP FIRMWARE UPDATING IN A RESOURCE RESTRICTED NETWORK, Yinfang Wang, Chuanwei Li, Feiliang Wang, and Yajun Xia
A DEEP GAUSSIAN MIXTURE MODEL APPROACH TO SCORING BASED ON FEEDBACK, Pranjal Daga and Antonio Nucci
AUTOMATED FAILURE PREDICTION AND SELF-HEALING OF EDGE DEVICES IN INTERNET OF THINGS INFRASTRUCTURE, Lalit Jain, Nirup Pothireddy, Sai Kiran Reddy Malikireddy, Vivek Parekh, Bipin Algubelli, Chandra Veluru, and Dileep Kumar
Applying Machine Learning to Determine Documents Related to Email, Cayden Meyer, Harold Kim, and Alan Green
PERFORMANCE DELAY MEASUREMENT AND FAULT DETECTION OF SR / SRV6 TE POLICIES IN SOFTWARE DEFINED NETWORKS, Clarence Filsfils, Rakesh Gandhi, Tarek Saad, Patrick Khordoc, and Sagar Soni
Updating Content Item Delivery Criteria Based On User Interaction, Anonymous
Sound-based Classifier for Domain Specific Language Model Selection, Anonymous
Augmented Reality Dance Instructions, Anonymous
Maximum Power Point Tracking Using Test Cell(s) in Solar Array(s), Anonymous
Maximum Power Point Tracking Using a DC-DC Converter Coupled to Photovoltaic Cells and a Battery, Anonymous
Peer Node Eviction in Wireless Mesh Networks, Javier Cardona
Person Identification and Displaying AR Banners, Anonymous
A Wearable Emotion Detection and Video/Image Recording System, Anonymous
AIRSPEED MEASUREMENT DEVICE FOR SLOW AIRCRAFT
Verifying authenticity of digital images using digital signatures, Neil Dhillon and Tanmay Wadhwa
PERFORMANCE DELAY MEASUREMENT AND FAULT DETECTION OF SR / SRV6 TE POLICIES IN SOFTWARE DEFINED NETWORKS, Clarence Filsfils, Rakesh Gandhi, Tarek Saad, Patrick Khordoc, and Sagar Soni
Visual match of emails or landing pages to detect phishing, Kuntal Sengupta and Vijay Eranti
Using machine learning to improve image storage and recall, Mary Witkowski, Kristina Bohl, and Raja Ratna Murthy Ayyagar
Spatially optimized wireless multicast networks with guaranteed bit-rate, Paul Heninwolf and Daniel Fernandes Barros
Guided capture for improved composition of group photographs, Zoltan Egyed
Remote ranging using vibrations and ultrasonic transmission, n/a
Measuring end-to-end latency of fingerprint authenticators, Jose Rodriguez and Firas Sammoura
Handcrafting visual features of emails or landing pages to detect phishing, Kuntal Sengupta and Vijay Eranti
Mixed Reality Interaction With Physical Keyboard, Anonymous
Automatic Removal Of Artifacts In 360° Videos, Anonymous
Projection Agnostic Quality Metric For 360° Images, Anonymous
User Identification Across Online Providers, Anonymous
Selective Content Delivery Based On Content Emotion, Anonymous
Attribute Prediction Based On Online Connections, Anonymous
User Emotion Based Selective Delivery Of Content, Anonymous
Smart Text Tool For Capturing And Sharing Visual Content
Automated Augmented Reality Context Stickers
Capture Modes, Filters And Frames For Visual Content
Tool For Measuring End To End Latency, Michal Kielan, Jose M. Gonzalez, and Michal Godek
Streaming Rate Based Playback Speed Control For Live Video
Simulating web page loading performance, Patrick Hulce
ON-DEVICE ANALYTICS: DATA COLLECTION, REPRESENTATION, AND FEEDBACK LOOP, Vishal Murgai, Nikul Bhatt, and Srinivas Addanki
ADVERTISING SOFTWARE/SECURITY USAGE DESCRIPTIONS WITH POLICY RESPONSE, Eliot Lear, Brian Weis, Chris Steck, and Nancy Cam-Winget
OBFUSCATION AND ANONYMIZATION TECHNIQUES FOR NETWORK DATA SETS FOR MACHINE LEARNING, Ralf Rantzau, Sebastian Jeuk, and Gonzalo Salgueiro
PROVISIONING DAY-ZERO CONFIGURATIONS THROUGH PASSIVE RADIO-FREQUENCY IDENTIFICATION, Santosh Patil, Shyam Vaidyanathan, Prashant Kumar, and Manoj Gupta
VISUALIZATION FOR IDENTIFYING SERVICE RESPONSES, Wagesh Kulkarni, Rakesh Sharma, and Hitesh Manwar
IDENTIFYING AI PARTICIPANTS IN CALLS AND ESCALATING AI-ONLY CALLS INTO AN OPTIMIZED MACHINE COMMUNICATION MODE, Denis Savostiyanov and Rob Hanton
MACHINE LEARNING FRAMEWORK FOR PRIORITIZING LOCATION MEASUREMENTS OF MULTIPLE DEVICES, Xu Zhang, Huy Tran, Matt Silverman, Abhishek Mukherji, Vinay Raghuram, Abhishek Bhattacharyya, and Santosh Pandey
METHOD OF PASSIVE PARTICIPANT TRACKING IN VIDEO CONFERENCE, Morgan Fang, Yasi Xi, Zhaocai Wang, and Janus Wang
Device History Recall Optimization with Virtual, Locally-Stored Acquisition Databases Using Previously Encountered Communication Access Points and Services, Jibing Wang, Qin Zhang, and Srinivasa Prasad Vangaru
Crowdsourced market research and survey completion using intelligent conversational assistants, Reena Singhal Lee
Lightfield Compression Using Commodity Hardware Video Codecs, Sai Deng, Pavel Krajcevski, Matthew Pharr, and Stuart Abercrombie
Micro Touchpad for Wearables, Chun Yat Li, Guangzhe Cui, and Debanjan Mukherjee
PATH INFORMATION-DRIVEN QUIC PATH_CHALLENGE TO OPTIMIZE PATH SELECTION IN 5G NETWORKS, Sebastian Jeuk, Gonzalo Salgueiro, and David Hanes
Techniques for Checking As-Worn Alignment of Eyewear with Display Optics or Progressive Prescription Lenses, Ozan Cakmakci, John Stuart Fitch, Vladimir Krneta, and David Hoffman
WiFi network selection based on RSSI velocity, Rebecca Silberstein
COGNITIVE CLOUD COLLABORATION, M. David Hanes, Sebastian Jeuk, Gonzalo Salgueiro, and Chuck Byers
Mechanical controller for a smartphone, Gökhan Bakir and Joseph Lange
Asymmetric PCIe, Nishant Patil
Ergonomic ESD cart, n/a
Tool for installing and removing dual in-line memory modules, n/a
Fine-grained memory protection, Jose German Rivera
An authoring environment for adaptively formatted text, Lucas Kovar and Shuo Diao
Software service for facilitating unbiased ratings, Tuna Toksoz and John Dukellis
Machine learning to optimize controlled experiments, Neil Hoyne
Conversion detection for improved online ad selection, Stephen Hsu, Eric J. Kolb, and Steven T. Dieter
Machine-learned alt text for images and videos, Sandro Feuz and Mohammadamin Barekatain
Web search of mathematical expressions, Victor Cărbune and Thomas Deselaers
Context-dependent output volume for voice-controlled virtual assistant, Victor Cărbune and Thomas Deselaers
Fast WiFi scanning, Jiwoong Lee
Task completion by seeking input from multiple parties, Matthew Sharifi
Providing contextual information for multi-party chats, Sammy El Ghazzal and Sandro Feuz
SAFE UNROUTED ADDRESSING IN A CLOUD OR DATACENTER NETWORK, Kyle Mestery and Ian Wells
WIRELESS MESH NETWORK FAULT DIAGNOSIS AND MANAGEMENT BASED ON BINARY TREE BASED SUPPORT VECTOR MACHINE, Lele Zhang, Chuanwei Li, Huimin She, and Li Zhao
Method for Filtering Displayed Content Based on Occupants, Scott Randolph, Bradley Stenning, and Steve Paik
DETERMINING BREAKPOINTS IN MEDIA CONTENT, Migle Padegimaite and Sammy El Ghazzal
Method for Filtering Displayed Content Based on Occupants, Scott Randolph, Bradley Stenning, and Steve Steve
Automating last-mile power connection discovery in datacenters, N/A
Translation of Electronic Dialogs
AUTOMATIC DUBBING OF VIDEOS WITH MULTIPLE SPEAKERS, Sandro Feuz and Mohammadamin Barekatain
Securing private images on user devices, Linden Evans and Laura Paragano
SYSTEMS AND METHODS FOR PREDICTING ONLINE VIDEO METRICS, Aaron Shon, Charles Johan Larsson Tibell, and Axel Erik Olov Henriksson
MACHINE-LEARNING OF LEADING INDICATORS FROM A PLURALITY OF SERVICES TO PERFORM MEMORY MANAGEMENT ON ANOTHER PLURALITY OF SERVICES WITH CORRELATING MEMORY USAGE PROFILE, Jayesh Wadikar, Pok Wong, Ajay Madhavan, and Smruti Lele
MACHINE LEARNING BASED TECHNIQUE TO DYNAMICALLY ALLOCATE A NETWORK SLICE BASED ON USER EQUIPMENT TYPE AND NETWORK SLICE SELECTION FUNCTION FACTOR FOR 5G WIRELESS INTERNET OF THINGS NETWORKS, Akram Sheriff, Santosh Patil, M. David Hanes, and Gonzalo Salgueiro
DYNAMIC RE-CALIBRATION OF LOCATION USING ACTIVE SENSORS AND BEHAVIORAL ANALYTICS, Robert Barton, Jerome Henry, and Vishal Desai
Virtual Reality in Nuisance Protection, Anonymous
Hand of the Invisible Poet, Anonymous