Article
Sleep and Wake Commands for Voice-Activated Devices, N/A
SON-POWERED DYNAMIC OPTIMIZATION OF RELAY LAYER TO ENHANCE COVERAGE AND CAPACITY OF A CELLULAR NETWORK COMBINED WITH CENTRALIZED SON ON MACRO LAYER, Alon Ben Ami and Tal Dunsky
MASSIVE MIMO OPTIMIZATION USING SELF-OPTIMIZING NETWORKS, Krishna Veni Thombarapu, Murali Mohan Cheekati, and Prasada Rao Ponnamaneni
ENTERPRISE ANALYTICS: METHOD AND APPARATUS FOR SDA PACKET DEBUGGING, FLOW VISIBILITY AND MONITORING, Rajeev Kumar, Parth Shah, Akshay Dorwat, and Manas Pati
Matching a graph with a non-deterministic finite automaton, Alexandre Boulgakov
BRANCHING NEURAL NETWORKS, Ufuk Can Biçici, Cem Keskin, and Shahram Izadi
CONTEXT SENSITIVE NETWORK SECURITY SCORE, Swami Anantha, Byju Pularikkal, Santosh Patil, and Sourav Chakraborty
Refined music clustering, Christian Weitenberner, Ullas Gargi, Girum Ibssa, Brian Karlak, and Krishmin Rai
Shush gesture for consumer devices, Scott Jenson
Personalized ordering for presentation of help topics, Victor Carbune
Defending against attacks on biometrics-based authentication, Tanmay Wadhwa and Neil Dhillon
Matching language and accent in virtual assistant responses, Jatin Matani, Philippe Gervais, Marcos Calvo, Sandro Feuz, and Thomas Deselaers
Automatic rebooking of hotels using virtual assistants, Saptarshi Bhattacharya
Internet of Things - Data Security and User Authentication Management, Ronald Heiby
GROUND ROBOT FOR CHARGING MULTIPLE ELECTRIC VEHICLES, Chuck Byers, Ashok Moghe, and John Apostolopoulos
GANTRY ROBOT FOR CHARGING MULTIPLE ELECTRIC VEHICLES, Chuck Byers, Ashok Moghe, and John Apostolopoulos
ACTIVE CHASSIS WITH ROTARY SPRING, Daniel Hoppe
CUSTOMER, SAFETY AND ENVIRONMENTAL, Daniel Hoppe
USE OF A PYROTECHNIC SEPARATOR FOR VOLTAGE, Daniel Hoppe
UNDERBODY PROTECTION WITH DAMPING, Daniel Hoppe
SOC AGAINST ELECTRIC VEHICLES, Daniel Hoppe
PRESSURE SIGNAL IMPROVING COMPONENT, Daniel Hoppe
ILLUMINATED MOLDINGS AND FRAMES RADIATOR, Daniel Hoppe
ATTACHMENT OF A FLAG POLE TO THE VEHICLE, Daniel Hoppe
ADAPTIVE POSITIONING OF COLLABORATION DEVICE USING PATTERN RECOGNITION OF ACCESSIBILITY USER, Damien McCoy
Triggering an Update of a Client Application by Selecting a Deeplink, Justin Lewis and Ruxandra Davies
APPLICATIONS ON TOP OF DNA CENTER: SOFTWARE FACILITATED METHOD TO RELIABLY ISOLATE, REMOVE AND INSERT DEVICES IN THE NETWORK, Vishal Murgai, Zach Cherian, Amarender Musku, Ankur Bhargava, Saurabh Agarwal, and Nikul Bhatt
A logical layer to interpret user interactions, Alison Lentz, Benny Schlesinger, John Thomas DiMartile III, Gabriel Taubman, and Regina O'Dell
BLOCKCHAIN BASED WI-FI ONBOARDING SIMPLIFICATION, IDENTITY MANAGEMENT AND DEVICE PROFILING FOR IOT DEVICES IN ENTERPRISE NETWORKS, Byju Pularikkal, Santosh Patil, Swami Anantha, and Sourav Chakraborty
Weight compression for deep networks using Kronecker products, Yair Movshovitz-Attias and Elad Eban
Active alignment method to dual balance camera spatial frequency response, Jamyuen Ko and Chung Chun Wan
APPLICATIONS ON TOP OF DNA CENTER: AUTOMATIC CONFIGURATION VALIDATION BASED ON TOPOLOGY FOR BASIC INTEROPERATION, Smruti Lele, Ankur Bhargava, and Ajay Madhavan
APPLICATION OF DNA-C: A METHOD FOR SHORT TERM LOAD PREDICTION AND LOAD BALANCING USING TECHNIQUES FROM CHAOS THEORY, Jerome Henry, Rajesh Pazhyannur, and Robert Barton
APPLICATIONS ON TOP OF DNA CENTER: TOPOLOGY EVOLUTION BASED ON CUSTOMER NETWORK DYNAMICS, Smruti Lele, Ankur Bhargava, and Ajay Madhavan
LambdaLoss: Metric-Driven Loss for Learning-to Rank, Cheng Li, Michael Bendersky, Marc Najork, Xuanhui Wang, and Nadav Golbandi
Providing link suggestions based on recent user activity, Jakob Foerster and Matthew Sharifi
A budget-based policy for operating system scheduling of background tasks, Alhaad Gokhale
LAYER 4 THROUGH LAYER 7 SERVICE CHAINING FOR VIRTUAL NETWORK FUNCTIONS IN CLOUD ENVIRONMENT, Balaji Sundararajan, Samar Sharma, and Yegappan Lakshmanan
TECHNIQUES FOR VISUALIZATION OF DEVICE INTERNAL PACKET PROCESSING AND NETWORK EVENTS, Jay Johnston, Magnus Mortensen, David White, and Michael Robertson
Progressive delivery of interactive content, Jared M. Zimmerman
Policy based Authentication Service with Mobile Connect, Bo Wang
Tracking Package Repository Release Using Blockchain, Alfred Pang
Detecting Evasive Malicious URL Using Graph Algorithm, Mu Lin, Sanjay d'Abreu Noronha, Kan Yan, Zhifeng Cai, and Kevin Hayes
STRATEGIES FOR LOOP PREVENTION FORWARDING LOGIC IN HYBRID INFORMATION CENTRIC NETWORKING, Scott Wainner, Luca Muscariello, and Giovanna Carofiglio
Using variable font width to adjust flow of text within text boxes, Sascha Brawer
ENABLING DETERMINISM IN A BEST EFFORT HOPPING SEQUENCE TIME SLOTTED CHANNEL HOPPING MESH, Pascal Thubert, Huimin She, and Charlie Chen
Seamless transfer of ambient media from environment to mobile device, Dominik Roblek and Matthew Sharifi
Reliability Scoring Approach for Content Sources, Richard Farnsworth
WAKE UP RADIO PROTECTION FROM DENIAL OF SERVICE ATTACK BASED ON BASEBAND MONITORING, Matt Silverman and Santosh Pandey
New Standoff for Countersunk Hole and Stacking Process, Justin Chen and Phoebus Lin
TRAFFIC REDIRECTION WITH DISTRIBUTED DENIAL OF SERVICE SEGMENT IDENTIFIERS, Robert Barton, Jerome Henry, and Siva Sivabalan
DYNAMIC WIRELESS LOCAL AREA NETWORK ACCESS CONTROL LIST PROVISIONING, Chethan Channappa and Mahesh Satyanarayana
AUTOMATIC MEASUREMENTS AND ANALYTICS IN CLOUD BASED MEDIA APPLICATIONS, Alessandro Duminuco, Peter Bosch, Andre Surcouf, and Jeffrey Napper
MERCHANDISE DISPLAY HOOK, InVue Security Products Inc.
DYNAMICALLY GENERATED DEVICE-SPECIFIC APPLICATION EXECUTABLES, John Ayres, Anthony Morris, Milena Nikolic, Yaakov Gluck, Pierre Lecesne, and Idries Hamadi
Adapting the formality level of the language in user interface localization, Steffen Meschkat
USB-C to 3.5mm adapter with PCB in audio jack, Changzhan Gu and Jae-won Hwang
Interaction with smart assistants using alternative and augmentative communication, Lorenzo Caggioni, Paolo Pigozzo, Davide Ferraro, Egil Hogholt, Teresa Pato, and Thomas Riga
CREATING AVAILABLE BANDWIDTH HEATMAP FOR USER ASSIST TO RELOCATE BASED ON BANDWIDTH NEEDS, Karthik Ganesan and Shravan Yampaty
PORTABLE NETWORK NAMESPACES: TRAFFIC COLORING FOR PORTABILITY, Ian Wells and Rajiv Asati
SECURITY SOLUTION FOR KUBERNETES USING CLOUD-NATIVE VIRTUAL NETWORK FUNCTIONS, Jan Medved
DIGITAL CAMPAIGN TRACKING WITH RESPECT TO APPLICATION INFRASTRUCTURE, Piyush Mathur, Bhupinder Singh, Siddhartha Dutta, and Arpita Agarwal
Side-effect free program state evaluation, Erik Luo, Aleksei Koziatinskii, and Yang Guo
DNAC BASED ANONYMOUS DFS (A-DFS) SERVICE, Gautam Bhanage and Manoj Gupta
HARMONIOUS MULTICAST RETRANSMISSION FOR LOW-POWER AND LOSSY NETWORKS FIRMWARE UPGRADING, Charlie Chen, Li Yang, Chuanwei Li, and Feiliang Wang
PATIENT HEALTH MONITORING PRIORITIZATION, Abhishek Dhammawat and Mansi Jain
Image enhancement suggestions based on machine learning, Karolina Pyszkiewicz, Vahid Kazemi, Hao Xu, Xuefeng Song, Shinko Cheng, Jingyu Cui, Shengyang Dai, Kechun Mao, Mugdha Kulkarni, Shalini Sah, Marc Cannon, Yun Liu, Aleksei Timofeev, Megan Gebhard, Nan Wang, and Jaishanker Pillai
Optimized driver presence detection, Daniel Hoppe
AUTOMATIC TEMPERATURE CONTROL OF AIR CONDITIONING / SEAT HEATING VIA A THERMAL IMAGE CAMERA, Daniel Hoppe
APPLY 3D PRINT COMPONENTS TO IMPROVE AERODYNAMICS ON A VEHICLE, Daniel Hoppe
WOPTIMOP - A Cloud Based Intelligent Method Of Automatically Creating And Delivering Workload Optimized Platform Contents, Suprateeka R Hegde, Sujoy Saraswati, and Amrita H S
Performant Shuffling Heuristic for Arbitrarily Large Playlists, Senthil Palanisami
Product unboxing, setup, and registration using a low power beacon, Andrew Lewis and Peter Lewis
Intent Preserving 360 Video Stabilization Using Constrained Optimization, Chetan Arora and Vivek Kwatra
Flexibility Ranking To Schedule Events, Terence Bennett
Automatic Setup / Configuration for New Devices, Yevgeniy Gutnik
Context aware routing for automobiles, Hilary Richardson and Maxwell Sills
Biodegradable filler rod, John Korman, D. Clay Cox, and David Walsh
Stabilizer channels for trenches, John Korman, D. Clay Cox, and David Walsh
Cutting tool for trench stabilization channels, John Korman, D. Clay Cox, and David Walsh
Context-Sensitive Display Adaptation, Sanjay d'Abreu Noronha
Shared document access control using keystores, Emmanuel M. Arriaga
Capacity planning for computing clusters, Lu Huang, Ana Radovanovic, Radovanovic Ye, Alexandre Duarte, and Walfredo Cirne Filho
Systems and Methods for Identifying a Speaker and/or Their Attention with Cameras and/or Microphones, Seth Raphael
Seamless Traffic preemption for emergency vehicles using USSD services with SET Triggers, Thippeswamy JHM
Selecting native ad units using gestures, Bo Lin and Tyler Pletz
Direct measurement of digital television signal quality, Alexei Zverovitch
Multi-level donation attribution in social networks, Justin Lewis and Ruxandra Davies
Real-time scheduling for software testing, Keun Soo Yim and Yuexi Ma
Digital advertising effectiveness measurement, Zachary Lupei and Dasarathi Sampath
Disabling facial unlocking using facial expression, Bernadette Alexia Carter
Comparative user feedback rating, Lingyi Zhang, Raamesh Deshpande, and Mohamad Susli
LONG SHORT TERM MEMORY BASED TOTAL TRAFFIC PREDICTION FOR CONTAINER LOAD BALANCING, Manoj Ragupathy and Xueqiang Sherman Ma
Massive On-Die Capacitor for Integrated Circuits, Woonseong Kim, Houle Gan, and Teckgyu Kang
Secure audio processing, Thad Hughes, Ignacio Lopez Moreno, Aleksandar Kracun, and Pedro Moreno
Directed Messages with Natural Identifiers, Oliver Gaymond and Lidia Gaymond
Insertion of information in hierarchical, Daniel Hoppe
INHERITANCE OF ATTRIBUTES IN A HIERARCHICAL, Daniel Hoppe
AUTOMATED DATA TRANSFER BETWEEN TWO, Daniel Hoppe