1
Huchen Fei, Dong Yang, Xiao Hong: System and method for rapid updating of credit information. JPMorgan Chase Bank N A, Hunton & Williams, April 17, 2012: US08160960 (54 worldwide citation)

According to one embodiment, the invention relates to a system and method for evaluating the creditworthiness of an account holder of a credit account comprising the steps of determining, at least once a day, whether a first data set relating to the creditworthiness of the account holder has been re ...


2
Xiao Hong Cao, Shu Yuen Ron Hui: Soft-switching techniques for power inverter legs. City University of Hong Kong, Barnes & Thornburg, September 19, 2006: US07110269 (32 worldwide citation)

This invention relates to new soft-switching techniques for minimizing switching losses and stress in power electronic circuits using inverter legs. By choosing the switching frequency with specific relationships with the resonant frequency of the power electronic circuits, the proposed switching te ...


3
Isaac Weiser, Margaret Weiser, Yong Biao Ye, Xiao Hong Guo, Jin Mao Huang: Novelties having spring supported appendages. Exhart Environmental Systems, Cislo & Thomas, June 3, 2003: US06572428 (31 worldwide citation)

A novelty item having extending appendages which are supported by springs so as to impart life-like movement thereto.


4

5
Huchen Fei, Dong Yang, Xiao Hong: System and method for rapid updating of credit information. JPMorgan Chase Bank N A, Hunton & Williams, March 30, 2010: US07689506 (19 worldwide citation)

According to one embodiment, the invention relates to a system and method for evaluating the creditworthiness of an account holder of a credit account comprising the steps of determining, at least once a day, whether a first data set relating to the creditworthiness of the account holder has been re ...


6
Zhenyu Wu, Xiao Hong Yan: Hybrid digital watermarking for video authentication. MY EZ Communications, F Chau & Associates, August 5, 2008: US07409556 (17 worldwide citation)

A hybrid digital watermarking system for video authentication includes an authenticated acquisition subsystem for digitally watermarking video data and a video management subsystem in signal communication with the authenticated acquisition subsystem for verifying the digitally watermarked video data ...


7
Daniel P Sophiea, Dwight K Hoffman, Xiao Hong, Gloria Hsu: Sound damping coating of flexible and rigid epoxy resins. The Dow Chemical Company, Essex Specialty Products, Norman L Sims, August 21, 2001: US06277903 (14 worldwide citation)

The invention is a sprayable coating having noise vibration and harshness reduction or absorption properties. Such composition comprises from about 10 to about 60 percent of the flexible epoxy resin, from about 5 to about 40 percent by weight of a rigid epoxy resin formulation, and a curing agent fo ...


8
Isaac Weiser, Margaret Weiser, Yong Biao Ye, Xiao Hong Guo, Jin Mao Huang: Novelties having spring supported appendages. Exhart Environmental Systems, Cislo & Thomas, July 29, 2003: US06599160 (13 worldwide citation)

A novelty item having extending appendages which are supported by springs so as to impart life-like movement thereto.


9
Michelle Xiao Hong Yan, Ke Huang, Hans Schüll: System and method for robust optic disk detection in retinal images using vessel structure and radon transform. Siemens Corporate Research, April 28, 2009: US07524061 (10 worldwide citation)

A method for optic disk detection in retinal images, includes: extracting a vessel tree from a retinal image; locating an optic disk in the retinal image using the vessel tree; enhancing a contrast of the optic disk; removing vessels from the contrast enhanced optic disk; detecting a boundary of the ...


10
Xiao Hong Du: Bit-line shielding method for ferroelectric memories. Ramtron International Corporation, Hogan & Hartson L, April 6, 2004: US06717839 (10 worldwide citation)

A bit-line shielding technique for a ferroelectric memory logically divides the bit-lines in the array into two groups. When the bit-lines in one of the groups are accessed, the bit-lines in the other group are not accessed and thus can be grounded to electrically shield the bit-lines being accessed ...