About
— entrepreneur · investor · executive · data geek · privacy thinker · former rocket…
Articles by Jim
Activity
-
Our portfolio company Haiqu recently published its paper "Scalable and shallow quantum circuits encoding probability distributions informed by…
Our portfolio company Haiqu recently published its paper "Scalable and shallow quantum circuits encoding probability distributions informed by…
Liked by Jim Adler
-
If this is your area of interest, jump at this internship opportunity! Our Carbon Neutrality group at TRI is the best of the best - you will learn a…
If this is your area of interest, jump at this internship opportunity! Our Carbon Neutrality group at TRI is the best of the best - you will learn a…
Liked by Jim Adler
-
I really enjoyed this conversation with Ben Adida of VotingWorks where I got to ask all the election security questions you have always wanted to…
I really enjoyed this conversation with Ben Adida of VotingWorks where I got to ask all the election security questions you have always wanted to…
Liked by Jim Adler
Experience
Education
Publications
-
Big Data and Thought Crime: an Interview with Jim Adler
Big Data Journal
At the Strata Conference in New York, Jim presented “Big Data is a hotbed of thought crime,” highlighting the implications of “computerized thought” for privacy, morality, ethics, and the law.
Other authorsSee publication -
What would the U.S. Founding Fathers do in the age of social media?
Seattle Times
Today we celebrate the 235th anniversary of the signing of the Declaration of Independence. It got me thinking about how our American commitment to life, liberty and the pursuit of happiness applies to today's high-tech, fast-paced, social-media world, especially for privacy and speech rights.
-
Count votes same way we count money
Seattle Post-Intelligencer
Why can't counting ballots be as precise and mundane as counting money in the bank? Democracy can be messy, but that doesn't mean counting our votes should be, too.
-
Forward sequential algorithms for best basis selection
IEE Proceedings-Vision, Image and Signal Processing
The problem of signal representation in terms of basis vectors from a large, over-complete, spanning dictionary has been the focus of much research, Achieving a succinct, or "sparse", representation is known as the problem of best basis representation. Methods are considered which seek to solve this problem by sequentially building up a basis set for the signal. Three distinct algorithm types have appeared in the literature, which are here termed basic matching pursuit (BMP), order recursive…
The problem of signal representation in terms of basis vectors from a large, over-complete, spanning dictionary has been the focus of much research, Achieving a succinct, or "sparse", representation is known as the problem of best basis representation. Methods are considered which seek to solve this problem by sequentially building up a basis set for the signal. Three distinct algorithm types have appeared in the literature, which are here termed basic matching pursuit (BMP), order recursive matching pursuit (ORMP) and modified matching pursuit (MMP). The algorithms are first described and then their computation is closely examined. Modifications are made to each of the procedures which improve their computational efficiency. Experimental results are presented which demonstrate that the ORMP method is the best procedure in terms of its ability to give the most compact signal representation, followed by MMP and the BMP which the poorest results. Finally, weighing the performance of each algorithm, its computational complexity and the type of dictionary available, recommendations are made as to which algorithm should be used for a given problem.
Other authors -
-
Comparison of Basis Selection Methods
IEEE Thirtieth Asilomar Conference on Signals, Systems and Computers
Three forward sequential basis selection methods are described: Basic Matching Pursuit (BMP), Order Recursive Matching Pursuit (ORMP) and Modified Matching Pursuit (MMP). A parallel basis selection method is also described and evaluated: the FOCal Underdetermined System Solver (FOCUSS) algorithm.
Other authors -
Patents
-
Systems and methods for detecting markers on a roadway
Issued US 10,127,462B1
System, methods, and other embodiments described herein relate to detecting markers on a roadway. In one embodiment, a method includes controlling a radar to transmit a scanning signal with defined characteristics. The radar is integrated with a vehicle that is traveling on the roadway. The method includes, in response to receiving a reflected signal resulting from the scanning signal interacting with the roadway, identifying the marker from the reflected signal according to an electromagnetic…
System, methods, and other embodiments described herein relate to detecting markers on a roadway. In one embodiment, a method includes controlling a radar to transmit a scanning signal with defined characteristics. The radar is integrated with a vehicle that is traveling on the roadway. The method includes, in response to receiving a reflected signal resulting from the scanning signal interacting with the roadway, identifying the marker from the reflected signal according to an electromagnetic signature of the marker embodied in the reflected signal. The electromagnetic signature is a response induced within the defined characteristics of the scanning signal that is embodied within the reflected signal.
Other inventorsSee patent -
Electronic document verification system and method
Issued US 5,606,609
The integrity of an electronic document can be verified by embedding a security object in the electronic document at a location selected by the signator. The security information can be encrypted using either private key encryption or public key encryption. The signator of the electronic document can be verified based upon the result of the decryption. The integrity of the electronic document can be verified if the decrypted document digest matches the calculated document digest. If the…
The integrity of an electronic document can be verified by embedding a security object in the electronic document at a location selected by the signator. The security information can be encrypted using either private key encryption or public key encryption. The signator of the electronic document can be verified based upon the result of the decryption. The integrity of the electronic document can be verified if the decrypted document digest matches the calculated document digest. If the signator and the document integrity are confirmed, the electronic chop is displayed in the document.
Other inventors -
More activity by Jim
-
Finally, the ability to connect blockchain assets to real world payment card networks. Welcome to the Toyota Ventures portfolio, Holyheld!
Finally, the ability to connect blockchain assets to real world payment card networks. Welcome to the Toyota Ventures portfolio, Holyheld!
Shared by Jim Adler
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Jim Adler in United States
-
Jim Adler
Partner at ADLER & Co. Modern and Contemporary Art
-
Jim Adler
Principal - Software Delivery Program/Project Manager at AT&T
-
Jim Adler
Executive Vice President
-
Jim Adler
Attorney, Adler and Manson - Missouri & Kansas Injury Attorneys
97 others named Jim Adler in United States are on LinkedIn
See others named Jim Adler