Technologies Found (41)
Array ( [cache_time] => 0 [counts_time] => 0 [query_time] => [category_counts_time] => 0 [total_time] => 0 )
Technology NameBriefcaseLead Researcher
Application Machine learning is the most important technological development of the century, with countless applications. Modern machine learning algorithms utilize neural network architectures (deep learning). Today's neural networks do ...
More
Rappoport Ari
Keywords Group messaging, out-of-band authentication, end-to-end encryption, man-in-the-middle attacks Current development stage TRL4 Technology validated in lab               Background While actively communicating at multiple messaging ...
More
Segev Gil
Fast and simple editing of special video effects  Motion computation in video editing involves warping or manipulations of time in order to control the chronological time of events, including delaying or slowing down some activities while ...
More
Peleg Shmuel
Application A number of overlapping images of a scene are initially recorded by a camera to form a mosaic. Mosaic images constitute a panoramic view around the optical axis. Mosaic images from aerial cameras translate parallel to the scene and ...
More
Peleg Shmuel
Application Social network technologies (SNT) and online Social Network Sites (SNS) are immensely popular and have become an integral part of people's everyday functioning and social lives worldwide, and especially among adolescents. The ...
More
Schwarz Baruch (Education)
Our Innovation An interactive web-based map based on innovative digital-mapping and information visualization technologies designed to explore and experience Jewish cultures in their historical development from a perspective of time and ...
More
Seroussi Edwin
Application Middleboxes play a major role in Software Defined Networks (SDN) as forwarding compressed packets is not enough to meet operators demands in terms of security, QoS/QoE provisioning and load balancing. In current systems, Deep Packet ...
More
Hay David
  Background Precise measurement of time is essential for many aspects of modern technology. The ubiquitous need for a stable frequency or wavelength reference has major implications for applications related to navigation, communication, ...
More
Levy Uriel
Computer-assisted addition of colors to monochrome images or movies  Highlights Computer-assisted process for adding colors to monochrome images or films Simplifies colorization process by exploiting the premise that neighboring pixels in ...
More
Lischinski Daniel
Fills the gap between crystallography and optical imaging    Background Information about macromolecules is encoded in their shape and the way they are assembled. X-ray scattering methods are important tools for investigating the structure and ...
More
Raviv Uri
Reduces incidence of serious errors and costs Errors are a serious concern in high performance computing. Increase in machine size and decrease in operating voltage lead to increase in the incidence of hard errors (component failure) and soft ...
More
Schwartz Oded
Preserves sharp edges in enlarged images (Converts DVD to HD)  Image upscaling, or enlargement of image size, results in blurring of edges and loss of image quality Although digital cameras produce high-resolution images, there still exist ...
More
Fattal Raanan
Highlights A new efficient method for recovering reliable local sets of dense correspondences between two images with shared content. The method could be applied for: automatic adjusting of the source’ tonal characteristics to match a ...
More
Lischinski Daniel
Application Employing the right person in the right job is a joint interest of the employer and the job seeker. The employer regrets the hiring decisions and terminates the individual's employment; in many other cases the individual regret his ...
More
Gati Itamar
Searchable symmetric encryption with practical big-data performance and strong security Outsourcing data storage to remote servers offers invaluable benefits while introducing many concerns when dealing with sensitive data.  In the presence of ...
More
Segev Gil
Fast Online Deep Packet Inspection (DPI) Network security requires the inspection of data packets for protocol non-compliance, viruses, spam, intrusions, or other predefined security-linked criteria. Usually carried out by a network device ...
More
Hay David
Application         A voice of a speaking person is usually surrounded by unrelated sounds (background noise) which make it hard to understand him. In case of multiple speaker, the noise is hard to be aligned Previous audio-visual approaches ...
More
Peleg Shmuel
Our Innovation System uses pictures, pseudo words, or artificial grammar to establish a secret between the user and the computer.  By testing user’s knowledge of the shared secret, program accepts the user only after the chance of imposture ...
More
Weinshall Daphna
Research-based tools for maximizing social interactions on a brand    Background Social interactions among consumers, both offline and through social media, have proven to be a central driver in the success of brands. Firms and brand managers ...
More
Peres Renana
Highlights Advanced tools for analyzing, monitoring, and understanding public and political discourse around the world The tools bring together theoretical understanding of political and public discourse with state-of- the-art computational ...
More
Sheafer Tamir