Technologies Found (43)
Array ( [cache_time] => 0 [counts_time] => 0 [query_time] => [category_counts_time] => 0 [total_time] => 0 )
Technology NameBriefcaseLead Researcher
  A New family of second-generation wavelets constructed using robust data-prediction lifting scheme    Highlights Almost every application for manipulating and improving photographic images, such as noise reduction and detail enhancement, ...
More
Fattal Raanan
Methods and systems for processing an input. An input vector y is received that represents a noisy observation of Ax, where A is a data matrix and x is a data vector of unknown variables. Data vector x is recovered from the received input vector ...
More
Dolev Danny
Application Competitive applications processes are widely implemented across academic and nonacademic organizations. Managing the application processes is highly sensitive for both sides. Application processes like scholarships, tenure track ...
More
Kramer Diego
Application Machine learning is the most important technological development of the century, with countless applications. Modern machine learning algorithms utilize neural network architectures (deep learning). Today's neural networks do ...
More
Rappoport Ari
Keywords Group messaging, out-of-band authentication, end-to-end encryption, man-in-the-middle attacks Current development stage TRL4 Technology validated in lab               Background While actively communicating at multiple messaging ...
More
Segev Gil
Fast and simple editing of special video effects  Motion computation in video editing involves warping or manipulations of time in order to control the chronological time of events, including delaying or slowing down some activities while ...
More
Peleg Shmuel
Application A number of overlapping images of a scene are initially recorded by a camera to form a mosaic. Mosaic images constitute a panoramic view around the optical axis. Mosaic images from aerial cameras translate parallel to the scene and ...
More
Peleg Shmuel
Application Social network technologies (SNT) and online Social Network Sites (SNS) are immensely popular and have become an integral part of people's everyday functioning and social lives worldwide, and especially among adolescents. The ...
More
Schwarz Baruch (Education)
Our Innovation An interactive web-based map based on innovative digital-mapping and information visualization technologies designed to explore and experience Jewish cultures in their historical development from a perspective of time and ...
More
Seroussi Edwin
Application Middleboxes play a major role in Software Defined Networks (SDN) as forwarding compressed packets is not enough to meet operators demands in terms of security, QoS/QoE provisioning and load balancing. In current systems, Deep Packet ...
More
Hay David
  Background Precise measurement of time is essential for many aspects of modern technology. The ubiquitous need for a stable frequency or wavelength reference has major implications for applications related to navigation, communication, ...
More
Levy Uriel
Computer-assisted addition of colors to monochrome images or movies  Highlights Computer-assisted process for adding colors to monochrome images or films Simplifies colorization process by exploiting the premise that neighboring pixels in ...
More
Lischinski Daniel
Fills the gap between crystallography and optical imaging    Background Information about macromolecules is encoded in their shape and the way they are assembled. X-ray scattering methods are important tools for investigating the structure and ...
More
Raviv Uri
Reduces incidence of serious errors and costs Errors are a serious concern in high performance computing. Increase in machine size and decrease in operating voltage lead to increase in the incidence of hard errors (component failure) and soft ...
More
Schwartz Oded
Preserves sharp edges in enlarged images (Converts DVD to HD)  Image upscaling, or enlargement of image size, results in blurring of edges and loss of image quality Although digital cameras produce high-resolution images, there still exist ...
More
Fattal Raanan
Highlights A new efficient method for recovering reliable local sets of dense correspondences between two images with shared content. The method could be applied for: automatic adjusting of the source’ tonal characteristics to match a ...
More
Lischinski Daniel
Application Employing the right person in the right job is a joint interest of the employer and the job seeker. The employer regrets the hiring decisions and terminates the individual's employment; in many other cases the individual regret his ...
More
Gati Itamar
Searchable symmetric encryption with practical big-data performance and strong security Outsourcing data storage to remote servers offers invaluable benefits while introducing many concerns when dealing with sensitive data.  In the presence of ...
More
Segev Gil
Fast Online Deep Packet Inspection (DPI) Network security requires the inspection of data packets for protocol non-compliance, viruses, spam, intrusions, or other predefined security-linked criteria. Usually carried out by a network device ...
More
Hay David
Application         A voice of a speaking person is usually surrounded by unrelated sounds (background noise) which make it hard to understand him. In case of multiple speaker, the noise is hard to be aligned Previous audio-visual approaches ...
More
Peleg Shmuel