Technologies Found (33)
Array ( [cache_time] => 0 [counts_time] => 0 [query_time] => [category_counts_time] => 0 [total_time] => 0 )
Technology NameBriefcaseLead Researcher
Reduces incidence of serious errors and costs Errors are a serious concern in high performance computing. Increase in machine size and decrease in operating voltage lead to increase in the incidence of hard errors (component failure) and soft ...
More
Schwartz Oded
  The Internet infrastructure was not designed with security in mind, and is consequently alarmingly vulnerable to attacks and configuration errors. Despite the consensus on the urgency of securing BGP routing, replacing BGP with S*BGP is still ...
More
Schapira Michael
Preserves sharp edges in enlarged images (Converts DVD to HD)  Image upscaling, or enlargement of image size, results in blurring of edges and loss of image quality Although digital cameras produce high-resolution images, there still exist ...
More
Fattal Raanan
Highlights A new efficient method for recovering reliable local sets of dense correspondences between two images with shared content. The method could be applied for: automatic adjusting of the source’ tonal characteristics to match a ...
More
Lischinski Daniel
Application Employing the right person in the right job is a joint interest of the employer and the job seeker. The employer regrets the hiring decisions and terminates the individual's employment; in many other cases the individual regret his ...
More
Gati Itamar
Searchable symmetric encryption with practical big-data performance and strong security Outsourcing data storage to remote servers offers invaluable benefits while introducing many concerns when dealing with sensitive data.  In the presence of ...
More
Segev Gil
Fast Online Deep Packet Inspection (DPI) Network security requires the inspection of data packets for protocol non-compliance, viruses, spam, intrusions, or other predefined security-linked criteria. Usually carried out by a network device ...
More
Hay David
Application         A voice of a speaking person is usually surrounded by unrelated sounds (background noise) which make it hard to understand him. In case of multiple speaker, the noise is hard to be aligned Previous audio-visual approaches ...
More
Peleg Shmuel
Highlights New protocol for certification of electronic identity Protects against computer corruption by viruses and hacker activities Successfully demonstrated capability to prevent  an impostor being accepted as user Secure certification ...
More
Weinshall Daphna
High quality, fast geometric image editing Highlights Recent computer vision technologies are enabling geometric image rearrangement. Current methods can introduce significant distortions, may limit flexibility or require extensive ...
More
Peleg Shmuel
Research-based tools for maximizing social interactions on a brand    Background Social interactions among consumers, both offline and through social media, have proven to be a central driver in the success of brands. Firms and brand managers ...
More
Peres Renana
Highlights Advanced tools for analyzing, monitoring, and understanding public and political discourse around the world The tools bring together theoretical understanding of political and public discourse with state-of- the-art computational ...
More
Sheafer Tamir
Gershon Ben-Shakhar, Department of Psychology, the Hebrew University of Jerusalem   Innovation summary We have developed an accurate technique for detecting deceitful attempts to deny recognition of a familiar face in a photograph. Based on ...
More
Pertzov Yoni
  • 1
  • 2