Jim Adler

San Francisco, California, United States Contact Info
16K followers 500+ connections

Join to view profile

About

— entrepreneur · investor · executive · data geek · privacy thinker · former rocket…

Articles by Jim

See all articles

Activity

Join now to see all activity

Experience & Education

  • Toyota Ventures

View Jim’s full experience

See their title, tenure and more.

or

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Publications

  • Big Data and Thought Crime: an Interview with Jim Adler

    Big Data Journal

    At the Strata Conference in New York, Jim presented “Big Data is a hotbed of thought crime,” highlighting the implications of “computerized thought” for privacy, morality, ethics, and the law.

    Other authors
    See publication
  • What would the U.S. Founding Fathers do in the age of social media?

    Seattle Times

    Today we celebrate the 235th anniversary of the signing of the Declaration of Independence. It got me thinking about how our American commitment to life, liberty and the pursuit of happiness applies to today's high-tech, fast-paced, social-media world, especially for privacy and speech rights.

    See publication
  • Count votes same way we count money

    Seattle Post-Intelligencer

    Why can't counting ballots be as precise and mundane as counting money in the bank? Democracy can be messy, but that doesn't mean counting our votes should be, too.

    See publication
  • Forward sequential algorithms for best basis selection

    IEE Proceedings-Vision, Image and Signal Processing

    The problem of signal representation in terms of basis vectors from a large, over-complete, spanning dictionary has been the focus of much research, Achieving a succinct, or "sparse", representation is known as the problem of best basis representation. Methods are considered which seek to solve this problem by sequentially building up a basis set for the signal. Three distinct algorithm types have appeared in the literature, which are here termed basic matching pursuit (BMP), order recursive…

    The problem of signal representation in terms of basis vectors from a large, over-complete, spanning dictionary has been the focus of much research, Achieving a succinct, or "sparse", representation is known as the problem of best basis representation. Methods are considered which seek to solve this problem by sequentially building up a basis set for the signal. Three distinct algorithm types have appeared in the literature, which are here termed basic matching pursuit (BMP), order recursive matching pursuit (ORMP) and modified matching pursuit (MMP). The algorithms are first described and then their computation is closely examined. Modifications are made to each of the procedures which improve their computational efficiency. Experimental results are presented which demonstrate that the ORMP method is the best procedure in terms of its ability to give the most compact signal representation, followed by MMP and the BMP which the poorest results. Finally, weighing the performance of each algorithm, its computational complexity and the type of dictionary available, recommendations are made as to which algorithm should be used for a given problem.

    Other authors
    • Scott Cotter
    • Bhaskar Rao
    • Ken Kreutz-Delgado
    See publication
  • Comparison of Basis Selection Methods

    IEEE Thirtieth Asilomar Conference on Signals, Systems and Computers

    Three forward sequential basis selection methods are described: Basic Matching Pursuit (BMP), Order Recursive Matching Pursuit (ORMP) and Modified Matching Pursuit (MMP). A parallel basis selection method is also described and evaluated: the FOCal Underdetermined System Solver (FOCUSS) algorithm.

    Other authors
    • Bhaskar Rao
    • Kenneth Kreutz-Delgado
    See publication

Patents

  • Systems and methods for detecting markers on a roadway

    Issued US 10,127,462B1

    System, methods, and other embodiments described herein relate to detecting markers on a roadway. In one embodiment, a method includes controlling a radar to transmit a scanning signal with defined characteristics. The radar is integrated with a vehicle that is traveling on the roadway. The method includes, in response to receiving a reflected signal resulting from the scanning signal interacting with the roadway, identifying the marker from the reflected signal according to an electromagnetic…

    System, methods, and other embodiments described herein relate to detecting markers on a roadway. In one embodiment, a method includes controlling a radar to transmit a scanning signal with defined characteristics. The radar is integrated with a vehicle that is traveling on the roadway. The method includes, in response to receiving a reflected signal resulting from the scanning signal interacting with the roadway, identifying the marker from the reflected signal according to an electromagnetic signature of the marker embodied in the reflected signal. The electromagnetic signature is a response induced within the defined characteristics of the scanning signal that is embodied within the reflected signal.

    Other inventors
    See patent
  • Electronic document verification system and method

    Issued US 5,606,609

    The integrity of an electronic document can be verified by embedding a security object in the electronic document at a location selected by the signator. The security information can be encrypted using either private key encryption or public key encryption. The signator of the electronic document can be verified based upon the result of the decryption. The integrity of the electronic document can be verified if the decrypted document digest matches the calculated document digest. If the…

    The integrity of an electronic document can be verified by embedding a security object in the electronic document at a location selected by the signator. The security information can be encrypted using either private key encryption or public key encryption. The signator of the electronic document can be verified based upon the result of the decryption. The integrity of the electronic document can be verified if the decrypted document digest matches the calculated document digest. If the signator and the document integrity are confirmed, the electronic chop is displayed in the document.

    Other inventors
    • Peter Houser
    See patent

More activity by Jim

View Jim’s full profile

  • See who you know in common
  • Get introduced
  • Contact Jim directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Jim Adler in United States

Add new skills with these courses