San Francisco, California, United States
Contact Info
16K followers
500+ connections
About
Articles by Jim
-
Innovation Infusion: Toyota Ventures Injects Another $300M Into Climate and Deep Tech
Innovation Infusion: Toyota Ventures Injects Another $300M Into Climate and Deep Tech
By Jim Adler
-
Head in the Clouds, Feet on the Ground: Toyota Ventures at 5 Years
Head in the Clouds, Feet on the Ground: Toyota Ventures at 5 Years
By Jim Adler
-
Finding New Mountains: Our Venture Mission of Discovery
Finding New Mountains: Our Venture Mission of Discovery
By Jim Adler
Activity
-
Please join us in welcoming the newest member of the JetBlue Ventures team! Tori Orr joins us as an Associate on the Investment team, where she’ll…
Please join us in welcoming the newest member of the JetBlue Ventures team! Tori Orr joins us as an Associate on the Investment team, where she’ll…
Liked by Jim Adler
-
Last week, Foothill Ventures co-hosted the Robotics Founders and Funders summit at Google Sunnyvale campus, together with CMU Tech &…
Last week, Foothill Ventures co-hosted the Robotics Founders and Funders summit at Google Sunnyvale campus, together with CMU Tech &…
Liked by Jim Adler
-
Thanks, Tanya Dua, for your interest in Toyota Ventures and the insightful questions!
Thanks, Tanya Dua, for your interest in Toyota Ventures and the insightful questions!
Shared by Jim Adler
Experience & Education
Publications
-
Big Data and Thought Crime: an Interview with Jim Adler
Big Data Journal
At the Strata Conference in New York, Jim presented “Big Data is a hotbed of thought crime,” highlighting the implications of “computerized thought” for privacy, morality, ethics, and the law.
Other authorsSee publication -
What would the U.S. Founding Fathers do in the age of social media?
Seattle Times
Today we celebrate the 235th anniversary of the signing of the Declaration of Independence. It got me thinking about how our American commitment to life, liberty and the pursuit of happiness applies to today's high-tech, fast-paced, social-media world, especially for privacy and speech rights.
-
Count votes same way we count money
Seattle Post-Intelligencer
Why can't counting ballots be as precise and mundane as counting money in the bank? Democracy can be messy, but that doesn't mean counting our votes should be, too.
-
Forward sequential algorithms for best basis selection
IEE Proceedings-Vision, Image and Signal Processing
The problem of signal representation in terms of basis vectors from a large, over-complete, spanning dictionary has been the focus of much research, Achieving a succinct, or "sparse", representation is known as the problem of best basis representation. Methods are considered which seek to solve this problem by sequentially building up a basis set for the signal. Three distinct algorithm types have appeared in the literature, which are here termed basic matching pursuit (BMP), order recursive…
The problem of signal representation in terms of basis vectors from a large, over-complete, spanning dictionary has been the focus of much research, Achieving a succinct, or "sparse", representation is known as the problem of best basis representation. Methods are considered which seek to solve this problem by sequentially building up a basis set for the signal. Three distinct algorithm types have appeared in the literature, which are here termed basic matching pursuit (BMP), order recursive matching pursuit (ORMP) and modified matching pursuit (MMP). The algorithms are first described and then their computation is closely examined. Modifications are made to each of the procedures which improve their computational efficiency. Experimental results are presented which demonstrate that the ORMP method is the best procedure in terms of its ability to give the most compact signal representation, followed by MMP and the BMP which the poorest results. Finally, weighing the performance of each algorithm, its computational complexity and the type of dictionary available, recommendations are made as to which algorithm should be used for a given problem.
Other authors -
Comparison of Basis Selection Methods
IEEE Thirtieth Asilomar Conference on Signals, Systems and Computers
Three forward sequential basis selection methods are described: Basic Matching Pursuit (BMP), Order Recursive Matching Pursuit (ORMP) and Modified Matching Pursuit (MMP). A parallel basis selection method is also described and evaluated: the FOCal Underdetermined System Solver (FOCUSS) algorithm.
Other authors
Patents
-
Systems and methods for detecting markers on a roadway
Issued US 10,127,462B1
System, methods, and other embodiments described herein relate to detecting markers on a roadway. In one embodiment, a method includes controlling a radar to transmit a scanning signal with defined characteristics. The radar is integrated with a vehicle that is traveling on the roadway. The method includes, in response to receiving a reflected signal resulting from the scanning signal interacting with the roadway, identifying the marker from the reflected signal according to an electromagnetic…
System, methods, and other embodiments described herein relate to detecting markers on a roadway. In one embodiment, a method includes controlling a radar to transmit a scanning signal with defined characteristics. The radar is integrated with a vehicle that is traveling on the roadway. The method includes, in response to receiving a reflected signal resulting from the scanning signal interacting with the roadway, identifying the marker from the reflected signal according to an electromagnetic signature of the marker embodied in the reflected signal. The electromagnetic signature is a response induced within the defined characteristics of the scanning signal that is embodied within the reflected signal.
Other inventorsSee patent -
Electronic document verification system and method
Issued US 5,606,609
The integrity of an electronic document can be verified by embedding a security object in the electronic document at a location selected by the signator. The security information can be encrypted using either private key encryption or public key encryption. The signator of the electronic document can be verified based upon the result of the decryption. The integrity of the electronic document can be verified if the decrypted document digest matches the calculated document digest. If the…
The integrity of an electronic document can be verified by embedding a security object in the electronic document at a location selected by the signator. The security information can be encrypted using either private key encryption or public key encryption. The signator of the electronic document can be verified based upon the result of the decryption. The integrity of the electronic document can be verified if the decrypted document digest matches the calculated document digest. If the signator and the document integrity are confirmed, the electronic chop is displayed in the document.
Other inventors
More activity by Jim
-
The New York Times has a nice piece on ElliQ from Intuition Robotics. ElliQ is an AI companion that’s enriching the lives of older adults by engaging…
The New York Times has a nice piece on ElliQ from Intuition Robotics. ElliQ is an AI companion that’s enriching the lives of older adults by engaging…
Shared by Jim Adler
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Jim Adler in United States
-
Jim Adler
Partner at ADLER & Co. Modern and Contemporary Art
-
Jim Adler
Principal - Software Delivery Program/Project Manager at AT&T
-
Jim Adler
Executive Vice President
-
Jim Adler
Attorney, Adler and Manson - Missouri & Kansas Injury Attorneys
96 others named Jim Adler in United States are on LinkedIn
See others named Jim Adler