Searched for: author%3A%22Lagendijk%2C+R.L.%22
(1 - 20 of 31)

Pages

document
Li, T. (author), Xu, L. (author), Erkin, Z. (author), Lagendijk, R.L. (author)
With the fast development of e-commerce, there is a higher demand for timely delivery. Logistic companies want to send receivers a more accurate arrival prediction to improve customer satisfaction and lower customer retention costs. One approach is to share (near) real-time location data with recipients, but this also introduces privacy and...
conference paper 2024
document
Li, T. (author), Erkin, Z. (author), Lagendijk, R.L. (author)
With the emerging of e-commerce, package theft is at a high level: It is reported that 1.7 million packages are stolen or lost every day in the U.S. in 2020, which costs $25 million every day for the lost packages and the service. Information leakage during transportation is an important reason for theft since thieves can identify which truck is...
journal article 2022
document
Cavalcante Siebert, L. (author), Lupetti, M.L. (author), Aizenberg, E. (author), Beckers, N.W.M. (author), Zgonnikov, A. (author), Veluwenkamp, H.M. (author), Abbink, D.A. (author), Giaccardi, Elisa (author), Houben, G.J.P.M. (author), Jonker, C.M. (author), van den Hoven, M.J. (author), Forster, D. (author), Lagendijk, R.L. (author)
How can humans remain in control of artificial intelligence (AI)-based systems designed to perform tasks autonomously? Such systems are increasingly ubiquitous, creating benefits - but also undesirable situations where moral responsibility for their actions cannot be properly attributed to any particular person or group. The concept of...
journal article 2022
document
Ugwuoke, C.I. (author), Erkin, Z. (author), Reinders, M.J.T. (author), Lagendijk, R.L. (author)
Genome sequencing has rapidly advanced in the last decade, making it easier for anyone to obtain digital genomes at low costs from companies such as Helix, MyHeritage, and 23andMe. Companies now offer their services in a direct-to-consumer (DTC) model without the intervention of a medical institution. Thereby, providing people with direct...
conference paper 2020
document
Nateghizad, M. (author), Erkin, Z. (author), Lagendijk, R.L. (author)
Many countries around the globe are investing on e-healthcare increasingly, which offers tremendous benefits to all stakeholders in healthcare. Nevertheless, this technology introduces unprecedented privacy concerns toward patients and raise more uncertainty among them to use e-healthcare for monitoring their vital signs. These concerns...
conference paper 2017
document
Tillem, G. (author), Erkin, Z. (author), Lagendijk, R.L. (author)
The growing complexity of software with respect to technological advances encourages model-based analysis of software systems for validation and verification. Process mining is one recently investigated technique for such analysis which enables the discovery of process models from event logs collected during software execution. However, the...
conference paper 2017
document
Tillem, G. (author), Erkin, Z. (author), Lagendijk, R.L. (author)
Validation in a big software system can be managed by analysis of its behaviour through occasionally collected event logs. Process mining is a technique to perform software validation by discovering process models from event logs or by checking the conformance of the logs to a process model. A well-known algorithm in process mining to discover...
conference paper 2016
document
Ugwuoke, C.I. (author), Erkin, Z. (author), Lagendijk, R.L. (author)
The continuous decline in the cost of DNA sequencing has contributed bothpositive and negative feelings in the academia and research community. It hasnow become possible to harvest large amounts of genetic data, which researches believe their study will help improve preventive and personalised healthcare, better understanding of diseases and...
conference paper 2016
document
Nateghizad, M. (author), Erkin, Z. (author), Lagendijk, R.L. (author)
In smart grids, providing power consumption statistics to the customers and generating recommendations for managing electrical devices are considered to be effective methods that can help to reduce energy consumption. Unfortunately, providing power consumption statistics and generating recommendations rely on highly privacy-sensitive smart...
journal article 2016
document
Erkin, Z. (author), Veugen, T. (author), Toft, T. (author), Lagendijk, R.L. (author)
Clustering is a very important tool in data mining and is widely used in on-line services for medical, financial and social environments. The main goal in clustering is to create sets of similar objects in a data set. The data set to be used for clustering can be owned by a single entity, or in some cases, information from different databases is...
journal article 2013
document
Doets, P.J.O. (author), Lagendijk, R.L. (author)
An audio fingerprint is a compact yet very robust representation of the perceptually relevant parts of an audio signal. It can be used for content-based audio identification, even when the audio is severely distorted. Audio compression changes the fingerprint slightly. We show that these small fingerprint differences due to compression can be...
journal article 2008
document
Prins, J.P. (author), Erkin, Z. (author), Lagendijk, R.L. (author)
Fingerprinting is an essential tool to shun legal buyers of digital content from illegal redistribution. In fingerprinting schemes, the merchant embeds the buyer's identity as a watermark into the content so that the merchant can retrieve the buyer's identity when he encounters a redistributed copy. To prevent the merchant from dishonestly...
journal article 2007
document
Erkin, Z. (author), Piva, A. (author), Katzenbeisser, S. (author), Lagendijk, R.L. (author), Shokrollahi, J. (author), Neven, G. (author), Barni, M. (author)
The processing and encryption of multimedia content are generally considered sequential and independent operations. In certain multimedia content processing scenarios, it is, however, desirable to carry out processing directly on encrypted signals. The field of secure signal processing poses significant challenges for both signal processing and...
journal article 2007
document
Doets, P.J.O. (author), Menot Gisbert, M. (author), Lagendijk, R.L. (author)
Audio fingerprints can be seen as hashes of the perceptual content of an audio excerpt. Applications include linking metadata to unlabeled audio, watermark support, and broadcast monitoring. Existing systems identify a song by comparing its fingerprint to pre-computed fingerprints in a database. Small changes of the audio induce small...
conference paper 2006
document
Wang, J. (author), Shterev, I.D. (author), Lagendijk, R.L. (author)
This paper presents a scheme for estimating two-band amplitude scale attack within a quantization-based watermarking context. Quantization-based watermarking schemes comprise a class of watermarking schemes that achieves the channel capacity in terms of additive noise attacks1. Unfortunately, Quantization-based watermarking schemes are not...
conference paper 2006
document
Meyer, P.F.A. (author), Westerlaken, R.P. (author), Klein Gunnewiek, R. (author), Lagendijk, R.L. (author)
In distributed video coding, the complexity of the video encoder is reduced at the cost of a more complex video decoder. Using the principles of Slepian andWolf, video compression is then carried out using channel coding principles, under the assumption that the video decoder can temporally predict side-information that is correlated with the...
conference paper 2005
document
Taal, R.J. (author), Lagendijk, R.L. (author)
Peer-to-peer networks (P2P) form a distributed communication infrastructure that is particularly well matched to video streaming using multiple description coding. We form M descriptions using MDC-FEC building on a scalable version of the “Dirac” video coder. The M descriptions are streamed via M different application layer multicast (ALM) trees...
conference paper 2005
document
Wang, J. (author), Reinders, M.J.T. (author), Pouwelse, J. (author), Lagendijk, R.L. (author)
The Wi-Fi walkman is a mobile multimedia application that we developed to investigate the technological and usability aspects of human-computer interaction with personalized, intelligent and context-aware wearable devices in peer-to-peer wireless environments such as the future home, office, or university campuses. It is a small handheld device...
conference paper 2005
document
Shterev, I.D. (author), Lagendijk, R.L. (author)
Quantization-based watermarking schemes comprise a class of watermarking schemes that achieves the channel capacity in terms of additive noise attacks.1 The existence of good high dimensional lattices that can be efficiently implemented2–4 and incorporated into watermarking structures, made quantization-based watermarking schemes of practical...
conference paper 2005
document
van Roosmalen, P.M.B. (author), Lagendijk, R.L. (author), Biemond, J. (author)
journal article 2002
Searched for: author%3A%22Lagendijk%2C+R.L.%22
(1 - 20 of 31)

Pages