Searched for: subject%3A%22quantization%22
(1 - 5 of 5)
document
Li, Qiongxiu (author), Gundersen, Jaron Skovsted (author), Lopuhaa-Zwakenberg, Milan (author), Heusdens, R. (author)
Privacy-preserving distributed average consensus has received significant attention recently due to its wide applicability. Based on the achieved performances, existing approaches can be broadly classified into perfect accuracy-prioritized approaches such as secure multiparty computation (SMPC), and worst-case privacy-prioritized approaches...
journal article 2024
document
Li, Qiongxiu (author), Heusdens, R. (author), Christensen, M.T. (author)
Privacy issues and communication cost are both major concerns in distributed optimization in networks. There is often a trade-off between them because the encryption methods used for privacy-preservation often require expensive communication overhead. To address these issues, we, in this paper, propose a quantization-based approach to achieve...
journal article 2022
document
Zhang, J. (author), Heusdens, R. (author), Hendriks, R.C. (author)
In this paper, we present an algorithm to estimate the relative acoustic transfer function (RTF) of a target source in wireless acoustic sensor networks (WASNs). Two well-known methods to estimate the RTF are the covariance subtraction (CS) method and the covariance whitening (CW) approach, the latter based on the generalized eigenvalue...
journal article 2019
document
Amini, J. (author), Hendriks, R.C. (author), Heusdens, R. (author), Guo, M. (author), Jensen, Jesper Rindom (author)
Multi-microphone noise reduction algorithms in binaural hearing aids which cooperate through a wireless link have the potential to become of great importance in future hearing aid systems. However, limited transmission capacity of such devices necessitates the data compression of signals transmitted from one hearing aid to the contralateral one....
conference paper 2016
document
Shterev, I.D. (author), Lagendijk, I.L. (author), Heusdens, R. (author)
Quantization-based watermarking schemes are vulnerable to amplitude scaling. Therefore the scaling factor has to be accounted for either at the encoder, or at the decoder, prior to watermark decoding. In this paper we derive the marginal probability density model for the watermarked and attacked data, when the attack channel consists of...
conference paper 2004
Searched for: subject%3A%22quantization%22
(1 - 5 of 5)