Keywords:
Publications of Samy Bengio sorted by recency
Discriminative Keyword Spotting, , and , in: Speech Communication, 51(4), 2009 |
|
Discriminative Keyword Spotting, , and , in: Automatic Speech and Speaker Recognition: Large Margin and Kernel Methods, John Wiley and Sons, 2009 |
A Proposal for a Kernel-based Algorithm for Large Vocabulary Continuous Speech Recognition, , in: Automatic Speech and Speaker Recognition: Large Margin and Kernel Methods, John Wiley and Sons, 2009 |
A Kernel Wrapper for Phoneme Sequence Recognition, and , in: Automatic Speech and Speaker Recognition: Large Margin and Kernel Methods, John Wiley and Sons, 2009 |
A Large Margin Algorithm for Forced Alignment, , , and , in: Automatic Speech and Speaker Recognition: Large Margin and Kernel Methods, John Wiley and Sons, 2009 |
Kernel Based Text-Independnent Speaker Verification, , and , Idiap-RR-68-2008 |
|
Automatic Speech and Speaker Recognition: Large Margin and Kernel Methods, and , John Wiley & Sons, 2008 |
Discriminative Keyword Spotting, , and , in: Workshop on Non-Linear Speech Processing, Paris, France, 2007 |
|
Discriminative Kernel-Based Phoneme Sequence Recognition, , , , and , in: The 9th International Conference on Spoken Language Processing (INTERSPEECH), Pittsburgh, PA, 2006 |
|
Performance Generalization in Biometric Authentication Using Joint User-Specific and Sample Bootstraps, , and , Idiap-RR-60-2005 |
|
Using Chimeric Users to Construct Fusion Classifiers in Biometric Authentication Tasks: An Investigation, and , Idiap-RR-59-2005 |
|
Using Chimeric Users to Construct Fusion Classifiers in Biometric Authentication Tasks: An Investigation, and , Idiap-RR-59-2005 |
|
Biometric Person Authentication IS A Multiple Classifier Problem, and , in: 7th International Workshop on Multiple Classifier Systems, MCS, 2007 |
|
Predictive Models for Music, , and , Idiap-RR-51-2008 |
|
Probabilistic Models for Melodic Prediction, , and , Idiap-RR-50-2008 |
|
Benchmarking Non-Parametric Statistical Tests, , and , Idiap-RR-38-2005 |
|
Extracting Information from Multimedia Meeting Collections, , and , Idiap-RR-50-2005 |
|
Modeling Individual and Group Actions in Meetings: a Two-Layer HMM Framework, , , , and , Idiap-RR-09-2004 |
|
A State-of-the-art Neural Network for Robust Face Verification, , and , Idiap-RR-36-2002 |
|
Robust Speech Recognition and Feature Extraction Using HMM2, , , and , Idiap-RR-42-2001 |
|
Face Verification Using Synthesized Non-Frontal Models, and , Idiap-RR-60-2003 |
|
Investigating Lexical Substitution Scoring for Subtitle Generation, , , , and , Idiap-RR-36-2006 |
|
Online Policy Adaptation for Ensemble Classifiers, and , Idiap-RR-69-2003 |
|
Exploring Contextual Information in a Layered Framework for Group Action Recognition, , and , Idiap-RR-41-2006 |
|
Taking on the Curse of Dimensionality in Joint Distributions Using Neural Networks, and , Idiap-RR-01-2000 |
|
A Multi-sample Multi-source Model for Biometric Authentication, , and , Idiap-RR-14-2002 |
|
A Statistical Significance Test for Person Authentication, and , Idiap-RR-83-2003 |
|
Revisiting Doddington's Zoo: A Systematic Method to Assess User-dependent Variabilities, , and , Idiap-RR-04-2006 |
|
Performance Generalization in Biometric Authentication Using Joint User-Specific and Sample Bootstraps, , and , Idiap-RR-60-2005 |
|
Adapted Generative Models For Face Verification, , and , Idiap-RR-76-2003 |
|
A New Margin-Based Criterion for Efficient Gradient Descent, and , Idiap-RR-16-2003 |
|
Hierarchical Multi-Stream Posterior Based Speech Recognition System, , and , Idiap-RR-25-2005 |
|
Using more informative posterior probabilities for speech recognition, , , and , Idiap-RR-91-2005 |
|
Towards Predicting Optimal Subsets of Base-Experts in Biometric Authentication Task, and , Idiap-RR-17-2004 |
|
Automatic Speech Recognition using Dynamic Bayesian Networks with both Acoustic and Articulatory Variables, , , and , Idiap-RR-19-2000 |
|
HMM2- A Novel Approach to HMM Emission Probability Estimation, , and , Idiap-RR-30-2000 |
|
Experimental Protocol on the BANCA Database, , , , , , , and , Idiap-RR-05-2002 |
|
Modeling Individual and Group Actions in Meetings With Layered HMMs, , , , and , Idiap-RR-33-2004 |
|
Measuring the Performance of Face Localization Systems, , , and , Idiap-RR-53-2005 |
|
A Kernel Trick For Sequences Applied to Text-Independent Speaker Verification Systems, and , Idiap-RR-77-2005 |
|
The Expected Performance Curve, , and , Idiap-RR-85-2003 |
|
A Probabilistic Interpretation of SVMs with an Application to Unbalanced Classification, , and , Idiap-RR-26-2005 |
|
Modeling Human Interaction in Meetings, , , , , , , and , Idiap-RR-59-2002 |
|
Database, Protocol and Tools for Evaluating Score-Level Fusion Algorithms in Biometric Authentication, and , Idiap-RR-44-2004 |
|
Non-Linear Variance Reduction Techniques in Biometric Authentication, and , Idiap-RR-26-2003 |
|
Improving Face Verification using Skin Color Information, and , Idiap-RR-44-2001 |
|
Automatic Analysis of Multimodal Group Actions in Meetings, , , , , and , Idiap-RR-27-2003 |
|
Speech Recognition Using Advanced HMM2 Features, , and , Idiap-RR-24-2001 |
|
Scalability Analysis of Audio-Visual Person Identity Verification, , , and , Idiap-RR-04-2003 |
|