Keywords:
Publications of Samy Bengio sorted by recency
| Discriminative Keyword Spotting, , and , in: Speech Communication, 51(4), 2009 |
|
| Discriminative Keyword Spotting, , and , in: Automatic Speech and Speaker Recognition: Large Margin and Kernel Methods, John Wiley and Sons, 2009 |
| A Proposal for a Kernel-based Algorithm for Large Vocabulary Continuous Speech Recognition, , in: Automatic Speech and Speaker Recognition: Large Margin and Kernel Methods, John Wiley and Sons, 2009 |
| A Kernel Wrapper for Phoneme Sequence Recognition, and , in: Automatic Speech and Speaker Recognition: Large Margin and Kernel Methods, John Wiley and Sons, 2009 |
| A Large Margin Algorithm for Forced Alignment, , , and , in: Automatic Speech and Speaker Recognition: Large Margin and Kernel Methods, John Wiley and Sons, 2009 |
| Kernel Based Text-Independnent Speaker Verification, , and , Idiap-RR-68-2008 |
|
| Automatic Speech and Speaker Recognition: Large Margin and Kernel Methods, and , John Wiley & Sons, 2008 |
| Discriminative Keyword Spotting, , and , in: Workshop on Non-Linear Speech Processing, Paris, France, 2007 |
|
| Discriminative Kernel-Based Phoneme Sequence Recognition, , , , and , in: The 9th International Conference on Spoken Language Processing (INTERSPEECH), Pittsburgh, PA, 2006 |
|
| Performance Generalization in Biometric Authentication Using Joint User-Specific and Sample Bootstraps, , and , Idiap-RR-60-2005 |
|
| Using Chimeric Users to Construct Fusion Classifiers in Biometric Authentication Tasks: An Investigation, and , Idiap-RR-59-2005 |
|
| Using Chimeric Users to Construct Fusion Classifiers in Biometric Authentication Tasks: An Investigation, and , Idiap-RR-59-2005 |
|
| Biometric Person Authentication IS A Multiple Classifier Problem, and , in: 7th International Workshop on Multiple Classifier Systems, MCS, 2007 |
|
| Predictive Models for Music, , and , Idiap-RR-51-2008 |
|
| Probabilistic Models for Melodic Prediction, , and , Idiap-RR-50-2008 |
|
| Benchmarking Non-Parametric Statistical Tests, , and , Idiap-RR-38-2005 |
|
| Extracting Information from Multimedia Meeting Collections, , and , Idiap-RR-50-2005 |
|
| Modeling Individual and Group Actions in Meetings: a Two-Layer HMM Framework, , , , and , Idiap-RR-09-2004 |
|
| A State-of-the-art Neural Network for Robust Face Verification, , and , Idiap-RR-36-2002 |
|
| Robust Speech Recognition and Feature Extraction Using HMM2, , , and , Idiap-RR-42-2001 |
|
| Face Verification Using Synthesized Non-Frontal Models, and , Idiap-RR-60-2003 |
|
| Investigating Lexical Substitution Scoring for Subtitle Generation, , , , and , Idiap-RR-36-2006 |
|
| Online Policy Adaptation for Ensemble Classifiers, and , Idiap-RR-69-2003 |
|
| Exploring Contextual Information in a Layered Framework for Group Action Recognition, , and , Idiap-RR-41-2006 |
|
| Taking on the Curse of Dimensionality in Joint Distributions Using Neural Networks, and , Idiap-RR-01-2000 |
|
| A Multi-sample Multi-source Model for Biometric Authentication, , and , Idiap-RR-14-2002 |
|
| A Statistical Significance Test for Person Authentication, and , Idiap-RR-83-2003 |
|
| Revisiting Doddington's Zoo: A Systematic Method to Assess User-dependent Variabilities, , and , Idiap-RR-04-2006 |
|
| Performance Generalization in Biometric Authentication Using Joint User-Specific and Sample Bootstraps, , and , Idiap-RR-60-2005 |
|
| Adapted Generative Models For Face Verification, , and , Idiap-RR-76-2003 |
|
| A New Margin-Based Criterion for Efficient Gradient Descent, and , Idiap-RR-16-2003 |
|
| Hierarchical Multi-Stream Posterior Based Speech Recognition System, , and , Idiap-RR-25-2005 |
|
| Using more informative posterior probabilities for speech recognition, , , and , Idiap-RR-91-2005 |
|
| Towards Predicting Optimal Subsets of Base-Experts in Biometric Authentication Task, and , Idiap-RR-17-2004 |
|
| Automatic Speech Recognition using Dynamic Bayesian Networks with both Acoustic and Articulatory Variables, , , and , Idiap-RR-19-2000 |
|
| HMM2- A Novel Approach to HMM Emission Probability Estimation, , and , Idiap-RR-30-2000 |
|
| Experimental Protocol on the BANCA Database, , , , , , , and , Idiap-RR-05-2002 |
|
| Modeling Individual and Group Actions in Meetings With Layered HMMs, , , , and , Idiap-RR-33-2004 |
|
| Measuring the Performance of Face Localization Systems, , , and , Idiap-RR-53-2005 |
|
| A Kernel Trick For Sequences Applied to Text-Independent Speaker Verification Systems, and , Idiap-RR-77-2005 |
|
| The Expected Performance Curve, , and , Idiap-RR-85-2003 |
|
| A Probabilistic Interpretation of SVMs with an Application to Unbalanced Classification, , and , Idiap-RR-26-2005 |
|
| Modeling Human Interaction in Meetings, , , , , , , and , Idiap-RR-59-2002 |
|
| Database, Protocol and Tools for Evaluating Score-Level Fusion Algorithms in Biometric Authentication, and , Idiap-RR-44-2004 |
|
| Non-Linear Variance Reduction Techniques in Biometric Authentication, and , Idiap-RR-26-2003 |
|
| Improving Face Verification using Skin Color Information, and , Idiap-RR-44-2001 |
|
| Automatic Analysis of Multimodal Group Actions in Meetings, , , , , and , Idiap-RR-27-2003 |
|
| Speech Recognition Using Advanced HMM2 Features, , and , Idiap-RR-24-2001 |
|
| Scalability Analysis of Audio-Visual Person Identity Verification, , , and , Idiap-RR-04-2003 |
|