Keywords:
Publications of Norman Poh sorted by title
A
A Multi-sample Multi-source Model for Biometric Authentication, , and , in: IEEE International Workshop on Neural Networks for Signal Processing (NNSP), 2002 |
|
A Multi-sample Multi-source Model for Biometric Authentication, , and , Idiap-RR-14-2002 |
|
A Novel Approach to Combining Client-Dependent and Confidence Information in Multimodal Biometric, and , in: Fifth Int'l. Conf. Audio- and Video-Based Biometric Person Authentication AVBPA, 2005 |
|
A Novel Approach to Combining Client-Dependent and Confidence Information in Multimodal Biometric, and , Idiap-RR-68-2004 |
|
A Study of the Effects of Score Normalisation Prior to Fusion in Biometric Authentication Tasks, and , Idiap-RR-69-2004 |
|
An Investigation of F-ratio Client-Dependent Normalisation on Biometric Authentication Tasks, and , Idiap-RR-46-2004 |
|
An Investigation of Spectral Subband Centroids for Speaker Authentication, , and , in: Int'l Conf. on Biometric Authentication, 2004 |
|
An Investigation of Spectral Subband Centroids for Speaker Authentication, , and , Idiap-RR-62-2003 |
|
B
Bi-Modal Person Recognition on a Mobile Phone: using mobile phone data, , , , , , , , , , , , , and , Idiap-RR-13-2012 |
|
Bi-Modal Person Recognition on a Mobile Phone: using mobile phone data, , , , , , , , , , , , , and , in: IEEE ICME Workshop on Hot Topics in Mobile Multimedia, 2012 |
|
C
Can Chimeric Persons Be Used in Multimodal Biometric Authentication Experiments?, and , Idiap-RR-20-2005 |
|
Compensating User-Specific Information with User-Independent Information in Biometric Authentication Tasks, and , Idiap-RR-44-2005 |
|
D
Database, Protocol and Tools for Evaluating Score-Level Fusion Algorithms in Biometric Authentication, and , in: Pattern Recognition Journal, 2005 |
|
Database, Protocol and Tools for Evaluating Score-Level Fusion Algorithms in Biometric Authentication, and , in: Fifth Int'l. Conf. Audio- and Video-Based Biometric Person Authentication AVBPA, 2005 |
|
Database, Protocol and Tools for Evaluating Score-Level Fusion Algorithms in Biometric Authentication, and , Idiap-RR-44-2004 |
|
E
EER of Fixed and Trainable Fusion Classifiers: A Theoretical Study with Application to Biometric Authentication Tasks, and , in: Sixth International Workshop on Multiple Classifier System (MCS2005), 2005 |
|
EER of Fixed and Trainable Fusion Classifiers: A Theoretical Study with Application to Biometric Authentication Tasks, and , Idiap-RR-01-2005 |
|
Estimating the Confidence Interval of Expected Performance Curve in Biometric Authentication Using Joint Bootstrap, and , Idiap-RR-25-2006 |
|
Evidences of Equal Error Rate Reduction in Biometric Authentication Fusion, and , Idiap-RR-43-2004 |
|
F
F-ratio Client-Dependent Normalisation on Biometric Authentication Tasks, and , in: Proceedings of the 2005 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP-05), 2005 |
|
H
How Do Correlation and Variance of Base-Experts Affect Fusion in Biometric Authentication Tasks?, and , in: IEEE Trans. on Signal Processing, 2005 |
|
How Do Correlation and Variance of Base-Experts Affect Fusion in Biometric Authentication Tasks?, and , Idiap-RR-18-2004 |
|
I
Improving Face Authetication Using Virtual Samples, , and , in: IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003 |
|
Improving Face Authetication Using Virtual Samples, , and , Idiap-RR-40-2002 |
|
Improving Fusion with Margin-Derived Confidence In Biometric Authentication Tasks, and , in: Fifth Int'l. Conf. Audio- and Video-Based Biometric Person Authentication AVBPA, 2005 |
|
Improving Fusion with Margin-Derived Confidence In Biometric Authentication Tasks, and , Idiap-RR-63-2004 |
|
Improving Single Modal and Multimodal Biometric Authentication Using F-ratio Client-Dependent Normalisation, and , Idiap-RR-52-2004 |
|
M
Multi-system Biometric Authentication: Optimal Fusion and User-Specific Information, , École Polytechnique Fédérale de Lausanne, 2006 |
|
N
Noise-Robust Multi-Stream Fusion for Text-Independent Speaker Authentication, and , in: The Speaker and Recognition Workshop, 2004 |
|
Noise-Robust Multi-Stream Fusion for Text-Independent Speaker Authentication, and , Idiap-RR-01-2004 |
|
Non-Linear Variance Reduction Techniques in Biometric Authentication, and , in: Workshop on Multimodal User Authentication, 2003 |
|
Non-Linear Variance Reduction Techniques in Biometric Authentication, and , Idiap-RR-26-2003 |
|
P
Performance Generalization in Biometric Authentication Using Joint User-Specific and Sample Bootstraps, , and , in: IEEE Pattern Analysis and Machine intelligence, 2007 |
|
Performance Generalization in Biometric Authentication Using Joint User-Specific and Sample Bootstraps, , and , Idiap-RR-60-2005 |
|
Performance Generalization in Biometric Authentication Using Joint User-Specific and Sample Bootstraps, , and , Idiap-RR-60-2005 |
|
R
Revisiting Doddington's Zoo: A Systematic Method to Assess User-dependent Variabilities, , and , in: Multimodal User Authentication (MMUA), 2006 |
|
Revisiting Doddington's Zoo: A Systematic Method to Assess User-dependent Variabilities, , and , Idiap-RR-04-2006 |
|
T
The 1st Competition on Counter Measures to Finger Vein Spoofing Attacks, , , , , , , , , and , in: The 8th IAPR International Conference on Biometrics (ICB), pages 513 - 518, 2015 |
[DOI] [URL] |
Towards Explaining the Success (Or Failure) of Fusion in Biometric Authentication, and , Idiap-RR-43-2005 |
|
Towards Predicting Optimal Subsets of Base-Experts in Biometric Authentication Task, and , Idiap-RR-17-2004 |
|
U
Using Chimeric Users to Construct Fusion Classifiers in Biometric Authentication Tasks: An Investigation, and , in: IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP), 2006 |
|
Using Chimeric Users to Construct Fusion Classifiers in Biometric Authentication Tasks: An Investigation, and , Idiap-RR-59-2005 |
|
Using Chimeric Users to Construct Fusion Classifiers in Biometric Authentication Tasks: An Investigation, and , Idiap-RR-59-2005 |
|
V
Variance Reduction Techniques in Biometric Authentication, and , Idiap-RR-17-2003 |
|
W
Why Do Multi-Stream, Multi-Band and Multi-Modal Approaches Work on Biometric User Authentication Tasks?, and , in: Proceedings of the 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP-04), 2004 |
|