All publications sorted by author
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 | 81 | 82 |
E
What to Show? Automatic Stream Selection Among Multiple Sensors, , and , in: International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications, 2014 |
|
Analyse non supervisée d'activités en vidéo surveillance pour l'analyse de scène et la détection d'événements anormaux, and , Idiap-RR-20-2013 |
[URL] |
Unsupervised Methods for Activity Analysis and Detection of Abnormal Events, and , Idiap-RR-21-2013 |
|
Unsupervised methods for activity analysis and detection of abnormal events, and , in: Intelligent Video Surveillance Systems (ISTE), Wiley, 2013 |
[DOI] |
Temporal Analysis of Motif Mixtures using Dirichlet Processes, , and , in: IEEE Trans. Pattern Analysis and Machine Intelligence (PAMI), 36(1), 2014 |
|
Extracting and Locating Temporal Motifs in Video Scenes Using a Hierarchical Non Parametric Bayesian Model, , and , in: IEEE Conference on Computer Vision and Pattern Recognition, 2011 |
|
Multi-camera Open Space Human Activity Discovery for Anomaly Detection, , and , in: 8th IEEE International Conference on Advanced Video and Signal-Based Surveillance, 2011 |
|
Spoofing Face Recognition with 3D Masks, and , in: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY:1084-1097, 2014 |
[DOI] |
Spoofing Attacks To 2D Face Recognition Systems With 3D Masks, and , Idiap-RR-42-2013 |
|
Spoofing in 2D Face Recognition with 3D Masks and Anti-spoofing with Kinect, and , Idiap-RR-27-2013 |
|
Spoofing in 2D Face Recognition with 3D Masks and Anti-spoofing with Kinect, and , in: Biometrics: Theory, Applications and Systems, Washington DC, USA, 2013 |
|
Spoofing Attacks To 2D Face Recognition Systems With 3D Masks, and , in: International Conference of the Biometrics Special Interes Group, Darmstadt, Germany, 2013 |
|
Within- and Cross- Database Evaluations for Gender Classification via BeFIT Protocols, , and , in: International Workshop on Multimedia Signal Processing, pages 1-6, 2014 |
[DOI] [URL] |
Automatic Speech Recognition using Dynamic Bayesian Networks with the Energy as an Auxiliary Variable, and , Idiap-RR-18-2003 |
|
Analysis of Verbal and Nonverbal Communication and Enactment: The Processing Issues, , , , and , Springer Verlag, 2011 |
Normalizing Flows for Speaker and Language Recognition Backend, , , , and , in: Odyssey 2024: The Speaker and Language Recognition Workshop, 2024 |
|
The FEMTI guidelines for contextual MT evaluation: principles and tools, , and , in: Linguistica Antverpiensia New Series, 8, 2009 |
Improving Contextual Quality Models for MT Evaluation Based on Evaluators' Feedback, , and , in: 6th International Conference on Language Resources and Evaluation, Marrakech, Morocco, 2008 |
E
Multi-modal person verification tools using speech and images, , in: European Conference on Multimedia Applications, Services and Techniques, 1996 |
E
IRL-Net: Inpainted Region Localization Network via Spatial Attention, , , , , and , in: IEEE Access, 11, 2023 |
[DOI] [URL] |
Learning Trajectory Distributions for Assisted Teleoperation and Path Planning, , , , , , and , in: Frontiers in Robotics and AI, 6:89, 2019 |
[DOI] [URL] |
Assisted teleoperation in changing environments with a mixture of virtual guides, , and , in: Advanced Robotics, 34(18):1157-1170, 2020 |
[DOI] [URL] |
An Attention Mechanism for Deep Q-Networks with Applications in Robotic Pushing, , and , Idiap-RR-03-2021 |
|
An Attention Mechanism for Deep Q-Networks with Applications in Robotic Pushing, , and , in: Proc. of Workshop on Emerging paradigms for robotic manipulation: from the lab to the productive world, ICRA, 2021 |
Reinforcement learning of trajectory distributions: Applications in assisted teleoperation and motion planning, , , , , and , in: IEEE International Conference on Intelligent Robots and Systems, 2019 |
An Efficient Image-to-Image Translation HourGlass-based Architecture for Object Pushing Policy Learning, , and , in: IEEE/RSJ International Conference on Intelligent Robots and Systems, 2021 |
|
A Multitask and Kernel approach for Learning to Push Objects with a Task-Parameterized Deep Q-Network, , , , and , in: Proc. IEEE/RSJ Intl Conf. on Intelligent Robots and Systems (IROS), 2023 |
|
F
Open-Set Speaker Identification pipeline in live criminal investigations, and , in: 1st ISCA Symposium on Security and Privacy in Speech Communication, 2021 |
|
ROXANNE Research Platform: Automate criminal investigations, , , , , and , in: Interspeech Show and Tell 2021, 2021 |
|
Graph2Speak: Improving Speaker Identification using Network Knowledge in Criminal Conversational Data, , , and , Idiap-RR-01-2023 |
[URL] |
Graph2Speak: Improving Speaker Identification using Network Knowledge in Criminal Conversational Data, , , and , in: 1st ISCA Symposium on Security and Privacy in Speech Communication, pages 10--13, 2021 |
[DOI] |
BertAA: BERT fine-tuning for Authorship Attribution, , , and , in: Proceedings of the 17th International Conference on Natural Language Processing, 2020 |
|
Claim-Dissector: An Interpretable Fact-Checking System with Joint Re-ranking and Veracity Prediction, , and , in: Association for Computational Linguistics, Findings of the Association for Computational Linguistics: ACL 2023:10184–10205, 2023 |
[URL] |
Claim-Dissector: An Interpretable Fact-Checking System with Joint Re-ranking and Veracity Prediction, , and , Idiap-Com-03-2022 |
[URL] |
IDIAPers @ Causal News Corpus 2022: Extracting Cause-Effect-Signal Triplets via Pre-trained Autoregressive Language Model, , , , , , and , Idiap-RR-12-2022 |
|
IDIAPers @ Causal News Corpus 2022: Extracting Cause-Effect-Signal Triplets via Pre-trained Autoregressive Language Model, , , , , , and , in: The 5th Workshop on Challenges and Applications of Automated Extraction of Socio-political Events from Text (CASE @ EMNLP 2022), 2022 |
[URL] |
ChildPlay-Hand: A Dataset of Hand Manipulations in the Wild, , and , in: Proceedings of the European Conference on Computer Vision (ECCV) Workshops, 2024 |
|
A Probabilistic Approach to Socio-Geographic Reality Mining, , Ecole Polytechnique Fédérale de Lausanne, 2011 |
|
Socio-Technical Network Analysis from Wearable Interactions, , and , in: International Symposium on Wearable Computers, 2012 |
|
Extracting Mobile Behavioral Patterns with the Distant N-Gram Topic Model, and , in: Proceedings of the IEEE International Symposium on Wearable Computers, Newcastle, 2012 |
|
A Probabilistic Approach to Mining Mobile Phone Data Sequences, and , in: Personal and Ubiquitous Computing, 2012 |
|
Discovering Routines from Large-Scale Human Locations using Probabilistic Topic Models, and , in: ACM Transactions on Intelligent Systems and Technology, 2(1), 2011 |
|
Probabilistic Mining of Socio-Geographic Routines from Mobile Phone Data, and , in: IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 4(4), 2010 |
|
Mining Human Location-Routines using a Multi-Level Topic Model, and , Idiap-RR-28-2010 |
|
Mining Human Location-Routines Using a Multi-Level Approach to Topic Modeling, and , in: 2010 IEEE Second International Conference on Social Computing, SIN Symposium, Minneapolis, Minnesota, USA, 2010 |
|
Learning and Predicting Multimodal Daily Life Patterns from Cell Phones, and , in: ICMI-MLMI, 2009 |
|
Daily Routine Classification from Mobile Phone Data, and , in: Workshop on Machine Learning and Multimodal Interaction (MLMI08), 2008 |
|
Discovering Human Routines from Cell Phone Data with Topic Models, and , Idiap-RR-32-2008 |
|
Discovering Human Routines from Cell Phone Data with Topic Models, and , in: IEEE International Symposium on Wearable Computers (ISWC), 2008 |
|
What Did You Do Today? Discovering Daily Routines from Large-Scale Mobile Data, and , in: ACM International Conference on Multimedia (ACMMM), 2008 |
|
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 | 81 | 82 |