logo Idiap Research Institute        
All publications sorted by author
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 | 81 | 82 |


E

What to Show? Automatic Stream Selection Among Multiple Sensors, Remi Emonet, E. Oberzaucher and Jean-Marc Odobez, in: International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications, 2014
attachment
Unsupervised methods for activity analysis and detection of abnormal events, Remi Emonet and Jean-Marc Odobez, in: Intelligent Video Surveillance Systems (ISTE), Wiley, 2013
attachment
[DOI]
Temporal Analysis of Motif Mixtures using Dirichlet Processes, Remi Emonet, Jagannadan Varadarajan and Jean-Marc Odobez, in: IEEE Trans. Pattern Analysis and Machine Intelligence (PAMI), 36(1), 2014
attachment
Multi-camera Open Space Human Activity Discovery for Anomaly Detection, Remi Emonet, Jagannadan Varadarajan and Jean-Marc Odobez, in: 8th IEEE International Conference on Advanced Video and Signal-Based Surveillance, 2011
attachment
Spoofing Face Recognition with 3D Masks, Nesli Erdogmus and Sébastien Marcel, in: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY:1084-1097, 2014
attachment
[DOI]
Spoofing in 2D Face Recognition with 3D Masks and Anti-spoofing with Kinect, Nesli Erdogmus and Sébastien Marcel, in: Biometrics: Theory, Applications and Systems, Washington DC, USA, 2013
attachment
Spoofing Attacks To 2D Face Recognition Systems With 3D Masks, Nesli Erdogmus and Sébastien Marcel, in: International Conference of the Biometrics Special Interes Group, Darmstadt, Germany, 2013
attachment
Within- and Cross- Database Evaluations for Gender Classification via BeFIT Protocols, Nesli Erdogmus, Matthias Vanoni and Sébastien Marcel, in: International Workshop on Multimedia Signal Processing, pages 1-6, 2014
attachment
[DOI]
[URL]
Improving Contextual Quality Models for MT Evaluation Based on Evaluators' Feedback, Paula Estrella, Andrei Popescu-Belis and Margaret King, in: 6th International Conference on Language Resources and Evaluation, Marrakech, Morocco, 2008

E

Multi-modal person verification tools using speech and images, M. Acheroy et al., in: European Conference on Multimedia Applications, Services and Techniques, 1996

E

An Attention Mechanism for Deep Q-Networks with Applications in Robotic Pushing, Marco Ewerton, Sylvain Calinon and Jean-Marc Odobez, in: Proc. of Workshop on Emerging paradigms for robotic manipulation: from the lab to the productive world, ICRA, 2021

F

Open-Set Speaker Identification pipeline in live criminal investigations, Mael Fabien and Petr Motlicek, in: 1st ISCA Symposium on Security and Privacy in Speech Communication, 2021
attachment
BertAA: BERT fine-tuning for Authorship Attribution, Mael Fabien, Esaú Villatoro-Tello, Petr Motlicek and Shantipriya Parida, in: Proceedings of the 17th International Conference on Natural Language Processing, 2020
attachment
Claim-Dissector: An Interpretable Fact-Checking System with Joint Re-ranking and Veracity Prediction, Martin Fajcik, Petr Motlicek and Pavel Smrz, in: Association for Computational Linguistics, Findings of the Association for Computational Linguistics: ACL 2023:10184–10205, 2023
[URL]
IDIAPers @ Causal News Corpus 2022: Extracting Cause-Effect-Signal Triplets via Pre-trained Autoregressive Language Model, Martin Fajcik, Muskaan Singh, Zuluaga-Gomez. Juan, Esaú Villatoro-Tello, Sergio Burdisso, Petr Motlicek and Pavel Smrz, in: The 5th Workshop on Challenges and Applications of Automated Extraction of Socio-political Events from Text (CASE @ EMNLP 2022), 2022
[URL]
ChildPlay-Hand: A Dataset of Hand Manipulations in the Wild, Arya Farkhondeh, Samy Tafasca and Jean-Marc Odobez, in: Proceedings of the European Conference on Computer Vision (ECCV) Workshops, 2024
attachment
A Probabilistic Approach to Socio-Geographic Reality Mining, Katayoun Farrahi, Ecole Polytechnique Fédérale de Lausanne, 2011
attachment
Socio-Technical Network Analysis from Wearable Interactions, Katayoun Farrahi, Remi Emonet and Alois Ferscha, in: International Symposium on Wearable Computers, 2012
attachment
Extracting Mobile Behavioral Patterns with the Distant N-Gram Topic Model, Katayoun Farrahi and Daniel Gatica-Perez, in: Proceedings of the IEEE International Symposium on Wearable Computers, Newcastle, 2012
attachment
Discovering Routines from Large-Scale Human Locations using Probabilistic Topic Models, Katayoun Farrahi and Daniel Gatica-Perez, in: ACM Transactions on Intelligent Systems and Technology, 2(1), 2011
attachment
Probabilistic Mining of Socio-Geographic Routines from Mobile Phone Data, Katayoun Farrahi and Daniel Gatica-Perez, in: IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 4(4), 2010
attachment
Mining Human Location-Routines Using a Multi-Level Approach to Topic Modeling, Katayoun Farrahi and Daniel Gatica-Perez, in: 2010 IEEE Second International Conference on Social Computing, SIN Symposium, Minneapolis, Minnesota, USA, 2010
attachment
Daily Routine Classification from Mobile Phone Data, Katayoun Farrahi and Daniel Gatica-Perez, in: Workshop on Machine Learning and Multimodal Interaction (MLMI08), 2008
attachment
Discovering Human Routines from Cell Phone Data with Topic Models, Katayoun Farrahi and Daniel Gatica-Perez, in: IEEE International Symposium on Wearable Computers (ISWC), 2008
attachment
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 | 81 | 82 |