All publications sorted by recency
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 | 81 | 82 |
Overview of the ImageCLEF 2013 Robot Vision Task, , , and , in: Working Notes, CLEF 2013, 2013 |
|
Investigating the Impact of Language Style and Vocal Expression on Social Roles of Participants in Professional Meetings, and , in: Affective Computing and Intelligent Interaction, Geneva, pages 324-329, IEEE, 2013 |
[DOI] |
Noise Intrusiveness Factors in Speech Telecommunications, , , and , in: Proceedings of the AIA-DAGA 2013 International Conference on Acoustics, Merano, Italy, pages 436-439, 2013 |
|
Multilingual speech recognition A posterior based approach, , École Polytechnique Fédérale de Lausanne (EPFL), 2013 |
|
Mining Conversational Social Video, , EPFL, 2013 |
|
Detecting Narrativity to Improve English to French Translation of Simple Past Verbs, , and , in: Proceedings of the 1st DiscoMT Workshop at ACL 2013 (51st Annual Meeting of the Association for Computational Linguistics), Sofia, Bulgaria, pages 33-42, 2013 |
|
Syllable-based Pitch Encoding for Low Bit Rate Speech Coding with Recognition/Synthesis Architecture, , and , Idiap-RR-24-2013 |
|
Where and What: Using Smartphones to Predict Next Locations and Applications in Daily Life, and , in: Pervasive and Mobile Computing, 2013 |
|
Automatic Social Role Recognition In Professional Meetings Using Conditional Random Fields, and , in: Proceedings of Interspeech, 2013 |
|
Using Phonological Phrase Segmentation to Improve Automatic Keyword Spotting for the Highly Agglutinating Hungarian Language, and , Idiap-RR-23-2013 |
|
Recurrent Convolutional Neural Networks for Scene Parsing, and , Idiap-RR-22-2013 |
|
Session variability modelling for face authentication, , , , and , in: IET Biometrics, 2(3):117-129, 2013 |
[DOI] |
Improving Grapheme-based ASR by Probabilistic Lexical Modeling Approach, and , in: Proceedings of Interspeech, 2013 |
|
Machine Translation with Many Manually Labeled Discourse Connectives, and , in: Proceedings of the 1st DiscoMT Workshop at ACL 2013 (51st Annual Meeting of the Association for Computational Linguistics), Sofia, Bulgaria, pages 43-50, 2013 |
|
Implicitation of Discourse Connectives in (Machine) Translation, and , in: Proceedings of the 1st DiscoMT Workshop at ACL 2013 (51st Annual Meeting of the Association for Computational Linguistics), Sofia, Bulgaria, pages 19-26, 2013 |
|
Syllable-based Pitch Encoding for Low Bit Rate Speech Coding with Recognition/Synthesis Architecture, , and , in: Proc. of Interspeech 2013, Lyon, France, 2013 |
|
Person Independent 3D Gaze Estimation From Remote RGB-D Cameras, and , in: International Conference on Image Processing, Melbourne, Australia, IEEE, 2013 |
[DOI] |
Automatic Personality Perception: Inferring Personality Traits from Nonverbal Vocal Behavior, , Electrical Engineering Department, EPFL, 2013 |
|
Who is Persuasive? The Role of Perceived Personality and Communication Modality in Social Multimedia, , , , and , in: International Conference on Multimodal Interaction, 2013 |
A Survey on Perceived Speaker Traits: Personality, Likability, Pathology and the First Challenge, , , , , , , , , , and , in: Computer Speech and Language, 19(1):100-131, 2015 |
[DOI] |
Diverse Keyword Extraction from Conversations, and , in: Proceedings of the ACL 2013 (51th Annual Meeting of the Association for Computational Linguistics ), Short Papers, Sofia, Bulgaria, pages 651-657, ACL, 2013 |
|
Using Phonological Phrase Segmentation to Improve Automatic Keyword Spotting for the Highly Agglutinating Hungarian Language, and , in: Proc. of Interspeech 2013, 2013 |
An Open-source State-of-the-art Toolbox for Broadcast News Diarization, , , , , and , in: INTERSPEECH, 2013 |
|
Unsupervised Methods for Activity Analysis and Detection of Abnormal Events, and , Idiap-RR-21-2013 |
|
Analyse non supervisée d'activités en vidéo surveillance pour l'analyse de scène et la détection d'événements anormaux, and , Idiap-RR-20-2013 |
[URL] |
Extracting Motifs from Time Series Generated by Concurrent Activities., , and , in: NIPS workshop on Learning and Planning from Batch Time Series Data, 2010 |
|
A Scalable Formulation of Probabilistic Linear Discriminant Analysis: Applied to Face Recognition, , , and , in: IEEE Transactions on Pattern Analysis and Machine Intelligence, 35(7):1788-1794, 2013 |
[DOI] [URL] |
I4U Submission to NIST SRE 2012: a large-scale collaborative effort for noise-robust speaker verification, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and , in: INTERSPEECH, Lyon, France, 2013 |
|
Stability and Hypothesis Transfer Learning, and , in: International Conference on Machine Learning, 2013 |
|
Annotating the meaning of discourse connectives by looking at their translation: The translation-spotting technique, , and , in: Dialogue & Discourse, 4(2):65-86, 2013 |
[DOI] |
Bi-Modal Biometric Authentication on Mobile Phones in Challenging Conditions, , , , and , Idiap-RR-30-2013 |
|
The 2013 Face Recognition Evaluation in Mobile Environment, , , , , , , , , , , , , , , , , , , , , , , , , , , and , in: The 6th IAPR International Conference on Biometrics, 2013 |
|
The 2013 Speaker Recognition Evaluation in Mobile Environment, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and , in: The 6th IAPR International Conference on Biometrics, 2013 |
|
Fusing Matching and Biometric Similarity Measures for Face Diarization in Video, , and , in: Proceedings of the 3rd ACM conference on International conference on multimedia retrieval, Dallas, Texas, USA, pages 97-104, ACM, 2013 |
|
Exploiting Accelerometers to Improve Movement Classification for Prosthetics, and , in: International Conference on Rehabilitation Robotics, 2013 |
|
Anti-spoofing in action: joint operation with a verification system, , and , in: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, Workshop on Biometrics, Portland, Oregon, 2013 |
|
The 2nd competition on counter measures to 2D face spoofing attacks, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and , in: International Conference of Biometrics 2013, Madrid, Spain, 2013 |
|
Sentiment Analysis of User Comments for One-Class Collaborative Filtering over TED Talks, and , in: 36th ACM SIGIR Conference on Research and Development in Information Retrieval, Dublin, Ireland, ACM, 2013 |
|
Probabilistic Lexical Modeling and Grapheme-based Automatic Speech Recognition, and , Idiap-RR-15-2013 |
|
From N to N+1: Multiclass Transfer Incremental Learning, , and , in: Proceedings of the Conference on Computer Vision and Pattern Recognition, 2013 |
|
Applying multi- and cross-lingual stochastic phone space transformations to non-native speech recognition, , , , and , in: IEEE Transactions on Audio, Speech, and Language Processing, 2013 |
[DOI] |
Combining Content with User Preferences for TED Lecture Recommendation, and , in: Proceedings of the 11th International Workshop on Content Based Multimedia Indexing, Veszprém, Hungary, IEEE, 2013 |
|
The 2nd Competition on Counter Measures to 2D Face Spoofing Attacks, , and , Idiap-RR-18-2013 |
|
Improving Grapheme-based ASR by Probabilistic Lexical Modeling Approach, and , Idiap-RR-14-2013 |
|
The 2013 Speaker Recognition Evaluation in Mobile Environment, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and , Idiap-RR-32-2013 |
|
The 2013 Face Recognition Evaluation in Mobile Environment, , , , , , , , , , , , , , , , , , , , , , , , , , , and , Idiap-RR-36-2013 |
|
Estimating Phoneme Class Conditional Probabilities from Raw Speech Signal using Convolutional Neural Networks, , and , Idiap-RR-13-2013 |
|
Spoofing in 2D Face Recognition with 3D Masks and Anti-spoofing with Kinect, and , Idiap-RR-27-2013 |
|
Anti-spoofing in action: joint operation with a verification system, , and , Idiap-RR-19-2013 |
|
Complementary Countermeasures for Detecting Scenic Face Spoofing Attacks, , , , and , in: International Conference on Biometrics, Madrid, Spain, 2013 |
[URL] |
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 | 81 | 82 |