All publications sorted by title
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 | 81 | 82 | 83 | 84 | 85 | 86 |
C
| Comparison of Client Model Adaptation Schemes, and , Idiap-RR-25-2001 |
|
| Comparison of different feature classifiers for brain computer interfaces, , , , , , , , and , in: Proceedings of the 1st International IEEE EMBS Conference on Neural Engineering, 2003 |
| Comparison of HMM experts with MLP experts in the Full Combination Multi-Band Approach to Robust ASR, and , in: ICSLP, 2000 |
|
| Comparison of HMM experts with MLP experts in the Full Combination Multi-Band Approach to Robust ASR, and , Idiap-RR-21-2000 |
|
| Comparison of MLP and GMM Classifiers for Face Verification on XM2VTS, , and , in: 4th International Conference on AUDIO- and VIDEO-BASED BIOMETRIC PERSON AUTHENTICATION, 2003 |
|
| Comparison of MLP and GMM Classifiers for Face Verification on XM2VTS, , and , Idiap-RR-10-2003 |
|
| Comparison of Subword Segmentation Methods for Open-vocabulary ASR using a Difficulty Metric, , , and |
|
| COMPARISON OF SUBWORD SEGMENTATION METHODS FOR OPEN-VOCABULARYEND-TO-END SPEECH RECOGNITION, , , and , Idiap-RR-34-2020 |
|
| Comparison of Support Vector Machine and Neural Network for Text Texture Verification, and , Idiap-RR-19-2002 |
|
| Comparison of Two Methods for Unsupervised Person Identification in TV Shows, , , , and , in: 12th International Workshop on Content-Based Multimedia Indexing, 2014 |
|
| Comparison of Unsupervised and Supervised Training of RBF Neural Networks. Case Study: Mapping of Contamination Data, and , in: Neural Computation 2000, 2000 |
| Compensating User-Specific Information with User-Independent Information in Biometric Authentication Tasks, and , Idiap-RR-44-2005 |
|
| Competition on Counter Measures to 2-D Facial Spoofing Attacks, , , , , , , , , , , , , , , , , , , , , , , and , in: Proceedings of IAPR IEEE International Joint Conference on Biometrics (IJCB), Washington DC, USA, 2011 |
|
| Competitive Neural Layer-based Method to Identify People with High Risk for Diabetic Foot, , , , , and , in: Computers in Biology and Medicine, 120, 2020 |
[DOI] [URL] |
| Complementary Countermeasures for Detecting Scenic Face Spoofing Attacks, , , , and , in: International Conference on Biometrics, Madrid, Spain, 2013 |
[URL] |
| Complex Daily Activities, Country-Level Diversity, and Smartphone Sensing: A Study in Denmark, Italy, Mongolia, Paraguay, and UK, , , , , , , , , , , , , , , , , , , , , and , in: Proceedings of the 2023 ACM CHI Conference on Human Factors in Computing Systems (CHI), Association for Computing Machinery, 2023 |
[DOI] |
| Complexity reduction of eigenvalue decomposition-based diffuse power spectral density estimators using the power method, , and , in: Proc. International Conference on Acoustics, Speech, and Signal Processing, Calgary, Canada, pages 451-455, 2018 |
|
| Composite Kernel Learning, , and , in: Proceedings of the 25th Annual International Conference on Machine Learning (ICML 2008), Omnipress, 2008 |
|
| Composite Kernel Learning, , and , Idiap-RR-59-2008 |
|
| Composition of Deep and Spiking Neural Networks for Very Low Bit Rate Speech Coding, , , and , Idiap-RR-11-2016 |
|
| Composition of Deep and Spiking Neural Networks for Very Low Bit Rate Speech Coding, , , and , in: IEEE/ACM Trans. on Audio, Speech and Language Processing, 2016 |
|
| Compositionality in English deverbal compounds:The role of the head, , and , in: The role of constituents in multiword expressions. Phraseology and Multiword Expressions, Language Science Press, Berlin, 2020 |
| Compound or phrase or in between? Testing Linguistic Criteria for Compoundhood in English, and , in: Word Structure, 13(2):250-281, 2020 |
| Comprehensive Vulnerability Evaluation of Face Recognition Systems to Template Inversion Attacks Via 3D Face Reconstruction, and , in: IEEE Transactions on Pattern Analysis and Machine Intelligence, 45(12):14248-14265, 2023 |
[DOI] [URL] |
| Computational Analysis Of Behavior In Employment Interviews And Video Resumes, , École Polytechnique Fédérale de Lausanne, 2015 |
|
| Computational Analysis of Urban Places Using Mobile Crowdsensing, , Ecole Polytechnique Federale de Lausanne, 2016 |
[DOI] |
| Computational Methods for Audio-Visual Analysis of Emergent Leadership in Teams, , École Polytechnique Fédéral de Lausanne, 2013 |
|
| Computational Methods For Structured Sparse Component Analysis of Convolutive Speech Mixtures, , , and , in: Proceedings IEEE International Conference on Acoustics, Speech and Signal Processing, 2012 |
|
| Computational Methods for Underdetermined Convolutive Speech Localization and Separation via Model-based Sparse Component Analysis, , , and , in: Speech Communication, 76:201-217, 2016 |
|
| Computational modeling of face-to-face social interaction using nonverbal behavioral cues, , Ecole Polytechnique Fédérale de Lausanne, 2011 |
|
| Computer vision profiling of neurite outgrowth dynamics reveals spatio-temporal modularity of Rho GTPase signaling, , , , , , , , , and , in: Journal of Cell Biology, 212(1):91-111, 2016 |
[DOI] |
| Computing Text Semantic Relatedness using the Contents and Links of a Hypertext Encyclopedia, and , in: Artificial Intelligence Journal, 194:176–202, 2013 |
[DOI] |
| Computing Text Semantic Relatedness using the Contents and Links of a Hypertext Encyclopedia, and , in: International Joint Conference on artificial intelligence, 2013 |
|
| Conditional Gaussian Mixture Models for Environmental Risk Mapping, , and , in: IEEE International Workshop on Neural Networks for Signal Processing (NNSP), 2002 |
|
| Conditional Gaussian Mixture Models for Environmental Risk Mapping, , and , Idiap-RR-12-2002 |
|
| Conditional Gaussian Mixtures, , Idiap-RR-11-2003 |
|
| Conditions for the finiteness of the moments of the volume of level sets, , , and , in: Electronic Communications in Probability, 24(17), 2019 |
[DOI] [URL] |
| Confidence Evaluation for Risk Prediction, , and , in: 2001 Annual Conference of the IAMG, 2001 |
|
| Confidence Evaluation for Risk Prediction, , and , Idiap-RR-22-2001 |
|
| Confidence Matters : Applications to Semantic Segmentation, , École polytechnique fédérale de Lausanne, 2023 |
[DOI] |
| Confidence Measures for Multimodal Identity Verification, , , and , in: Information Fusion, 3(04), 2002 |
|
| Confidence Measures for Multimodal Identity Verification, , , and , Idiap-RR-38-2001 |
|
| Confidence Measures in Hybrid HMM/ANN Speech Recognition, and , in: Proceedings of Workshop on Text, Speech and Dialog (TSD'98) Brno, Czech Republic, 1998 |
| Confidence Measures in Multiple pronunciations Modeling For Speaker Verification, and , in: Proceedings of the 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP-04), 2004 |
|
| Confidence Measures in Multiple pronunciations Modeling For Speaker Verification, and , Idiap-RR-53-2003 |
|
| Confidence-based Cue Integration for Visual Place Recognition, and , in: IEEE International Conference on Intelligent RObot Systems (IROS), 2007 |
|
| Confidence-based Cue Integration for Visual Place Recognition, and , Idiap-RR-17-2007 |
|
| Configuration Space Distance Fields for Manipulation Planning, , , and , in: Robotics: Science and Systems (RSS), 2024, 2024 |
|
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 | 81 | 82 | 83 | 84 | 85 | 86 |