logo Idiap Research Institute        
All publications sorted by title
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 |


E

Exploiting Contextual Information for Speech/Non-Speech Detection, Sree Hari Krishnan Parthasarathi, Petr Motlicek and Hynek Hermansky, in: Text, Speech and Dialogue, Brno, Czech Republic, Springer-Verlag Berlin, Heidelberg, 2008
attachment
Exploiting foreign resources for DNN-based ASR, Petr Motlicek, David Imseng, Blaise Potard, Philip N. Garner and Ivan Himawan, in: EURASIP Journal on Audio, Speech, and Music Processing(2015:17), 2015
attachment
[DOI]
Exploiting Hyperlinks to Learn a Retrieval Model, David Grangier and Samy Bengio, in: NIPS Workshop on Learning to Rank, 2005
attachment
Exploiting Long-Term Observations for Track Creation and Deletion in Online Multi-Face Tracking, Stefan Duffner and Jean-Marc Odobez, in: IEEE Conference on Automatic Face and Gesture Recognition, pages 525-530, IEEE, 2011
attachment
Exploiting Low-dimensional Structures to Enhance DNN based Acoustic Modeling in Speech Recognition, Pranay Dighe, Gil Luyet, Afsaneh Asaei and Hervé Bourlard, in: Proceedings of 2016 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2016), Shanghai, pages 5690-5694, IEEE, 2016
attachment
Exploiting observers' judgements for nonverbal group interaction analysis, Gokul Chittaranjan, Oya Aran and Daniel Gatica-Perez, in: IEEE Conference on Automatic Face and Gesture Recognition, pages 6, IEEE, 2011
attachment
Exploiting Scene Cues for Dropped Object Detection, Adolfo Lopez-Mendez, Florent Monay and Jean-Marc Odobez, in: 9th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications., 2014
attachment
EXPLOITING SEQUENCE INFORMATION FOR TEXT-DEPENDENT SPEAKER VERIFICATION, Subhadeep Dey, Petr Motlicek, Srikanth Madikeri and Marc Ferras, in: Proceedings of 2017 IEEE International Conference on Acoustics, Speech, and Signal Processing, New Orleans, pages 5370-5374, 2017
attachment
Exploiting un-transcribed foreign data for speech recognition in well-resourced languages, David Imseng, Blaise Potard, Petr Motlicek, Alexandre Nanchen and Hervé Bourlard, in: Proceedings IEEE International Conference on Acoustics, Speech and Signal Processing, Florence, IT, pages 2322 - 2326, IEEE, 2014
attachment
[DOI]
Exploratory Study on Direct Prediction of Diabetes using Deep Residual Networks, Samaneh Abbasi-Sureshjani, Behdad Dasht Bozorg, Bart ter Haar Romeny and Francois Fleuret, in: Proceedings of the thematic conference on computational vision and medical image processing, 2017
Exploring Contextual Information in a Layered Framework for Group Action Recognition, Dong Zhang, Daniel Gatica-Perez and Samy Bengio, in: In the Eighth International Conference on Multimodal Interfaces (ICMI'06), 2006
attachment
Exploring Human Biometrics: A Focus on Security Concerns and Deep Neural Networks, Vedrana Krivokuca, in: APSIPA Transactions on Signal and Information Processing, 2023
attachment
[DOI]
[URL]
Extended Cauchy Machines, S. Cuche and Emile Fiesler, in: Proceedings of the International Conference on Neural Information Processing, 1996
Extending the Cooperative Dual-Task Space in Conformal Geometric Algebra, Tobias Löw and Sylvain Calinon, in: Proc. IEEE Intl Conf. on Robotics and Automation, 2024
attachment
Extracting Directional and Comparable Corpora from a Multilingual Corpus for Translation Studies, Bruno Cartoni and Thomas Meyer, in: Proceedings of the eighth international conference on Language Resources and Evaluation (LREC), Istanbul, TR, pages 6, 2012
attachment
Extracting Information from Multimedia Meeting Collections, Daniel Gatica-Perez, Dong Zhang and Samy Bengio, in: 7th ACM SIGMM International Workshop on Multimedia Information Retrieval, 2005
attachment
Extracting Informative Textual Parts from Web Pages Containing User-Generated Content, Nikolaos Pappas, Georgios Katsimpras and Efstathios Stamatatos, in: 12th International Conference on Knowledge Management and Knowledge Technologies, ACM ICPS, Graz, Austria, pages 4:1--4:8, ACM, 2012
attachment
[URL]
Extracting Mobile Behavioral Patterns with the Distant N-Gram Topic Model, Katayoun Farrahi and Daniel Gatica-Perez, in: Proceedings of the IEEE International Symposium on Wearable Computers, Newcastle, 2012
attachment
Extracting Motifs from Time Series Generated by Concurrent Activities., Jagannadan Varadarajan, Remi Emonet and Jean-Marc Odobez, in: NIPS workshop on Learning and Planning from Batch Time Series Data, 2010
attachment
Extraction of Articulators in X-Ray Image Sequences, Georg Thimm and Juergen Luettin, in: Proceedings of the European Conference on Speech Communication and Technology, 1999
attachment
EYEDIAP: A Database for the Development and Evaluation of Gaze Estimation Algorithms from RGB and RGB-D Cameras, Kenneth Alberto Funes Mora, Florent Monay and Jean-Marc Odobez, in: Proceedings of the ACM Symposium on Eye Tracking Research and Applications, Safety Harbor, Florida, United States of America, ACM, 2014
attachment
[DOI]

F

F-ratio Client-Dependent Normalisation on Biometric Authentication Tasks, Norman Poh and Samy Bengio, in: Proceedings of the 2005 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP-05), 2005
attachment
Face Anti-spoofing: Visual Approach, André Anjos, Jukka Komulainen, Sébastien Marcel, Abdenour Hadid and Matti Pietikainen, in: Handbook of Biometric Anti-Spoofing, pages 65-82, Springer-Verlag, 2014
[DOI]
Face Authentication Based on Local Features and Generative Models, Fabien Cardinaux, École Polytechnique Fédérale de Lausanne, 2005
attachment
Face Authentication Using Adapted Local Binary Pattern Histograms, Yann Rodriguez and Sébastien Marcel, in: 9th European Conference on Computer Vision (ECCV), 2006
attachment
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 |