All publications
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 | 81 |
2013
Bi-Modal Biometric Authentication on Mobile Phones in Challenging Conditions, , , , and , Idiap-RR-30-2013 |
|
The 2013 Face Recognition Evaluation in Mobile Environment, , , , , , , , , , , , , , , , , , , , , , , , , , , and , in: The 6th IAPR International Conference on Biometrics, 2013 |
|
The 2013 Speaker Recognition Evaluation in Mobile Environment, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and , in: The 6th IAPR International Conference on Biometrics, 2013 |
|
Fusing Matching and Biometric Similarity Measures for Face Diarization in Video, , and , in: Proceedings of the 3rd ACM conference on International conference on multimedia retrieval, Dallas, Texas, USA, pages 97-104, ACM, 2013 |
|
Exploiting Accelerometers to Improve Movement Classification for Prosthetics, and , in: International Conference on Rehabilitation Robotics, 2013 |
|
Anti-spoofing in action: joint operation with a verification system, , and , in: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, Workshop on Biometrics, Portland, Oregon, 2013 |
|
The 2nd competition on counter measures to 2D face spoofing attacks, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and , in: International Conference of Biometrics 2013, Madrid, Spain, 2013 |
|
Sentiment Analysis of User Comments for One-Class Collaborative Filtering over TED Talks, and , in: 36th ACM SIGIR Conference on Research and Development in Information Retrieval, Dublin, Ireland, ACM, 2013 |
|
Probabilistic Lexical Modeling and Grapheme-based Automatic Speech Recognition, and , Idiap-RR-15-2013 |
|
From N to N+1: Multiclass Transfer Incremental Learning, , and , in: Proceedings of the Conference on Computer Vision and Pattern Recognition, 2013 |
|
Applying multi- and cross-lingual stochastic phone space transformations to non-native speech recognition, , , , and , in: IEEE Transactions on Audio, Speech, and Language Processing, 2013 |
[DOI] |
Combining Content with User Preferences for TED Lecture Recommendation, and , in: Proceedings of the 11th International Workshop on Content Based Multimedia Indexing, Veszprém, Hungary, IEEE, 2013 |
|
The 2nd Competition on Counter Measures to 2D Face Spoofing Attacks, , and , Idiap-RR-18-2013 |
|
Improving Grapheme-based ASR by Probabilistic Lexical Modeling Approach, and , Idiap-RR-14-2013 |
|
The 2013 Speaker Recognition Evaluation in Mobile Environment, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and , Idiap-RR-32-2013 |
|
The 2013 Face Recognition Evaluation in Mobile Environment, , , , , , , , , , , , , , , , , , , , , , , , , , , and , Idiap-RR-36-2013 |
|
Estimating Phoneme Class Conditional Probabilities from Raw Speech Signal using Convolutional Neural Networks, , and , Idiap-RR-13-2013 |
|
Spoofing in 2D Face Recognition with 3D Masks and Anti-spoofing with Kinect, and , Idiap-RR-27-2013 |
|
Anti-spoofing in action: joint operation with a verification system, , and , Idiap-RR-19-2013 |
|
Complementary Countermeasures for Detecting Scenic Face Spoofing Attacks, , , , and , in: International Conference on Biometrics, Madrid, Spain, 2013 |
[URL] |
Can face anti-spoofing countermeasures work in a real world scenario?, , , and , in: International Conference on Biometrics, Madrid, Spain, 2013 |
[URL] |
Evaluating Shape Descriptors for Detection of Maya Hieroglyphs, , and , in: in Proc. Mexican Conf. on Pattern Recognition, Queretaro, 2013 |
|
Statistical models for HMM/ANN hybrids, and , Idiap-RR-11-2013 |
|
From Foursquare to my Square: Learning Check-in Behavior from Multiple Sources, , and , in: The 7th International AAAI Conference on Weblogs and Social Media, 2013 |
|
Bias Adaptation for Vocal Tract Length Normalization, , , and , Idiap-RR-12-2013 |
|
Adaptation Experiments on French MediaParl ASR, , Idiap-RR-10-2013 |
|
Grapheme and Multilingual Posterior Features for Under-Resourced Speech Recognition: A Study on Scottish Gaelic, , and , in: IEEE International Conference on Acoustics, Speech and Signal Processing, 2013 |
|
Improved Overlap Speech Diarization of Meeting Recordings using Long-term Conversational Features, and , in: ICASSP, 2013 |
|
Improved Overlap Speech Diarization of Meeting Recordings using Long-term Conversational Features, and , in: ICASSP, 2013 |
Enhancing State Mapping-Based Cross-Lingual Speaker Adaptation using Phonological Knowledge in a Data-Driven Manner, and , Idiap-RR-08-2013 |
|
Speaker adaptive Kullback-Leibler divergence based hidden Markov models, and , in: Proceedings IEEE International Conference on Acoustics, Speech and Signal Processing, 2013 |
|
A Scalable Formulation of Probabilistic Linear Discriminant Analysis: Applied to Face Recognition, , , and , Idiap-RR-07-2013 |
[URL] |
On the (Un)importance of the Contextual Factors In HMM-Based Speech Synthesis, , and , in: Proceedings of the IEEE Intl. Conference on Acoustics, Speech and Signal Processing (ICASSP), Vancouver, Canada, pages 8140 - 8143, 2013 |
|
Convolutional Pitch Target Approximation Model for Speech Synthesis, and , Idiap-RR-05-2013 |
|
Computational Methods for Audio-Visual Analysis of Emergent Leadership in Teams, , École Polytechnique Fédéral de Lausanne, 2013 |
|
Fast Object Detection with Entropy-Driven Evaluation, , , and , in: Proceedings of the Conference on Computer Vision and Pattern Recognition, 2013 |
KL-HMM and Probabilistic Lexical Modeling, and , Idiap-RR-04-2013 |
|
Who Wants To Be A Millionaire? (II), , and , Idiap-Com-02-2013 |
|
Learning Categories from Few Examples with Multi Model Knowledge Transfer, , and , Idiap-RR-16-2013 |
|
Learning to Learn by Exploiting Prior Knowledge, , EDIC, 2013 |
|
The Places of Our Lives: Visiting Patterns and Automatic Labeling from Longitudinal Smartphone Data, and , in: IEEE Transactions on Mobile Computing, 2013 |
|
Using out-of-language data to improve an under-resourced speech recognizer, , , and , Idiap-RR-09-2013 |
|
Using out-of-language data to improve an under-resourced speech recognizer, , , and , in: Speech Communication, 2013 |
[DOI] [URL] |
Distinguishing the Popularity Between Topics: A System for Up-to-date Opinion Retrieval and Mining in the Web, , and , in: Proceedings of the 14th International Conference on Intelligent Text Processing and Computational Linguistics, LNCS, Samos, Greece, ACM, 2013 |
[URL] |
Assessing the Accuracy of Discourse Connective Translations: Validation of an Automatic Metric, and , in: 14th International Conference on Intelligent Text Processing and Computational Linguistics, University of the Aegean, Samos, Greece, pages 236-247, Springer, 2013 |
[DOI] |
Spoofing Attacks To 2D Face Recognition Systems With 3D Masks, and , Idiap-RR-42-2013 |
|
Body communicative cue extraction for conversational analysis, , , , and , in: Proceedings of IEEE International Conference on Automatic Face and Gesture Recognition, 2013 |
|
Structured Sparse Acoustic Modeling for Speech Separation, , , and , in: Signal Processing with Adaptive Sparse Structured Representations SPARS, SPARS, 2013 |
|
Model-based Sparse Component Analysis for Multiparty Distant Speech Recognition, , École Polytechnique Fédérale de Lausanne, 2013 |
|
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 | 81 |