Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
Continuous "always-on" monitoring is beneficial for a number of applications, but potentially imposes a high load in terms of communication, storage and power consumption when a large number of variables need to be monitored. We introduce two new filtering ...
Deconvolution is an image processing technique that restores the effective object representation [3] [4], allowing to improve images analysis steps such as segmentation [1] or colocalization study [2]. We performed several deconvolution tests on different ...
The problem of time validity of biometric models has received only a marginal attention from researchers. Actual and up-to-date at the time of their creation, extracted features and models relevant to a person's face may eventually become outdated, leading ...
Ieee Service Center, 445 Hoes Lane, Po Box 1331, Piscataway, Nj 08855-1331 Usa2010
Existing approaches to biometric classification with quality measures make a clear distinction between the single-modality applications and the multi-modal scenarios. This study bridges this gap with Q-stack, a stacking-based classifier ensemble, which use ...
This paper presents two models for content-based automatic image annotation and retrieval in web image repositories, based on the co-occurrence of tags and visual features in the images. In particular, we show how additional measures can be taken to addres ...
We present two models for content-based automatic image annotation and retrieval in web image repositories, based on the co-occurrence of tags and visual features in the images. In particular, we show how additional measures can be taken to address the noi ...
The problem of time validity of biometric models has received only a marginal attention from researchers. In this paper, we investigate the aging influence on the classifier scores of genuine client. Our studies show that as age progresses the classifier s ...
Ieee Service Center, 445 Hoes Lane, Po Box 1331, Piscataway, Nj 08855-1331 Usa2009
We investigate the usability of the Artificial Immune Systems (AIS) approach for solving selected problems in computer networks. Artificial immune systems are created by using the concepts and algorithms inspired by the theory of how the Human Immune Syste ...
A well-known approach for collaborative spam filtering is to determine which emails belong to the same bulk, e.g. by exploiting their content similarity. This allows, after observing an initial portion of a bulk, for the bulkiness scores to be assigned to ...
Spam is usually sent in bulk. A bulk mailing consists of many copies of the same original spam message, each sent to a different recipient. The copies are usually obfuscated, i.e. modified a bit in order to look different from each other. In collaborative ...