Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
Realistic body images (avatars) have been long utilized in virtual reality applications, and they are becoming increasingly used in Neuroscience and Neuroprosthetics fields. To elucidate monkeys' perception of avatars, we have measured reaction of two naiv ...
In the last decades, image production has grown significantly. From digital photographs to the medical scans, including satellite images and video films, more and more data need to be processed. Consequently the number of applications based on digital imag ...
We address the question of how to characterize the outliers that may appear when matching two views of the same scene. The match is performed by comparing the difference of the two views at a pixel level, aiming at a better registration of the images. When ...
The issue of privacy protection in video surveillance has drawn a lot of interest lately. However, thorough performance analysis and validation is still lacking, especially regarding the fulfillment of privacy-related requirements. In this paper, we put fo ...
Ieee Service Center, 445 Hoes Lane, Po Box 1331, Piscataway, Nj 08855-1331 Usa2010
Digitally, panoramic pictures can be assembled from several individual, overlapping photographs. While the geometric alignment of these photographs has retained a lot of attention from the computer vision community, the mapping of colour, i.e. the correcti ...
Crowds are part of our everyday experience; nevertheless, in virtual worlds they are still relatively rare. In this thesis we explore the challenges of bringing crowds into interactive virtual environments and the possible applications of real-time interac ...
A common technique to by-pass 2-D face recognition systems is to use photographs of spoofed identities. Unfortunately, research in counter-measures to this type of attack have not kept-up - even if such threats have been known for nearly a decade, there se ...
Visual information, in the form of images and video, comes from the interaction of light with objects. Illumination is a fundamental element of visual information. Detecting and interpreting illumination effects is part of our everyday life visual experien ...
The development of plastic card printers has led to the widespread use of identity documents printed on plastic cards, such as ID cards, driving licenses, and access key cards. This paper presents a new security feature based on a technique for embedding a ...
The ultimate goal of automatic image rendering is a system that gives at least as pleasing results as a human expert using an image manipulation program. In this article we demonstrate that the exploitation of semantic image keywords is a promising approac ...