The Flux: Creating a Large Annotated Image Database
Related publications (47)
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
To go beyond the query-by-example paradigm in image retrieval, there is a need for semantic indexing of large image collections for intuitive text-based image search. Different models have been proposed to learn the dependencies between the visual content ...
Cursive character recognition is a challenging task due to high variability and intrinsic ambiguity of cursive letters. This paper presents \emph{C-Cube} (Cursive Character Challenge), a new public-domain cursive character database. \emph{C-Cube} contains ...
We investigate the learning of the appearance of an object from a single image of it. Instead of using a large number of pictures of an object to be recognized, we use pictures of other objects to learn invariance to noise and variations in pose and illumi ...
Cursive character recognition is a challenging task due to high variability and intrinsic ambiguity of cursive letters. This paper presents \emph{C-Cube} (Cursive Character Challenge), a new public-domain cursive character database. \emph{C-Cube} contains ...
To go beyond the query-by-example paradigm in image retrieval, there is a need for semantic indexing of large image collections for intuitive text-based image search. Different models have been proposed to learn the dependencies between the visual content ...
Generalized snapshot isolation extends snapshot isolation as used in Oracle and other databases in a manner suitable for replicated databases. While (conventional) snapshot isolation requires that transactions observe the ``latest'' snapshot of the databas ...
In this paper, we study the safety guarantees of group communication-based database replication techniques. We show that there is a model mismatch between group communication and database, and because of this, classical group communication systems cannot b ...
In this paper, we propose a system for face verification. It describes in detail each stage of the system: the modeling of the face, the extraction of relevant features and the classification of the input face as a client or an impostor. This system is bas ...
The issues of fusion with client-dependent and confidence information have been well studied separately in biometric authentication. In this study, we propose to take advantage of both sources of information in a discriminative framework. Initially, each s ...
The issues of fusion with client-dependent and confidence information have been well studied separately in biometric authentication. In this study, we propose to take advantage of both sources of information in a discriminative framework. Initially, each s ...