Static Models of Derivative-Coordinates Phase Spaces for Multivariate Time Series Classification: An Application to Signature Verification
Related publications (32)
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
In this paper, a novel statistical generative model to describe a face is presented, and is applied to the face authentication task. Classical generative models used so far in face recognition, such as Gaussian Mixture Models (GMMs) and Hidden Markov Model ...
In this paper, we propose a Markov chain modeling of complicated phenomena observed from coupled chaotic oscillators. Once we obtain the transition probability matrix from computer simulation results, various statistical quantities can be easily calculated ...
We present an approach based on Hidden Markov Model (HMM) and Gaussian Mixture Regression (GMR) to learn robust models of human motion through imitation. The proposed approach allows us to extract redundancies across multiple demonstrations and build time- ...
The equations of motion are derived for the dynamical folding of charged molecular strands (such as DNA) modeled as flexible continuous filamentary distributions of interacting rigid charge conformations. The new feature is that these equations are nonloca ...
Passports are now equipped with RFID chips that contain private information, biometric data, and a digital signature by issuing authorities. We review most of applicable security and privacy issues. We argue that the main privacy issue is not unauthorized ...
Our main motivation is to design more user-friendly security protocols. Indeed, if the use of the protocol is tedious, most users will not behave correctly and, consequently, security issues occur. An example is the actual behavior of a user in front of an ...
The Lagrangian and Hamiltonian structures for an ideal gauge-charged fluid are determined. Using a Kaluza-Klein point of view, the equations of motion are obtained by Lagrangian and Poisson reductions associated to the automorphism group of a principal bun ...
Most state-of-the-art automatic speech recognition (ASR) systems deal with noise in the environment by extracting noise robust features which are subsequently modelled by a Hidden Markov Model (HMM). A limitation of this feature-based approach is that the ...
Releasing a classical digital signature faces to privacy issues. Indeed, there are cases where the prover needs to authenticate some data without making it possible for any malicious verifier to transfer the proof to anyone else. It is for instance the cas ...
The Monge problem [23], [27], as reformulated by Kantorovich [19], [20] is that of the transportation, at a minimum "cost", of a given mass distribu- tion from an initial to a final position during a given time interval. It is an optimal transport problem ...