Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
Generalized snapshot isolation extends snapshot isolation as used in Oracle and other databases in a manner suitable for replicated databases. While (conventional) snapshot isolation requires that transactions observe the ``latest'' snapshot of the databas ...
Cursive character recognition is a challenging task due to high variability and intrinsic ambiguity of cursive letters. This paper presents \emph{C-Cube} (Cursive Character Challenge), a new public-domain cursive character database. \emph{C-Cube} contains ...
In this paper, we propose a system for face verification. It describes in detail each stage of the system: the modeling of the face, the extraction of relevant features and the classification of the input face as a client or an impostor. This system is bas ...
Scene structuring is a video analysis task for which no common evaluation procedures have been fully adopted. In this paper, we present a methodology to evaluate such task in home videos, which takes into account human judgement, and includes a representat ...
Scene structuring is a video analysis task for which no common evaluation procedures have been fully adopted. In this paper, we present a methodology to evaluate such task in home videos, which takes into account human judgement, and includes a representat ...
The International Global H-mode Threshold Database has been revised and cleaned from inadequate data for some tokamaks. This significantly reduces the scatter for the corresponding datasets. The resulting new analyses including all ten tokamaks yields resu ...
Research efforts in the design of image-based gestural interfaces have steadily increased over the last few years. Numerous approaches have been investigated to recognize gestures such as facial expressions, hand gestures or hand postures. Nevertheless, th ...
For the development and evaluation of methods for person identification, verification, and other tasks, databases play an important role. Despite this fact, there exists no measure whether a given database is sufficient to train and/or to test a given algo ...
The issues of fusion with client-dependent and confidence information have been well studied separately in biometric authentication. In this study, we propose to take advantage of both sources of information in a discriminative framework. Initially, each s ...