A Novel Approach to Combining Client-Dependent and Confidence Information in Multimodal Biometric
Related publications (82)
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
Despite an increasing interest in speaker recognition technologies, a significant obstacle still hinders their wide deployment --- their high vulnerability to spoofing or presentation attacks. These attacks can be easy to perform. For instance, if an attac ...
Before performing experiments in the lab with dielectrophoresis (DEP), it is useful to predict the particle and cell responses to the electric field. This requires knowledge of particles or cells properties, which can be obtained from the literature, and i ...
Despite commonly reported potentials for emission reduction and efficiency increase, industrial heat pumps have yet to reach wide-scale employment in non-refrigeration appli- cations. The bottlenecks are identified as a general scepticism from process oper ...
In the problem of coded caching for media delivery, two separate coding opportunities have been identified. The first opportunity is a multi-user advantage and crucially hinges on a public broadcast link in the delivery phase. This has been explored in a p ...
Cloud computing has been experiencing sharp development over the last years, leading to an increased demand for application migration to the cloud. Cloud providers, in an effort to attract more customers and earn their confidence, offer to tenants the illu ...
Research in the area of automatic speaker verification (ASV) has advanced enough for the industry to start using ASV systems in practical applications. However, these systems are highly vulnerable to spoofing or presentation attacks (PAs), limiting their w ...
Theoretical part (about 3 weeks from 20 Feb to 12 March) Literature search for current knowledge on air pollution in relation to urban farming: where is the accumulation; what kind of pollution can we find (dusts, dioxins, PM, heavy metalsâŠ); what are ...
We describe the design and recording of a high quality French speech corpus, aimed at building TTS systems, investigate multiple styles, and emphasis. The data was recorded by a French voice talent, and contains about ten hours of speech, including emphasi ...
This article provides a technical introduction to the PATSTAT Register database, which contains bibliographical, procedural and legal status data on patent applications handled by the European Patent Office. It presents eight MySQL queries that cover some ...
Edge computing promises lower latency interactions for clients operating at the edge by shifting computation away from Data Centers to Points of Presence which are more abundant and located geographically closer to end users. However, most commercially ava ...