Writer Identification for Smart Meeting Room Systems
Publications associées (32)
Graph Chatbot
Chattez avec Graph Search
Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
We present a discriminative clustering approach in which the feature representation can be learned from data and moreover leverage labeled data. Representation learning can give a similarity-based clustering method the ability to automatically adapt to an ...
Training convolutional neural networks (CNNs) for very high-resolution images requires a large quantity of high-quality pixel-level annotations, which is extremely labor-intensive and time-consuming to produce. Moreover, professional photograph interpreter ...
Machine learning (ML) applications are ubiquitous. They run in different environments such as datacenters, the cloud, and even on edge devices. Despite where they run, distributing ML training seems the only way to attain scalable, high-quality learning. B ...
In wearable-based human activity recognition (HAR) research, one of the major challenges is the large intra-class variability problem. The collected activity signal is often, if not always, coupled with noises or bias caused by personal, environmental, or ...
Information is the resolution of uncertainty and manifests itself as patterns. Although complex, most observable phenomena are not random and instead are associated with deterministic, chaotic systems. The underlying patterns and symmetries expressed from ...
The present invention according to one embodiment concerns a computer-implemented method of analysing handwritten characters produced by a user. The method comprises: collecting (107) handwritten characters of the user, the user being part of a given user ...
To operate the railway system safely and efficiently, a multitude of assets need to me monitored. Railway sleepers are one of these infrastructure assets, that are safety critical. To automate the monitoring process, data-driven fault diagnostics models ha ...
Side-channel CPU disassembly is a side-channel attack that allows an adversary to recover instructions executed by a processor. Not only does such an attack compromise code confidentiality, it can also reveal critical information on the system’s internals. ...
The shear resistance of headed studs is of paramount importance for the design of steel-concrete composite structures and an accurate predictive model is highly needed. Ensemble learning is expected to be a powerful solution while it relies on laborious se ...
Early and accurate detection of epileptic seizures is an extremely important therapeutic goal due to the severity of complications it can prevent. To this end, a low-power machine learning-based seizure detection implemented on an FPGA is proposed in this ...