MULTI-INDEX VOTING FOR ASYMMETRIC DISTANCE COMPUTATION IN A LARGE-SCALE BINARY CODES. Chih-Yi Chiu, Yu-Cyuan Liou, and Sheng-Hao Chou
|
|
- Bryce Moore
- 5 years ago
- Views:
Transcription
1 MULTI-INDEX VOTING FOR ASYMMETRIC DISTANCE COMPUTATION IN A LARGE-SCALE BINARY CODES Chih-Yi Chiu, Yu-Cyuan Liou, and Sheng-Hao Chou Departent of Coputer Science and Inforation Engineering, National Chiayi University, Taiwan ABSTRACT In this paper, we propose a fast search ethod for asyetric distance coputation in large-scale binary codes. Asyetric distances take advantage of less inforation loss at the query side. However, calculating asyetric distances with the linear scan approach is prohibitive in a large-scale dataset. We present a novel algorith called ulti-index voting, which integrates the ulti-index hashing technique with a voting echanis, to select appropriate candidates and calculate their asyetric distances. Substantial experiental evaluations are given to deonstrate that, guided by the voting echanis, the proposed ethod can yield an approxiate accuracy to the linear scan approach while accelerating the run tie with a significant speedup. For exaple, one result shows that in a dataset of one billion 256-bit binary codes, exaining only.5% of the dataset can reach 95~99% close accuracy to the linear scan approach but can accelerate over 73~128 ties. Index Ters Nearest neighbor search, asyetric distance coputation, ulti-index hashing and voting 1. INTRODUCTION Searching the nearest neighbors (NN) is a proble of finding the closest data with respect to a given query. It is a fundaental requireent in any applications, such as inforation retrieval, signal processing, pattern recognition, and coputer vision. However, within a high-diensional feature space and a large-scale dataset volue, the NN search becoes a very challenging task when faced with the accuracy, efficiency, and eory issues siultaneously. A nuber of binary ebedding algoriths have been recently proposed to address these issues [1][3][4][7][8][1]. By ebedding the original data into the binary space, the binary ebedding algoriths enable a faster NN search by hardware-supported bit operations and anageable eory consuption with the copact binary representation. However, the use of binary ebedding causes severe inforation loss after ebedding. Even though these binary ebedding algoriths try to bridge the gap through learning, an inevitable large inforation loss exists in apping a realvalued vector to a binary code. Besides, the Haing distance between two binary codes allows only a few distinct values. Hence, the NN search in the binary space causes a weaker discriination than that in the real-valued space. A novel concept called asyetric distance atching for binary codes has recently been proposed, and has been shown to be ore accurate than Haing distance atching [2][5]. Asyetric eans that the distance is coputed between two different spaces. For exaple, in our case, the query is a real-valued vector while the reference data are binary codes. Since asyetric atching does not ebed the query to the binary space, it takes advantage of a lesser aount of inforation loss at the query side. The NN search in the real-valued space would yield a ore discriinating result. We follow Gordo et al. s forulation of asyetric distances for binary ebedding codes [2]. Assue that a binary ebedding function h(x i ) = q(f(x i )) can be decoposed into two functions f and q, where f(x i ): {R} s {I} t transfors s-diensional real-valued vector x i to a t-diensional real-valued vector y i, and q(y i ): {I} t {B} t transfors y i to a t-diensional binary code z i. 1 The asyetric distance between a real-valued vector (query) and a binary code (reference) is calculated in the interediate space {I} t. In Gordo et al. s approach, they adopted the linear scan schee to exhaustively calculate the asyetric distances of all reference data. However, this is prohibitive when searching in a large-scale dataset. In this paper, we propose a fast search ethod for asyetric distance coputation in large-scale binary codes. For a reference dataset of binary codes, we divide each code into disjoint binary subvectors and store the in different index tables. Given a query of the real-valued vector, it is transfored and divided into interediate real-valued subvectors. We calculate the Euclidean distances in the interediate space between each query subvector and centroids of all entries in an index table, and rank these entries fro near to far. We then sequentially scan the ranked entries across the index tables for voting. A reference binary code that has ultiple subvectors close to the query, i.e., it gets enough votes fro the query, is selected as a candidate. Finally, we calculate candidates asyetric distances and output NNs for the query. 1 R, I, and B represent the original real-valued, interediate, and ebedded binary spaces, respectively /16/$ IEEE 116 ICASSP 216
2 The candidate selection algorith is called ulti-index voting. Epirical studies are given through substantial experiental evaluations on large-scale datasets. Results show that, guided by the voting echanis, the proposed ethod deonstrates a satisfactory accuracy with a significant speedup. For exaple, in a dataset of one billion 256-bit binary codes, our ethod that exaines only.5% of the reference dataset can reach 95~99% close accuracy to the linear scan approach but can accelerate over 73~128 ties [2]. Two state-of-the-art ethods for asyetric NN search, including product quantization [5] and ulti-index hashing [9] are ipleented for coparison. The proposed ethod yields the best accuracy by taking advantage of cobining ulti-index voting and interediate space coputation. In particular, without the voting echanis, the accuracy is uch lower than the linear scan approach; adopting the voting echanis can generate a burst iproveent in accuracy. The reainder of this paper is organized as follows. In Section 2, we briefly introduce the related work. Section 3 describes and analyzes the proposed ulti-index voting algorith in detail. Section 4 deonstrates and discusses the experiental results. Conclusions are given in Section RELATED WORK The NN search for binary codes can be divided into two categories: syetric and asyetric. For the syetric approach, a query x Q is transfored to a binary code through the binary ebedding function. The distance fro x Q to a reference data x i is expressed as the Haing distance of their binary codes. Matching binary codes can be done efficiently with a couple of achine instructions (e.g., XOR and POPCNT instructions). In particular, Norouzi et al. [9] proposed an efficient ulti-index hashing (MIH) schee to perfor an exact search for binary codes. Reference binary codes are divided into disjoint subvectors and hashed into different index tables. Given a query and a search radius r, the reference codes that differ fro the query by r bits or less can be exactly returned. A key factor for speedup is that for each index table, the search radius is decreased to only r bits. This is because, when two binary codes differ by r bits or less, at least in one of their subvectors they differ by at ost r bits. Rather than the syetric approach that purely exploits the binary space structure, the asyetric approach utilizes the original space inforation of binary codes. However, the asyetric distance between x Q and x i is coputed in neither the original space nor the binary space; it is calculated in their interediate space. Gordo et al. [2] presented two asyetric distance coputation (ADC) schees based on statistic expectation and lower-bound. Jégou et al. [5] proposed an inverted file syste with asyetric distance coputation (IVF-ADC) for approxiate NN search based on product quantization. The inverted file syste is served as a coarse quantizer. The residual vector between a vector and its corresponding coarse centroid is encoded with a product quantizer, which proceeds by decoposing the high-diensional space into a Cartesian product of low-diensional subspaces. 3. MULTI-INDEX VOTING Suppose we have a reference dataset of n t-diensional binary codes {z i {B} t i = 1, 2,, n}, whose correspondences are s-diensional real-valued vectors in the original space {x i {R} s i = 1, 2,, n} and t- diensional real-valued vectors in the interediate space {y i {I} t i = 1, 2,, n}. Every binary code z i is divided into disjoint subvectors, each of which coprises of g = t bits (assue t is divisible by ). g should be chosen appropriately so that the syste can bear O(2 g ) data space occupied in eory. We then build index tables with respect to subvectors as follows. Denote the jth subvector as z i, j [1, ]. A cluster Z β = {i z i β} is generated to store a set of reference identities whose jth subvectors are, where β {B} g is a g-diensional binary code. We also copute the cluster ean in the interediate space of Z β : y β = 1 Z β y i i Z β where denotes the cardinality of the set. For any subvector z i = β, its correspondence in the interediate space can be considered to be y β. In other words, we build a quantizer u of the jth subvector in the interediate space: u (y i ) = y β for i Z β. Z β and y β are calculated for all j and offline. An online knn search algorith for the given query x Q {R} s is presented hereafter. The query x Q is projected to the interediate space as y Q and then divided into subvectors. For the jth subvector y Q, we sort the clusters {Z β } based on its Euclidean distances to the cluster eans {y β } in ascending order. Denote the sorted cluster indexes as {B r r = 1,2,, 2 g }, where y Br is the rth nearest to y Q in the interediate space. Started fro the nearest clusters of all subvectors {Z B1 j = 1,2,, }, if a reference data x i is stored in Z B1, we denote x i is voted by x Q. When the vote count of x i accuulates ore than the vote threshold T v, x i is put in a candidate set. The process is repeated for the next nearest clusters until the size of the candidate set is greater than the candidate threshold T c. The search algorith, tered ulti-index voting, is listed in the following:, 1161
3 Algorith: Multi-index voting Input: n reference binary codes {z i }, index tables {Z β }, and the query x Q. Output: k NN binary codes for x Q. 1. Generate a t-diensional vector in the interediate space for x Q : y Q = f(x Q ). 2. For each subvector index j and binary code, calculate the Euclidean distance between y Q and yβ : ed (y Q, yβ ) = yq yβ For each j, sort the above Euclidean distances to obtain an index list {B r r = 1,2,, 2 g }, where y Br is the rth nearest to y Q in the interediate space. 4. Initialize an epty candidate set C and vote counts for all x i : x i.votecount =, i = 1, 2,, n. 5. Let C be the size of C, T v and T c be the thresholds of the vote count and the candidate size respectively. Do the loop: do for r = 1 to 2 g for j = 1 to for i Z Br x i.votecount = x i.votecount + 1. if x i.votecount T v Add x i to C. while C < T c. 6. For each x i C, calculate the asyetric distance between x Q and x i in the interediate space: ad(x Q, x i ) = ed (y Q, yβ ), j=1 where i Z β. Build a axheap to store the k sallest asyetric distances seen so far. 7. Apply the heap sort algorith to the axheap and output the k NN binary codes. 4. EXPERIMENTAL RESULT We carried out the experients on a public large-scale dataset: ANN_SIFT1B [6]. It contains one billion SIFT vectors (each with 128-diensional real values) and 1, queries along with the ground truth of 1, nearest neighbors for each query. The real-valued vectors are transfored to 128/256 bits binary codes by using locality sensitive hashing (LSH). Experients were run on a PC using Windows 7, with Intel Core i7 3.4GHz CPU (only one thread is used), 256KB L2 cache, and 64GB RAM. We ipleent five NN search ethods for coparison, including exhaustive syetric distance coputation (abbreviated as SDC), exhaustive asyetric distance coputation (ADC) [2], inverted file syste with asyetric distance coputation (IVF-ADC) [5], ultiindex hashing with asyetric distance coputation (MIH- ADC) [9], and the proposed ulti-index voting with asyetric distance coputation (MIV-ADC). The forer two ethods perfor an exact but exhaustive search. They can be considered the baselines of the syetric and asyetric approaches, respectively. The latter three ethods act as the approxiate but speedup versions of ADC. The ain difference aong the is in the inverted indexing: IVF-ADC eploys a single index table; MIH- ADC and MIV-ADC adopt ultiple index tables but with different candidate selection echaniss. MIH-ADC selects candidates that are hit by the query only once and within r bits Haing distance to the query in the binary space. MIV-ADC applies a voting echanis to select candidates if they are hit by the query at least T v ties in different index tables, and candidates are selected in order according to their Euclidean distances to the query in the interediate space. Figure 1 plots ean average precision () for SDC, ADC, and MIV-ADC. The abscissa axes represent T v, and the ordinate axes represent. Solid curves represent various T c = {1K, 5K, 1K, 5K, 1M} of MIV-ADC, while dash lines represent SDC and ADC. In general, ADC stands for the accuracy upper bound for in asyetric binary code search. MIV-ADC gets an iproveent on accuracy with an increasing voting threshold T v. However, it turns out to be degenerated when T v is close to the nuber of index tables due to the cuulative quantization error in the interediate space MIV-ADC_1K MIV-ADC_5K MIV-ADC_1K MIV-ADC_5K MIV-ADC_1M ADC SDC T v T v (a) (b) Fig. 1. for querying the 1B (a) 128-bit and (b) 256-bit datasets. Solid curves represent various T c = {1K, 5K, 1K, 5K, 1M} of MIV-ADC, while dash lines represent SDC and ADC. Tables I and II suarize the run tie for the 128-bit and 256-bit datasets, respectively. In general, as the candidate size T c increases ten ties, the run tie increases uch less than ten ties. It iplies the proposed ethod runs in a sublinear tie coplexity. In addition, the speedup of MIV-ADC over ADC is ore proinent in a longer-bit dataset. As an exaple of the 256-bit dataset, when T v = 3 and T c = 5K (.5% of the reference dataset), MIV-ADC can reach 99% close to ADC but run over 73 ties faster than ADC; if we change T v = 2, MIV-ADC can reach 95% close accuracy to ADC with 128 ties acceleration over ADC MIV-ADC_1K MIV-ADC_5K MIV-ADC_1K MIV-ADC_5K MIV-ADC_1M ADC SDC 1162
4 Table I. Run tie (second) for querying the 1B 128-bit dataset T v = 1 T v = 2 T v = 3 T v = 4 T v = 5 T v = 6 T v = 7 T v = 8 T c = 1K T c = 5K MIV-ADC T c = 1K T c = 5K T c = 1M E-SDC E-ADC Table II. Run tie (second) for querying the 1B 256-bit dataset T v = 1 T v = 2 T v = 3 T v = 4 T v = 5 T v = 6 T v = 7 T v = 8 T c = 1K T c = 5K MIV-ADC T c = 1K T c = 5K T c = 1M E-SDC E-ADC Next, we copare and discuss the three approxiate ADC ethods: IVF-ADC, MIH-ADC, and MIV-ADC. Figure 2 shows and run tie for querying the 128-bit dataset. All ethods apply the sae feature decoposition schee by partitioning the original SIFT vector into eight disjoint subvectors. In the 128-bit dataset, IVF-ADC eploys one index table, whereas MIH-ADC and MIV- ADC eploy eight index tables; each index table coprises of 2 16 entries (clusters). We do not show the result of the 256-bit dataset because MIH-ADC requires ore eory beyond the 64GB RAM achine. Despite the voting echanis, MIV-ADC yields the best accuracy aong these ethods. Considering MIV- ADC and MIH-ADC, they both use ultiple index tables but apply different candidate selection strategies. MIV-ADC selects candidates in the interediate space, whereas MIH- ADC does it in the binary space, which is known to be less discriinatory. Therefore, MIV-ADC can obtain higher quality candidates to yield a better accuracy than MIH-ADC. An interesting observation is that, in Figure 2(b), the run tie of MIH-ADC and MIV-ADC has a crossover in the interval T c = {1K, 5K}. In other words, when T c is raised, MIH-ADC will take ore tie to collect ore candidates than MIV-ADC. This is because the candidate set of MIH-ADC grows rapidly with the order of the binoial coefficient, whereas that of MIV-ADC increases gradually in the proposed voting algorith. For the run tie, IVF-ADC is the fastest NN search ethod due to its siple single-index structure. Without the voting echanis, however, the accuracy is uch lower than the accuracy upper bound posed by the linear scan ethod ADC. It requires a large aount of candidates to be exained to approach the accuracy upper bound, and thus uch ore tie is spent for the candidate exaination. MIV-ADC that adopts the voting echanis can generate a burst iproveent in accuracy, which is close to the accuracy upper bound, by exaining relatively sall aount of candidates. For exaple in the 256-bit dataset, IVF-ADC yields.15 by spends 5.8 seconds to scanning one hundred illion candidates (1% of the 1B reference dataset), while MIV-ADC yields the sae accuracy by spending.93 seconds to scan five hundred thousand candidates (.5% of the 1B reference dataset) under T v = IVF-ADC MIH-ADC MIV-ADC T =1 v =2 =3 1K 1K 5K 1M T c (a) (b) Fig. 2. (a) and (b) run tie for searching the 1B 128- bit SIFT dataset by IVF-ADC, MIH-ADC, and MIV-ADC. 5. CONCLUSIONS In this paper, we present an approxiate asyetric NN search ethod for binary ebedding codes. By taking advantage of ulti-index voting in the interediate space, the proposed ethod achieves an outstanding perforance in ters of the tradeoff between the accuracy and the efficiency. Experiental results show the proposed NN search ethod yields a close accuracy to the linear scan approach and a significant speedup by applying a sall vote threshold in exaining a fraction of the dataset. ACKNOWLEDGEMENTS 1K 1K 5K 1M T c This work was supported in part by the Ministry of Science and Technology, Taiwan, under Grants MOST E MY3 and MOST E MY2. run tie IVF-ADC MIH-ADC MIV-ADC T =1 v =2 =3 1163
5 REFERENCES [1] T. Ge, K. He, and J. Sun, Graph cuts for supervised binary coding, In Proceedings of European conference on Coputer Vision (Zurich, Switzerland, Sep. 6-12, 214). ECCV 14. [2] A. Gordo, F. Perronnin, Y. Gong, and S. Lazebnik, Asyetric distances for binary ebeddings, IEEE Transactions on Pattern Analysis and Machine Intelligence. Vol. 36, No. 1, pp , 214. [3] K. He, F. Wen, and J. Sun, K-eans hashing: an affinity-preserving quantization ethod for learning binary copact codes, In Proceedings of IEEE International Conference on Coputer Vision and Pattern Recognition. (Portland, USA, Jun ). CVPR 13. [4] G. Irie, Z. Li, X. M. Wu, and S. F. Chang, Locally linear hashing for extracting non-linear anifolds, In Proceedings of IEEE International Conference on Coputer Vision and Pattern Recognition (Colubus, USA, Jun , 214). CVPR 14. [5] H. Jégou, M. Douze, and C. Schid, Product quantization for nearest neighbor search, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 33, No. 1, pp , 211. [6] H. Jégou, R. Tavenard, M. Douze, and L. Asaleg, Searching in one billion vectors: re-rank with source coding, In Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (Prague, Czech Republic, May 22-27, 211). ICASSP 11. [7] W. Liu, J. Wang, S. Kuar, and S. F. Chang, Hashing with graphs, In Proceedings of International Conference on Machine Learning (Bellevue, USA, Jun. 28-Jul. 2, 211). ICML 11. [8] M. Norouzi and D. J. Fleet, Minial loss hashing for copact binary codes, In Proceedings of International Conference on Machine Learning (Bellevue, USA, Jun. 28-Jul. 2, 211). ICML 11. [9] M. Norouzi, A. Punjani, and D. J. Fleet, Fast exact search in Haing space with ulti-index hashing, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 36, No. 6, pp , 214. [1] Y. Weiss, A. Torralba, and R. Fergus, Spectral hashing, In Proceedings of Annual Conference on Neural Inforation Processing Systes (Vancouver, Canada, Dec. 8-13, 28). NIPS
EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011
EE 364B Convex Optiization An ADMM Solution to the Sparse Coding Proble Sonia Bhaskar, Will Zou Final Project Spring 20 I. INTRODUCTION For our project, we apply the ethod of the alternating direction
More informationComputer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13
Coputer Aided Drafting, Design and Manufacturing Volue 26, uber 2, June 2016, Page 13 CADDM 3D reconstruction of coplex curved objects fro line drawings Sun Yanling, Dong Lijun Institute of Mechanical
More informationA Novel Fast Constructive Algorithm for Neural Classifier
A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore
More informationImage Filter Using with Gaussian Curvature and Total Variation Model
IJECT Vo l. 7, Is s u e 3, Ju l y - Se p t 016 ISSN : 30-7109 (Online) ISSN : 30-9543 (Print) Iage Using with Gaussian Curvature and Total Variation Model 1 Deepak Kuar Gour, Sanjay Kuar Shara 1, Dept.
More informationCOLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL
COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL 1 Te-Wei Chiang ( 蔣德威 ), 2 Tienwei Tsai ( 蔡殿偉 ), 3 Jeng-Ping Lin ( 林正平 ) 1 Dept. of Accounting Inforation Systes, Chilee Institute
More informationAscending order sort Descending order sort
Scalable Binary Sorting Architecture Based on Rank Ordering With Linear Area-Tie Coplexity. Hatrnaz and Y. Leblebici Departent of Electrical and Coputer Engineering Worcester Polytechnic Institute Abstract
More informationTensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3
2017 2nd International Conference on Coputational Modeling, Siulation and Applied Matheatics (CMSAM 2017) ISBN: 978-1-60595-499-8 TensorFlow and Keras-based Convolutional Neural Network in CAT Iage Recognition
More information2013 IEEE Conference on Computer Vision and Pattern Recognition. Compressed Hashing
203 IEEE Conference on Coputer Vision and Pattern Recognition Copressed Hashing Yue Lin Rong Jin Deng Cai Shuicheng Yan Xuelong Li State Key Lab of CAD&CG, College of Coputer Science, Zhejiang University,
More informationGeo-activity Recommendations by using Improved Feature Combination
Geo-activity Recoendations by using Iproved Feature Cobination Masoud Sattari Middle East Technical University Ankara, Turkey e76326@ceng.etu.edu.tr Murat Manguoglu Middle East Technical University Ankara,
More informationDetection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm
Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,
More informationModeling Parallel Applications Performance on Heterogeneous Systems
Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln
More informationEfficient Estimation of Inclusion Coefficient using HyperLogLog Sketches
Efficient Estiation of Inclusion Coefficient using HyperLogLog Sketches Azade Nazi, Bolin Ding, Vivek Narasayya, Surajit Chaudhuri Microsoft Research {aznazi, bolind, viveknar, surajitc}@icrosoft.co ABSTRACT
More informationSearching in one billion vectors: re-rank with source coding
Searching in one billion vectors: re-rank with source coding Hervé Jégou INRIA / IRISA Romain Tavenard Univ. Rennes / IRISA Laurent Amsaleg CNRS / IRISA Matthijs Douze INRIA / LJK ICASSP May 2011 LARGE
More informationOptimal Route Queries with Arbitrary Order Constraints
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL.?, NO.?,? 20?? 1 Optial Route Queries with Arbitrary Order Constraints Jing Li, Yin Yang, Nikos Maoulis Abstract Given a set of spatial points DS,
More informationImage hiding with an improved genetic algorithm and an optimal pixel adjustment process
Eighth International Conference on Intelligent Systes Design and Applications Iage hiding with an iproved genetic algorith and an optial pixel adjustent process Lin-Yu Tseng Yung-Kuan Chan Yu-An Ho Yen-Ping
More informationMapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues
Mapping Data in Peer-to-Peer Systes: Seantics and Algorithic Issues Anastasios Keentsietsidis Marcelo Arenas Renée J. Miller Departent of Coputer Science University of Toronto {tasos,arenas,iller}@cs.toronto.edu
More informationInvestigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks
Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,
More informationLarge-scale visual recognition Efficient matching
Large-scale visual recognition Efficient matching Florent Perronnin, XRCE Hervé Jégou, INRIA CVPR tutorial June 16, 2012 Outline!! Preliminary!! Locality Sensitive Hashing: the two modes!! Hashing!! Embedding!!
More informationClustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering
Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into
More informationAnalysing Real-Time Communications: Controller Area Network (CAN) *
Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination
More informationNews Events Clustering Method Based on Staging Incremental Single-Pass Technique
News Events Clustering Method Based on Staging Increental Single-Pass Technique LI Yongyi 1,a *, Gao Yin 2 1 School of Electronics and Inforation Engineering QinZhou University 535099 Guangxi, China 2
More informationPrivacy-preserving String-Matching With PRAM Algorithms
Privacy-preserving String-Matching With PRAM Algoriths Report in MTAT.07.022 Research Seinar in Cryptography, Fall 2014 Author: Sander Sii Supervisor: Peeter Laud Deceber 14, 2014 Abstract In this report,
More informationThe optimization design of microphone array layout for wideband noise sources
PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun
More informationLarge scale object/scene recognition
Large scale object/scene recognition Image dataset: > 1 million images query Image search system ranked image list Each image described by approximately 2000 descriptors 2 10 9 descriptors to index! Database
More informationHIGH PERFORMANCE PRE-SEGMENTATION ALGORITHM FOR SONAR IMAGES
HIGH PERFORMANCE PRE-SEGMENTATION ALGORITHM FOR SONAR IMAGES Benjain Lehann*, Konstantinos Siantidis*, Dieter Kraus** *ATLAS ELEKTRONIK GbH Sebaldsbrücker Heerstraße 235 D-28309 Breen, GERMANY Eail: benjain.lehann@atlas-elektronik.co
More information1 Extended Boolean Model
1 EXTENDED BOOLEAN MODEL It has been well-known that the Boolean odel is too inflexible, requiring skilful use of Boolean operators to obtain good results. On the other hand, the vector space odel is flexible
More informationSolving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification
Solving the Daage Localization Proble in Structural Health Monitoring Using Techniques in Pattern Classification CS 9 Final Project Due Dec. 4, 007 Hae Young Noh, Allen Cheung, Daxia Ge Introduction Structural
More informationReal-Time Detection of Invisible Spreaders
Real-Tie Detection of Invisible Spreaders MyungKeun Yoon Shigang Chen Departent of Coputer & Inforation Science & Engineering University of Florida, Gainesville, FL 3, USA {yoon, sgchen}@cise.ufl.edu Abstract
More informationIdentifying Converging Pairs of Nodes on a Budget
Identifying Converging Pairs of Nodes on a Budget Konstantina Lazaridou Departent of Inforatics Aristotle University, Thessaloniki, Greece konlaznik@csd.auth.gr Evaggelia Pitoura Coputer Science and Engineering
More informationGromov-Hausdorff Distance Between Metric Graphs
Groov-Hausdorff Distance Between Metric Graphs Jiwon Choi St Mark s School January, 019 Abstract In this paper we study the Groov-Hausdorff distance between two etric graphs We copute the precise value
More informationNovel Image Representation and Description Technique using Density Histogram of Feature Points
Novel Iage Representation and Description Technique using Density Histogra of Feature Points Keneilwe ZUVA Departent of Coputer Science, University of Botswana, P/Bag 00704 UB, Gaborone, Botswana and Tranos
More informationPerformance Analysis of RAID in Different Workload
Send Orders for Reprints to reprints@benthascience.ae 324 The Open Cybernetics & Systeics Journal, 2015, 9, 324-328 Perforance Analysis of RAID in Different Workload Open Access Zhang Dule *, Ji Xiaoyun,
More informationEnergy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks
Energy-Efficient Disk Replaceent and File Placeent Techniques for Mobile Systes with Hard Disks Young-Jin Ki School of Coputer Science & Engineering Seoul National University Seoul 151-742, KOREA youngjk@davinci.snu.ac.kr
More informationA CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER
A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER VIOLETA TOMAŠEVIĆ, SLOBODAN BOJANIĆ 2 and OCTAVIO NIETO-TALADRIZ 2 The Mihajlo Pupin Institute, Volgina 5, 000 Belgrade, SERBIA AND MONTENEGRO 2 Technical University
More informationDefining and Surveying Wireless Link Virtualization and Wireless Network Virtualization
1 Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization Jonathan van de Belt, Haed Ahadi, and Linda E. Doyle The Centre for Future Networks and Counications - CONNECT,
More informationGalois Homomorphic Fractal Approach for the Recognition of Emotion
Galois Hooorphic Fractal Approach for the Recognition of Eotion T. G. Grace Elizabeth Rani 1, G. Jayalalitha 1 Research Scholar, Bharathiar University, India, Associate Professor, Departent of Matheatics,
More informationDesign Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems
Design Optiization of Mixed Tie/Event-Triggered Distributed Ebedded Systes Traian Pop, Petru Eles, Zebo Peng Dept. of Coputer and Inforation Science, Linköping University {trapo, petel, zebpe}@ida.liu.se
More informationData & Knowledge Engineering
Data & Knowledge Engineering 7 (211) 17 187 Contents lists available at ScienceDirect Data & Knowledge Engineering journal hoepage: www.elsevier.co/locate/datak An approxiate duplicate eliination in RFID
More informationApproaching the Skyline in Z Order
Approaching the Skyline in Z Order KenC.K.Lee Baihua Zheng Huajing Li Wang-Chien Lee cklee@cse.psu.edu bhzheng@su.edu.sg huali@cse.psu.edu wlee@cse.psu.edu Pennsylvania State University, University Park,
More informationLeveraging Relevance Cues for Improved Spoken Document Retrieval
Leveraging Relevance Cues for Iproved Spoken Docuent Retrieval Pei-Ning Chen 1, Kuan-Yu Chen 2 and Berlin Chen 1 National Taiwan Noral University, Taiwan 1 Institute of Inforation Science, Acadeia Sinica,
More informationAction Recognition Using Local SpatioTemporal Oriented Energy Features and Additive. Kernel SVMs
International Journal of Electronics and Electrical Engineering Vol., No., June, 4 Action Recognition Using Local SpatioTeporal Oriented Energy Features and Additive Kernel SVMs Jiangfeng Yang and Zheng
More informationOblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands
Oblivious Routing for Fat-Tree Based Syste Area Networks with Uncertain Traffic Deands Xin Yuan Wickus Nienaber Zhenhai Duan Departent of Coputer Science Florida State University Tallahassee, FL 3306 {xyuan,nienaber,duan}@cs.fsu.edu
More informationAdaptive Holistic Scheduling for In-Network Sensor Query Processing
Adaptive Holistic Scheduling for In-Network Sensor Query Processing Hejun Wu and Qiong Luo Departent of Coputer Science and Engineering Hong Kong University of Science & Technology Clear Water Bay, Kowloon,
More informationA High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Membership Functions *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 21, 607-626 (2005) A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Mebership Functions * SHIH-HSU HUANG AND JIAN-YUAN LAI + Departent of
More informationQUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS
QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS Guofei Jiang and George Cybenko Institute for Security Technology Studies and Thayer School of Engineering Dartouth College, Hanover NH 03755
More informationDetecting Anomalous Structures by Convolutional Sparse Models
Detecting Anoalous Structures by Convolutional Sparse Models Diego Carrera, Giacoo Boracchi Dipartiento di Elettronica, Inforazione e Bioingegeria Politecnico di Milano, Italy {giacoo.boracchi, diego.carrera}@polii.it
More informationA Learning Framework for Nearest Neighbor Search
A Learning Fraework for Nearest Neighbor Search Lawrence Cayton Departent of Coputer Science University of California, San Diego lcayton@cs.ucsd.edu Sanjoy Dasgupta Departent of Coputer Science University
More informationA Trajectory Splitting Model for Efficient Spatio-Temporal Indexing
A Trajectory Splitting Model for Efficient Spatio-Teporal Indexing Slobodan Rasetic Jörg Sander Jaes Elding Mario A. Nasciento Departent of Coputing Science University of Alberta Edonton, Alberta, Canada
More informationA Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction
MATEC Web of Conferences 73, 03073(08) https://doi.org/0.05/atecconf/087303073 SMIMA 08 A roadband Spectru Sensing Algorith in TDCS ased on I Reconstruction Liu Yang, Ren Qinghua, Xu ingzheng and Li Xiazhao
More informationManifold Regularized Transfer Distance Metric Learning
HAIBO SHI, YONG LUO, CHAO XU, YONGGANG WEN: MTDML 1 Manifold Regularized Transfer Distance Metric Learning Haibo Shi 1 shh@pku.edu.cn Yong Luo 2 yluo180@gail.co Chao Xu 1 xuchao@cis.pku.edu.cn Yonggang
More informationA Learning Framework for Nearest Neighbor Search
A Learning Fraework for Nearest Neighbor Search Lawrence Cayton Departent of Coputer Science University of California, San Diego lcayton@cs.ucsd.edu Sanjoy Dasgupta Departent of Coputer Science University
More informationThe Internal Conflict of a Belief Function
The Internal Conflict of a Belief Function Johan Schubert Abstract In this paper we define and derive an internal conflict of a belief function We decopose the belief function in question into a set of
More informationPOSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION. Junjun Jiang, Ruimin Hu, Zhen Han, Tao Lu, and Kebin Huang
IEEE International Conference on ultiedia and Expo POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION Junjun Jiang, Ruiin Hu, Zhen Han, Tao Lu, and Kebin Huang National Engineering
More informationFeature-Centric Evaluation for Efficient Cascaded Object Detection
IEEE Conference on Coputer Vision and Pattern (CVPR, 2004 Feature-Centric Evaluation for Efficient Cascaded Object Detection Henry Schneideran 1 Robotics Institute Carnegie Mellon University Pittsburgh,
More informationA Method of Generating Multi-Scale Disc-Like Distributions for NDT Registration Algorithm
International Journal of Mechanical Engineering and Robotics Research Vol. 5, o., January 06 A Method of Generating Multi-Scale Disc-Like Distributions for D Registration Algorith Hyunki Hong and Beohee
More informationImplementation of fast motion estimation algorithms and comparison with full search method in H.264
IJCSNS International Journal of Coputer Science and Network Security, VOL.8 No.3, March 2008 139 Ipleentation of fast otion estiation algoriths and coparison with full search ethod in H.264 A.Ahadi, M.M.Azadfar
More informationCollaborative Web Caching Based on Proxy Affinities
Collaborative Web Caching Based on Proxy Affinities Jiong Yang T J Watson Research Center IBM jiyang@usibco Wei Wang T J Watson Research Center IBM ww1@usibco Richard Muntz Coputer Science Departent UCLA
More informationBoosted Detection of Objects and Attributes
L M M Boosted Detection of Objects and Attributes Abstract We present a new fraework for detection of object and attributes in iages based on boosted cobination of priitive classifiers. The fraework directly
More informationFeature Selection to Relate Words and Images
The Open Inforation Systes Journal, 2009, 3, 9-13 9 Feature Selection to Relate Words and Iages Wei-Chao Lin 1 and Chih-Fong Tsai*,2 Open Access 1 Departent of Coputing, Engineering and Technology, University
More informationA Distributed Multi-service Resource Allocation Algorithm in Heterogeneous Wireless Access Medium
1 A Distributed Multi-service Resource Allocation Algorith in Heterogeneous Wireless Access Mediu Muhaad Isail, Student Meber, IEEE, and Weihua Zhuang, Fellow, IEEE Abstract In this paper, radio resource
More informationA Novel 2D Texture Classifier For Gray Level Images
2012, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.co A Novel 2D Texture Classifier For Gray Level Iages B.S. Mousavi 1 Young Researchers Club, Zahedan
More informationInternational Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN
International Journal of Scientific & Engineering Research, Volue 4, Issue 0, October-203 483 Design an Encoding Technique Using Forbidden Transition free Algorith to Reduce Cross-Talk for On-Chip VLSI
More informationDifferent criteria of dynamic routing
Procedia Coputer Science Volue 66, 2015, Pages 166 173 YSC 2015. 4th International Young Scientists Conference on Coputational Science Different criteria of dynaic routing Kurochkin 1*, Grinberg 1 1 Kharkevich
More informationA Novel Quantization Approach for Approximate Nearest Neighbor Search to Minimize the Quantization Error
A Novel Quantization Approach for Approximate Nearest Neighbor Search to Minimize the Quantization Error Uriti Archana 1, Urlam Sridhar 2 P.G. Student, Department of Computer Science &Engineering, Sri
More informationDerivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router
Derivation of an Analytical Model for Evaluating the Perforance of a Multi- Queue Nodes Network Router 1 Hussein Al-Bahadili, 1 Jafar Ababneh, and 2 Fadi Thabtah 1 Coputer Inforation Systes Faculty of
More informationAn Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks
An Ad Hoc Adaptive Hashing Technique for Non-Uniforly Distributed IP Address Lookup in Coputer Networks Christopher Martinez Departent of Electrical and Coputer Engineering The University of Texas at San
More information! What is mrmr feature selection. ! Applications in cancer classification. ! Applications in image pattern recognition. ! Theoretical basis of mrmr
Miniu Redundancy and Maxiu Relevance Feature election and Its Applications Hanchuan Peng Janelia Far Research Capus, Howard Hughes Medical Institute What is RMR feature selection Applications in cancer
More informationTHE rapid growth and continuous change of the real
IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, JANUARY/FEBRUARY 2015 47 Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh, Issa
More informationAN INTEGRATED APPROACH TO MUSIC BOUNDARY DETECTION
10th International Society for Music Inforation Retrieval Conference (ISMIR 2009) AN INTEGRATED APPROACH TO MUSIC BOUNDARY DETECTION Min-Yian Su, Yi-Hsuan Yang, Yu-Ching Lin, Hoer Chen National Taiwan
More informationA Periodic Dynamic Load Balancing Method
2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 A Periodic Dynaic Load Balancing Method Taotao Fan* State Key Laboratory of Inforation
More informationRule Extraction using Artificial Neural Networks
Rule Extraction using Artificial Neural Networks S. M. Karuzzaan 1 Ahed Ryadh Hasan 2 Abstract Artificial neural networks have been successfully applied to a variety of business application probles involving
More informationEFFICIENT VIDEO SEARCH USING IMAGE QUERIES A. Araujo1, M. Makar2, V. Chandrasekhar3, D. Chen1, S. Tsai1, H. Chen1, R. Angst1 and B.
EFFICIENT VIDEO SEARCH USING IMAGE QUERIES A. Araujo1, M. Makar2, V. Chandrasekhar3, D. Chen1, S. Tsai1, H. Chen1, R. Angst1 and B. Girod1 1 Stanford University, USA 2 Qualco Inc., USA ABSTRACT We study
More informationPlanet Scale Software Updates
Planet Scale Software Updates Christos Gkantsidis 1, Thoas Karagiannis 2, Pablo Rodriguez 1, and Milan Vojnović 1 1 Microsoft Research 2 UC Riverside Cabridge, UK Riverside, CA, USA {chrisgk,pablo,ilanv}@icrosoft.co
More informationA Study of the Relationship Between Support Vector Machine and Gabriel Graph
A Study of the Relationship Between Support Vector Machine and Gabriel Graph Wan Zhang and Irwin King {wzhang, king}@cse.cuhk.edu.hk Departent of Coputer Science & Engineering The Chinese University of
More informationDiscrete Fourier Transform
Discrete Fourier Transfor This is the first tutorial in our ongoing series on tie series spectral analysis. In this entry, we will closely exaine the discrete Fourier transfor (aa DFT) and its inverse,
More informationDesigning High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh 1, Issa Khalil 2, and Abdallah Khreishah 3 1: Coputer Engineering & Inforation Technology,
More informationReconfigurable Architecture for VLSI 9/7-5/3 Wavelet Filter
Reconfigurable Architecture for VSI 9/7-5/3 Wavelet Filter Tze-Yun Sung * Hsi-Chin Hsin ** * Departent of Microelectronics Engineering Chung Hua University 77, Sec., Wufu Road, Hsinchu City 3- TAIWAN bobsung@chu.edu.tw
More informationReconstruction of Time Series using Optimal Ordering of ICA Components
Reconstruction of Tie Series using Optial Ordering of ICA Coponents Ar Goneid and Abear Kael Departent of Coputer Science & Engineering, The Aerican University in Cairo, Cairo, Egypt e-ail: goneid@aucegypt.edu
More informationMulti Packet Reception and Network Coding
The 2010 Military Counications Conference - Unclassified Progra - etworking Protocols and Perforance Track Multi Packet Reception and etwork Coding Aran Rezaee Research Laboratory of Electronics Massachusetts
More informationA Spectral Framework for Detecting Inconsistency across Multi-Source Object Relationships
A Spectral Fraework for Detecting Inconsistency across Multi-Source Object Relationships Jing Gao, Wei Fan, Deepak Turaga, Srinivasan Parthasarathy, and Jiawei Han University of Illinois at Urbana-Chapaign,
More informationACNS: Adaptive Complementary Neighbor Selection in BitTorrent-like Applications
ACNS: Adaptive Copleentary Neighbor Selection in BitTorrent-like Applications Zhenbao Zhou 1, 2, Zhenyu Li 1, 2, Gaogang Xie 1 1 Institute of Coputing Technology, Chinese Acadey of Sciences, Beijing 100190,
More informationEnhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue
Enhancing Real-Tie CAN Counications by the Prioritization of Urgent Messages at the Outgoing Queue ANTÓNIO J. PIRES (1), JOÃO P. SOUSA (), FRANCISCO VASQUES (3) 1,,3 Faculdade de Engenharia da Universidade
More informationCollection Selection Based on Historical Performance for Efficient Processing
Collection Selection Based on Historical Perforance for Efficient Processing Christopher T. Fallen and Gregory B. Newby Arctic Region Supercoputing Center University of Alaska Fairbanks Fairbanks, Alaska
More informationShortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm
International Journal of Engineering and Technical Research (IJETR) ISSN: 31-869 (O) 454-4698 (P), Volue-5, Issue-1, May 16 Shortest Path Deterination in a Wireless Packet Switch Network Syste in University
More informationUsing Imperialist Competitive Algorithm in Optimization of Nonlinear Multiple Responses
International Journal of Industrial Engineering & Production Research Septeber 03, Volue 4, Nuber 3 pp. 9-35 ISSN: 008-4889 http://ijiepr.iust.ac.ir/ Using Iperialist Copetitive Algorith in Optiization
More informationarxiv: v1 [cs.dc] 3 Oct 2018
Sparse Winograd Convolutional neural networks on sall-scale systolic arrays Feng Shi, Haochen Li, Yuhe Gao, Benjain Kuschner, Song-Chun Zhu University of California Los Angeles Los Angeles, USA {shi.feng,sczh}@cs.ucla.edu
More informationFair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones
Advance Access publication on 24 February 2017 The British Coputer Society 2017. All rights reserved. For Perissions, please eail: journals.perissions@oup.co doi:10.1093/cojnl/bxx015 Fair Energy-Efficient
More informationTHE rounding operation is performed in almost all arithmetic
This is the author's version of an article that has been published in this journal. Changes were ade to this version by the publisher prior to publication. The final version of record is available at http://dx.doi.org/.9/tvlsi.5.538
More informationFast Accumulation Lattice Algorithm for Mining Sequential Patterns
Proceedings of the 6th WSEAS International Conference on Applied Coputer Science, Hangzhou, China, April 15-17, 2007 229 Fast Accuulation Lattice Algorith for Mining Sequential Patterns NANCY P. LIN, WEI-HUA
More informationLOSSLESS COMPRESSION OF BAYER MASK IMAGES USING AN OPTIMAL VECTOR PREDICTION TECHNIQUE
1th European Signal Processing Conference (EUSIPCO 2006), Florence, Italy, Septeber -8, 2006, copyright by EUASIP LOSSLESS COMPESSION OF AYE MASK IMAES USIN AN OPTIMAL VECTO PEDICTION TECHNIQUE Stefano
More informationUtility-Based Resource Allocation for Mixed Traffic in Wireless Networks
IEEE IFOCO 2 International Workshop on Future edia etworks and IP-based TV Utility-Based Resource Allocation for ixed Traffic in Wireless etworks Li Chen, Bin Wang, Xiaohang Chen, Xin Zhang, and Dacheng
More informationλ-harmonious Graph Colouring Lauren DeDieu
λ-haronious Graph Colouring Lauren DeDieu June 12, 2012 ABSTRACT In 198, Hopcroft and Krishnaoorthy defined a new type of graph colouring called haronious colouring. Haronious colouring is a proper vertex
More informationCarving Differential Unit Test Cases from System Test Cases
Carving Differential Unit Test Cases fro Syste Test Cases Sebastian Elbau, Hui Nee Chin, Matthew B. Dwyer, Jonathan Dokulil Departent of Coputer Science and Engineering University of Nebraska - Lincoln
More informationAffine Invariant Texture Analysis Based on Structural Properties 1
ACCV: The 5th Asian Conference on Coputer Vision, --5 January, Melbourne, Australia Affine Invariant Texture Analysis Based on tructural Properties Jianguo Zhang, Tieniu Tan National Laboratory of Pattern
More informationAdaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN
Proceedings of the nd International onference on oputer Science and Electronics Engineering (ISEE 3) Adaptive Paraeter Estiation Based ongestion Avoidance Strategy for DTN Qicai Yang, Futong Qin, Jianquan
More informationAsynchronous Distributed Data Parallelism for Machine Learning
Asynchronous Distributed Data Parallelis for Machine Learning Zheng Yan, Yunfeng Shao Shannon Lab, Huawei Technologies Co., Ltd. Beijing, China, 100085 {yanzheng, shaoyunfeng}@huawei.co Abstract Distributed
More informationExperiences with complex user profiles for approximate P2P community matching
Experiences with coplex user profiles for approxiate PP counity atching Patrizio Dazzi ISTI-CNR Pisa, Italy p.dazzi@isti.cnr.it Matteo Mordacchini IIT-CNR Pisa, Italy.ordacchini@iit.cnr.it Fabio Baglini
More informationApproximate String Matching with Reduced Alphabet
Approxiate String Matching with Reduced Alphabet Leena Salela 1 and Jora Tarhio 2 1 University of Helsinki, Departent of Coputer Science leena.salela@cs.helsinki.fi 2 Aalto University Deptartent of Coputer
More informationOPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS
Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented
More informationMassive amounts of high-dimensional data are pervasive in multiple domains,
Challenges of Feature Selection for Big Data Analytics Jundong Li and Huan Liu, Arizona State University Massive aounts of high-diensional data are pervasive in ultiple doains, ranging fro social edia,
More information