Dynamic Multi-View Hashing for Online Image Retrieval
|
|
- Edwina Lambert
- 6 years ago
- Views:
Transcription
1 Proceedings of the wenty-sixth International Joint Conference on Artificial Intelligence IJCAI-17 Dynaic Multi-View Hashing for Online Iage Retrieval Liang Xie 1, Jialie Shen 2, Jungong Han 3, Lei Zhu 4, Ling Shao 5 1 Wuhan University of echnology, China 2 Northubria University, United Kingdo 3 Lancaster University, United Kingdo 4 he University of Queensland, Australia 5 University of East Anglia, United Kingdo whutxl@hotail.co, {jialie, jungonghan77, leizhu0608}@gail.co, ling.shao@ieee.org Abstract Advanced hashing technique is essential in large s- cale online iage retrieval and organization, where iage contents are frequently changed. While traditional ulti-view hashing ethod has achieve proising effectiveness, its batch-based learning based schee largely leads to very expensive updating cost. Meanwhile, existing online hashing schee generally focuses on single-view data. Good effectiveness can not be expected when searching over real online iages, which typically have ultiple views. Further, both types of hashing ethods only can generate hash codes with fixed length. hus they have liited capability on coprehensive characterization of streaing iage data. In this paper, we propose dynaic ulti-view hashing, which can adaptively augent hash codes according to dynaic changes of iage. Meanwhile, leverages online learning to generate hash codes. It can increase the code length when current code is not able to represent new iages effectively. Moreover, to gain further iproveent on overall perforance, each view is assigned with a weight, which can be efficiently updated in the online learning process. In order to avoid the frequent updating of code length and view weights, an intelligent buffering schee is designed to preserve significant data to aintain good effectiveness of. Experiental results on t- wo real-world iage datasets deonstrate superior perforance of DWVH over several state-of-theart hashing ethods. 1 Introduction With the explosive growth of online iage repositories, techniques to facilitate fast and effective large scale content access are getting ore and ore attentions. In recent years, hashing has eerged as a proising technology to support large-scale iage retrieval [Mu et al., 2010; Zhen and Yeung, 2012a; Guo et al., 2017b; Wu et al., 2017; Corrsponding Author Zhu et al., 2017]. Except various visual features, the Web iages are associated with various text inforation such as tags or short coents. In order to iprove Web iage search perforance, various ulti-view hashing ethods have been recently proposed [Zhang et al., 2011; Wu et al., 2014; 2015; Xie et al., 2016; Liu et al., 2017; Lin et al., 2017b; 2017a; Guo et al., 2017a]. Multi-view hashing integrates the advantages of hashing technology and ulti-view learning, it enjoys better perforance than single-view hashing, and can support the queries fro different views such as visual features or text features. Web iage database is highly dynaic and frequently updated. raditional ulti-view hashing ethods are developed based on batch-based learning, which is very expensive in ters of updating cost. Multi-view hashing ethods ay accuulate all data to retrain the hash codes and functions when new iages arrive, however their tie coplexity will be extreely high and unaffordable. Recently, several online hashing ethods [Leng et al., 2015; Cakir and Sclaroff, 2015b] are proposed to support effective search over dynaic iage databases. However, their perforance is far beyond satisfactory. When applying existing ulti-view hashing and online hashing ethods for web iage retrieval, they generally suffer fro several issues. Existing online hashing ethods ai at generating the binary codes with fixed length, which is not suited to the dynaic iage data. In real world, the contents of new iage data could be seantically different fro the old one. When new iage data is inserted into the database, longer codes should be required to preserve ore discriinative inforation to support search over updated iage database. According to previous results [Zhou et al., 2014], longer hash code can lead to ore coprehensive iage representation and better search perforance. For exaple, Wikipedia dataset [Rasiwasia et al., 2010] consisting of 2866 iages only needs 32 bits codes to achieve the best perforance. However, for NUS-WIDE having iages, at least 128 bits are required to achieve the best perforance. However, larger code length does not ean the better perforance, in that hashing for data with sall size ay get trapped in local inia [Zhen and Yeung, 2012b]. herefore, general hashing ethods usually choose an appropriate code length for a particular database, which is not suitable to dynaic database, whose size is continuously changed. o solve this proble, the code length for dynaic iage 3133
2 Proceedings of the wenty-sixth International Joint Conference on Artificial Intelligence IJCAI-17 database needs to be intelligently augented to guarantee hashing perforance. Another proble is how to easure iportance of different views in the online learning of hash codes. Although each view will contribute to the final hash codes, they can not be equally treated. For exaple, text feature usually contains ore seantic inforation than visual feature [Caicedo et al., 2012], thus it should be assigned with the higher weight. Several ulti-view hashing ethods take the view weights into account and thus they achieve significant perforance iproveent. However, to the best of our knowledge, none of existing online hashing ethods focus on developing intelligent schee to estiate optial weighs for different views. In this paper, we propose a novel unsupervised online hashing ethod: Dynaic Multi-view Hashing to support the effective and efficient dynaic online iage retrieval. owards this goal, uses a dynaic hashing schee, where length of hashing codes can be adaptively augented. In, a dictionary is used to construct the hash codes of iages. When a new data cannot be represented by current dictionary, it will be added to augent the dictionary. Moreover, applies ulti-view features for hashing, and proper weight is assigned to each view. In the online learning process, to avoid the frequent updating of dictionary and odality weights, a buffer is used to preserve significant iages for purpose of subsequential updating. he core technical contributions of our work can be suarized as follows: In, the code length can be dynaically augented with the changes of iage data. As a result, can better represent the streaing iages. In addition, users are not required to predefine the appropriate code length which will be autoatically obtained by. can effectively estiate proper weights for different views to reflect their different iportance in hashing. Previous online hashing ethods generally don t have weighting schee. An intelligent buffer schee is designed for the online learning process of, which enables highly efficient learning process of hash codes and view weights. Experiental results on real-world iage datasets show the superiority of in ters of both search efficiency and accuracy. he reainder of this paper is organized as follows: Section 2 introduces related work; Section 3 coprehensively introduces the proposed ulti-view hashing ethod; Section 4 introduces the experiental configurations and reports the experiental results and ain findings. Finally, Section 5 concludes the paper with future work. 2 Related Work Multi-view Hashing - In recent years, uch attention has been paid for ulti-view hashing. Most ulti-view hashing ethods can be divided to two categories according to the query types supported. Several ulti-view hashing ethods cobine all features to construct database hash codes, but they require that query has the sae features as database Database Dynaic Hash Codes Buffer Iage Hash Function ext Hash Funciton Multi-view Dictionary Learning Figure 1: he overall illustration of. Visual Query ext Query New Iage data. his type of ulti-view hashing usually ais to gain the effective cobination of ulti-view features. Coposite Hashing with Multiple Inforation Sources CHMIS [Zhang et al., 2011] uses graphs of ulti-views features to learn the hash codes, and each view is assigned with a weight for cobination. Since graph learning is inefficient, anchor graph is adopted to accelerate the learning process. Multi-view Anchor Graph Hashing MVAGH [Ki and Choi, 2013] exploits anchors to construct graphs for hashing. Multiview Alignent Hashing MAH [Liu et al., 2015] cobines atrix factorization with anchor graph learning for hashing, and it achieves good perforance based on ulti-view features. Multi-view ethods also can support queries based on different views. his type of ulti-view hashing is also called as cross-view hashing. Generally, cross-view hashing ethods ai at odeling the correlation of different views. Crossview Hashing CVH [Kuar and Udupa, 2011] optiizes the haing distance of different views, it can be regarded as an extended version of Canonical Correlation Analysis C- CA. Inter-edia Hashing [Song et al., 2013] both optiizes the intra-edia and inter-edia consistency. Seantic Correlation Maxiization SCM [Zhang and Li, 2014] axiizes the seantic correlation between iage and text features, and it further considers the quantization loss of hash codes. Seantic opic Multiodal Hashing SMH [Zhou et al., 2014] firstly generates text topics and iage concepts, and then correlates the in a coon hash space. Online Hashing is ore practical than traditional batchbased learning ethods, in that any new iages in realworld are generated. In recent three years, a few online hashing ethods are proposed. Online Kernel Hashing OKH [Huang et al., 2013] and Adaptive Hashing [Cakir and Sclaroff, 2015a] are supervised ethods, they use siilar iage pairs as training data. Although they can effectively p- reserve the correlation of iages in hash codes, they require labeled training exaples which are difficult to collect. Online Sketching Hashing OSH [Leng et al., 2015] is unsupervised online hashing ethod, thus it is not relied on labeled data. he ain disadvantage of existing online hashing ethods is that they are not designed for ulti-view features, so they cannot perfor well for the retrieval of ulti-view iages. 3 Dynaic Multi-View Hashing consists of two ain odules: online learning process and search process. Figure 1 illustrates the overall structure of. In the dynaic hash codes, blue area, red area 3134
3 Proceedings of the wenty-sixth International Joint Conference on Artificial Intelligence IJCAI-17 and yellow area denote the old codes, hash codes of new data and the augented codes respectively. he database consists of any iages having both visual and text contents. When new iage arrives, ultiple kinds of visual features and one text feature are extracted and cobined via ulti-view dictionary learning. he differentiation threshold L t deterines whether the iage can be represented by current hash codes. If not, it is added to the buffer, and the buffer data are used to augent hash codes till no ore space is available in the buffer. In the following sections, ore details about L t will be presented. 3.1 Model Forulation In, at step t, the database contains old iage features added at previous steps Xt 1 M, where M is the nuber of views. Xt 1 R t 1 d, and d is the diension of th view feature. he old iages are represented with hash codes H t 1 {0, 1} t 1 C, where C is the code length. hen new iage x t M is added into the database, and Xt = [Xt 1, x t ]. Our goal is to learn new hash codes h t {0, 1} 1 C to represent new iage. he hash function also needs to be learnt to project any views into the learned hash space. owards the goal, the kernel dictionary representation is gained to construct hash codes. Dictionary learning is effective in learning hash codes [Yu et al., 2014; Zhang et al., ], and the kernel projection will ake the hash codes preserve ore discriinative inforation. hus, at tie t, the dictionary consists of a subset of the database saples with uti-view features. For each view, its corresponding dictionary is denoted as Dt = [x a 1,..., x a C ]. Assuing each saple can be constructed fro its hash codes and dictionary, we have the following forulation: in L t Ht, Dt M = α 2 H t ϕ Dt ϕ Xt 2 F + λ H t 2 F s.t. i=1 α = 1 1 where ϕ is a kernel projection function, λ is the regularization paraeter, α = [α 1,..., α M ] denotes the view weights. 3.2 Online Learning Basic process At each step t, when new iage is added into the database, the overall objective function can be reforulated as: in L t Ht, Dt M = L t 1 Ht 1, Dt M + lt ht, Dt M If dictionary Dt M is not changed, Dt = Dt 1, the constraint L t 1 Ht 1, Dt M has been satisfied by previous learning steps. hus, We only need to consider the optiization of l t ht, Dt M, and the objective function is: in l t ht, Dt M = α 2 h t ϕ Dt ϕ x t 2 F + λ h t 2 F 3 2 After applying the kernel trick, the objective function 3 can be rewritten as: α 2 h t K t h t 2h t zt + ktt + λh t h t 4 where K t R C C is the kernel atrix of the dictionary D t, and K t i, j = ϕx a i ϕx a j, z t i = ϕx t ϕx a i, a i is the index of i th dictionary eleent. k tt = ϕx t ϕx t. By setting the derivative of Eq.4 to zeros, we can obtain h t as: where K t = M h t = z t Kt + λi 1 5 α 2 K t, z t = M α 2 z t. For each odality, if vector ϕ x t is linearly independent on vectors of dictionary ϕ Dt. hen h t coputed by Eq.5 cannot satisfy Eq.3, and x t should be added into the dictionary. herefore, we have to deterine the linear dependence of new vectors. By substituting Eq.5 into Eq.3, it can be transfored to: l t ht, Dt 1 M M = α 2 ktt zt h t + λh t h t 6 We use a threshold ρ to deterine the linear dependence. If l t ht, D t 1 M < ρ, then the approxiate linear dependence described by Eq.3 can be satisfied. And we do not need to change dictionary. If l t ht, D t 1 M ρ, then new hash codes cannot be effectively represented by current dictionary. As a result, both dictionary and hash codes need to be augented, and the odal weights should be recoputed accordingly. Dictionary augent with buffer schee Considering the worst case that new iage is always very d- ifferent to database iages and cannot be represented by current dictionary, we have to frequently update the dictionary, which is obviously inefficient. herefore, a buffer schee is applied to avoid the frequent updating process. he buffer schee relaxes the restrict linear dependence in Eq.3. At each step t, if the new iage satisfies l t ht, Dt 1 M ρ, then iage t is added into the buffer with axiu size B ax. After the updating, in case that the buffer is full, iage b will be selected fro the buffer with highest value of l t. hen we augent the dictionary with iage b and update the view weights α. he dictionary is updated with Dt = [Dt 1, x b ], and the hash codes constructed fro dictionary have to be augented accordingly. We should optiize the following overall objective function: in L t Ht, Dt M = L t\b Ht\b, Dt M + lb hb, Dt M s.t. α =
4 Proceedings of the wenty-sixth International Joint Conference on Artificial Intelligence IJCAI-17 Where H t\b denotes the hash codes of database iages except b. Since iage b is linearly independent on other dictionary iages, we can only use it to represent itself. herefore we have h b = [0, 1], and l b hb, D t M = 0. hen Eq.7 can be siplified as: + M L t Ht, Dt M = λ r Ht Ht H t\b K t Ht\b 2H t\b α 2 r Z t\b + K t\b 8 After the dictionary is augented, the new K t and Z t\b can be coputed as: [ ] K t = K t 1 zb z b k bb [ Zt\b = Zt 1\b, k ] X t\b, x b 9 Lea 1. If H t\b = [ H t 1\b, 0 ], then the following equation is satisfied: L t Ht\b, Dt M = Lt 1 Ht 1\b, Dt 1 M 10 Proof. Fro Eq.9, we can obtain: H t\b K t Ht\b = [ H t 1\b, 0 ] [ K t 1 zb z b k bb Siilarly, we have: ] [ H t 1\b 0 = H t 1\b K t 1 H t 1\b 11 H t\b Z t\b = Ht 1\b Z t 1\b 12 Based on above two equations and Eq.8, we can easily obtain that each eleent in L t and L t 1 is equivalent, thus Eq.10 is satisfied. heore 1. he objective function [ L t Ht, ] Dt M will be decreased after we set H t = Ht\b, h b, and H t\b = [ Ht 1\b, 0 ] and h b = [0, 1]. Proof. According to Lea 1 and Eq.7, we can obtain that L t Ht, D t M = Lt 1 Ht 1\b, D t 1 M + l b hb, D t M, and lb hb, D t M = 0 can be satisfied by h b = [0, 1]. Before the dictionary augent, iage b in the buffer always has a high l b hb, D t 1 M which describes the linear dependence, where h b denote old codes of b. It is obviously that l b hb, D t 1 M > ρ > 0 = l b hb, D t M. Finally we have Lt Ht, D t M < L t 1 Ht 1, D t 1 M. herefore, the objective function can be decreased. heore 1 confirs that our objective function is consistently decreased by the buffer schee. By specially considering the iage with largest l b and reduce it to 0 by using dictionary augent, the objective functions L t can be largely decreased. If the buffer is full and we augent the codes, then we preserve half iages with highest l to ensure that ] Algorith 1 Online learning process of at step t. Input: x t M,Dt 1 M, K t 1 M, α Output: H t, Dt M, K t M, α 1: Copute h t by Eq.5; 2: Copute l t h t, Dt 1 M by Eq.6 3: if l t h t, Dt 1 M < δ then 4: H t = [Ht 1, sgnh t ] ; 5: K t = K t 1 and D t = D t 1; 6: else if l t h t, D t 1 M >= δ then 7: Add t into the buffer, and use Algorith 2 to optiize H t, α and K t ; 8: end if Algorith 2 Augent dictionary with buffer schee. Input: Buffer, H t, Dt 1 M, K t 1 M, α Output: H t, Dt M, K t M, α 1: Add iage t and corresponding l t h t, Dt 1 M into buffer; 2: Buffer size B = B + 1; 3: if B = B ax then 4: Select iage b in buffer with highest l b ; 5: Reove 1/2 of buffer data with lowest l; 6: Augent dictionary Dt = [Dt 1, x b ] ; 7: Update K t according to Eq.9; 8: Update H t\b = [ H t 1\b, 0 ] ; 9: Update h b = [0, 1]; 10: Update α according to Eq.13 11: else if B < B ax then 12: K t = K t 1, Dt = Dt 1; 13: end if high l can be preserved for further process to decrease objective function. he frequency of augenting depends on the buffer size, if buffer size is large, then the learning process is ore efficient, but objective function can not be effectively decreased. hus we should ake a tradeoff between learning efficiency and effect by adjusting the buffer size. At last, the view weights need to be updated to further reduce the objective function 7. by using the lagrange ultiplier for Eq.7, we can copute α by: where δ = r α = 1/δ M i=1 1/δ i 13 H t K t Ht 2H t Zt + Ktt he basic online learning process and dictionary augentation process are shown in Algorith 1 and 2 respectively. is efficient in learning hash codes. Fro Algorith 1 we can find that the only the hash codes of new data is coputed, and the old codes are not needed to update. Although Algorith 2 updates the old hash codes of previous. 3136
5 Proceedings of the wenty-sixth International Joint Conference on Artificial Intelligence IJCAI MAH OSH x 10 4 x 10 4 a Iage query b ext query Figure 2: he scores of MIR Flickr at different database sizes x 10 4 c Multi-view query MAH OSH x 10 5 x 10 5 a Iage query b ext query Figure 3: he scores of NUS-WIDE at different database sizes x 10 5 c Multi-view query data, they are only augented with all zero eleents, which can be efficiently ipleented. he tie coplexity of D- MVH is independent of database size, it only relies on buffer size B and code length C. Extension to visual and text features In real-world applications, users ay not use all the views as query and be likely to choose parts of the. Besides the ulti-view features, we specifically consider the case of visual features and only text feature. For the query based on visual features, its hash codes can be coputed as:h v = M 1 Kt 1. Where view 1 to M 1 are the sgn αz 2 v visual features and view M is text feature. If the query only contains text feature e.g. several keywords, we can copute 1 its hash codes ash te = sgn zte M Kt. 4 Experients 4.1 Datasets We use two ulti-view iage datasets: MIR Flickr [Huiskes and Lew, 2008] and NUS-WIDE [Chua et al., 2009] to copare the hashing perforance in the online scenario. MIR Flickr contains iages collected fro Flickr. All iages are annotated with 38 class labels which are used as the ground truth. In the retrieval process, iages which share at least one sae label are considered as relevant. We select 1% iages as queries, and the rest iages are added to the database sequentially. We use 3 visual features [Guillauin et al., 2010], including 100- D Hue histogra, 1000-D SIF BoVW, 4096-D RGB histogra and 512-D GIS. Each iage is associated with text tags, thus we use 457-D BoW as text feature. NUS-WIDE contains iages collected fro Flickr, each iages is labeled by 81 concepts which can be used for evaluation. We select 1% iages as queries and the rest iages fors the streaing database. We use 3 visual features, including 500-D SIF BoVW, 64- D color histogra, 144-D color correlogra, 73-D edge direction histogra, 128-D wavelet texture and 225-D block-wise color. Each iage is associated with text tags, thus we also use 1000-D BoW as text feature. 4.2 Experiental Settings In the ipleentation of, we use Gaussian kernel for all visual features, and histogra intersection kernel for text feature. does not contain any paraeters to set. he regularization λ is set to 10 3, it is used to avoid the atrix singularity and has little influence on the results. he axiu buffer size is set to 1000 on MIR Flickr and 5000 on NUS-WIDE respectively, the threshold ρ is set to. Since our ethods does not use any supervised inforation, we copare our ethod with several representative unsupervised hashing ethods, including Online Sketching Hashing OSH [Leng et al., 2015], Collective Matrix Factorization Hashing [Ding et al., 2014], Multiview Alignent Hashing MAH [Liu et al., 2015] and Inter-edia Hashing [Song et al., 2013]. OSH cannot support any single-view or partial-view query such as text query and iage query. can only cope with two views, thus we concatenate all visual features into a visual feature. MAH cannot support visual or text query, it only supports ultiview query. supports visual and text query, but cannot support ulti-view query. Mean average precision [Song et al., 2013] is used to easure the effect of retrieval, and scores are coputed on the top 50 retrieved docuents of each query. Moreover, we evaluate the learning tie of all ethods to easure 3137
6 Proceedings of the wenty-sixth International Joint Conference on Artificial Intelligence IJCAI-17 able 1: Learning tie and code length at different sizes on NUS-WIDE. Database size OSH tie s tie s code length the efficiency of retrieval. Learning tie is coputed as the total tie of learning hash codes and functions, thus it accuulates the tie of all learning processes fro first step to current step. All the experients are conducted on a coputer with Intel CoreM i5 2.6GHz 2 processors and 12.0GB RAM Multi view Query Iage Query ext Query Seconds Experiental Results In the experients, we consider three types of queries: visual query, text query and ulti-view query. he visual query contains all visual features, text query contains only one text feature, and ulti-view query consists of all features. On MIR Flickr, iages are added to database sequentially, thus we have to evaluate the hashing perforance at different database size. More specifically, we evaluate the scores at t = {2.5, 5, 7.5, 10, 12.5, 15, 17.5, 20, 22.5, 25} he code length of DVMH is changed with the increase of database size, therefore is not appropriate to evaluate the perforance of other ethods at various code lengths. According to previous results [Ding et al., 2014], we choose the best code length as 64 bits. In order to ake a fair coparison, will not increase the code length when it reaches 64 bits. Figure 2 shows the scores of MIR Flickr at different database sizes. In iage query and text query, we copare with and. In ulti-view query, we copare with, MAH and OSH. Fro this figure we can find that obtains higher scores than other ethods. In iage and ulti-view query, the scores are increased with the data size. his phenoenon illustrates the effectiveness of our dynaic schee where code length is adaptively augented. With the augentation of code length, the perforance of can be consistently iproved. Siilar to MIR Flickr, on NUS-WIDE we evaluate the scores at different sizes, the best code length of copared ethods is set to 128 bits. he code length of will not increase when it reaches 128 bits. Figure 3 shows the scores at different database sizes. Siilar to the results of MIR Flickr, outperfors other ulti-view hashing ethods. On all types of queries, the socres of are iproved with the increase of data size. he increase of scores on NUS-WIDE are ore significant than MIR Flickr, the reason is that NUS-WIDE contains uch ore iages, thus the increase of code length are ore benefit to NUS-WIDE. Note that on NUS-WIDE, we use all 81 labels for evaluation, other works such as [Ding et al., 2014] use a reduced version which only contains 10 labels. herefore the overall scores reported in this paper are relatively lower Buffer Buffer a Scores b raining tie Figure 4: Effects of buffer size on NUS-WIDE. 4.4 Efficiency Analysis we also copare the learning tie of to online hashing ethod OSH. able 1 shows the learning tie of two ethods, and the code length of at different sizes. We can find that consues less learning tie than OSH. uses the buffer schee to avoid the frequent updating process. It is ore efficient than OSH while guarantees the hashing perforance. In addition, we can find that the code length of is dynaically changed with the increase of data size. 4.5 Effects of Buffer At last we evaluate the effects of buffer size. able 4 shows the coparison of and training tie with buffer size {500,1000,3000, 5000, 7000, 10000}. All the results are e- valuated at the final step of NUS-WIDE, where all iages are included in database. We can find that the results are relatively steady at different buffer size, which deonstrates the robustness of. Moreover, both s- cores and training tie decrease with the buffer size, thus we can choose a proper size by considering the tradeoff between scores and training tie. 5 Conclusions In this paper we propose Dynaic Multi-view Hashing D- MVH for online retrieval of streaing iage data. can adaptively augent code length to preserve ore inforation of new iage. It constructs hash codes by a dynaic dictionary, when new data cannot be effectively represented by current hash codes, can augent the dictionary to better represent this data. o avoid the frequent updating of dictionary. A buffer schee is designed and only data which are significantly different to current dictionary eleents are considered for updating. Experiental results on MIR Flickr and NUS-WIDE deonstrate the efficiency and effectiveness of copared to representative online hashing and ulti-view hashing ethods
7 Proceedings of the wenty-sixth International Joint Conference on Artificial Intelligence IJCAI-17 References [Caicedo et al., 2012] Juan C Caicedo, Jaafar BenAbdallah, Fabio A González, and Olfa Nasraoui. Multiodal representation, indexing, autoated annotation and retrieval of iage collections via non-negative atrix factorization. Neurocoputing, 761:50 60, [Cakir and Sclaroff, 2015a] Fatih Cakir and Stan Sclaroff. Adaptive hashing for fast siilarity search. In CVPR, pages , [Cakir and Sclaroff, 2015b] Fatih Cakir and Stan Sclaroff. Online supervised hashing. In ICIP, pages , [Chua et al., 2009] at-seng Chua, Jinhui ang, Richang Hong, Haojie Li, Zhiping Luo, and Yantao Zheng. Nus-wide: a realworld web iage database fro national university of singapore. In ACM CIVR, page 48, [Ding et al., 2014] Guiguang Ding, Yuchen Guo, and Jile Zhou. Collective atrix factorization hashing for ultiodal data. In CVPR, pages , [Guillauin et al., 2010] Matthieu Guillauin, Jakob Verbeek, and Cordelia Schid. Multiodal sei-supervised learning for iage classification. In CVPR, pages , [Guo et al., 2017a] Y. Guo, G. Ding, J. Han, and Y. Gao. Zero-shot learning with transferred saples. IEEE rans. Iage Processing, 2617: , [Guo et al., 2017b] Yuchen Guo, Guiguang Ding, Li Liu, Jungong Han, and Ling Shao. Learning to hash with optiized anchor ebedding for scalable retrieval. IEEE rans. Iage Processing, 263: , [Huang et al., 2013] Long-Kai Huang, Qiang Yang, and Wei-Shi Zheng. Online hashing. In IJCAI, [Huiskes and Lew, 2008] Mark J Huiskes and Michael S Lew. he ir flickr retrieval evaluation. In ACM ICMR, pages 39 43, [Ki and Choi, 2013] Saehoon Ki and Seungjin Choi. Multiview anchor graph hashing. In Acoustics, Speech and Signal Processing ICASSP, 2013 IEEE International Conference on, pages , [Kuar and Udupa, 2011] Shaishav Kuar and Raghavendra Udupa. Learning hash functions for cross-view siilarity search. In IJCAI, page 1360, [Leng et al., 2015] Cong Leng, Jiaxiang Wu, Jian Cheng, Xiao Bai, and Hanqing Lu. Online sketching hashing. In CVPR, pages , [Lin et al., 2017a] Z. Lin, G. Ding, J. Han, and L. Shao. End-to-end feature-aware label space encoding for ultilabel classification with any classes. IEEE rans. Neural Networks and Learning Systes, [Lin et al., 2017b] Z. Lin, G. Ding, J. Han, and J. Wang. Crossview retrieval via probability-based seantics-preserving hashing. IEEE rans. Cybernetics, [Liu et al., 2015] Li Liu, Mengyang Yu, and Ling Shao. Multiview alignent hashing for efficient iage search. Iage Processing, IEEE ransactions on, 243: , [Liu et al., 2017] Li Liu, Zijia Lin, Ling Shao, Fuin Shen, Guiguang Ding, and Jungong Han. Sequential discrete hashing for scalable cross-odality siilarity retrieval. IEEE rans. Iage Processing, 261: , [Mu et al., 2010] Yadong Mu, Jialie Shen, and Shuicheng Yan. Weakly-supervised hashing in kernel space. In CVPR, pages , [Rasiwasia et al., 2010] Nikhil Rasiwasia, Jose Costa Pereira, E- anuele Coviello, Gabriel Doyle, Gert RG Lanckriet, Roger Levy, and Nuno Vasconcelos. A new approach to cross-odal ultiedia retrieval. In ACM MM, pages , [Song et al., 2013] Jingkuan Song, Yang Yang, Yi Yang, Zi Huang, and Heng ao Shen. Inter-edia hashing for large-scale retrieval fro heterogeneous data sources. In ACM SIGMOD, pages , [Wu et al., 2014] Fei Wu, Zhou Yu, Yi Yang, Siliang ang, Yin Zhang, and Yueting Zhuang. Sparse ulti-odal hashing. Multiedia, IEEE ransactions on, 162: , [Wu et al., 2015] Botong Wu, Qiang Yang, Wei-Shi Zheng, Yizhou Wang, and Jingdong Wang. Quantized correlation hashing for fast cross-odal search. In IJCAI, [Wu et al., 2017] Gengshen Wu, Li Liu, Yuchen Guo, Guiguang D- ing, Jungong Han, Jialie Shen, and Ling Shao. Unsupervised deep video hashing with balanced rotation. In IJCAI, [Xie et al., 2016] Liang Xie, Jialie Shen, and Lei Zhu. Online cross-odal hashing for web iage retrieval. In AAAI, pages , [Yu et al., 2014] Zhou Yu, Fei Wu, Yi Yang, Qi ian, Jiebo Luo, and Yueting Zhuang. Discriinative coupled dictionary hashing for fast cross-edia retrieval. In ACM SIGIR, pages , [Zhang and Li, 2014] Dongqing Zhang and Wu-Jun Li. Large-scale supervised ultiodal hashing with seantic correlation axiization. In AAAI, pages , [Zhang et al., ] Yin Zhang, Weiing Lu, Yang Liu, and Fei Wu. Kernelized sparse hashing for scalable iage retrieval. Neurocoputing, 172. [Zhang et al., 2011] Dan Zhang, Fei Wang, and Luo Si. Coposite hashing with ultiple inforation sources. In ACM SIGIR, pages , [Zhen and Yeung, 2012a] Yi Zhen and Dit-Yan Yeung. Coregularized hashing for ultiodal data. In NIPS 25, pages [Zhen and Yeung, 2012b] Yi Zhen and Dit-Yan Yeung. A probabilistic odel for ultiodal hash function learning. In ACM SIGKDD, pages , [Zhou et al., 2014] Jile Zhou, Guiguang Ding, and Yuchen Guo. Latent seantic sparse hashing for cross-odal siilarity search. In ACM SIGIR, pages , [Zhu et al., 2017] Lei Zhu, Jialie Shen, Liang Xie, and Zhiyong Cheng. Unsupervised visual hashing with seantic assistant for content-based iage retrieval. IEEE rans. Knowl. Data Eng., 292: ,
Dynamic Multi-View Hashing for Online Image Retrieval
Dynamic Multi-View Hashing for Online Image Retrieval Paper ID:888 Abstract Advanced hashing technique is essential to facilitate effective organization and retrieval over online image collections, where
More informationOnline Cross-Modal Hashing for Web Image Retrieval
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence (AAAI-6) Online Cross-Modal Hashing for Web Image Retrieval Liang ie Department of Mathematics Wuhan University of Technology, China
More informationManifold Regularized Transfer Distance Metric Learning
HAIBO SHI, YONG LUO, CHAO XU, YONGGANG WEN: MTDML 1 Manifold Regularized Transfer Distance Metric Learning Haibo Shi 1 shh@pku.edu.cn Yong Luo 2 yluo180@gail.co Chao Xu 1 xuchao@cis.pku.edu.cn Yonggang
More informationPOSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION. Junjun Jiang, Ruimin Hu, Zhen Han, Tao Lu, and Kebin Huang
IEEE International Conference on ultiedia and Expo POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION Junjun Jiang, Ruiin Hu, Zhen Han, Tao Lu, and Kebin Huang National Engineering
More informationLeveraging Relevance Cues for Improved Spoken Document Retrieval
Leveraging Relevance Cues for Iproved Spoken Docuent Retrieval Pei-Ning Chen 1, Kuan-Yu Chen 2 and Berlin Chen 1 National Taiwan Noral University, Taiwan 1 Institute of Inforation Science, Acadeia Sinica,
More informationThe optimization design of microphone array layout for wideband noise sources
PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun
More informationTensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3
2017 2nd International Conference on Coputational Modeling, Siulation and Applied Matheatics (CMSAM 2017) ISBN: 978-1-60595-499-8 TensorFlow and Keras-based Convolutional Neural Network in CAT Iage Recognition
More informationA Novel Fast Constructive Algorithm for Neural Classifier
A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore
More informationCOLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL
COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL 1 Te-Wei Chiang ( 蔣德威 ), 2 Tienwei Tsai ( 蔡殿偉 ), 3 Jeng-Ping Lin ( 林正平 ) 1 Dept. of Accounting Inforation Systes, Chilee Institute
More informationOPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS
Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented
More informationUnsupervised Deep Hashing via Binary Latent Factor Models for Large-scale Cross-modal Retrieval
Unsupervised Deep Hashing via Binary Latent Factor Models for Large-scale Cross-modal Retrieval Gengshen Wu 1, Zijia Lin 2, Jungong Han 1, Li Liu 3, Guiguang Ding 4, Baochang Zhang 5, Jialie Shen 6 1 Lancaster
More informationGeo-activity Recommendations by using Improved Feature Combination
Geo-activity Recoendations by using Iproved Feature Cobination Masoud Sattari Middle East Technical University Ankara, Turkey e76326@ceng.etu.edu.tr Murat Manguoglu Middle East Technical University Ankara,
More informationDetection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm
Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,
More information2013 IEEE Conference on Computer Vision and Pattern Recognition. Compressed Hashing
203 IEEE Conference on Coputer Vision and Pattern Recognition Copressed Hashing Yue Lin Rong Jin Deng Cai Shuicheng Yan Xuelong Li State Key Lab of CAD&CG, College of Coputer Science, Zhejiang University,
More informationSolving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification
Solving the Daage Localization Proble in Structural Health Monitoring Using Techniques in Pattern Classification CS 9 Final Project Due Dec. 4, 007 Hae Young Noh, Allen Cheung, Daxia Ge Introduction Structural
More informationEE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011
EE 364B Convex Optiization An ADMM Solution to the Sparse Coding Proble Sonia Bhaskar, Will Zou Final Project Spring 20 I. INTRODUCTION For our project, we apply the ethod of the alternating direction
More informationAGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM
International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.5, Septeber 205 AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM Xie Yang and Cheng Wushan College of Mechanical Engineering,
More informationMULTI-INDEX VOTING FOR ASYMMETRIC DISTANCE COMPUTATION IN A LARGE-SCALE BINARY CODES. Chih-Yi Chiu, Yu-Cyuan Liou, and Sheng-Hao Chou
MULTI-INDEX VOTING FOR ASYMMETRIC DISTANCE COMPUTATION IN A LARGE-SCALE BINARY CODES Chih-Yi Chiu, Yu-Cyuan Liou, and Sheng-Hao Chou Departent of Coputer Science and Inforation Engineering, National Chiayi
More informationUtility-Based Resource Allocation for Mixed Traffic in Wireless Networks
IEEE IFOCO 2 International Workshop on Future edia etworks and IP-based TV Utility-Based Resource Allocation for ixed Traffic in Wireless etworks Li Chen, Bin Wang, Xiaohang Chen, Xin Zhang, and Dacheng
More informationIdentifying Converging Pairs of Nodes on a Budget
Identifying Converging Pairs of Nodes on a Budget Konstantina Lazaridou Departent of Inforatics Aristotle University, Thessaloniki, Greece konlaznik@csd.auth.gr Evaggelia Pitoura Coputer Science and Engineering
More informationAN INTEGRATED APPROACH TO MUSIC BOUNDARY DETECTION
10th International Society for Music Inforation Retrieval Conference (ISMIR 2009) AN INTEGRATED APPROACH TO MUSIC BOUNDARY DETECTION Min-Yian Su, Yi-Hsuan Yang, Yu-Ching Lin, Hoer Chen National Taiwan
More information! What is mrmr feature selection. ! Applications in cancer classification. ! Applications in image pattern recognition. ! Theoretical basis of mrmr
Miniu Redundancy and Maxiu Relevance Feature election and Its Applications Hanchuan Peng Janelia Far Research Capus, Howard Hughes Medical Institute What is RMR feature selection Applications in cancer
More informationAn Efficient Approach for Content Delivery in Overlay Networks
An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr
More informationA Novel 2D Texture Classifier For Gray Level Images
2012, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.co A Novel 2D Texture Classifier For Gray Level Iages B.S. Mousavi 1 Young Researchers Club, Zahedan
More informationMassive amounts of high-dimensional data are pervasive in multiple domains,
Challenges of Feature Selection for Big Data Analytics Jundong Li and Huan Liu, Arizona State University Massive aounts of high-diensional data are pervasive in ultiple doains, ranging fro social edia,
More informationFeature Selection to Relate Words and Images
The Open Inforation Systes Journal, 2009, 3, 9-13 9 Feature Selection to Relate Words and Iages Wei-Chao Lin 1 and Chih-Fong Tsai*,2 Open Access 1 Departent of Coputing, Engineering and Technology, University
More informationDetecting Anomalous Structures by Convolutional Sparse Models
Detecting Anoalous Structures by Convolutional Sparse Models Diego Carrera, Giacoo Boracchi Dipartiento di Elettronica, Inforazione e Bioingegeria Politecnico di Milano, Italy {giacoo.boracchi, diego.carrera}@polii.it
More informationA Periodic Dynamic Load Balancing Method
2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 A Periodic Dynaic Load Balancing Method Taotao Fan* State Key Laboratory of Inforation
More informationSurvivability Function A Measure of Disaster-Based Routing Performance
Survivability Function A Measure of Disaster-Based Routing Perforance Journal Club Presentation on W. Molisz. Survivability function-a easure of disaster-based routing perforance. IEEE Journal on Selected
More informationQuantitative Comparison of Sinc-Approximating Kernels for Medical Image Interpolation
Quantitative Coparison of Sinc-Approxiating Kernels for Medical Iage Interpolation Erik H. W. Meijering, Wiro J. Niessen, Josien P. W. Plui, Max A. Viergever Iage Sciences Institute, Utrecht University
More informationImage Filter Using with Gaussian Curvature and Total Variation Model
IJECT Vo l. 7, Is s u e 3, Ju l y - Se p t 016 ISSN : 30-7109 (Online) ISSN : 30-9543 (Print) Iage Using with Gaussian Curvature and Total Variation Model 1 Deepak Kuar Gour, Sanjay Kuar Shara 1, Dept.
More informationA Low-Cost Multi-Failure Resilient Replication Scheme for High Data Availability in Cloud Storage
216 IEEE 23rd International Conference on High Perforance Coputing A Low-Cost Multi-Failure Resilient Replication Schee for High Data Availability in Cloud Storage Jinwei Liu* and Haiying Shen *Departent
More informationNovel Image Representation and Description Technique using Density Histogram of Feature Points
Novel Iage Representation and Description Technique using Density Histogra of Feature Points Keneilwe ZUVA Departent of Coputer Science, University of Botswana, P/Bag 00704 UB, Gaborone, Botswana and Tranos
More informationNews Events Clustering Method Based on Staging Incremental Single-Pass Technique
News Events Clustering Method Based on Staging Increental Single-Pass Technique LI Yongyi 1,a *, Gao Yin 2 1 School of Electronics and Inforation Engineering QinZhou University 535099 Guangxi, China 2
More informationComputer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13
Coputer Aided Drafting, Design and Manufacturing Volue 26, uber 2, June 2016, Page 13 CADDM 3D reconstruction of coplex curved objects fro line drawings Sun Yanling, Dong Lijun Institute of Mechanical
More informationOblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands
Oblivious Routing for Fat-Tree Based Syste Area Networks with Uncertain Traffic Deands Xin Yuan Wickus Nienaber Zhenhai Duan Departent of Coputer Science Florida State University Tallahassee, FL 3306 {xyuan,nienaber,duan}@cs.fsu.edu
More informationIMAGE MOSAICKING FOR ESTIMATING THE MOTION OF AN UNDERWATER VEHICLE. Rafael García, Xevi Cufí and Lluís Pacheco
IMAGE MOSAICKING FOR ESTIMATING THE MOTION OF AN UNDERWATER VEHICLE Rafael García, Xevi Cufí and Lluís Pacheco Coputer Vision and Robotics Group Institute of Inforatics and Applications, University of
More informationReal Time Displacement Measurement of an image in a 2D Plane
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882 Volue 5, Issue 3, March 2016 176 Real Tie Displaceent Measureent of an iage in a 2D Plane Abstract Prashant
More informationA Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction
MATEC Web of Conferences 73, 03073(08) https://doi.org/0.05/atecconf/087303073 SMIMA 08 A roadband Spectru Sensing Algorith in TDCS ased on I Reconstruction Liu Yang, Ren Qinghua, Xu ingzheng and Li Xiazhao
More informationInvestigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks
Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,
More informationDerivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router
Derivation of an Analytical Model for Evaluating the Perforance of a Multi- Queue Nodes Network Router 1 Hussein Al-Bahadili, 1 Jafar Ababneh, and 2 Fadi Thabtah 1 Coputer Inforation Systes Faculty of
More informationData & Knowledge Engineering
Data & Knowledge Engineering 7 (211) 17 187 Contents lists available at ScienceDirect Data & Knowledge Engineering journal hoepage: www.elsevier.co/locate/datak An approxiate duplicate eliination in RFID
More informationBoosted Detection of Objects and Attributes
L M M Boosted Detection of Objects and Attributes Abstract We present a new fraework for detection of object and attributes in iages based on boosted cobination of priitive classifiers. The fraework directly
More informationQUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS
QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS Guofei Jiang and George Cybenko Institute for Security Technology Studies and Thayer School of Engineering Dartouth College, Hanover NH 03755
More informationEnergy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks
Energy-Efficient Disk Replaceent and File Placeent Techniques for Mobile Systes with Hard Disks Young-Jin Ki School of Coputer Science & Engineering Seoul National University Seoul 151-742, KOREA youngjk@davinci.snu.ac.kr
More informationAffine Invariant Texture Analysis Based on Structural Properties 1
ACCV: The 5th Asian Conference on Coputer Vision, --5 January, Melbourne, Australia Affine Invariant Texture Analysis Based on tructural Properties Jianguo Zhang, Tieniu Tan National Laboratory of Pattern
More informationEffective Tracking of the Players and Ball in Indoor Soccer Games in the Presence of Occlusion
Effective Tracking of the Players and Ball in Indoor Soccer Gaes in the Presence of Occlusion Soudeh Kasiri-Bidhendi and Reza Safabakhsh Airkabir Univerisity of Technology, Tehran, Iran {kasiri, safa}@aut.ac.ir
More informationAN APPROACH ON BIMODAL BIOMETRIC SYSTEMS
AN APPROACH ON BIODAL BIOETRIC SYSTES Eugen LUPU, Siina EERICH Technical University of Cluj-Napoca, 26-28 Baritiu str. Cluj-Napoca phone: +40-264-40-266; fax: +40-264-592-055; e-ail: Eugen.Lupu @co.utcluj.ro
More informationRule Extraction using Artificial Neural Networks
Rule Extraction using Artificial Neural Networks S. M. Karuzzaan 1 Ahed Ryadh Hasan 2 Abstract Artificial neural networks have been successfully applied to a variety of business application probles involving
More informationIntelligent Robotic System with Fuzzy Learning Controller and 3D Stereo Vision
Recent Researches in Syste Science Intelligent Robotic Syste with Fuzzy Learning Controller and D Stereo Vision SHIUH-JER HUANG Departent of echanical Engineering National aiwan University of Science and
More informationScalable search-based image annotation
Multiedia Systes DOI 17/s53-8-128-y REGULAR PAPER Scalable search-based iage annotation Changhu Wang Feng Jing Lei Zhang Hong-Jiang Zhang Received: 18 October 27 / Accepted: 15 May 28 Springer-Verlag 28
More informationSpectral Clustering with Two Views
Spectral Clustering with Two Views Virginia R. de Sa Departent of Cognitive Science, 55 University of California, San Diego 95 Gilan Dr. La Jolla, CA 993-55 desa@ucsd.edu Abstract In this paper we develop
More informationAn Automatic Method for Summary Evaluation Using Multiple Evaluation Results by a Manual Method
An Autoatic Method for Suary Evaluation Using Multiple Evaluation Results by a Manual Method Hidetsugu Nanba Faculty of Inforation Sciences, Hiroshia City University 3-4-1 Ozuka, Hiroshia, 731-3194 Japan
More informationMapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues
Mapping Data in Peer-to-Peer Systes: Seantics and Algorithic Issues Anastasios Keentsietsidis Marcelo Arenas Renée J. Miller Departent of Coputer Science University of Toronto {tasos,arenas,iller}@cs.toronto.edu
More informationNON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH
NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH V. Atienza; J.M. Valiente and G. Andreu Departaento de Ingeniería de Sisteas, Coputadores y Autoática Universidad Politécnica de Valencia.
More informationPerformance Analysis of RAID in Different Workload
Send Orders for Reprints to reprints@benthascience.ae 324 The Open Cybernetics & Systeics Journal, 2015, 9, 324-328 Perforance Analysis of RAID in Different Workload Open Access Zhang Dule *, Ji Xiaoyun,
More informationGalois Homomorphic Fractal Approach for the Recognition of Emotion
Galois Hooorphic Fractal Approach for the Recognition of Eotion T. G. Grace Elizabeth Rani 1, G. Jayalalitha 1 Research Scholar, Bharathiar University, India, Associate Professor, Departent of Matheatics,
More informationHIGH PERFORMANCE PRE-SEGMENTATION ALGORITHM FOR SONAR IMAGES
HIGH PERFORMANCE PRE-SEGMENTATION ALGORITHM FOR SONAR IMAGES Benjain Lehann*, Konstantinos Siantidis*, Dieter Kraus** *ATLAS ELEKTRONIK GbH Sebaldsbrücker Heerstraße 235 D-28309 Breen, GERMANY Eail: benjain.lehann@atlas-elektronik.co
More informationOn computing global similarity in images
On coputing global siilarity in iages S Ravela and R Manatha Coputer Science Departent University of Massachusetts, Aherst, MA 01003 Eail: ravela,anatha @csuassedu Abstract The retrieval of iages based
More information2nd Workshop on Advanced Research and Technology in Industry Applications (WARTIA 2016)
2nd Workshop on Advanced Research and Technology in Industry Applications (WARTIA 2016) Method for Marking and Positioning Corrosions in the Autoobile Engine Cylinder Cavity fro the Ultrasonic Phased Array
More informationA Trajectory Splitting Model for Efficient Spatio-Temporal Indexing
A Trajectory Splitting Model for Efficient Spatio-Teporal Indexing Slobodan Rasetic Jörg Sander Jaes Elding Mario A. Nasciento Departent of Coputing Science University of Alberta Edonton, Alberta, Canada
More informationComputer Vision and Image Understanding
Coputer Vision and Iage Understanding 117 (2013) 453 465 Contents lists available at SciVerse ScienceDirect Coputer Vision and Iage Understanding journal hoepage: www.elsevier.co/locate/cviu Pooling in
More informationA simplified approach to merging partial plane images
A siplified approach to erging partial plane iages Mária Kruláková 1 This paper introduces a ethod of iage recognition based on the gradual generating and analysis of data structure consisting of the 2D
More informationAsynchronous Distributed Data Parallelism for Machine Learning
Asynchronous Distributed Data Parallelis for Machine Learning Zheng Yan, Yunfeng Shao Shannon Lab, Huawei Technologies Co., Ltd. Beijing, China, 100085 {yanzheng, shaoyunfeng}@huawei.co Abstract Distributed
More informationDifferent criteria of dynamic routing
Procedia Coputer Science Volue 66, 2015, Pages 166 173 YSC 2015. 4th International Young Scientists Conference on Coputational Science Different criteria of dynaic routing Kurochkin 1*, Grinberg 1 1 Kharkevich
More informationFeature Based Registration for Panoramic Image Generation
IJCSI International Journal of Coputer Science Issues, Vol. 10, Issue 6, No, Noveber 013 www.ijcsi.org 13 Feature Based Registration for Panoraic Iage Generation Kawther Abbas Sallal 1, Abdul-Mone Saleh
More informationThe research on end-effector position and orientation error distribution of SCARA industrial robot
International Journal of Research in Engineering and Science (IJRES) ISSN (Online): 2320-9364, ISSN (Print): 2320-9356 Volue 3 Issue 6 ǁ June 2015 ǁ PP.13-20 The research on end-effector position and orientation
More information1 Extended Boolean Model
1 EXTENDED BOOLEAN MODEL It has been well-known that the Boolean odel is too inflexible, requiring skilful use of Boolean operators to obtain good results. On the other hand, the vector space odel is flexible
More informationAdaptive Holistic Scheduling for In-Network Sensor Query Processing
Adaptive Holistic Scheduling for In-Network Sensor Query Processing Hejun Wu and Qiong Luo Departent of Coputer Science and Engineering Hong Kong University of Science & Technology Clear Water Bay, Kowloon,
More informationResearch on a Kind of QoS-Sensitive Semantic Web Services Composition Method Based on Genetic Algorithm
roceedings of the 7th International Conference on Innovation & Manageent 893 Research on a Kind of QoS-Sensitive Seantic Web Services Coposition Method Based on Genetic Algorith Cao Hongjiang, Nie Guihua,
More informationHUMAN pose estimation is an important problem in computer
JOURNAL OF L A T E X CLASS FILES, VOL. 6, NO., JANUARY 7 Robust 3D Huan Pose Estiation fro Single Iages or Video Sequences Chunyu Wang, Student Meber, IEEE, Yizhou Wang, Meber, IEEE, Zhouchen Lin, Meber,
More informationBeta Process Multiple Kernel Learning
Beta Process Multiple Kernel Learning Bingbing Ni Advanced Digital Sciences Center Singapore 86 bingbing.ni@adsc.co.sg Teng Li Anhui University Hefei 009, P. R. China tenglwy@gail.co Pierre Moulin UIUC
More informationResearch on the Classification and Selection of Archive Texts with the Improved C4.5 Algorithm
INTERNATIONAL JOURNAL OF IRUITS, SYSTEMS AND SIGNAL PROESSING Volue 2, 208 Research on the lassification and Selection of Archive Texts with the Iproved 4.5 Algorith Xianbin Lv Abstract In the age of inforation
More informationA Discrete Spring Model to Generate Fair Curves and Surfaces
A Discrete Spring Model to Generate Fair Curves and Surfaces Atsushi Yaada Kenji Shiada 2 Tootake Furuhata and Ko-Hsiu Hou 2 Tokyo Research Laboratory IBM Japan Ltd. LAB-S73 623-4 Shiotsurua Yaato Kanagawa
More informationShortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm
International Journal of Engineering and Technical Research (IJETR) ISSN: 31-869 (O) 454-4698 (P), Volue-5, Issue-1, May 16 Shortest Path Deterination in a Wireless Packet Switch Network Syste in University
More informationExperiences with complex user profiles for approximate P2P community matching
Experiences with coplex user profiles for approxiate PP counity atching Patrizio Dazzi ISTI-CNR Pisa, Italy p.dazzi@isti.cnr.it Matteo Mordacchini IIT-CNR Pisa, Italy.ordacchini@iit.cnr.it Fabio Baglini
More informationA Study of the Relationship Between Support Vector Machine and Gabriel Graph
A Study of the Relationship Between Support Vector Machine and Gabriel Graph Wan Zhang and Irwin King {wzhang, king}@cse.cuhk.edu.hk Departent of Coputer Science & Engineering The Chinese University of
More informationSupplementary Section. A. Algorithm. B. Datasets. C. More on Labeling Functions
Suppleentary Section In this section, we include ore details about our algorith, labeling functions, datasets as well as additional results and coparisons, which could not be included in the ain paper
More informationGAN-OPC: Mask Optimization with Lithography-guided Generative Adversarial Nets
GAN-OPC: Mask Optiization with Lithography-guided Generative Adversarial Nets Haoyu Yang hyyang@cse.cuhk.edu.hk Shuhe Li shli@cse.cuhk.edu.hk Yuzhe Ma yza@cse.cuhk.edu.hk ABSTRACT Bei Yu byu@cse.cuhk.edu.hk
More informationAction Recognition Using Local SpatioTemporal Oriented Energy Features and Additive. Kernel SVMs
International Journal of Electronics and Electrical Engineering Vol., No., June, 4 Action Recognition Using Local SpatioTeporal Oriented Energy Features and Additive Kernel SVMs Jiangfeng Yang and Zheng
More informationJoint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points
Joint Measureent- and Traffic Descriptor-based Adission Control at Real-Tie Traffic Aggregation Points Stylianos Georgoulas, Panos Triintzios and George Pavlou Centre for Counication Systes Research, University
More informationDesigning High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh 1, Issa Khalil 2, and Abdallah Khreishah 3 1: Coputer Engineering & Inforation Technology,
More informationMiPPS: A Generative Model for Multi-Manifold Clustering
Manifold Learning and its Applications: Papers fro the AAAI Fall Syposiu (FS-9-) MiPPS: A Generative Model for Multi-Manifold Clustering Oluwasani Koyejo and Joydeep Ghosh Electrical and Coputer Engineering
More informationarxiv: v1 [cs.dc] 3 Oct 2018
Sparse Winograd Convolutional neural networks on sall-scale systolic arrays Feng Shi, Haochen Li, Yuhe Gao, Benjain Kuschner, Song-Chun Zhu University of California Los Angeles Los Angeles, USA {shi.feng,sczh}@cs.ucla.edu
More informationSupport Vector Machine Based Robotic Traversability Prediction with Vision Features
International Journal of Coputational Intelligence Systes, Vol. 6, No. (July, 0), 96-608 Support Vector Machine Based Robotic Traversability Prediction with Vision Features Jianwei Cui, Yan Guo, Huatao
More informationModal Masses Estimation in OMA by a Consecutive Mass Change Method.
Modal Masses Estiation in OMA by a Consecutive Mass Change Method. F. Pelayo University of Oviedo, Departent of Construction and Manufacturing Engineering, Gijón, Spain M. López-Aenlle University of Oviedo,
More information@FMI c Kyung Moon Sa Co.
Annals of Fuzzy Matheatics and Inforatics Volue 1, No. 1, (January 2011), pp. 55-70 ISSN 2093-9310 http://www.afi.or.kr @FMI c Kyung Moon Sa Co. http://www.kyungoon.co Multi-granulation rough set: fro
More informationA Learning Framework for Nearest Neighbor Search
A Learning Fraework for Nearest Neighbor Search Lawrence Cayton Departent of Coputer Science University of California, San Diego lcayton@cs.ucsd.edu Sanjoy Dasgupta Departent of Coputer Science University
More informationLearning Integrated Holism-Landmark Representations for Long-Term Loop Closure Detection
Learning Integrated Holis-Landark Representations for Long-Ter Loop Closure Detection Fei Han, Hua Wang, Hao Zhang Departent of Coputer Science, Colorado School of Mines, Golden, CO 8040 fhan@ines.edu,
More informationClassification and Prediction of Motion Trajectories using Spatiotemporal Approximations
Classification and Prediction of Motion Trajectories using Spatioteporal Approxiations Andrew Naftel & Shehzad Khalid School of Inforatics University of Manchester Manchester, M6 1QD a.naftel@anchester.ac.uk;
More informationReconstruction of Time Series using Optimal Ordering of ICA Components
Reconstruction of Tie Series using Optial Ordering of ICA Coponents Ar Goneid and Abear Kael Departent of Coputer Science & Engineering, The Aerican University in Cairo, Cairo, Egypt e-ail: goneid@aucegypt.edu
More informationDebiasing Crowdsourced Batches
Debiasing Crowdsourced Batches Honglei Zhuang, Aditya Paraeswaran, Dan Roth and Jiawei Han Departent of Coputer Science University of Illinois at Urbana-Chapaign {hzhuang3, adityagp, danr, hanj}@illinois.edu
More informationClustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering
Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into
More informationIN many interactive multimedia streaming applications, such
840 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 8, NO. 5, MAY 06 A Geoetric Approach to Server Selection for Interactive Video Streaing Yaochen Hu, Student Meber, IEEE, DiNiu, Meber, IEEE, and Zongpeng Li, Senior
More informationA Distributed Multi-service Resource Allocation Algorithm in Heterogeneous Wireless Access Medium
1 A Distributed Multi-service Resource Allocation Algorith in Heterogeneous Wireless Access Mediu Muhaad Isail, Student Meber, IEEE, and Weihua Zhuang, Fellow, IEEE Abstract In this paper, radio resource
More informationThe Method of Flotation Froth Image Segmentation Based on Threshold Level Set
Advances in Molecular Iaging, 5, 5, 38-48 Published Online April 5 in SciRes. http://www.scirp.org/journal/ai http://dx.doi.org/.436/ai.5.54 The Method of Flotation Froth Iage Segentation Based on Threshold
More informationTHE rapid growth and continuous change of the real
IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, JANUARY/FEBRUARY 2015 47 Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh, Issa
More informationImage hiding with an improved genetic algorithm and an optimal pixel adjustment process
Eighth International Conference on Intelligent Systes Design and Applications Iage hiding with an iproved genetic algorith and an optial pixel adjustent process Lin-Yu Tseng Yung-Kuan Chan Yu-An Ho Yen-Ping
More informationA High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Membership Functions *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 21, 607-626 (2005) A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Mebership Functions * SHIH-HSU HUANG AND JIAN-YUAN LAI + Departent of
More informationMulti Packet Reception and Network Coding
The 2010 Military Counications Conference - Unclassified Progra - etworking Protocols and Perforance Track Multi Packet Reception and etwork Coding Aran Rezaee Research Laboratory of Electronics Massachusetts
More information