No abstract available.
Cited By
- Indyk P and Xu H Worst-case performance of popular approximate nearest neighbor search implementations Proceedings of the 37th International Conference on Neural Information Processing Systems, (66239-66256)
- Almansour A, Alsaeedi G, Almazroui H and Almuflehi H I-Privacy Photo Proceedings of the 2020 the 4th International Conference on Compute and Data Analysis, (131-141)
- Xiao C, Feng D and Yuan M (2019). Soft decision optimization method for robust fundamental matrix estimation, Machine Vision and Applications, 30:4, (657-669), Online publication date: 1-Jun-2019.
- Jin C, Sun Q and Jin S (2019). A hybrid automatic image annotation approach, Multimedia Tools and Applications, 78:9, (11815-11834), Online publication date: 1-May-2019.
- Sun L, Guo J and Zhu Y (2019). Applying uncertainty theory into the restaurant recommender system based on sentiment analysis of online Chinese reviews, World Wide Web, 22:1, (83-100), Online publication date: 1-Jan-2019.
- Fichtenberger H and Rohde D A theory-based evaluation of nearest neighbor models put into practice Proceedings of the 32nd International Conference on Neural Information Processing Systems, (6743-6754)
- Mollajan A, Memarian H and Nabi-Bidhendi M (2018). Fuzzy classifier fusion, Neural Computing and Applications, 30:3, (825-834), Online publication date: 1-Aug-2018.
- Har-Peled S and Kumar N (2018). Robust Proximity Search for Balls Using Sublinear Space, Algorithmica, 80:1, (279-299), Online publication date: 1-Jan-2018.
- Bibliography Frontiers of Multimedia Research, (315-377)
- Pratama A, Widyawan , Lazovik A and Aiello M Power-Based Device Recognition for Occupancy Detection Service-Oriented Computing – ICSOC 2017 Workshops, (174-187)
- Wrobel K, Doroz R, Porwik P, Naruniec J and Kowalski M (2017). Using a Probabilistic Neural Network for lip-based biometric verification, Engineering Applications of Artificial Intelligence, 64:C, (112-127), Online publication date: 1-Sep-2017.
- Rayar F and Robillard P ORbox Proceedings of the 29th Conference on l'Interaction Homme-Machine, (179-186)
- Song K, Nie F and Han J Two dimensional large margin nearest neighbor for matrix classification Proceedings of the 26th International Joint Conference on Artificial Intelligence, (2751-2757)
- Marchegiani L and Posner I Leveraging the urban soundscape: Auditory perception for smart vehicles 2017 IEEE International Conference on Robotics and Automation (ICRA), (6547-6554)
- Ning Q, Zhu J, Zhong Z, Hoi S and Chen C (2017). Scalable Image Retrieval by Sparse Product Quantization, IEEE Transactions on Multimedia, 19:3, (586-597), Online publication date: 1-Mar-2017.
- Har-Peled S and Mahabadi S Proximity in the age of distraction Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms, (1-15)
- Angiulli F (2017). On the behavior of intrinsically high-dimensional spaces, The Journal of Machine Learning Research, 18:1, (6209-6268), Online publication date: 1-Jan-2017.
- Gutiérrez P, Lastra M, Bacardit J, Benítez J and Herrera F (2016). GPU-SME-kNN, Information Sciences: an International Journal, 373:C, (165-182), Online publication date: 10-Dec-2016.
- Carreira-Perpiñán M and Raziperchikolaei R An ensemble diversity approach to supervised binary hashing Proceedings of the 30th International Conference on Neural Information Processing Systems, (757-765)
- Porwik P, Doroz R and Orczyk T (2016). Signatures verification based on PNN classifier optimised by PSO algorithm, Pattern Recognition, 60:C, (998-1014), Online publication date: 1-Dec-2016.
- Kaothanthong N, Chun J and Tokuyama T (2016). Distance interior ratio, Pattern Recognition Letters, 78:C, (14-21), Online publication date: 15-Jul-2016.
- Vatsalan D and Christen P (2016). Privacy-preserving matching of similar patients, Journal of Biomedical Informatics, 59:C, (285-298), Online publication date: 1-Feb-2016.
- Liu H, Jiang A, Wang M and Wan J (2018). Local similarity preserved hashing learning via Markov graph for efficient similarity search, Neurocomputing, 159:C, (144-150), Online publication date: 2-Jul-2015.
- Hall R and Attenberg J Fast and Accurate Maximum Inner Product Recommendations on Map-Reduce Proceedings of the 24th International Conference on World Wide Web, (1263-1268)
- Ji R, Gao Y, Duan L, Yao H and Dai Q (2015). Learning-Based Local Visual Representation and Indexing, 10.5555/2815517, Online publication date: 6-Apr-2015.
- Wang J, Shen H, Yan S, Yu N, Li S and Wang J Optimized Distances for Binary Code Ranking Proceedings of the 22nd ACM international conference on Multimedia, (517-526)
- Porwik P and Doroz R Self-adaptive Biometric Classifier Working on the Reduced Dataset Proceedings of the 9th International Conference on Hybrid Artificial Intelligence Systems - Volume 8480, (377-388)
- Zhang X and Song Q (2014). Predicting the number of nearest neighbors for the k-NN classification algorithm, Intelligent Data Analysis, 18:3, (449-464), Online publication date: 1-May-2014.
- Tan W, Baker M, Lee B and Samadani R The sound of silence Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems, (1-14)
- Wang J, Wang J, Yu N and Li S Order preserving hashing for approximate nearest neighbor search Proceedings of the 21st ACM international conference on Multimedia, (133-142)
- Chen L and Wang F (2019). Preference-based clustering reviews for augmenting e-commerce recommendation, Knowledge-Based Systems, 50:C, (44-59), Online publication date: 1-Sep-2013.
- Roy A, Mackin P and Mukhopadhyay S (2013). 2013 Special Issue, Neural Networks, 41, (113-129), Online publication date: 1-May-2013.
- Aiger D, Kaplan H and Sharir M Reporting neighbors in high-dimensional euclidean space Proceedings of the twenty-fourth annual ACM-SIAM symposium on Discrete algorithms, (784-803)
- Raman K, Svore K, Gilad-Bachrach R and Burges C Learning from mistakes Proceedings of the 21st ACM international conference on Information and knowledge management, (1930-1934)
- Wang J and Li S Query-driven iterated neighborhood graph search for large scale indexing Proceedings of the 20th ACM international conference on Multimedia, (179-188)
- Fraz M, Remagnino P, Hoppe A, Uyyanonvara B, Rudnicka A, Owen C and Barman S (2012). Blood vessel segmentation methodologies in retinal images - A survey, Computer Methods and Programs in Biomedicine, 108:1, (407-433), Online publication date: 1-Oct-2012.
- Sergeev N A Supremum Norm Based Near Neighbor Search in High Dimensional Spaces Proceedings of the International Conference on Computer Vision and Graphics - Volume 7594, (600-609)
- Kong W, Li W and Guo M Manhattan hashing for large-scale image retrieval Proceedings of the 35th international ACM SIGIR conference on Research and development in information retrieval, (45-54)
- Zhen Y and Yeung D A probabilistic model for multimodal hash function learning Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining, (940-948)
- Trad M, Joly A and Boujemaa N Distributed KNN-graph approximation via hashing Proceedings of the 2nd ACM International Conference on Multimedia Retrieval, (1-8)
- Cai H and Ng M Feature weighting by RELIEF based on local hyperplane approximation Proceedings of the 16th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part II, (335-346)
- Piro P, Nock R, Nielsen F and Barlaud M (2012). Leveraging k-NN for generic classification boosting, Neurocomputing, 80:C, (3-9), Online publication date: 15-Mar-2012.
- Derrac J, Cornelis C, García S and Herrera F (2012). Enhancing evolutionary instance selection algorithms by means of fuzzy rough set based feature selection, Information Sciences: an International Journal, 186:1, (73-92), Online publication date: 1-Mar-2012.
- Liu N and Wang H (2018). Weighted principal component extraction with genetic algorithms, Applied Soft Computing, 12:2, (961-974), Online publication date: 1-Feb-2012.
- Razmjooy N, Mousavi B and Soleymani F (2012). A real-time mathematical computer method for potato inspection using machine vision, Computers & Mathematics with Applications, 63:1, (268-279), Online publication date: 1-Jan-2012.
- Teodoro G, Valle E, Mariano N, Torres R and Meira W Adaptive parallel approximate similarity search for responsive multimedia retrieval Proceedings of the 20th ACM international conference on Information and knowledge management, (495-504)
- Tong W, Li F, Yang T, Jin R and Jain A A kernel density based approach for large scale image retrieval Proceedings of the 1st ACM International Conference on Multimedia Retrieval, (1-8)
- Chin T, Suter D and Wang H (2018). Boosting histograms of descriptor distances for scalable multiclass specific scene recognition, Image and Vision Computing, 29:4, (241-250), Online publication date: 1-Mar-2011.
- Turaga P and Chellappa R Nearest-neighbor search algorithms on non-Euclidean manifolds for computer vision applications Proceedings of the Seventh Indian Conference on Computer Vision, Graphics and Image Processing, (282-289)
- Mao R, Ramakrishnan S, Nuckolls G and Miranker D An inverted index for mass spectra similarity query and comparison with a metric-space method Proceedings of the Third International Conference on SImilarity Search and APplications, (93-99)
- Blachnik M and Duch W Improving accuracy of LVQ algorithm by instance weighting Proceedings of the 20th international conference on Artificial neural networks: Part III, (257-266)
- Yun J, Jing L, Yu J and Huang H Semantics-based representation model for multi-layer text classification Proceedings of the 14th international conference on Knowledge-based and intelligent information and engineering systems: Part II, (1-10)
- Arevalillo-Herráez M and Ferri F Interactive image retrieval using smoothed nearest neighbor estimates Proceedings of the 2010 joint IAPR international conference on Structural, syntactic, and statistical pattern recognition, (708-717)
- Gómez-Ballester E, Micó L, Thollard F, Oncina J and Moreno-Seco F Combining elimination rules in tree-based nearest neighbor search algorithms Proceedings of the 2010 joint IAPR international conference on Structural, syntactic, and statistical pattern recognition, (80-89)
- Hamerly G and Speegle G Efficient model selection for large-scale nearest-neighbor data mining Proceedings of the 27th British national conference on Data Security and Security Data, (37-54)
- Tellaeche A, Arana R, Ibarguren A and Martínez-Otzeta J Automatic quality inspection of percussion cap mass production by means of 3d machine vision and machine learning techniques Proceedings of the 5th international conference on Hybrid Artificial Intelligence Systems - Volume Part I, (270-277)
- Arroyo Á, Serradilla F and Calvo Ó Modeling spatial-temporal context information in virtual worlds Proceedings of the 23rd international conference on Industrial engineering and other applications of applied intelligent systems - Volume Part I, (437-447)
- Komogortsev O, Jayarathna S, Aragon C and Mahmoud M Biometric identification via an oculomotor plant mathematical model Proceedings of the 2010 Symposium on Eye-Tracking Research & Applications, (57-60)
- Shimosaka M, Murasaki K, Mori T and Sato T Human shape reconstruction via graph cuts for voxel-based markerless motion capture in intelligent environment Proceedings of the 3rd International Universal Communication Symposium, (230-236)
- Chen J, Fang H and Saad Y (2009). Fast Approximate kNN Graph Construction for High Dimensional Data via Recursive Lanczos Bisection, The Journal of Machine Learning Research, 10, (1989-2012), Online publication date: 1-Dec-2009.
- Whiteson S and Whiteson D (2009). Machine learning for event selection in high energy physics, Engineering Applications of Artificial Intelligence, 22:8, (1203-1217), Online publication date: 1-Dec-2009.
- Li F, Tong W, Jin R, Jain A and Lee J An efficient key point quantization algorithm for large scale image retrieval Proceedings of the First ACM workshop on Large-scale multimedia retrieval and mining, (89-96)
- Valle E and Cord M Advanced Techniques in CBIR Proceedings of the 2009 Tutorials of the XXII Brazilian Symposium on Computer Graphics and Image Processing, (72-78)
- Jiang L, Wu Z, Zheng Q and Liu J Learning Deep Web Crawling with Diverse Features Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 01, (572-575)
- Bendicks C, Tarlet D, Michaelis B, Thévenin D and Wunderlich B Use of Coloured Tracers in Gas Flow Experiments for a Lagrangian Flow Analysis with Increased Tracer Density Proceedings of the 31st DAGM Symposium on Pattern Recognition - Volume 5748, (392-401)
- Sæbjørnsen A, Willcock J, Panas T, Quinlan D and Su Z Detecting code clones in binary executables Proceedings of the eighteenth international symposium on Software testing and analysis, (117-128)
- Strasdat H, Stachniss C and Burgard W Which landmark is useful? Proceedings of the 2009 IEEE international conference on Robotics and Automation, (197-202)
- Kao K, Liao I and Li Y (2009). Detecting rogue access points using client-side bottleneck bandwidth analysis, Computers and Security, 28:3-4, (144-152), Online publication date: 1-May-2009.
- Trajcevski G, Tamassia R, Ding H, Scheuermann P and Cruz I Continuous probabilistic nearest-neighbor queries for uncertain trajectories Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology, (874-885)
- Leezer J and Zhang Y Simulating human intuitive decisions by Q-learning Proceedings of the 2009 ACM symposium on Applied Computing, (2077-2081)
- Valle E, Cord M and Philipp-Foliguet S High-dimensional descriptor indexing for large multimedia databases Proceedings of the 17th ACM conference on Information and knowledge management, (739-748)
- Chen K, Pao H and Chang H Game bot identification based on manifold learning Proceedings of the 7th ACM SIGCOMM Workshop on Network and System Support for Games, (21-26)
- Zhu S, Li T, Chen Z, Wang D and Gong Y (2008). Dynamic active probing of helpdesk databases, Proceedings of the VLDB Endowment, 1:1, (748-760), Online publication date: 1-Aug-2008.
- García S, Cano J and Herrera F (2008). A memetic algorithm for evolutionary prototype selection, Pattern Recognition, 41:8, (2693-2709), Online publication date: 1-Aug-2008.
- Liu Y, Wang X and Zha H Dimension amnesic pyramid match kernel Proceedings of the 23rd national conference on Artificial intelligence - Volume 2, (652-658)
- Zhang J, Gao X, Xu J and Li M Rapid and accurate protein side chain prediction with local backbone information Proceedings of the 12th annual international conference on Research in computational molecular biology, (285-299)
- Andoni A and Indyk P (2008). Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions, Communications of the ACM, 51:1, (117-122), Online publication date: 1-Jan-2008.
- Zafra A, Ventura S, Herrera-Viedma E and Romero C Multiple instance learning with genetic programming for web mining Proceedings of the 9th international work conference on Artificial neural networks, (919-927)
- Kim K and Choi S Neighbor search with global geometry Proceedings of the 24th international conference on Machine learning, (401-408)
- Kadlec T and Jelínek I Ontology-based approach to adaptation Proceedings of the 2007 international conference on Computer systems and technologies, (1-4)
- Han J, Lee J, Park S, Hwang J and Nah Y Distributed k-NN query processing for location services Proceedings of the 5th IFIP WG 10.2 international conference on Software technologies for embedded and ubiquitous systems, (30-39)
- Blachnik M and Duch W Prototype-based threshold rules Proceedings of the 13th international conference on Neural information processing - Volume Part III, (1028-1037)
Recommendations
Stereo Matching as a Nearest-Neighbor Problem
We propose a representation of images, called intrinsic curves, that transforms stereo matching from a search problem into a nearest-neighbor problem. Intrinsic curves are the paths that a set of local image descriptors trace as an image scanline is ...
Nonlinear Nearest-Neighbour Matching and Its Application in Legal Precedent Retrieval
ICITA '05: Proceedings of the Third International Conference on Information Technology and Applications (ICITA'05) Volume 2 - Volume 02Case-Based Reasoning (CBR) has been widely and successfully applied in legal precedent retrieval. Traditional Nearest-Neighbour (NN) matching has shown that it is not capable of dealing with the situations that the values of weights or dimensional ...
Discrete-to-deep reinforcement learning methods
AbstractNeural networks are effective function approximators, but hard to train in the reinforcement learning (RL) context mainly because samples are correlated. In complex problems, a neural RL approach is often able to learn a better solution than ...