|
[1] A. Alahi, R. Ortiz, and P. Vandergheynst, “Freak: Fast retina keypoint,” In Proc. IEEE Conference on Computer Vision and Pattern Recognition, 2012.
[2] I. Amerini, L. Ballan, R. Caldelli, A. D. Bimbo, and G. Serra, “A SIFT-based forensic method for copy-move attack detection and transformation recovery,” IEEE Transactions Information Forensics Security, Vol. 6, No. 3, pp. 1099–1110, 2011.
[3] A. Babenko and V. Lempitsky, “Efficient Indexing of Billion-Scale datasets of deep descriptors, ” CVPR. IEEE, 2016.
[4] C. Burges, T. Shaked*, and E. Renshaw, “Learning to Rank using Gradient Descent,” Appearing in Proceedings of the 22th International Conference on Machine Learning, Bonn, Germany, 2005.
[5] Z. Cao*, T. Qin*, T. Y. Liu, M. F. Tsai*, and H. Li, “Learning to Rank: From Pairwise Approach to Listwise Approach,” Appearing in Proceedings of the 24th International Conference on Machine Learning, Corvallis, OR, pp. 129-136, 2007.
[6] M. Charikar, “Similarity estimation techniques from rounding algorithms,” In Proceedings of ACM Symposium on Theory of Computing (STOC), pp 380-388, 2002.
[7] A. Gionis, P. Indyk, and R. Motwani, “Similarity search in high dimensions via hashing,” in Proc. of 25th International Conference on Very Large Data Bases, 1999, pp. 518–529.
[8] A. Gordo, F. Perronnin, and Y. Gong, “Asymmetric distance for binary embedding,” IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 36, No. 1, pp. 33-47, 2014.
[9] T. Ge, K. He, and J. Sun, “Graph cuts for supervised binary coding,” In Proceedings of European conference on Computer Vision (ECCV), Vol. 7, pp. 250-264, 2014.
[10] T. Ge, K. He, Q. Ke, and J. Sun, “Optimized Product Quantization,” IEEE Transactions on Pattern Analysis and Machine Intelligence, 2013.
[11] D. Greene, M. Parnas, and F. Yao, “Multi-index hashing for information retrieval,” In Proceedings of IEEE Conference on Foundations of Computer Science, 1994.
[12] Y. Gong, S. Lazebnik, A. Gordo, and F. Perronnin, “Iterative Quantization: A Procrustean Approach to Learning Binary Codes for Large-scale Image Retrieval,” IEEE Transactions on Pattern Analysis and Machine Intelligence, 2012.
[13] J. He, W. Liu, and S. F. Chang, “Scalable similarity search with optimized kernel hashing,” in Proc. Int. Conf. Knowledge Discovery Data Mining, 2010.
[14] K. He, F. Wen, and J. Sun, “K-means Hashing: an Affinity-Preserving Quantization Method for Learning Binary Compact Codes,” In Proceedings of IEEEE International Conference on Computer Vision and Pattern Recognition (CVPR), pp. 2938-2945, 2013.
[15] G. Irie, Z. Li, X. M. Wu, and S. F. Chang, “Locally Linear Hashing for Extracting Non-Linear Manifolds,” In Proceedings of IEEEE International Conference on Computer Vision and Pattern Recognition (CVPR), pp. 2123-2130, 2014.
[16] P. Indyk, “Nearest-neighbor searching in high dimensions,” in Handbook of discrete and computational geometry, J. E. Goodman and J. O’Rourke, Eds. Boca Raton, FL: CRC Press LLC,2004.
[17] C. Jung, L.C. Jiao, and Y. Shen, “Ensemble Ranking SVM for Learning to Rank,” IEEE International Workshop on Machine Learning for Signal Processing, Beijing, China, 2011.
[18] H. Jegou, M. Douze, and C. Schmid, “Product Quantization for Nearest Neighbor Search”, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 33, No. 1, Jan. 2011.
[19] J. Ji, J. Li, S. Yan, B. Zhang, and Q. Tian, “Super-bit Locality-Sensitive Hashing,” NIPS'12 Proceedings of the 25th International Conference on Neural Information Processing Systems, Lake Tahoe, Nevada, 2012..
[20] B. Kulis and K.Grauman, “Kernelized Locality-Sensitive Hashing,” IEEE Transactions on Pattern Analysis and Machine Intelligence, 2012.
[21] B. Kulis and T. Darrell, “Learning to hash with binary reconstructive embeddings,” in Proc. 23rd Adv. Neural Inf. Process. Syst., 2009.
[22] Y. Kalantidis and Y. Avrithis, “Locally Optimized Product Quantization for Approximate Nearest Neighbor Search,” IEEE Conference on Computer Vision and Pattern Recognition, 2014.
[23] M. Norouzi, A. Punjani, and D. J. Fleet, “Fast exact search in Hamming space with multi-index hashing,” IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 36, No. 6, pp. 1107-1119, 2014.
[24] M. Raginsky and S. Lazebnik, “Locality-sensitive binary codes from shift-invariant kernels,” In Proc. Advances in Neural Information Processing Systems, 2009.
[25] G. Shakhnarovich, P. Viola, and T. Darrell, “Fast pose estimation with parameter-sensitive hashing,” in Proc. IEEE 9th Int. Conf. Comput. Vis., 2003.
[26] G. Shakhnarovich, T. Darrell, and P. Indyk, “Nearest-neighbor methods in learning and vision: theory and practice” ,MIT Press, 2006.
[27] B. Wei, T. Guan, and J. Yu, “Projected Residual Vector Quantization for ANN Search,” IEEE Multimedia, vol. 21, 2014.
[28] Y. Weiss, A. Torralba, and R. Fergus, “Spectral hashing,” in Proc. Adv. Neural Inf. Process. Syst., 2008.
[29] F. Xia*, T. Y. Liu, J. Wang, W. Zhang, and H. Li , “Listwise Approach to Learning to Rank - Theory and Algorithm,” Appearing in Proceedings of the 25th International Conference on Machine Learning, Helsinki, Finland, 2008.
[30] J. Xu and H. Li, “AdaRank: A Boosting Algorithm for Information Retrieval,” SIGIR’07, Amsterdam, The Netherlands, July 2007.
[31] 劉宇詮,“近似非對稱式最近鄰居搜尋二元特徵資料庫,”嘉義:國立嘉義大學資訊工程學研究所
|