A comparison of pivot selection techniques for permutation-based indexing

被引:13
|
作者
Amato, Giuseppe [1 ]
Esuli, Andrea [1 ]
Falchi, Fabrizio [1 ]
机构
[1] Ist Sci & Tecnol Informaz A Faedo, I-56124 Pisa, Italy
关键词
Permutation-based; Pivot; Metric space; Similarity search; Inverted files; Content based image retrieval; SIMILARITY SEARCH; RETRIEVAL; HUBS;
D O I
10.1016/j.is.2015.01.010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, permutation based indexes have attracted interest in the area of similarity search. The basic idea of permutation based indexes is that data objects are represented as appropriately generated permutations of a set of pivots (or reference objects). Similarity queries are executed by searching for data objects whose permutation representation is similar to that of the query, following the assumption that similar objects are represented by similar permutations of the pivots. In the context of permutation-based indexing, most authors propose to select pivots randomly from the data set, given that traditional pivot selection techniques do not reveal better performance. However, to the best of our knowledge, no rigorous comparison has been performed yet. In this paper we compare five pivot selection techniques on three permutation-based similarity access methods. Among those, we propose a novel technique specifically designed for permutations. Two significant observations emerge from our tests. First, random selection is always outperformed by at least one of the tested techniques. Second, there is no technique that is universally the best for all permutation-based access methods; rather different techniques are optimal for different methods. This indicates that the pivot selection technique should be considered as an integrating and relevant part of any permutation-based access method. (C) 2015 Elsevier Ltd. All rights reserved.
引用
收藏
页码:176 / 188
页数:13
相关论文
共 50 条
  • [1] Pivot Selection Strategies for Permutation-Based Similarity Search
    Amato, Giuseppe
    Esuli, Andrea
    Falchi, Fabrizio
    [J]. SIMILARITY SEARCH AND APPLICATIONS (SISAP), 2013, 8199 : 91 - 102
  • [2] Quantized ranking for permutation-based indexing
    Mohamed, Hisham
    Marchand-Maillet, Stephane
    [J]. INFORMATION SYSTEMS, 2015, 52 : 163 - 175
  • [3] Quantized Ranking for Permutation-Based Indexing
    Mohamed, Hisham
    Marchand-Maillet, Stephane
    [J]. SIMILARITY SEARCH AND APPLICATIONS (SISAP), 2013, 8199 : 103 - 114
  • [4] Employing GPU architectures for permutation-based indexing
    Krulis, Martin
    Osipyan, Hasmik
    Marchand-Maillet, Stephane
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (09) : 11859 - 11887
  • [5] Employing GPU architectures for permutation-based indexing
    Martin Kruliš
    Hasmik Osipyan
    Stéphane Marchand-Maillet
    [J]. Multimedia Tools and Applications, 2017, 76 : 11859 - 11887
  • [6] Quantifying the Invariance and Robustness of Permutation-Based Indexing Schemes
    Marchand-Maillet, Stephane
    Roman-Rangel, Edgar
    Mohamed, Hisham
    Nielsen, Frank
    [J]. SIMILARITY SEARCH AND APPLICATIONS, SISAP 2016, 2016, 9939 : 79 - 92
  • [7] Multi-Core (CPU and GPU) for Permutation-Based Indexing
    Mohamed, Hisham
    Osipyan, Hasmik
    Marchand-Maillet, Stephane
    [J]. SIMILARITY SEARCH AND APPLICATIONS, 2014, 8821 : 277 - 288
  • [8] Cancelable Permutation-Based Indexing for Secure and Efficient Biometric Identification
    Murakami, Takao
    Fujita, Ryo
    Ohki, Tetsushi
    Kaga, Yosuke
    Fujio, Masakazu
    Takahashi, Kenta
    [J]. IEEE ACCESS, 2019, 7 : 45563 - 45582
  • [9] Deep Permutations: Deep Convolutional Neural Networks and Permutation-Based Indexing
    Amato, Giuseppe
    Falchi, Fabrizio
    Gennaro, Claudio
    Vadicamo, Lucia
    [J]. SIMILARITY SEARCH AND APPLICATIONS, SISAP 2016, 2016, 9939 : 93 - 106
  • [10] Motion Compensation Techniques in Permutation-Based Video Encryption
    Sabino, Caio C.
    Andrade, Lais S.
    Ren, Tsang Ing
    Cavalcanti, George D. C.
    Jyh, Tsang Ing
    Sijbers, Jan
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC 2013), 2013, : 1578 - 1581