Proceedings of the 20th ACM International Conference on Information and Knowledge Management 2011
DOI: 10.1145/2063576.2063899
|View full text |Cite
|
Sign up to set email alerts
|

Efficient retrieval of 3D building models using embeddings of attributed subgraphs

Abstract: We present a novel method for retrieval and classification of 3D building models that is tailored to the specific requirements of architects. In contrast to common approaches our algorithm relies on the interior spatial arrangement of rooms instead of exterior geometric shape. We first represent the internal topological building structure by a Room Connectivity Graph (RCG). Each room is characterized by a node. Connections between rooms like e.g. doors are represented by edges. Nodes and edges are additionally… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 20 publications
0
3
0
Order By: Relevance
“…1 We first pop the head element c from C. Then, we look up the head c of C and set a target lower bound to lb(q, c ) + 1, where lb(q, c ) is the current lower bound of c . 2 We incrementally tighten the lower bound of c up to the target. 3 If we successfully tighten the lower bound of c, we push c into C. We can fail to tighten the lower bound of c if and only if we obtain ged(q, c) which is less than the target (see Algorithm 3).…”
Section: B Ged Lower Bound-based Top-k Search Algorithmmentioning
confidence: 99%
“…1 We first pop the head element c from C. Then, we look up the head c of C and set a target lower bound to lb(q, c ) + 1, where lb(q, c ) is the current lower bound of c . 2 We incrementally tighten the lower bound of c up to the target. 3 If we successfully tighten the lower bound of c, we push c into C. We can fail to tighten the lower bound of c if and only if we obtain ged(q, c) which is less than the target (see Algorithm 3).…”
Section: B Ged Lower Bound-based Top-k Search Algorithmmentioning
confidence: 99%
“…Image Analysis [19][20][21][22][23][24] Handwritten Document Analysis [25][26][27][28][29][30][31][32][33] Biometrics [34][35][36][37][38][39][40] Bio-and Chemoinformatics [41][42][43][44][45][46] Knowledge and Process Management [47][48][49][50] Malware Detection [51][52][53][54] Other Applications [55][56][57][58] Fig. 1: Taxonomy of the reviewed application fields and papers that use the framework for Bipartite Graph Edit Distance (BP).…”
Section: Applications Of the Bipartite Graph Edit Distance (Bp)mentioning
confidence: 99%
“…Graphs are also used for 3D-images analysis. In [24], for instance, graphs are used to represent topological building structures by a so called Room Connectivity Graph. To this end, nodes represent rooms and are labelled by three-dimensional characteristics of the room.…”
Section: Image Analysismentioning
confidence: 99%