2012 IEEE Conference on Computer Vision and Pattern Recognition 2012
DOI: 10.1109/cvpr.2012.6248024
|View full text |Cite
|
Sign up to set email alerts
|

Spherical hashing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 110 publications
(7 citation statements)
references
References 22 publications
0
7
0
Order By: Relevance
“…Figure 2 shows the Precision Recall (PR) curve of the hash code on the CIFAR-10 and NUS-WIDE datasets. In order to evaluate the effectiveness of the proposed method, we compare the results of the proposed method and the comparison method, including DDH [10], UH-BDNN [4], ITQ [15], AGH [6], SpH [16], PCAH [17], LSH [18]. The length of the hash code in the CIFAR-10 experiment is 64 bits, and the NUS-WIDE experiment is 32 bits.…”
Section: Performance Analysismentioning
confidence: 99%
“…Figure 2 shows the Precision Recall (PR) curve of the hash code on the CIFAR-10 and NUS-WIDE datasets. In order to evaluate the effectiveness of the proposed method, we compare the results of the proposed method and the comparison method, including DDH [10], UH-BDNN [4], ITQ [15], AGH [6], SpH [16], PCAH [17], LSH [18]. The length of the hash code in the CIFAR-10 experiment is 64 bits, and the NUS-WIDE experiment is 32 bits.…”
Section: Performance Analysismentioning
confidence: 99%
“…All aforementioned unimodal hashing models cannot generate balanced code matrix. Spherical hashing (SpH) [9] and global hashing system (GHS) [23] quantize the distance between a data point and a special point. The closer half to a special point is denoted as 1 while the further half is denoted as 0.…”
Section: A Unimodal Hashingmentioning
confidence: 99%
“…The final step of SpH [40] is the same as our method, so SpH also generates a balanced code matrix. However, SpH searches the locations of special points in the entire space, which makes it difficult to find a good solution.…”
Section: Spherical Hashing (Sph)mentioning
confidence: 99%
“…We evaluate our methods by comparing to seven hashing methods which includes: Iterative Quantization (ITQ) [16], Isotropic Hashing (IsoH) [17], Harmonious Hashing (HH) [36], Spectral Hashing (SH) [13], Inductive Manifold Hashing (IMH) [12], Orthogonal K-means (ok-means) [43] and Spherical Hashing (SpH) [40]. Our data-dependent and data-independent are denoted as GHS-DD and GHS-DI, respectively.…”
Section: A Protocols and Baselinesmentioning
confidence: 99%