Capacity/storage tradeoff in high-dimensional identification systems

E Tuncel - IEEE Transactions on Information Theory, 2009 - ieeexplore.ieee.org
The asymptotic tradeoff between the number of distinguishable objects and the necessary
storage space (or equivalently, the search complexity) in an identification system is …

Adaptive cluster distance bounding for high-dimensional indexing

S Ramaswamy, K Rose - IEEE Transactions on Knowledge …, 2010 - ieeexplore.ieee.org
We consider approaches for similarity search in correlated, high-dimensional data sets,
which are derived within a clustering framework. We note that indexing by “vector …

Feature extraction for patch-based classification of multispectral earth observation images

FA Georgescu, C Vaduva… - IEEE Geoscience and …, 2016 - ieeexplore.ieee.org
Recently, various patch-based approaches have emerged for high and very high resolution
multispectral image classification and indexing. This comes as a consequence of the most …

Hierarchical identification with pre-processing

MT Vu, TJ Oechtering… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
We study a two-stage identification problem with pre-processing to enable efficient data
retrieval and reconstruction. In the enrollment phase, users' data are stored into the …

Compression for quadratic similarity queries

A Ingber, T Courtade… - IEEE transactions on …, 2015 - ieeexplore.ieee.org
The problem of performing similarity queries on compressed data is considered. We focus
on the quadratic similarity measure, and study the fundamental tradeoff between …

Utility and privacy of data sources: Can shannon help conceal and reveal information?

L Sankar, SR Rajagopalan… - 2010 Information Theory …, 2010 - ieeexplore.ieee.org
The problem of private information¿ leakage¿(inadvertently or by malicious design) from the
myriad large centralized searchable data repositories drives the need for an analytical …

Searching methods for biometric identification systems: Fundamental limits

FMJ Willems - 2009 IEEE International Symposium on …, 2009 - ieeexplore.ieee.org
We study two-stage search procedures for biometric identification systems in an information-
theoretical setting. Our main conclusion is that clustering based on vector-quantization …

Image-driven data mining for image content segmentation, classification, and attribution

CF Barnes - IEEE Transactions on Geoscience and Remote …, 2007 - ieeexplore.ieee.org
Image-driven data mining methods are described for image content segmentation,
classification, and attribution, where each pixel location of an image-under-analysis is the …

[PDF][PDF] A theory of privacy and utility in databases

L Sankar, SR Rajagopalan, HV Poor - Ar**v e-prints, 2011 - researchgate.net
Ensuring the usefulness of electronic data sources while providing necessary privacy
guarantees is an important unsolved problem. This problem drives the need for an …

Identification rate, search and memory complexity tradeoff: Fundamental limits

F Farhadzadeh, FMJ Willems - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In an information-theoretic framework, we introduce a two-stage decoding scheme capable
of achieving identification capacity to address search and memory complexities in large …