Capacity/storage tradeoff in high-dimensional identification systems
E Tuncel - IEEE Transactions on Information Theory, 2009 - ieeexplore.ieee.org
The asymptotic tradeoff between the number of distinguishable objects and the necessary
storage space (or equivalently, the search complexity) in an identification system is …
storage space (or equivalently, the search complexity) in an identification system is …
Adaptive cluster distance bounding for high-dimensional indexing
S Ramaswamy, K Rose - IEEE Transactions on Knowledge …, 2010 - ieeexplore.ieee.org
We consider approaches for similarity search in correlated, high-dimensional data sets,
which are derived within a clustering framework. We note that indexing by “vector …
which are derived within a clustering framework. We note that indexing by “vector …
Feature extraction for patch-based classification of multispectral earth observation images
FA Georgescu, C Vaduva… - IEEE Geoscience and …, 2016 - ieeexplore.ieee.org
Recently, various patch-based approaches have emerged for high and very high resolution
multispectral image classification and indexing. This comes as a consequence of the most …
multispectral image classification and indexing. This comes as a consequence of the most …
Hierarchical identification with pre-processing
MT Vu, TJ Oechtering… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
We study a two-stage identification problem with pre-processing to enable efficient data
retrieval and reconstruction. In the enrollment phase, users' data are stored into the …
retrieval and reconstruction. In the enrollment phase, users' data are stored into the …
Compression for quadratic similarity queries
The problem of performing similarity queries on compressed data is considered. We focus
on the quadratic similarity measure, and study the fundamental tradeoff between …
on the quadratic similarity measure, and study the fundamental tradeoff between …
Utility and privacy of data sources: Can shannon help conceal and reveal information?
L Sankar, SR Rajagopalan… - 2010 Information Theory …, 2010 - ieeexplore.ieee.org
The problem of private information¿ leakage¿(inadvertently or by malicious design) from the
myriad large centralized searchable data repositories drives the need for an analytical …
myriad large centralized searchable data repositories drives the need for an analytical …
Searching methods for biometric identification systems: Fundamental limits
FMJ Willems - 2009 IEEE International Symposium on …, 2009 - ieeexplore.ieee.org
We study two-stage search procedures for biometric identification systems in an information-
theoretical setting. Our main conclusion is that clustering based on vector-quantization …
theoretical setting. Our main conclusion is that clustering based on vector-quantization …
Image-driven data mining for image content segmentation, classification, and attribution
CF Barnes - IEEE Transactions on Geoscience and Remote …, 2007 - ieeexplore.ieee.org
Image-driven data mining methods are described for image content segmentation,
classification, and attribution, where each pixel location of an image-under-analysis is the …
classification, and attribution, where each pixel location of an image-under-analysis is the …
[PDF][PDF] A theory of privacy and utility in databases
Ensuring the usefulness of electronic data sources while providing necessary privacy
guarantees is an important unsolved problem. This problem drives the need for an …
guarantees is an important unsolved problem. This problem drives the need for an …
Identification rate, search and memory complexity tradeoff: Fundamental limits
In an information-theoretic framework, we introduce a two-stage decoding scheme capable
of achieving identification capacity to address search and memory complexities in large …
of achieving identification capacity to address search and memory complexities in large …