{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T23:40:01Z","timestamp":1748562001849,"version":"3.41.0"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319221793"},{"type":"electronic","value":"9783319221809"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-22180-9_61","type":"book-chapter","created":{"date-parts":[[2015,8,10]],"date-time":"2015-08-10T13:07:32Z","timestamp":1439212052000},"page":"615-622","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Approximate Bit-Vector Algorithms for Hashing-Based Similarity Searches"],"prefix":"10.1007","author":[{"given":"Ling","family":"Wang","sequence":"first","affiliation":[]},{"given":"Tie Hua","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Zhen Hong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zhao Yang","family":"Qu","sequence":"additional","affiliation":[]},{"given":"Keun Ho","family":"Ryu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,11]]},"reference":[{"issue":"3","key":"61_CR1","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1007\/s00778-010-0200-z","volume":"20","author":"Y Gao","year":"2011","unstructured":"Gao, Y., Zheng, B., Chen, G., Li, Q., Guo, X.: Continuous visible nearest neighbor query processing in spatial databases. VLDB 20(3), 371\u2013396 (2011)","journal-title":"VLDB"},{"key":"61_CR2","doi-asserted-by":"crossref","unstructured":"Lin, Y., Jin, R., Cai, D., He, X.: Random projection with filtering for nearly duplicate search. In: Proceedings of the 26th AAAI Conference on Artificial Intelligence, pp. 641\u2013647. AAAI Press, Toronto (2012)","DOI":"10.1609\/aaai.v26i1.8199"},{"key":"61_CR3","unstructured":"Zhang, D., Yang, G., Hu, Y., Jin, Z., Cai, D., He, X.: A unified approximate nearest neighbor search scheme by combining data structure and hashing. In: Proceedings of the 23rd International Joint Conference on Artificial Intelligence, pp. 681\u2013687. IJCAI Press, Beijing (2013)"},{"issue":"1","key":"61_CR4","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1145\/1327452.1327494","volume":"51","author":"A Andoni","year":"2008","unstructured":"Andoni, A., Indyk, P.: Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions. Commun. ACM 51(1), 117\u2013122 (2008)","journal-title":"Commun. ACM"},{"key":"61_CR5","doi-asserted-by":"crossref","unstructured":"Jin, Z., Hu, Y., Lin, Y., Zhang, D., Lin, S., Cai, D., Li, X.: Complementary projection hashing. In: IEEE International Conference on Computer Vision, pp. 257\u2013264. IEEE Press, Sydney (2013)","DOI":"10.1109\/ICCV.2013.39"},{"issue":"8","key":"61_CR6","doi-asserted-by":"publisher","first-page":"1362","DOI":"10.1109\/TCYB.2013.2283497","volume":"44","author":"Z Jin","year":"2014","unstructured":"Jin, Z., Li, C., Lin, Y., Cai, D.: Density sensitive hashing. IEEE Trans. Cybern. 44(8), 1362\u20131371 (2014)","journal-title":"IEEE Trans. Cybern."},{"issue":"6","key":"61_CR7","doi-asserted-by":"publisher","first-page":"1092","DOI":"10.1109\/TPAMI.2011.219","volume":"34","author":"B Kulis","year":"2012","unstructured":"Kulis, B., Grauman, K.: Kernelized locality-sensitive hashing. IEEE Trans. Pattern Anal. Mach. Intell. 34(6), 1092\u20131104 (2012)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"61_CR8","doi-asserted-by":"crossref","unstructured":"Lin, Y., Jin, R., Cai, D., Yan, S., Li, X.: Compressed hashing. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 446\u2013451. IEEE Press, Portland (2013)","DOI":"10.1109\/CVPR.2013.64"},{"key":"61_CR9","unstructured":"Weiss, Y., Torralba, A., Fergus, R.: Spectral hashing. In: Proceedings of the 22nd Annual Conference on Neural Information Processing Systems, pp. 1753\u20131760. Curran Associates Press, Vancouver (2008)"},{"issue":"6","key":"61_CR10","doi-asserted-by":"publisher","first-page":"1380","DOI":"10.1109\/TKDE.2012.76","volume":"25","author":"C Wu","year":"2013","unstructured":"Wu, C., Zhu, J., Cai, D., Chen, C., Bu, J.: Semi-supervised nonlinear hashing using bootstrap sequential projection learning. IEEE Trans. Knowl. Data Eng. 25(6), 1380\u20131393 (2013)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"61_CR11","unstructured":"Xu, B., Bu, J., Lin, Y., Chen, C., He, X., Cai, D.: Harmonious hashing. In: Proceedings of the 23rd International Joint Conference on Artificial Intelligence, pp. 1820\u20131826. AAAI Press, Beijing (2013)"},{"key":"61_CR12","unstructured":"Gionis, A., Indyk, P., Motwani, R.: Similarity search in high dimensions via hashing. In: Proceedings of the 25th International Conference on Very Large Data Bases, pp. 518\u2013529. Morgan Kaufmann Press (1999)"},{"key":"61_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1007\/978-3-662-43984-5_16","volume-title":"Database Systems for Advanced Applications","author":"P Yuan","year":"2014","unstructured":"Yuan, P., Sha, C., Sun, Y.: Hashed-join: approximate string similarity join with hashing. In: Han, W.-S., Lee, M.L., Muliantara, A., Sanjaya, N.A., Thalheim, B., Zhou, S. (eds.) DASFAA 2014. LNCS, vol. 8505, pp. 217\u2013229. Springer, Heidelberg (2014)"},{"key":"61_CR14","doi-asserted-by":"crossref","unstructured":"Shakhnarovich, G., Viola, P., Darrell, T.: Fast pose estimation with parameter-sensitive hashing. In: Proceedings of the 9th IEEE International Conference on Computer Vision, pp. 750\u2013757. IEEE Press, Nice (2003)","DOI":"10.1109\/ICCV.2003.1238424"},{"key":"61_CR15","doi-asserted-by":"crossref","unstructured":"Indyk, P., Motwani, R.: Approximate nearest neighbors: towards removing the curse of dimensionality. In: Proceedings of the 30th Annual ACM Symposium on Theory of Computing, pp. 604\u2013613. ACM Press, New York (1998)","DOI":"10.1145\/276698.276876"},{"key":"61_CR16","doi-asserted-by":"crossref","unstructured":"Charikar, M.: Similarity estimation techniques from rounding algorithms. In: Proceedings of the 34th Annual ACM Symposium on Theory of Computing, pp. 380\u2013388. ACM Press, Montreal (2002)","DOI":"10.1145\/509907.509965"},{"key":"61_CR17","doi-asserted-by":"crossref","unstructured":"Paula, L.B.D., Villaca\u00b8 R.D.S., Magalhaes, M.F.: Analysis of concept similarity methods applied to an LSH function. In: Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, pp. 547\u2013555. IEEE Press, Munich (2011)","DOI":"10.1109\/COMPSAC.2011.38"},{"issue":"7","key":"61_CR18","doi-asserted-by":"publisher","first-page":"969","DOI":"10.1016\/j.ijar.2008.11.006","volume":"50","author":"R Salakhutdinov","year":"2009","unstructured":"Salakhutdinov, R., Hinton, G.: Semantic hashing. Approximate Reasoning 50(7), 969\u2013978 (2009)","journal-title":"Approximate Reasoning"},{"key":"61_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"735","DOI":"10.1007\/978-3-642-15552-9_53","volume-title":"Computer Vision \u2013 ECCV 2010","author":"R Chaudhry","year":"2010","unstructured":"Chaudhry, R., Ivanov, Y.: Fast approximate nearest neighbor methods for non-euclidean manifolds with applications to human activity analysis in videos. In: Daniilidis, K., Maragos, P., Paragios, N. (eds.) ECCV 2010, Part II. LNCS, vol. 6312, pp. 735\u2013748. Springer, Heidelberg (2010)"},{"key":"61_CR20","unstructured":"Kulis, B., Darrell, T.: Learning to hash with binary reconstructive embeddings. In: Proceedings of 23rd Annual Conference on Neural Information Processing Systems, pp. 1042\u20131050. Curran Associates Press, Vancouver (2009)"},{"key":"61_CR21","unstructured":"Lewis, D.D.: Reuters-21578 text categorization test collection. http:\/\/www.daviddlewis.com\/resources\/testcollections\/reuters21578\/"}],"container-title":["Lecture Notes in Computer Science","Intelligent Computing Theories and Methodologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-22180-9_61","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T23:09:51Z","timestamp":1748560191000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-22180-9_61"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319221793","9783319221809"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-22180-9_61","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"11 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}