{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,8,21]],"date-time":"2023-08-21T17:40:22Z","timestamp":1692639622715},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2017,1,10]],"date-time":"2017-01-10T00:00:00Z","timestamp":1484006400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Comput Vis"],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1007\/s11263-016-0984-4","type":"journal-article","created":{"date-parts":[[2017,1,10]],"date-time":"2017-01-10T08:00:10Z","timestamp":1484035210000},"page":"287-308","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Structured Learning of Binary Codes with Column Generation for Optimizing Ranking Measures"],"prefix":"10.1007","volume":"123","author":[{"given":"Guosheng","family":"Lin","sequence":"first","affiliation":[]},{"given":"Fayao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Chunhua","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Jianxin","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Heng Tao","family":"Shen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,1,10]]},"reference":[{"key":"984_CR1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441","volume-title":"Convex optimization","author":"S Boyd","year":"2004","unstructured":"Boyd, S., & Vandenberghe, L. (2004). Convex optimization. Cambridge: Cambridge University Press."},{"key":"984_CR2","doi-asserted-by":"publisher","unstructured":"Cakir, F., & Sclaroff, S. (2015). Adaptive hashing for fast similarity search. In Proceedings of the international conference on computer vision.","DOI":"10.1109\/ICCV.2015.125"},{"key":"984_CR3","doi-asserted-by":"publisher","unstructured":"Chakrabarti, S., Khanna, R., Sawant, U., & Bhattacharyya, C. (2008). Structured learning for non-smooth ranking losses. In Proceedings of the ACM knowledge discovery and data mining.","DOI":"10.1145\/1401890.1401906"},{"key":"984_CR4","doi-asserted-by":"publisher","unstructured":"Dean, T., Ruzon, M. A., Segal, M., Shlens, J., Vijayanarasimhan, S., & Yagnik, J. (2013). Fast, accurate detection of 100,000 object classes on a single machine. In Proceedings of the international conference on computer vision and pattern recognition.","DOI":"10.1109\/CVPR.2013.237"},{"key":"984_CR5","doi-asserted-by":"publisher","unstructured":"Demiriz, A., Bennett, K. P., & Shawe-Taylor, J. (2002). Linear programming boosting via column generation. Machine Learning, 46(1\u20133), 225\u2013254.","DOI":"10.1023\/A:1012470815092"},{"key":"984_CR6","unstructured":"Gionis, A., Indyk, P., & Motwani, R. (1999). Similarity search in high dimensions via hashing. In Proceedings of the international conference on very large data bases."},{"key":"984_CR7","doi-asserted-by":"publisher","unstructured":"Gong, Y., Lazebnik, S., Gordo, A., & Perronnin, F. (2013). Iterative quantization: A procrustean approach to learning binary codes for large-scale image retrieval. IEEE Transactions on Pattern Analysis and Machine Intelligence, 35(12), 2916\u20132929.","DOI":"10.1109\/TPAMI.2012.193"},{"key":"984_CR8","unstructured":"Heo, J., Lee, Y., He, J., Chang, S., & Yoon, S. (2012). Spherical hashing. In Proceedings of the international conference on computer vision and pattern recognition."},{"key":"984_CR9","doi-asserted-by":"crossref","unstructured":"J\u00e4rvelin, K., & Kek\u00e4l\u00e4inen, J. (2000). IR evaluation methods for retrieving highly relevant documents. In Proceedings of the ACM conference on SIGIR.","DOI":"10.1145\/345508.345545"},{"key":"984_CR10","doi-asserted-by":"publisher","unstructured":"Joachims, T. (2005). A support vector method for multivariate performance measures. In Proceedings of the international conference on machine learning.","DOI":"10.1145\/1102351.1102399"},{"key":"984_CR11","doi-asserted-by":"publisher","unstructured":"Joachims, T. (2006). Training linear SVMs in linear time. In Proceedings of the ACM knowledge discovery and data mining.","DOI":"10.1145\/1150402.1150429"},{"key":"984_CR12","doi-asserted-by":"publisher","unstructured":"Kelley, J. E., Jr. (1960). The cutting-plane method for solving convex programs. Journal of the Society for Industrial and Applied Mathematics, 8(4), 703\u2013712.","DOI":"10.1137\/0108053"},{"key":"984_CR13","unstructured":"Kulis, B., & Darrell, T. (2009). Learning to hash with binary reconstructive embeddings. In Proceedings of advances in neural information processing systems."},{"key":"984_CR14","doi-asserted-by":"publisher","unstructured":"Kulis, B., & Grauman, K. (2012). Kernelized locality-sensitive hashing. IEEE Transactions on Pattern Analysis and Machine Intelligence, 34(6), 1092\u20131104.","DOI":"10.1109\/TPAMI.2011.219"},{"key":"984_CR15","unstructured":"Li, X., Lin, G., Shen, C., van den Hengel, A., & Dick, A. (2013). Learning hash functions using column generation. In Proceedings of international conference on machine learning."},{"key":"984_CR16","unstructured":"Lim, D., & Lanckriet, G. (2014). Efficient learning of mahalanobis metrics for ranking. In Proceedings of the international conference on machine learning."},{"key":"984_CR17","doi-asserted-by":"publisher","unstructured":"Lin, G., Shen, C., & Wu, J. (2014a). Optimizing ranking measures for compact binary code learning. In Proceedings of the European conference on computer vision.","DOI":"10.1007\/978-3-319-10578-9_40"},{"key":"984_CR18","doi-asserted-by":"publisher","unstructured":"Lin, G., Shen, C., Shi, Q., van den Hengel, A., & Suter, D. (2014b). Fast supervised hashing with decision trees for high-dimensional data. In Proceedings of the international conference on computer vision and pattern recognition , Columbus, OH, USA.","DOI":"10.1109\/CVPR.2014.253"},{"key":"984_CR19","doi-asserted-by":"publisher","unstructured":"Lin, G., Shen, C., Suter, D., & van den Hengel, A. (2013). A general two-step approach to learning-based hashing. In Proceedings of the international conference on computer vision, Sydney, Australia.","DOI":"10.1109\/ICCV.2013.317"},{"key":"984_CR20","unstructured":"Liu, W., Wang, J., Ji, R., Jiang, Y. G., & Chang, S. F. (2012). Supervised hashing with kernels. Proceedings of the international conference on computer vision and pattern recognition."},{"key":"984_CR21","unstructured":"Liu, W., Wang, J., Kumar, S., & Chang, S. F. (2011). Hashing with graphs. In Proceedings of the international conference on machine learning."},{"key":"984_CR22","unstructured":"McFee, B., & Lanckriet, G. R. G. (2010). Metric learning to rank. In Proceedings of the international conference on machine learning."},{"key":"984_CR23","unstructured":"MOSEK ApS. (2015). The MOSEK optimization toolbox for MATLAB manual. Version 7.1 (Revision 28)."},{"key":"984_CR24","unstructured":"Norouzi, M., & Fleet, D. J. (2011). Minimal loss hashing for compact binary codes. In Proceedings of the international conference on machine learning (pp. 353\u2013360)."},{"key":"984_CR25","unstructured":"Norouzi, M., Fleet, D. J., & Salakhutdinov, R. (2012). Hamming distance metric learning. In Proceedings of the advances in neural information processing systems."},{"key":"984_CR26","unstructured":"Schultz, M., & Joachims, T. (2004). Learning a distance metric from relative comparisons. In Proceedings of advances in neural information processing systems."},{"key":"984_CR27","unstructured":"Shalit, U., Weinshall, D., & Chechik, G. (2012). Online learning in the embedded manifold of low-rank matrices. Journal of Machine Learning Research, 13, 429\u2013458."},{"key":"984_CR28","unstructured":"Shen, C., Kim, J., Wang, L., & van den Hengel, A. (2012). Positive semidefinite metric learning using boosting-like algorithms. Journal of Machine Learning Research, 13, 1007\u20131036."},{"key":"984_CR29","doi-asserted-by":"publisher","unstructured":"Shen, C., & Li, H. (2010). On the dual formulation of boosting algorithms. IEEE Transactions on Pattern Analysis and Machine Intelligence, 32(12), 2216\u20132231.","DOI":"10.1109\/TPAMI.2010.47"},{"key":"984_CR30","doi-asserted-by":"publisher","unstructured":"Shen, C., Lin, G., & van den Hengel, A. (2014). StructBoost: Boosting methods for predicting structured output variables. IEEE Transactions on Pattern Analysis and Machine Intelligence, 36(10), 2089\u20132103.","DOI":"10.1109\/TPAMI.2014.2315792"},{"key":"984_CR31","doi-asserted-by":"publisher","unstructured":"Shen, F., Shen, C., Liu, W., & Shen, H. T. (2015). Supervised discrete hashing. In Proceedings of the international conference on computer vision and pattern recognition.","DOI":"10.1109\/CVPR.2015.7298598"},{"key":"984_CR32","doi-asserted-by":"publisher","unstructured":"Shen, F., Shen, C., Shi, Q., van den Hengel, A., & Tang, Z. (2013). Inductive hashing on manifolds. In Proceedings of the international conference on computer vision and pattern recognition, Oregon, USA.","DOI":"10.1109\/CVPR.2013.205"},{"key":"984_CR33","doi-asserted-by":"publisher","unstructured":"Strecha, C., Bronstein, A. M., Bronstein, M. M., & Fua, P. (2012). LDAHash: Improved matching with smaller descriptors. IEEE Transactions on Pattern Analysis and Machine Intelligence, 34(1), 66\u201378.","DOI":"10.1109\/TPAMI.2011.103"},{"key":"984_CR34","doi-asserted-by":"publisher","unstructured":"Torralba, A., Fergus, R., & Weiss, Y. (2008). Small codes and large image databases for recognition. In Proceedings of the international conference on computer vision and pattern recognition.","DOI":"10.1109\/CVPR.2008.4587633"},{"key":"984_CR35","doi-asserted-by":"publisher","unstructured":"Wang, J., Kumar, S., & Chang, S.-F. (2012). Semi-supervised hashing for large-scale search. IEEE Transactions on Pattern Analysis and Machine Intelligence, 34(12), 2393\u20132406.","DOI":"10.1109\/TPAMI.2012.48"},{"key":"984_CR36","unstructured":"Wang, J., Shen, H. T., Song, J. & Ji, J. (2014). Hashing for similarity search: A survey. CoRR. arXiv:1408.2927 ."},{"key":"984_CR37","unstructured":"Wang, Q., Zhang, Z., & Si, L. (2015). Ranking preserving hashing for fast similarity search. In Proceedings of the international joint conference on artificial Intelligence, 34(12), 2393\u20132406."},{"key":"984_CR38","doi-asserted-by":"publisher","unstructured":"Weiss, Y., Fergus, R., & Torralba, A. (2012). Multidimensional spectral hashing. In Proceedings of the European conference on computer vision.","DOI":"10.1007\/978-3-642-33715-4_25"},{"key":"984_CR39","unstructured":"Weiss, Y., Torralba, A., & Fergus, R. (2008). Spectral hashing. In Proceedings of advances in neural information processing systems."},{"key":"984_CR40","doi-asserted-by":"publisher","unstructured":"Weston, J., Bengio, S., & Usunier, N. (2010). Large scale image annotation: Learning to rank with joint word-image embeddings. Machine Learning, 81(1), 21\u201335.","DOI":"10.1007\/s10994-010-5198-3"},{"key":"984_CR41","doi-asserted-by":"publisher","unstructured":"Yue, Y., Finley, T., Radlinski, F., & Joachims, T. (2007). A support vector method for optimizing average precision. In Proceedings of the ACM conference on SIGIR.","DOI":"10.1145\/1277741.1277790"},{"key":"984_CR42","unstructured":"Zhang, D., Wang, J., Cai, D., & Lu, J. (2010). Extensions to self-taught hashing: Kernelisation and supervision. In Proceedings of the ACM conference on SIGIR workshop."},{"key":"984_CR43","doi-asserted-by":"publisher","unstructured":"Zhu, C., Byrd, R. H., Lu, P., & Nocedal, J. (1997). Algorithm 778: L-BFGS-B: Fortran subroutines for large-scale bound-constrained optimization. ACM Transactions on Mathematical Software, 23(4), 550\u2013560.","DOI":"10.1145\/279232.279236"}],"container-title":["International Journal of Computer Vision"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11263-016-0984-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11263-016-0984-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11263-016-0984-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,21]],"date-time":"2023-08-21T17:17:55Z","timestamp":1692638275000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11263-016-0984-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1,10]]},"references-count":43,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,6]]}},"alternative-id":["984"],"URL":"https:\/\/doi.org\/10.1007\/s11263-016-0984-4","relation":{},"ISSN":["0920-5691","1573-1405"],"issn-type":[{"value":"0920-5691","type":"print"},{"value":"1573-1405","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,1,10]]}}}