{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:28:41Z","timestamp":1750307321563,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,4,18]],"date-time":"2011-04-18T00:00:00Z","timestamp":1303084800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-07-51078"],"award-info":[{"award-number":["CNS-07-51078"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,4,18]]},"DOI":"10.1145\/1991996.1992012","type":"proceedings-article","created":{"date-parts":[[2011,6,6]],"date-time":"2011-06-06T11:53:52Z","timestamp":1307361232000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":35,"title":["Lost in binarization"],"prefix":"10.1145","author":[{"given":"Yu-Gang","family":"Jiang","sequence":"first","affiliation":[{"name":"Columbia University, New York, NY"}]},{"given":"Jun","family":"Wang","sequence":"additional","affiliation":[{"name":"IBM T. J. Watson Research Center, Yorktown Heights, NY"}]},{"given":"Shih-Fu","family":"Chang","sequence":"additional","affiliation":[{"name":"Columbia University, New York, NY"}]}],"member":"320","published-online":{"date-parts":[[2011,4,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/361002.361007"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1646396.1646452"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206531"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1348246.1348248"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-1809.1936.tb02137.x"},{"key":"e_1_3_2_1_6_1","volume-title":"NIPS.","author":"Goldberger J.","year":"2004","unstructured":"J. Goldberger , S. Roweis , G. Hinton , and R. Salakhutdinov . Neighbourhood components analysis . In NIPS. 2004 . J. Goldberger, S. Roweis, G. Hinton, and R. Salakhutdinov. Neighbourhood components analysis. In NIPS. 2004."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1162\/089976602760128018"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1127647"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1459359.1459449"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1201\/9781420035315.ch39"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/276698.276876"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2009.5459419"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-009-0285-2"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282280.1282352"},{"key":"e_1_3_2_1_15_1","volume-title":"NIPS","author":"Kulis B.","year":"2009","unstructured":"B. Kulis and T. Darrell . Learning to hash with binary reconstructive embeddings . In NIPS , 2009 . B. Kulis and T. Darrell. Learning to hash with binary reconstructive embeddings. In NIPS, 2009."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2009.5459466"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88688-4_27"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"key":"e_1_3_2_1_19_1","volume-title":"VISAPP","author":"Muja M.","year":"2009","unstructured":"M. Muja and D. G. Lowe . Fast approximate nearest neighbors with automatic algorithm configuration . In VISAPP , 2009 . M. Muja and D. G. Lowe. Fast approximate nearest neighbors with automatic algorithm configuration. In VISAPP, 2009."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2006.264"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011139631724"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1027527.1027650"},{"key":"e_1_3_2_1_23_1","volume-title":"SIGIR Workshop","author":"Salakhutdinov R.","year":"2007","unstructured":"R. Salakhutdinov and G. Hinton . Semantic hashing . SIGIR Workshop , 2007 . R. Salakhutdinov and G. Hinton. Semantic hashing. SIGIR Workshop, 2007."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/946247.946721"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/946247.946751"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.895972"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/244130.244151"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.128"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2008.4587633"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2010.5539994"},{"key":"e_1_3_2_1_31_1","volume-title":"ICML","author":"Wang J.","year":"2010","unstructured":"J. Wang , S. Kumar , and S.-F. Chang . Sequential projection learning for hashing with compact codes . In ICML , 2010 . J. Wang, S. Kumar, and S.-F. Chang. Sequential projection learning for hashing with compact codes. In ICML, 2010."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2006.58"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390156.1390302"},{"key":"e_1_3_2_1_34_1","volume-title":"NIPS","author":"Weiss Y.","year":"2008","unstructured":"Y. Weiss , A. Torralba , and R. Fergus . Spectral hashing . In NIPS , 2008 . Y. Weiss, A. Torralba, and R. Fergus. Spectral hashing. In NIPS, 2008."},{"key":"e_1_3_2_1_35_1","first-page":"521","volume-title":"NIPS","author":"Xing E.","year":"2003","unstructured":"E. Xing , A. Ng , M. Jordan , and S. Russell . Distance metric learning with application to clustering with side-information . NIPS , pages 521 -- 528 , 2003 . E. Xing, A. Ng, M. Jordan, and S. Russell. Distance metric learning with application to clustering with side-information. NIPS, pages 521--528, 2003."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1386352.1386367"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1132956.1132959"}],"event":{"name":"ICMR'11: International Conference on Multimedia Retrieval","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Trento Italy","acronym":"ICMR'11"},"container-title":["Proceedings of the 1st ACM International Conference on Multimedia Retrieval"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1991996.1992012","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1991996.1992012","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:05:54Z","timestamp":1750244754000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1991996.1992012"}},"subtitle":["query-adaptive ranking for similar image search with compact codes"],"short-title":[],"issued":{"date-parts":[[2011,4,18]]},"references-count":37,"alternative-id":["10.1145\/1991996.1992012","10.1145\/1991996"],"URL":"https:\/\/doi.org\/10.1145\/1991996.1992012","relation":{},"subject":[],"published":{"date-parts":[[2011,4,18]]},"assertion":[{"value":"2011-04-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}