{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:49:29Z","timestamp":1771699769957,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,6,5]],"date-time":"2012-06-05T00:00:00Z","timestamp":1338854400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000145","name":"Division of Information and Intelligent Systems","doi-asserted-by":"publisher","award":["IIS-0917072"],"award-info":[{"award-number":["IIS-0917072"]}],"id":[{"id":"10.13039\/100000145","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,6,5]]},"DOI":"10.1145\/2324796.2324816","type":"proceedings-article","created":{"date-parts":[[2012,7,3]],"date-time":"2012-07-03T11:53:15Z","timestamp":1341316395000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Constrained keypoint quantization"],"prefix":"10.1145","author":[{"given":"Yang","family":"Cai","sequence":"first","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"given":"Wei","family":"Tong","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh"}]},{"given":"Linjun","family":"Yang","sequence":"additional","affiliation":[{"name":"Microsoft Research Asia, Beijing, China"}]},{"given":"Alexander G.","family":"Hauptmann","sequence":"additional","affiliation":[{"name":"Microsoft Research Asia, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2012,6,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"cc_web_video: Near-duplicate web video dataset. available: http:\/\/vireo.cs.cityu.edu.hk\/webvideo\/.  cc_web_video: Near-duplicate web video dataset. available: http:\/\/vireo.cs.cityu.edu.hk\/webvideo\/."},{"key":"e_1_3_2_1_2_1","unstructured":"http:\/\/www.flickr.com.  http:\/\/www.flickr.com."},{"key":"e_1_3_2_1_3_1","unstructured":"http:\/\/www.robots.ox.ac.uk\/~vgg\/data\/oxbuildings.  http:\/\/www.robots.ox.ac.uk\/~vgg\/data\/oxbuildings."},{"key":"e_1_3_2_1_4_1","unstructured":"http:\/\/www.robots.ox.ac.uk\/~vgg\/research\/affine.  http:\/\/www.robots.ox.ac.uk\/~vgg\/research\/affine."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/553876"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2008.4587598"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5244\/C.18.16"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2072298.2072484"},{"key":"e_1_3_2_1_9_1","volume-title":"Workshop on Statistical Learning in Computer Vision","author":"Csurka G.","year":"2004","unstructured":"G. Csurka , C. Dance , L. Fan , J. Willamowski , and C. Bray . Visual categorization with bags of keypoints . Workshop on Statistical Learning in Computer Vision , 2004 . G. Csurka, C. Dance, L. Fan, J. Willamowski, and C. Bray. Visual categorization with bags of keypoints. Workshop on Statistical Learning in Computer Vision, 2004."},{"key":"e_1_3_2_1_10_1","volume-title":"Pattern Classification","author":"Duda R. O.","year":"2000","unstructured":"R. O. Duda , P. E. Hart , and D. G. Stork . Pattern Classification . Wiley-Interscience Publication , 2000 . R. O. Duda, P. E. Hart, and D. G. Stork. Pattern Classification. Wiley-Interscience Publication, 2000."},{"key":"e_1_3_2_1_11_1","author":"Grauman K.","year":"2007","unstructured":"K. Grauman and T. Darrell . The pyramid match kernel: Efficient learning with sets of features. Journal of Machine Learning Research , 2007 . K. Grauman and T. Darrell. The pyramid match kernel: Efficient learning with sets of features. Journal of Machine Learning Research, 2007.","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1963.10500830"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-009-0285-2"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2005.66"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1027527.1027729"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1873951.1874182"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1631058.1631075"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.223"},{"key":"e_1_3_2_1_20_1","volume-title":"International Conference on Computer Vision Theory and Application (VISSAPP'09)","author":"Muja M.","year":"2009","unstructured":"M. Muja and D. G. Lowe . Fast approximate nearest neighbors with automatic algorithm configuration . In International Conference on Computer Vision Theory and Application (VISSAPP'09) , 2009 . M. Muja and D. G. Lowe. Fast approximate nearest neighbors with automatic algorithm configuration. In International Conference on Computer Vision Theory and Application (VISSAPP'09), 2009."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2006.264"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2007.383172"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2008.4587635"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/946247.946751"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2007.4408924"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1291233.1291280"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2072298.2071923"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2011.2162399"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.170"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2008.917359"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/1698924.1699334"}],"event":{"name":"ICMR '12: International Conference on Multimedia Retrieval","location":"Hong Kong China","acronym":"ICMR '12","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 2nd ACM International Conference on Multimedia Retrieval"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2324796.2324816","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2324796.2324816","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:52:09Z","timestamp":1750243929000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2324796.2324816"}},"subtitle":["towards better bag-of-words model for large-scale multimedia retrieval"],"short-title":[],"issued":{"date-parts":[[2012,6,5]]},"references-count":31,"alternative-id":["10.1145\/2324796.2324816","10.1145\/2324796"],"URL":"https:\/\/doi.org\/10.1145\/2324796.2324816","relation":{},"subject":[],"published":{"date-parts":[[2012,6,5]]},"assertion":[{"value":"2012-06-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}