{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:00:09Z","timestamp":1772906409724,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,8,19]],"date-time":"2016-08-19T00:00:00Z","timestamp":1471564800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the State Key Laboratory of Software Development Environment","award":["SKLSDE- 2015ZX-04"],"award-info":[{"award-number":["SKLSDE- 2015ZX-04"]}]},{"name":"the National Natural Science Foundation of China","award":["61402026 and 61370125"],"award-info":[{"award-number":["61402026 and 61370125"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,8,19]]},"DOI":"10.1145\/3007669.3007722","type":"proceedings-article","created":{"date-parts":[[2016,12,13]],"date-time":"2016-12-13T14:31:54Z","timestamp":1481639514000},"page":"88-93","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["GKSH"],"prefix":"10.1145","author":[{"given":"Bo","family":"Wu","sequence":"first","affiliation":[{"name":"State Key Lab of Software Development Environment, Beihang University, Beijing, China"}]},{"given":"Bo","family":"Lang","sequence":"additional","affiliation":[{"name":"State Key Lab of Software Development Environment, Beihang University, Beijing, China"}]},{"given":"Yang","family":"Liu","sequence":"additional","affiliation":[{"name":"State Key Lab of Software Development Environment, Beihang University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2016,8,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.410145"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2013.08.010"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.37"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Zhang S Hu M Yang J. Treepi: A novel graph indexing method. IEEE ICDE. 966--975 (2007)  Zhang S Hu M Yang J. Treepi: A novel graph indexing method. IEEE ICDE. 966--975 (2007)","DOI":"10.1109\/ICDE.2007.368955"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24075-6_60"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393347.2396337"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"X Liu J He B Lang. Reciprocal Hash Tables for Nearest Neighbor Search. AAAI 626--632 (2013)   X Liu J He B Lang. Reciprocal Hash Tables for Nearest Neighbor Search. AAAI 626--632 (2013)","DOI":"10.1609\/aaai.v27i1.8582"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/997817.997857"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2013.08.022"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.132"},{"key":"e_1_3_2_1_11_1","first-page":"1753","volume-title":"NIPS","author":"A","year":"2008"},{"key":"e_1_3_2_1_12_1","volume-title":"Proc. CVPR (2010)","author":"Mu Y."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/946247.946721"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"G. Hinton and R. Salakhutdinov. Reducing the imensionality of data with neural network. Science 313(5786) pp.504 (2006)  G. Hinton and R. Salakhutdinov. Reducing the imensionality of data with neural network. Science 313(5786) pp.504 (2006)","DOI":"10.1126\/science.1127647"},{"key":"e_1_3_2_1_15_1","volume-title":"Shih-Fu Chang. Supervised Hashing with Kernels. In Proc. CVPR (2012)","author":"Liu Wei"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.219"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1142\/S021800140900748X"},{"key":"e_1_3_2_1_18_1","unstructured":"S.V.N. Vishwanathan Nicol N. Schraudolph Risi Kondor etal Graph Kernels. Journal of Machine Learning Research pp. 1201--1242 (2010)   S.V.N. Vishwanathan Nicol N. Schraudolph Risi Kondor et al. Graph Kernels. Journal of Machine Learning Research pp. 1201--1242 (2010)"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2010.5539994"},{"key":"e_1_3_2_1_20_1","volume-title":"Introduction PASCAL VOC","author":"Everingham","year":"2012"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88682-2_24"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2012.04.016"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1101149.1101288"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13735-012-0003-7"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1027527.1027531"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2014.07.017"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"X Liu X Fan C Deng Z Li Hao Su D Tao. Multilinear Hyperplane Hashing. IEEE CVPR (2016)  X Liu X Fan C Deng Z Li Hao Su D Tao. Multilinear Hyperplane Hashing. IEEE CVPR (2016)","DOI":"10.1109\/CVPR.2016.553"},{"key":"e_1_3_2_1_29_1","unstructured":"Z Li X Liu\u00e2 J Wu H Su. Adaptive Binary Quantization for Fast Nearest Neighbor Search. ECAI (2016)  Z Li X Liu\u00e2 J Wu H Su. Adaptive Binary Quantization for Fast Nearest Neighbor Search. ECAI (2016)"}],"event":{"name":"ICIMCS'16: International Conference on Internet Multimedia Computing and Service","location":"Xi'an China","acronym":"ICIMCS'16","sponsor":["Xidian University"]},"container-title":["Proceedings of the International Conference on Internet Multimedia Computing and Service"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3007669.3007722","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3007669.3007722","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:39:37Z","timestamp":1750217977000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3007669.3007722"}},"subtitle":["Graph based Image Retrieval using Supervised Kernel Hashing"],"short-title":[],"issued":{"date-parts":[[2016,8,19]]},"references-count":29,"alternative-id":["10.1145\/3007669.3007722","10.1145\/3007669"],"URL":"https:\/\/doi.org\/10.1145\/3007669.3007722","relation":{},"subject":[],"published":{"date-parts":[[2016,8,19]]},"assertion":[{"value":"2016-08-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}