Skip to main content

Predicates and superimposed coding: An application to image recognition

  • Conference paper
  • First Online:
Computational Intelligence Theory and Applications (Fuzzy Days 1997)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1226))

Included in the following conference series:

  • 109 Accesses

Abstract

First of all we show that the evaluation of predicates leads to a classical problem of retrieval on secondary keys. After a brief sketch of the signature file technique we collect some known probabilistic results. This allows us to treat two distinct mathematical models simultaneously. We then consider the so-called false drop probability in the context of key-based image recognition. It is shown that known optimality results do not necessarily remain valid in this situation. This suggests shifting the emphasis from optimizing the false drop probability to optimizing the search time (both aims do not necessarily coincide). Thus we are led to consider a 2-level scheme which is simple compared to other 2-level schemes which have been used before. This scheme can be employed because of a suboptimal choice of parameters. Finally theoretical predictions derived from a somewhat crude abstract model are validated by experimental work carried out on a Smalltalk prototype. Encouraging results are obtained.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chang, W.W., and Schek, H.J. A Signature Access Method for the Starburst Database System. In Proceedings of the 15th International Conference on VLDB (Amsterdam, Aug. 1989), pp. 145–153

    Google Scholar 

  2. Ciaccia, P., and Zezula, P. Estimating Accesses in Partitioned Signature File Organizations. ACM Trans. Inf. Syst., 11, 2, (April 1993), pp. 133–142

    Google Scholar 

  3. Deppisch, U. S-tree: A dynamic balanced signature index for office retrieval. In Proceedings of the ACM Conference on Research and Development in Information Retrieval Pisa, (Sept. 8–10, 1986), pp. 77–87

    Google Scholar 

  4. Falkowski, B.-J. Probabilistic Perceptrons. Neural Networks, 8, 4, (1995), pp. 513–523

    Google Scholar 

  5. Faloutsos, C., and Christodoulakis, S. Signature files: An access method for documents and its analytical performance evaluation. ACM Trans. Off. Inf. Syst., 2, 4, (1984), pp. 267–268

    Google Scholar 

  6. Faloutsos, C., and Christodoulakis, S. Description and performance analysis of signature file methods for office filing. ACM Trans. Off. Inf, Syst., 5, 3, (1987), pp. 237–257

    Google Scholar 

  7. Faloutsos, C. Signature-based text retrieval methods: A survey. In IEEE Computer Society Technical Committee on Data Engineering. Special issue on document retrieval, 13, 1, (March 1990), pp. 25–32

    Google Scholar 

  8. Faloutsos, C., Barber, R., Flickner, M., Hafner, J., Niblack, W., and Petkovic, D. Efficient and Effective Querying by Image Content. J. of Intelligent Information Systems, 3, (1994), pp. 231–262

    Google Scholar 

  9. Forster, O. Analysis 1. Vieweg & Sohn, Braunschweig, Wiesbaden, (1980)

    Google Scholar 

  10. Gray, J.R. Probability. Oliver & Boyd, Edinburgh and London, (1967)

    Google Scholar 

  11. Knuth, D.E. The Art of Computer Programming, Vol. I, Fundamental Algorithms, Reading, MA: Addison-Wesley, (1973)

    Google Scholar 

  12. Knuth, D.E. The Art of Computer Programming, Vol. III Sorting and Searching, Reading MA: Addison-Wesley, (1973)

    Google Scholar 

  13. Lee, D.L., and Leng, C. Partitioned signature files: Design issues and performance evaluation. ACM Trans. Inf. Syst. 7, 2, (April 1989), pp. 158–180

    Google Scholar 

  14. Minsky, M.L., and Papert, S.A. Perceptrons. The MIT Press, (1988)

    Google Scholar 

  15. Roberts, C.S. Partial match retrieval via the method of superimposed codes. Proc. IEEE 67, 12 (Dec. 1979), pp. 1624–1642

    Google Scholar 

  16. Sacks-Davis, R., Kent, A., and Ramamohanarao, K. Multikey Access Methods Based on Superimposed Coding Techniques. ACM Transactions on Database Systems, 12, 4, (December 1987), pp. 655–696

    Google Scholar 

  17. Stiassny, S. Mathematical analysis of various superimposed coding methods. American Documentation 11, 2, (Feb. 1960), pp. 155–169

    Google Scholar 

  18. Zezula, P., Rabbiti, F., and Tiberio, P. Dynamic Partitioning of Signature Files. ACM Trans. Inf. Syst. 9, 4, (Oct. 1991), pp. 336–369

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Bernd Reusch

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Falkowski, BJ. (1997). Predicates and superimposed coding: An application to image recognition. In: Reusch, B. (eds) Computational Intelligence Theory and Applications. Fuzzy Days 1997. Lecture Notes in Computer Science, vol 1226. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-62868-1_117

Download citation

  • DOI: https://doi.org/10.1007/3-540-62868-1_117

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-62868-2

  • Online ISBN: 978-3-540-69031-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics