Abstract
First of all we show that the evaluation of predicates leads to a classical problem of retrieval on secondary keys. After a brief sketch of the signature file technique we collect some known probabilistic results. This allows us to treat two distinct mathematical models simultaneously. We then consider the so-called false drop probability in the context of key-based image recognition. It is shown that known optimality results do not necessarily remain valid in this situation. This suggests shifting the emphasis from optimizing the false drop probability to optimizing the search time (both aims do not necessarily coincide). Thus we are led to consider a 2-level scheme which is simple compared to other 2-level schemes which have been used before. This scheme can be employed because of a suboptimal choice of parameters. Finally theoretical predictions derived from a somewhat crude abstract model are validated by experimental work carried out on a Smalltalk prototype. Encouraging results are obtained.
Preview
Unable to display preview. Download preview PDF.
References
Chang, W.W., and Schek, H.J. A Signature Access Method for the Starburst Database System. In Proceedings of the 15th International Conference on VLDB (Amsterdam, Aug. 1989), pp. 145–153
Ciaccia, P., and Zezula, P. Estimating Accesses in Partitioned Signature File Organizations. ACM Trans. Inf. Syst., 11, 2, (April 1993), pp. 133–142
Deppisch, U. S-tree: A dynamic balanced signature index for office retrieval. In Proceedings of the ACM Conference on Research and Development in Information Retrieval Pisa, (Sept. 8–10, 1986), pp. 77–87
Falkowski, B.-J. Probabilistic Perceptrons. Neural Networks, 8, 4, (1995), pp. 513–523
Faloutsos, C., and Christodoulakis, S. Signature files: An access method for documents and its analytical performance evaluation. ACM Trans. Off. Inf. Syst., 2, 4, (1984), pp. 267–268
Faloutsos, C., and Christodoulakis, S. Description and performance analysis of signature file methods for office filing. ACM Trans. Off. Inf, Syst., 5, 3, (1987), pp. 237–257
Faloutsos, C. Signature-based text retrieval methods: A survey. In IEEE Computer Society Technical Committee on Data Engineering. Special issue on document retrieval, 13, 1, (March 1990), pp. 25–32
Faloutsos, C., Barber, R., Flickner, M., Hafner, J., Niblack, W., and Petkovic, D. Efficient and Effective Querying by Image Content. J. of Intelligent Information Systems, 3, (1994), pp. 231–262
Forster, O. Analysis 1. Vieweg & Sohn, Braunschweig, Wiesbaden, (1980)
Gray, J.R. Probability. Oliver & Boyd, Edinburgh and London, (1967)
Knuth, D.E. The Art of Computer Programming, Vol. I, Fundamental Algorithms, Reading, MA: Addison-Wesley, (1973)
Knuth, D.E. The Art of Computer Programming, Vol. III Sorting and Searching, Reading MA: Addison-Wesley, (1973)
Lee, D.L., and Leng, C. Partitioned signature files: Design issues and performance evaluation. ACM Trans. Inf. Syst. 7, 2, (April 1989), pp. 158–180
Minsky, M.L., and Papert, S.A. Perceptrons. The MIT Press, (1988)
Roberts, C.S. Partial match retrieval via the method of superimposed codes. Proc. IEEE 67, 12 (Dec. 1979), pp. 1624–1642
Sacks-Davis, R., Kent, A., and Ramamohanarao, K. Multikey Access Methods Based on Superimposed Coding Techniques. ACM Transactions on Database Systems, 12, 4, (December 1987), pp. 655–696
Stiassny, S. Mathematical analysis of various superimposed coding methods. American Documentation 11, 2, (Feb. 1960), pp. 155–169
Zezula, P., Rabbiti, F., and Tiberio, P. Dynamic Partitioning of Signature Files. ACM Trans. Inf. Syst. 9, 4, (Oct. 1991), pp. 336–369
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1997 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Falkowski, BJ. (1997). Predicates and superimposed coding: An application to image recognition. In: Reusch, B. (eds) Computational Intelligence Theory and Applications. Fuzzy Days 1997. Lecture Notes in Computer Science, vol 1226. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-62868-1_117
Download citation
DOI: https://doi.org/10.1007/3-540-62868-1_117
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-62868-2
Online ISBN: 978-3-540-69031-3
eBook Packages: Springer Book Archive