Predicates and Superimposed Coding: An Application to Image Recognition
暂无分享,去创建一个
[1] Dik Lun Lee,et al. Partitioned signature files: design issues and performance evaluation , 1989, TOIS.
[2] Bernd-Jürgen Falkowski. Probabilistic perceptrons , 1995, Neural Networks.
[3] Christos Faloutsos,et al. Signature files: an access method for documents and its analytical performance evaluation , 1984, TOIS.
[4] Uwe Deppisch,et al. S-tree: a dynamic balanced signature index for office retrieval , 1986, SIGIR '86.
[5] Hans-Jörg Schek,et al. A Signature Access Method for the Starburst Database System , 1989, VLDB.
[6] Kotagiri Ramamohanarao,et al. Multikey access methods based on superimposed coding techniques , 1987, TODS.
[7] Donald E. Knuth,et al. The Art of Computer Programming, Volume I: Fundamental Algorithms, 2nd Edition , 1997 .
[8] C.S. Roberts,et al. Partial-match retrieval via the method of superimposed codes , 1979, Proceedings of the IEEE.
[9] Donald Ervin Knuth,et al. The Art of Computer Programming , 1968 .
[10] Simon Stiassny. Mathematical analysis of various superimposed coding methods , 1960 .
[11] Christos Faloutsos,et al. Description and performance analysis of signature file methods for office filing , 1987, TOIS.
[12] Pavel Zezula,et al. Estimating accesses in partitioned signature file organizations , 1993, TOIS.
[13] Pavel Zezula,et al. Dynamic partitioning of signature files , 1991, TOIS.