Proceedings ArticleDOI
On the resemblance and containment of documents
TLDR
The basic idea is to reduce these issues to set intersection problems that can be easily evaluated by a process of random sampling that could be done independently for each document.Abstract:
Given two documents A and B we define two mathematical notions: their resemblance r(A, B) and their containment c(A, B) that seem to capture well the informal notions of "roughly the same" and "roughly contained." The basic idea is to reduce these issues to set intersection problems that can be easily evaluated by a process of random sampling that can be done independently for each document. Furthermore, the resemblance can be evaluated using a fixed size sample for each document. This paper discusses the mathematical properties of these measures and the efficient implementation of the sampling process using Rabin (1981) fingerprints.read more
Citations
More filters
Proceedings ArticleDOI
TAPER: tiered approach for eliminating redundancy in replica synchronization
TL;DR: Through extensive experiments, it is observed that in comparison with rsync, a widely-used directory synchronization tool, TAPER reduces bandwidth by 15% to 71%, performs faster matching, and scales to a larger number of replicas.
Proceedings ArticleDOI
Speeding up the Xbox recommender system using a euclidean transformation for inner-product spaces
Yoram Bachrach,Yehuda Finkelstein,Ran Gilad-Bachrach,Liran Katzir,Noam Koenigstein,Nir Nice,Ulrich Paquet +6 more
TL;DR: This work proposes a novel order preserving transformation, mapping the maximum inner product search problem to Euclidean space nearest neighbor search problem, and studies the efficiency of several (approximate) nearest neighbor data structures.
Journal ArticleDOI
Data Mining the Web: Uncovering Patterns in Web Content, Structure, and Usage
Zdravko Markov,Daniel T. Larose +1 more
TL;DR: The author revealed how the A Priori Algorithm and the MDL-Based Model Evaluation techniques improved the efficiency of the Web Usage Mining process and also revealed new ideas about how to improve the quality of the search process.
Book
Visual Object Recognition
Kristen Grauman,Bastian Leibe +1 more
TL;DR: This lecture summarizes what is and isn't possible to do reliably today, and overviews key concepts that could be employed in systems requiring visual categorization, with an emphasis on recent advances in the field.
ODISSEA: A Peer-to-Peer Architecture for Scalable Web Search and Information Retrieval.
Torsten Suel,Chandan Mathur,Jo-wen Wu,Jiangong Zhang,Alex Delis,Mehdi Kharrazi,Xiaohui Long,Xiaohui Long,Kulesh Shanmugasundaram +8 more
TL;DR: A prototype system called ODISSEA (Open DIStributed Search Engine Architecture) is described, which provides a highly distributed global indexing and query execution service that can be used for content residing inside or outside of a P2P network.
References
More filters
Book
The Probabilistic Method
TL;DR: A particular set of problems - all dealing with “good” colorings of an underlying set of points relative to a given family of sets - is explored.
Journal ArticleDOI
Syntactic clustering of the Web
TL;DR: An efficient way to determine the syntactic similarity of files is developed and applied to every document on the World Wide Web, and a clustering of all the documents that are syntactically similar is built.
Journal ArticleDOI
Min-Wise Independent Permutations
TL;DR: This research was motivated by the fact that such a family of permutations is essential to the algorithm used in practice by the AltaVista web index software to detect and filter near-duplicate documents.
Proceedings Article
Finding similar files in a large file system
TL;DR: Application of sif can be found in file management, information collecting, program reuse, file synchronization, data compression, and maybe even plagiarism detection.
Proceedings ArticleDOI
Copy detection mechanisms for digital documents
TL;DR: This paper proposes a system for registering documents and then detecting copies, either complete copies or partial copies, and describes algorithms for such detection, and metrics required for evaluating detection mechanisms (covering accuracy, efficiency, and security).