Reversible Sketch Based on the XOR-based Hashing Wenfeng Feng and Qiao Guo

Zhibin Zhang and Zongpu Jia

Network Information Center Beijing Institute of Technology Beijing 100081, China

Department of Computer Science and Technology Henan University of Technology Jiaozuo, Hennan Province 454000, China

{fengwf & guoqiao}@bit.edu.cn

{zhangzhibin & jiazongpu}@hpu.edu.cn

ABSTRACT Sketch is a sub-linear space data structure that can find frequent items (or heavy hitters) with very good accuracy. But the current sketches are not good at the finding speed which is critical in the real-time network monitoring applications, especially in the change detection and anomaly detection. One of the state-of-theart schemas for this question is based on the group testing technique, which sacrifices the storage space and the update speed. Another one is by "modular hashing" and "IP mangling", which is complex and only adapt to IP network traffic. To address this challenge, we provided a novel reversible sketch data structure which had exactly sub-linear finding time proportional to the sketch length at none cost of the storage space and a little cost of the update time, and had even better accuracy than the Count-Min sketch. We introduced the XOR-based hash functions over the Galois field GF({0,1}n, ⊕, ·), and defined the maximum dispersion among hash functions. We chose d nonsingular boolean matrices randomly to implement the random projection from the source address space {0,1}n to the hash address space {0,1}m, and used the inverse matrix of one of the randomly chosen nonsingular matrices to implement the reversal mapping. Based on the reversible sketch, we implemented an algorithm that finds and estimates the frequent items online with good accuracy. The estimate procedure used a two-stage strategy which includes the Identification and the Verification. The Identification step generates the candidate frequent items and the Verification step further verifies these items. Using a large amount of real Internet traffic data from NLANR, the experiments demonstrated great improvement at the finding speed and some improvement at the accuracy over the current representative sketch, e.g. Count-Min sketch. Our preliminary results hint at the possibility of using the reversible sketch as a building block for network anomaly detection and distributed real-time traffic analysis.

Categories and Subject Descriptors E.2.3 [Data]: Data representations .

Storage

Representations

–Hash-table

Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. PM2HW2N’2006, October 2–4, 2006, Torremolinos, (Malaga), Spain. Copyright 2006 ACM 1-58113-000-0/00/0004…$5.00.

General Terms Algorithms, Design, Performance

Keywords data stream, sketch data structure, XOR-based hashing, maximum dispersion, non-singular boolean matrix over GF({0,1}n, ⊕, ·).

1. INTRODUCTION Internet is huge complex network systems which connect huge number of data generators and data consumers. Monitoring and analyzing network traffic accurately in near real time is essential for many network applications. For example, Network anomaly detection systems need to continuously monitoring the traffic in order to uncover anomalous traffic patterns in near real-time, especially those caused by flash crowds, denial-of-service attacks (DoS), worms, and etc. Network traffic engineering systems need to observe the traffic pattern prior to the traffic control or load balance. Network billing systems need to monitor the traffic usage pattern in order to perform usage-based pricing. This paper focus on identifying and estimating heavy hitters online under the assumption that the stream volume is so huge that exactly maintaining each distinct item is infeasible, and the response requirement is real-time so the items can only be processed and analyzed in high speed memory. There are mainly two approaches in this situation: sampling-based and sketchingbased, which can also be called data-driven and universe-driven respectively [5]. Compared to the sampling approach, the sketching approach has such advantages: It supports deletion operation in a multi-set, and is linearity for the combination and subtract of the sketches that used the same parameters and hash functions [6,7]. Sketch is a particularly powerful technique for real-time analysis of the massive, high speed data generated by IP networks. Many sketches have been implemented [2,4,8]. Sketches are probabilistic summary data structures based on the random projection [7]. They are sub-linear in storage space and are adapt to finding frequent items, querying range sums, computing quantiles, and etc. In the networking context, sketch has been successfully applied to detecting (hierarchical) heavy hitters [3] and heavy changes [2,18]. There are mainly four criteria for evaluating the performance of sketches: 1. Fast Update Speed. Sketch should be capable of operating at network line speed on per packet or per flow record basis. Thus per packet or per flow record processing time has to be very fast so that processing can be carried out in real time.

2. Low Storage Space. Although memory and disk is increasingly cheap and plentiful, storing and processing traffic data at per packet speed calls for high speed memory with very small access times. Such memory (such as SRAMs) can be expensive, and so it is desirable that sketch use small space for processing and storing summaries of IP traffic data streams. 3. Fast Finding Speed. The operation of finding and estimating the frequent items should be relatively fast to react to the post processing (such as: anomalous alert, intrusion detection and prevention, traffic controlling, etc.). 4. Good accuracy of finding and estimating frequent items. It's very important that the operation should also give very good accuracy of its output. Fast finding speed is critical for near real time applications such as network anomalous detection, network intrusion detection, network traffic engineering, etc. There are mainly two approaches to achieve this goal in the sketching techniques. The first is based on the group testing technique [12], which sacrifices the storage space and the update speed. Another one [19, 20] is by "modular hashing" and "IP mangling", which is complex and only adapt to IP network traffic. We introduced a novel reversible sketch which chose nonsingular boolean matrices randomly to implement the random projection. The reversible sketch greatly improved the speed of finding and estimating the frequent items with almost none cost of the storage space and a little cost of the update time. The remainder of the paper is organized as follows. In Section 2, we define the problem, give an overview of sketch work, and survey the related work. In Section 3, we describe the reversible sketch. In Section 4, we evaluate the proposed method using synthetical data and real Internet traffic data. We conclude in Section 5.

2. BACKGROUND 2.1 Heavy Hitters in Data Stream The heavy hitters mean the frequent items in data stream. Finding frequent items is a basic problem in data stream and is the block of many other queries and approaches, such as iceberg query[1], network traffic anomaly detection[2], and finding (hierarchical) heavy hitters [3,4]. Let U={0,1}n be the set of n-digit binary numbers. Let Z={zx|x∈U} be the number set indexed by U. U is called the key set and Z is called the value set. zx is initialized to zero for all x∈U. Let S=a1,a2,… be the data stream arrived sequentially. Every data stream item is abstracted as a key-value pair (x,v) and x∈U, v∈Z. When the data stream item (x,v) arrives, the update program zx= zx+v is executed. In this situation, the set Z is defined as the value set dynamically generated by the data stream S. Definition 1. (Heavy Hitters) Let set Z be the value set dynamically generated by the data stream S. Define the L1 norm as Z 1 = ∑ x∈U z x . Fix a threshold Φ (0<Φ≤1), then define

F = {x | x ∈ U ∧ z x ≥ φ Z data stream S.

1

as the heavy hitters decided by the

2.2 Count-Min Sketch

Count-Min (CM) sketch [4] is a representative and efficient sketching technique. Let [U] denote set {0,1,…,U-1}, [W] denote set {0,1,…,W-1}, and fix a prime P>U>W, then H={h(x)=((ax + b) mod P) mod W | x∈[U], a, b∈[P]} is a family of pair-wise independent hash functions from [U] to [W]. By choosing d hash functions h1, … ,hd from H uniformly at random, the random projection from [U] to [W] can be implemented. The Count-Min sketch maintains a two dimensional array C[d][W] in memory. When a data stream item (x, v) arrives, it executes update programs: {for i=1 to d C[i][hi(x)]+=v;}, and it estimates the current frequency of item x by mini(C[i][hi(x)]). The Count-Min sketch is a variation of the Bloom Filter [9] in nature; it reduces the range of hash functions from O(U) to O(logU), and looses the k-wise (k>2 generally) independence to 2-wise independence. It adapt to finding frequent items, querying range sums, finding quantiles, and etc. Its performance is strongly related to and influenced by the skew of the data distribution [10]; when the skew of the data distribution is larger, its efficiency is better, and vice versa. Using the Count-Min sketch as the oracle, by stacking logn Count-Min sketches, we can implement a hierarchical Count-Min sketch. We call it CMH sketch data structure. Based on the CMH sketch, using the divide and conquer strategy and the group testing technique, we can greatly improve the speed of finding the frequent items at the cost of the storage space and update time. Moreover, the CMH sketch can be used to summary the hierarchical structure in data stream [3], which we don’t mention here. We used the CM and CMH sketch as the baseline of evaluating the reversible sketch.

3. OUR APPROACH 3.1 Theory

Definition 2. (XOR-based hash functions) Let U={0,1}n be the

(

n-dimensional binary vector space, and U = U \ {0} is the ndimensional binary vector space except for the zero vector. Let W={0,1}m be the m-dimensional binary vector space. Let Г={0,1}n×m be the set of n×m boolean matrices. For any A∈Г, it can be expressed as bellow: n

 bn −1, m −1 bn −1, m − 2 L bn −1,0   R n −1   bn − 2, m −1 bn − 2, m − 2 L bn − 2,0  . A =  M  =   M M M   R 0    b0, m − 2 L b0,0   b0, m −1 ( And for any x = [ xn −1 , L , x0 ] ∈ U 0 , define a hash function as the

vector-matrix multiplication xA over GF(2)1×n, where multiplication and addition are to be done modulo 2 and are equivalent to the AND and XOR functions, respectively. Define a family of XOR-based hash functions as:

( H = {h( x) = xA | x ∈ U 0 , A ∈ Γ} .

(1)

The hash function can also be expressed as:

h( x) = xA = ⊕ 0≤i ≤ n −1( Ri ⋅ xi ) .

(2)

Proposition 1. The family of XOR-based hash functions H in Definition 2 is pair-wise independent when randomly and uniformly chosen boolean matrices from Г. (The proof is omitted)



Definition 3. (Maximum dispersion) Let h1(x) be a hash function from set U to set W1, h2(x) be a hash function from set U to set W2. If ∀ a ∈ W1, ∀ b ∈ W 2 , { x ∈ U : h1 ( x ) = a } I { x ∈ U : h 2 ( x ) = b } = { x ∈ U : h1 ( x ) = a ∧ h 2 ( x ) = b }

(3) ,

= | U | ( | W 1 || W 2 |)

Before go to the data structure, we introduce some C procedures first, which are essential components of the reversible sketch. 1. isFullRank(unsigned int *A, int m). It judges whether a n×m boolean matrix A is full ranked. If n=m, it judges whether a n×n boolean matrix is nonsingular. 2. Invert(unsigned int *A, int n). It compute the inverse matrix of a a n×n nonsingular boolean matrix A. 3. XorHash(unsigned int x, unsigned int *A, int n). It compute the vector-matrix multiplication of an item key x and a n×n nonsingular boolean matrix A. We define a variable groups= ceil(n/m) as the division of n by

then h1(x) and h2(x) have maximum dispersion between each other.

m.

[21,22] discussed the analogical concept which be expressed by the interbank dispersion of the skewed associated caches. The simultaneous conflict on two hash functions which have maximum dispersion between each other is extraordinary less than those not. We inspired from this idea and used the hash functions which have maximum dispersion between each other to implement the random projection. Although the pair-wise independent hash functions has guaranteed low conflict level with high probability, the hash functions with maximum dispersion between each other should perform better.

Data structure. A reversible sketch includes two parts. First is a three dimensional counter array C[d][groups][W], of which, d is the number of the nonsingular boolean matrices chosen randomly from the space Г={0,1}n×n, groups is the division of n by m, W is the range of the hash functions. Second is the d nonsingular boolean matrices A1,…,Ad, which are randomly chose and stored in an array of unsigned integer random numbers RA[d][n]. Some pseudo random number generators, such as RANROT [13], can be used to generate the random numbers.

Definition 4. (Full-ranked boolean matrix over GF({0,1}n, ⊕, ·)) For any n×m boolean matrix A=[C1,…,Cm], C1,…,Cm ∈ {0,1}n n≥m, if there does not exist a set of coefficients (not all zero) b1,…,bm∈{0,1}, such that b1 ⋅ C1 ⊕ L ⊕ bm ⋅ Cm = 0 , then C1,…,Cm are linearly independent and the boolean matrix A=[C1,…,Cm] is full ranked. If n=m, then the boolean matrix A=[C1,…,Cn] is nonsingular. Proposition

2.

If

a

n×(m1+m2)

boolean

matrix

A = [C1 ,L , Cm1 , L , Cm1 + m2 ] ( n≥m1+m2) is full ranked, and let A1 = [C1 , L , Cm1 ] , A2 = [Cm1 +1 , L , Cm1 + m2 ] , then the hash functions h1 ( x) = xA1 and dispersion between each other.

h2 ( x) = xA2

have

n=m1+m2,

and

Algorithm 1 randomA() Step 1. Generating a pseudo-randomly boolean matrix A uniformly from the boolean matrix space Г={0,1}n×n.

maximum

Step 2. If isFullRank(A,n) then store the matrix A, else reject the matrix A.



Step 3. Looping the Step 1. and Step 2. to generate d nonsingular boolean matrices randomly.

(The proof is omitted) When

Randomly choose d nonsingular boolean matrices. There have been several algorithms to generate random nonsingular boolean matrices on GF({0,1}n, ⊕, ·) uniformly[16,17]. We implemented a simple procedure to choose nonsingular matrices at random from the boolean matrix space Г={0,1}n×n. The procedure cannot promise the uniformity of the randomized chosen, so we lack enough underlying theory to analysis its performance. But the experiments demonstrated no worse than the performance of the Count-Min sketch.

A = [C1 ,L , Cm1 , L , Cm1 + m2 ]

is

nonsingular, then we can compute the inverse matrix of the matrix A. Using the inverse matrix A’, the reverse mapping of the hash functions h1 ( x) = xA1 and h2 ( x) = xA2 can be completed. Consequently, the reverse operation of the sketch can be implemented, that is illustrated at the Estimate procedure in Section 3.2.

3.2 Reversible Sketch The Reversible Sketch (RS) uses d nonsingular matrices A1,…,Ad which are chosen at random from the boolean matrix space Г={0,1}n×n to implement random projection from U={0,1}n to W={0,1}m. According to the constraint of the computer address space, we limit that n≤32, therefore, any boolean vector in U={0,1}n can be stored by an unsigned integer.

For the first chosen nonsingular boolean matrix, we compute its inverse matrix by calling the procedure Invert. Update procedure. When an item (x,v) arrives, which means that the item key x is added by a quantity of v, then v is added to the counters of the counter array C[d][groups][W], and the counters’ addresses are determined by A1,…,Ad. Algorithm 2 Update(x,v) T += v; // T is the current total frequencies of the items, and T=||Z||1 for (i=0;i
for (j=0;j>=m; } } // Update Estimate procedure. We used a two stage strategy to find and estimate the frequent items in data stream. First step is the Identification which used the structure C[0][groups][W] as the identification structure. For any combination of the counters in different groups, if all the counters are larger than the threshold, then it’s a candidate item. The item’s key can be computed by the inverse matrix of the first chosen nonsingular matrix R[0]. Second step is the Verification which used the structure C[1…d1][groups][W] as the verification structure. For every candidate item, it checks whether all the corresponding counters in the verification structure are larger than the threshold. If so, it outputs the item as the frequent item; or else, it rejects the item. Algorithm 3 Verify(key) est = INT_MAX; // initialize a max value for the estimate value for (i=1;i>=m; } }

Experiments were carried out on a 1.7-GHz notebook PC with 512-MB RAM. Experimental Data. We evaluated on two classes of data. 1. Synthetic data sets that were made by using standard routines to draw values from a Zipf distribution with specified parameter z. Each experiment consisted of drawing items from a domain of size U=224. For convenience, we called this kind of data SYN data. 2. The real IP packets data that were collected by the Passive Measurement and Analysis (PMA) project of National Laboratory for Applied Network Research (NLANR). The experiments used the 20010225-020000 trace data in the Auckland-IV data sets, which was an IP header trace captured with a DAG3 system at the University of Auckland Internet uplink by the WAND research group in February 25, 2001[14]. The trace consists of more than 35 millions IP headers and its data format is DAG, which uses 40Bytes to store one IP header. We parsed the DAG records and extracted the source IP address field and destination IP address field from the DAG records. Because the first byte of all the source IP addresses and destination IP addresses was 10, we cut out it from all the IP addresses and got a IP address domain of size U=224. For convenience, we called the source IP address field data SRCIP and the destination IP address field data DSTIP respectively. Accuracy Criteria. We evaluated the accuracy of the reversible sketch through three criteria. 1. Recall. The recall of a query result is the proportion of the frequent items that are found by the algorithm. The recall equals to 100% means that the algorithm identified all the frequent items, and none was missed. From the implementation of the reversible sketch, we knew that the recall of the finding frequent items algorithm is 100%. 2. Precision. The precision is the proportion of items identified by the algorithm that are frequent items. 3. The relative error ratio of the estimated value to the real value, namely Ex = ( zˆ x − z x ) z x .

return est;

We used the average of the relative error ratio Avg ( E x ) and the

} // Verify

maximum of relative error ratio Max( Ex ) as a whole to measure the reversible sketch and its algorithms.

Algorithm 4 Estimate(thresh) // when groups=2 for (i1=0; i1thresh) for (i2=0; i2thresh) { hash=( i1<thresh) output(key); } } // Estimate.

4. EXPERIMENTS AND ANALYSIS We implemented the reversible sketch in C and made use of the public implementations of the Count-Min sketch data structure available from http://www.cs.rutgers.edu/~muthu/ massdal-codeindex.html for comparison, from which we draw much inspiration.

We chose that m=12, d=2, the threshold Φ=0.003, then W=212=4096, groups= ceil(n/m)=2. We gave the same parameters for the CM, CMH, and REV sketches. Especially for the CMH sketch, we gave the granularity=2. Thus, the CM sketch and the REV sketch had almost the same space, and the CMH sketch had more than three times space than the CM and REV sketches. The update time of the CM sketch was the shortest among these three sketches. And the update time of the REV sketch was less than two times of that of the CM sketch, the CMH sketch less than four times. The output time of the CM sketch was the longest among them. And the output time of the REV and CMH sketches reduced four to five magnitudes than that of the CM sketch. From the Table 1, we could conclude that the REV sketch greatly improved the output speed using almost the same space with the CM sketch and less than two times of the update time of the CM sketch. Moreover, the REV sketch is based on the XOR operation, and adapt to the hardware implementation [23]. In the high-speed data stream environments (such as the backbone network), many algorithms have to be implemented with hardware. In this situation, the REV sketch is much more conformable than the CM sketch.

Table. 1 The space, update time, and output time of the CM, CMH, and REV sketches. Sketch

Space(Bytes)

UpTime(ns)

OutTime(us)

CM

65600

320

12000000

CMH

218688

1200

200

(c) The maximum error ratio Figure 1. The accuracy of the CM, CMH, and REV sketches (SRCIP data).

REV 65872 600 1200 Next, we evaluated the accuracy of these three sketches at three aspects: the precision, the average error ratio, and the maximum error ratio. Figure 1(a,b,c) compare the accuracy of the CM, CMH, and REV sketches when the data is SRCIP. Fig.. 2(a,b,c) compare the accuracy of the CM, CMH, and REV sketches when the data is DSTIP. From the figures, we could see that the REV sketch had no less or even better accuracy than that of the CM sketch.

(a) The precision

(a) The precision

(b) The average error ratio

(b) The average error ratio

(c) The maximum error ratio Figure 2. The accuracy of the CM, CMH, and REV sketches (DSTIP data).

5. CONCLUSION In order to reduce the time of finding the frequent items in the sketch data structure, we inspired from the maximum dispersion among hash functions and the nonsingular boolean matrix on GF({0,1}n, ⊕, ·), and implemented a reversible sketch. The reversible sketch greatly improved the finding speed than the CM

sketch at almost none cost of the space and a little cost of the update time. And the accuracy of the reversible sketch was no less than that of the CM sketch, or even better. Moreover, the reversible sketch was based on the XOR operation, and adapted to the hardware implementation, and thus was much valuable in the real-time applications. The future work is to complement the random generation of the nonsingular boolean matrices, and explore the applications of the maximum dispersion concept in other fields such as clustering.

6. REFERENCES

[11] Carter J L, Wegman M N. Universal classes of hash functions[J]. Journal of Computer and System Sciences, 1979, 18(2):143-154. [12] Cormode, G. and S. Muthukrishnan. "What's hot and what's not: tracking most frequent items dynamically." ACM Transactions on Database Sys-tems (TODS) 30.1 (2005): 249-78. [13] http://www.agner.org/random/ [14] http://pma.nlanr.net/Traces/long/auck4.html

[1] Fang, M., et al. "Computing iceberg queries efficiently." Proceedings of the 24rd International Conference on Very Large Data Bases 299-310.

[15] Dharmapurikar S, Krishnamurthy P, Sproull T,et al. Deep packet inspection using parallel Bloom Filters[A], Proceedings of 11th Symposium on High Performance Interconnects[C]. California:IEEE 2003.44-51.

[2] Krishnamurthy, B., et al. "Sketch-based change detection: methods, evaluation, and applications." Proceedings of the 2003 ACM SIGCOMM conference on Internet measurement (2003): 234-247.

[16] Randall D. Efficient Generation of Random Nonsingular Matrices. Random Structures and Algorithms 4.1 (1993): 111-118

[3] Cormode G, Muthukrishnan S, Korn F,et al. Finding hierarchical heavy hitters in data streams[A]. Proceedinds of the International Conference on Very Large Databases[C]. Germany:Springer, 2003.464-475. [4] Cormode G, Muthukrishnan S. An improved data stream summary: the count-min sketch and its applications[J]. Journal of Algorithms, 2005,55(1):58-75. [5] Cormode, G., et al. "Holistic UDAFs at streaming speeds." Proceedings of the 2004 ACM SIGMOD international conference on Management of data (2004): 35-46.

[17] Payne W. H. and McMillen K. L. Orderly enumeration of nonsingular binary matrices applied to text encryption. Communications of the ACM 21.4 (1978): 259-263. [18] Cormode, G. and S. Muthukrishnan. What's new: finding significant differences in network data streams. IEEE/ACM Transactions on Networking, 13.6 (2005): 1219-1232. [19] Schweller R, Chen Y, Parsons E, Gupta A, Memik G, and Zhang Y. Reverse hashing for sketch-based change detection on high-speed networks. Tech. Rep. NWU-CS-2004-45, Northwestern University, 2004.

[6] Gilbert, A., et al. "QuickSAND: Quick summary and analysis of network data." DIMACS, Tech.Repo 43 (2001): 2001.

[20] Schweller R, et al. Reversible sketches for efficient and accurate change detection over network data streams. Proceedings of the 4th ACM SIGCOMM conference on Internet measurement (2004): 207-212.

[7] Muthukrishnan, S. "Data streams: Algorithms and applications, 2003." Manuscript based on invited talk from 14th SODA.Available from http://www.cs.rutgers.edu/muthu/stream-1-1.ps

[21] Vandierendonck H, Bosschere K De. XOR-based hash functions [J]. IEEE Transactions on Computers. 2005, 54(7): 800-812.

[8] Charikar, M., K. Chen, and M. Farach-Colton. "Finding frequent items in data streams." Theoretical Computer Science 312.1 (2004): 3-15. [9] B. H. Bloom. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 13(7):422– 426, 1970. [10] Cormode G, MUTHUKRISHNAN S. Summarizing and mining skewed data streams[A]. Proceedings of SDM[C]. 2005.44–55.

[22] Bodin F, Seznec A. Skewed Associativity Improves Program Performance and Enhances Predictability [J]. IEEE Tranactions on. Computers. 1997, 46(5): 530-544. [23] Dharmapurikar S, Krishnamurthy P, Sproull T,et al. Deep packet inspection using parallel Bloom Filters[A], Proceedings of 11th Symposium on High Performance Interconnects[C]. California:IEEE 2003.44-51.

Reversible Sketch Based on the XOR-based Hashing

proportional to the sketch length at none cost of the storage space and a little cost of the update ... Using a large amount of real Internet traffic data from NLANR,.

386KB Sizes 0 Downloads 307 Views

Recommend Documents

Locality-Sensitive Hashing Scheme Based on Dynamic ...
4.1 Theory of Virtual Rehashing ..... Color The Color dataset contains 68,040 32-dimensional data objects, which are the color histograms of images in the.

Variable Threshold Based Reversible Watermarking
Similarly, Bilal et al. proposed a fast method based on Dynamic Programming. (DP) [6]. ... able to embed depth maps generated through other advanced approaches [21]. ..... [25] http://www.securityhologram.com/about.php. [26] ENHANCING ...

The Sketch - PowerOptions
Feb 11, 2008 - Had “accounting discrepancies”. .... like a small business that's insured by the owner in case the building burns down, your RadioActive Profit.

SPEC Hashing: Similarity Preserving algorithm for Entropy-based ...
This paper presents a novel and fast algorithm for learning binary hash ..... the hypothesis space of decision stumps, which we'll call. H, is bounded. .... One way to optimize the search .... Conference on Computer Vision, 2003. [11] A. Torralba ...

Semantic Hashing -
Deep auto-encoder. Word count vector ... Training. • Pretraining: Mini-baches with 100 cases. • Greedy pretrained with 50 epochs. • The weights were initialized ...

A Sketch-Based Interface for Collaborative Design
tems (e.g., CAD systems), on the other hand, provide con- siderable ... A more flexible approach for sketch- ing 3D shapes of ..... phous elements, such as clouds, fire and water, tradition- .... Human Factors in Computing Systems (1995), pp.

An Agent-Based Paradigm for Free-Hand Sketch ... - Springer Link
R. Serra and R. Cucchiara (Eds.): AI*IA 2009, LNAI 5883, pp. 345–354, 2009. ..... then, it is add- ed, and the system must wait for the next stroke to be introduced: ...

ParSketch: A Sketch-Based Interface for a 2D ...
A theoretical analysis of the efficiency component of ... solid computer models” and the “ability to sketch engineering objects in the freehand mode” were the ... PC screen. The recognition engine cleans up input data and adjusts edges to make.

Sketch-Based Interfaces for Parametric Modelling
Pedro Company ... current CAD tools are not well suited to the initial design stages of product ... GEGROSS is a CASk application than performs an online.

Reversible Adhesion of Particles on Lipid Bilayers ...
Biological membranes partition living organisms and eukaryotic cells into different compartments, each of which having its own function and integrity. Moreover, some organelles, such as the endoplasmic reticulum, are characterized by very complex mem

Semantic Hashing -
Conjugate gradient for fine-tuning. • Reconstructing the code words. • Replacing the stochastic binary values of hidden units with probability. • Code layer close ...

Reversible on-demand cell alignment using ...
E-mail address: [email protected] (S. Takayama). 0142-9612/$ - see front .... dized surface and bulk polymer may not be discrete, but it does convey the ...

Reversible switching of tetra-tert-butyl-azobenzene on ...
sent an attractive route for the development of new tech- nologies ... Fax: +49 30 838 56059. .... hand, the non-planar cis-isomer (free molecule) possesses a.

Complementary Projection Hashing - CiteSeerX
Given a data set X ∈ Rd×n containing n d-dimensional points ..... data set is publicly available 3 and has been used in [7, 25, 15]. ..... ing for large scale search.

sac-reversible-patron.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item.

Reversible Data Hiding
technique, which enables the exact recovery of the original host signal upon extraction of the ... ues in the digital representation of the host signal, e.g. overflows.

Discrete Graph Hashing - Semantic Scholar
matrix trace norm, matrix Frobenius norm, l1 norm, and inner-product operator, respectively. Anchor Graphs. In the discrete graph hashing model, we need to ...

Corruption-Localizing Hashing
Mar 8, 2011 - 2 School of Computer Science, University of Electronic Science and ... known paradigms, such as virus signature detection, which we do not ...

Reversible-Reactions-derivation.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item.

Hashing with Graphs - Sanjiv Kumar
2009) made a strong assumption that data is uniformly distributed. This leads to a simple analytical eigen- function solution of 1-D Laplacians, but the manifold.

CITIZEN'S RECOMMENDATIONS BASED ON THE SPOT OF ...
CITIZEN'S RECOMMENDATIONS BASED ON THE SPOT OF VIOLENCE IN MATIRANGA.pdf. CITIZEN'S RECOMMENDATIONS BASED ON THE SPOT OF VIOLENCE IN MATIRANGA.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying CITIZEN'S RECOMMENDATIONS BASED ON THE SPOT O

CITIZEN'S RECOMMENDATIONS BASED ON THE SPOT OF ...
CITIZEN'S RECOMMENDATIONS BASED ON THE SPOT OF VIOLENCE IN MATIRANGA.pdf. CITIZEN'S RECOMMENDATIONS BASED ON THE SPOT OF ...

Reversible Tote Bag.pdf
with my 1⁄4" sewing machine foot. Begin by cutting two 17" squares. from each of your two fabrics. Then cut four 14" strips of webbing. Now you're ready to start ...