Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2806416.2806632acmconferencesArticle/Chapter ViewAbstractPublication PagescikmConference Proceedingsconference-collections
short-paper

A Fast k-Nearest Neighbor Search Using Query-Specific Signature Selection

Published: 17 October 2015 Publication History

Abstract

k-nearest neighbor (k-NN) search aims at finding k points nearest to a query point in a given dataset. k-NN search is important in various applications, but it becomes extremely expensive in a high-dimensional large dataset. To address this performance issue, locality-sensitive hashing (LSH) is suggested as a method of probabilistic dimension reduction while preserving the relative distances between points. However, the performance of existing LSH schemes is still inconsistent, requiring a large amount of search time in some datasets while the k-NN approximation accuracy is low. In this paper, we target on improving the performance of k-NN search and achieving a consistent k-NN search that performs well in various datasets. In this regard, we propose a novel LSH scheme called Signature Selection LSH (S2LSH). First, we generate a highly diversified signature pool containing signature regions of various sizes and shapes. Then, for a given query point, we rank signature regions of the query and select points in the highly ranked signature regions as k-NN candidates of the query. Extensive experiments show that our approach consistently outperforms the state-of-the-art LSH schemes.

References

[1]
M. S. Charikar. Similarity estimation techniques from rounding algorithms. In STOC, pages 380--388. ACM, 2002.
[2]
M. Datar, N. Immorlica, P. Indyk, and V. S. Mirrokni. Locality-sensitive hashing scheme based on p-stable distributions. In SOCG, pages 253--262. ACM, 2004.
[3]
J. Davidson, B. Liebald, J. Liu, P. Nandy, T. Van Vleet, U. Gargi, S. Gupta, Y. He, M. Lambert, B. Livingston, et al. The youtube video recommendation system. In RecSys, pages 293--296. ACM, 2010.
[4]
J. Gan, J. Feng, Q. Fang, and W. Ng. Locality-sensitive hashing scheme based on dynamic collision counting. In SIGMOD, pages 541--552. ACM, 2012.
[5]
A. Gionis, P. Indyk, R. Motwani, et al. Similarity search in high dimensions via hashing. In VLDB, volume 99, pages 518--529, 1999.
[6]
J.-P. Heo, Y. Lee, J. He, S.-F. Chang, and S.-E. Yoon. Spherical hashing. In CVPR, pages 2957--2964. IEEE, 2012.
[7]
P. Indyk and R. Motwani. Approximate nearest neighbors: towards removing the curse of dimensionality. In STOC, pages 604--613. ACM, 1998.
[8]
Y. Tao, K. Yi, C. Sheng, and P. Kalnis. Quality and efficiency in high dimensional nearest neighbor search. In SIGMOD, pages 563--576. ACM, 2009.

Cited By

View all
  • (2024)A Trajectory-oriented Locality-sensitive Hashing Method for User IdentificationIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2023.3324427(1-14)Online publication date: 2024
  • (2022)Two-Stage Training of Graph Neural Networks for Graph ClassificationNeural Processing Letters10.1007/s11063-022-10985-555:3(2799-2823)Online publication date: 28-Jul-2022
  • (2020) A k ‐nearest neighbor query method based on trust and location privacy protection Concurrency and Computation: Practice and Experience10.1002/cpe.576634:16Online publication date: 6-Apr-2020
  • Show More Cited By

Index Terms

  1. A Fast k-Nearest Neighbor Search Using Query-Specific Signature Selection

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CIKM '15: Proceedings of the 24th ACM International on Conference on Information and Knowledge Management
    October 2015
    1998 pages
    ISBN:9781450337946
    DOI:10.1145/2806416
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 17 October 2015

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. k-nearest neighbor search
    2. locality sensitive hashing

    Qualifiers

    • Short-paper

    Funding Sources

    Conference

    CIKM'15
    Sponsor:

    Acceptance Rates

    CIKM '15 Paper Acceptance Rate 165 of 646 submissions, 26%;
    Overall Acceptance Rate 1,861 of 8,427 submissions, 22%

    Upcoming Conference

    CIKM '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)2
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 14 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)A Trajectory-oriented Locality-sensitive Hashing Method for User IdentificationIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2023.3324427(1-14)Online publication date: 2024
    • (2022)Two-Stage Training of Graph Neural Networks for Graph ClassificationNeural Processing Letters10.1007/s11063-022-10985-555:3(2799-2823)Online publication date: 28-Jul-2022
    • (2020) A k ‐nearest neighbor query method based on trust and location privacy protection Concurrency and Computation: Practice and Experience10.1002/cpe.576634:16Online publication date: 6-Apr-2020
    • (2017)Query-specific signature selection for efficient k-nearest neighbour approximationJournal of Information Science10.1177/016555151664417643:4(440-457)Online publication date: 1-Aug-2017

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media