摘要:
A methodology of highly interactive intra-object relevance feedback is used to retrieve multimedia data from a database. The query object could consist of one or more images, images derived from video, a video sequence, or an audio clip. The query is adjusted using the information fed-back by the user about the relevance of previously extracted part(s) from the object itself, such that the adjusted query is a better approximation to the user's perception. The information fed-back by the user during intra-query modification is used for intra-object learning of the user's perception. The refined query is subsequently used for inter-object relevance feedback where data is retrieved from the database based on parameters learnt by intra-query object feedback mechanism, and the user provides feedback by ranking the retrieved objects in order of their relevance to him or her. In the system according to the invention, inter-object learning of user's perception is expedited by utilizing the learnt parameters in the intra-object relevance feedback. Furthermore, the methodology of the invention allows for building refined queries based on part(s) or sub-sequence(s) of the query object rather than the entire object itself, thereby reducing the number of irrelevant objects, retrieved from the database. The methodology allows synthesis and modification of the input query object itself in the event a query object is not directly available, and, also to learn the user's perception.
摘要:
A user at a client machine can customize components of a database search performed at a server. The user does this by sending executable code to the database server. Software code runs as middleware on the database server machine to communicate between the database server and the client and performs the functions of supplying the client with vital information required for generating code which will be used for customizing various processes of the database retrieval session. Typically, the server comprises a set of database servers and the middleware runs on each database server machine to communicate between the database servers and the client. The middleware provides a virtual machine on which the user-supplied code written in a virtual machine language is executed, giving a uniform interface across the set of database servers on which the same user-supplied code will be executed ensuring that the user-supplied code executes under database server specified access privileges.
摘要:
A method of doing meaningful modifications on an image is presented. These modifications can then be used in variety of applications related to image shape manipulation and similar shape retrieval. The method extracts macrofeatures and microfeature from a given shape. Deformations are done on the macrofeatures only. These deformations are either predefined, or are taken from a deformation library, or are calculated from the shape itself, The microfeatures are then added to the deformed macrofeatures to get a deformed shape. The shape deformations then allow user's perception of shape similarity to be learned, which is reflected in the values of parameters in a parameterized shape similarity metric. The user can use one of the deformed shapes as the initial query point, instead of the shape he or she started with. The shape database compression is achieved by storing only the identification of a similar shape and value of global deformations which will generate this shape approximately, instead of storing every shape feature individually.
摘要:
A method (and system) for guaranteeing authenticity of an object, includes providing a sample of material obtainable only by at least one of chemical and physical processes such that the sample is random and not reproducible, associating a number reproducibly to the sample by using a specific reader, and forming at least one coded version of the number, the at least one coded version being obtained by a key signature, and the version being recorded into an area of the object.
摘要:
A method is presented for marking high-quality digital images with a robust and invisible watermark. It requires the mark to survive and remain detectable and authenticatable through all image manipulations that in themselves do not damage the image beyond useability. These manipulations include JPEG “lossy” compression and, in the extreme, the printing and rescanning of the image. The watermark also has the property that it can detect if the essential contents of the image has changed. The first phase of the method comprises extracting a digest or number N from the image so that N only (or mostly) depends on the essential information content, such that the same number N can be obtained from a scan of a high quality print of the image, from the compressed form of the image, or in general, from the image after minor modifications (introduced inadvertently by processing, noise etc.). The second phase comprises the marking. This can be done in form of an invisible robust watermark, or in form of some visible signature or watermark.
摘要:
A system and method for updating and correcting facts that receives proposed values for facts from users and determines a probability that the user providing the values provides unreliable information.
摘要:
A system and method for updating and correcting facts that receives proposed values for facts from users and determines a correctness score which is used to automatically accept or reject the proposed values.
摘要:
A determination of whether a mapped business listing that is produced as a search result corresponds to an actual location of operation is based on different factors. One factor identifies whether the business listing is associated with a business category that appears as search results for a particular geographic area in numbers that exceed average proportions for the same business category density in similarly situated geographic areas. Another factor determines whether different business listings in the same geographic area include the same identifying data. Specific characteristics of a neighborhood where the business listing is mapped provide an additional factor for identifying whether a search result for a business listing is map spam. The different factors may be considered together to determine the likelihood that a mapped search result is spam.
摘要:
A system and method for managing online map information determines map records that represent more than one map feature by identifying map feature records where at least one attribute of the map feature record has more than value wherein each of the values has a probability of being correct that exceeds a threshold.
摘要:
The present application discloses systems and methods for using probabilistic prioritization to assign human reviewers to review data stored in or indexed by an information system. Some embodiments include accessing an index of data items, where individual data items have a corresponding probability f of having a problem, a cost to review the data item, a penalty if a problem associated with the data item is not remedied, and a gain if a problem associated with the data item is remedied; identifying a subset of data items having a corresponding f that is greater than or equal to a decision threshold based on the data item's corresponding cost, penalty, and gain; and ranking at least a portion of the subset of data items based at least in part on their corresponding cost, f, and gain.