Key points are not available for this paper at this time.
Secondary clustering as a cause of hash code inefficiency is discussed, and a new hashing method based on its eliminiation is presented. Comparisons with previous methods are made both analytically and empirically.
Building similarity graph...
Analyzing shared references across papers
Loading...
James Bell (Sun,) studied this question.
www.synapsesocial.com/papers/6a07ee5509b3c820153787b5 — DOI: https://doi.org/10.1145/362007.362040
James Bell
Communications of the ACM
Digital Wave (United States)
Building similarity graph...
Analyzing shared references across papers
Loading...