Author of the publication

Mobile product search with Bag of Hash Bits and boundary reranking.

, , , , , , and . CVPR, page 3005-3012. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

People Search within an Online Social Network: Large Scale Analysis of Facebook Graph Search Query Logs., , , , and . CIKM, page 1009-1018. ACM, (2014)Two medium access control schemes for DS-CDMA personal communication networks., and . PIMRC, page 1373-1377. IEEE, (1998)Reciprocal Hash Tables for Nearest Neighbor Search., , and . AAAI, page 626-632. AAAI Press, (2013)The Analysis of Influence Factors of the Confidence Level on University Students' Network Shopping., and . CIS, page 837-841. IEEE Computer Society, (2011)Performance of Voice/Data Integration for Two MAC Protocols in DS-CDMA Wireless Networks., , and . ICNP, page 319-326. IEEE Computer Society, (1998)Spherical hashing., , , , and . CVPR, page 2957-2964. IEEE Computer Society, (2012)Rich Human Feedback for Text-to-Image Generation., , , , , , , , , and 8 other author(s). CoRR, (2023)Multiple feature kernel hashing for large-scale visual search., , and . Pattern Recognit., 47 (2): 748-757 (2014)Differentially Private Heatmaps., , , , , , and . AAAI, page 7696-7704. AAAI Press, (2023)On-Device Few-Shot Personalization for Real-Time Gaze Estimation., , , , , , and . ICCV Workshops, page 1149-1158. IEEE, (2019)