• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Liu Yan, Hao Zhongxiao. A Δ-Tree Based Similarity Join Processing for High-Dimensional Data[J]. Journal of Computer Research and Development, 2009, 46(6): 995-1002.
Citation: Liu Yan, Hao Zhongxiao. A Δ-Tree Based Similarity Join Processing for High-Dimensional Data[J]. Journal of Computer Research and Development, 2009, 46(6): 995-1002.

A Δ-Tree Based Similarity Join Processing for High-Dimensional Data

More Information
  • Published Date: June 14, 2009
  • The similarity join, an important data mining primitive, can be successfully applied to speeding up applications such as similarity search, data analysis and data mining. So far most of researches focus on the execution of high-dimensional joins over large amounts of disk based data. The increasing sizes of main memory available on current computers, and the need for efficient processing of spatial joins suggest that spatial joins for a large class of problems can be processed in main memory. Δ-tree is a novel multi-level index structure, it can speed up the high-dimensional query in main memory environment and has been proven to be an efficient index method. Each level in the Δ-tree represents the data space at different dimensionalities: the number of dimensions increases towards the leaf level which contains the data at their full dimensions. The remaining dimensions are obtained using principal component analysis. Using the properties of Δ-tree, a similarity join algorithm on the basis of index structure Δ-tree, Δ-tree-join, is presented. The top-down scheme can use fewer number of dimensions, compute the distances and efficiently complete join processing. Experimental results indicate that Δ-tree-join outperforms the state-of-the-art algorithm, EGO-join, and EGO\+*-join by a wide margin, and is an efficient similarity join method.
  • Related Articles

    [1]Chen Yanmin, Wang Hao, Ma Jianhui, Du Dongfang, Zhao Hongke. A Hierarchical Attention Mechanism Framework for Internet Credit Evaluation[J]. Journal of Computer Research and Development, 2020, 57(8): 1755-1768. DOI: 10.7544/issn1000-1239.2020.20200217
    [2]Shen Jianliang, Li Sikun, Liu Lei, Wang Guanwu, Wang Xin, Liu Qinrang. Hierarchical Configuration Memory Design for Coarse-Grained Reconfigurable SoC[J]. Journal of Computer Research and Development, 2017, 54(5): 1121-1129. DOI: 10.7544/issn1000-1239.2017.20150889
    [3]Hou Xiaofeng, Song Pengtao, Tang Weichao, Li Chao, Liang Xiaoyao. Green Hierarchical Management for Distributed Datacenter Containers[J]. Journal of Computer Research and Development, 2016, 53(7): 1493-1502. DOI: 10.7544/issn1000-1239.2016.20160119
    [4]Zhao Bo, Huang Shujian, Dai Xinyu, Yuan Chunfeng, Huang Yihua. Parallel Algorithm for Hierarchical Phrase Machine Translation Based on Distributed Memory Storage[J]. Journal of Computer Research and Development, 2014, 51(12): 2724-2732. DOI: 10.7544/issn1000-1239.2014.20131335
    [5]Chen Shuming, Chen Shenggang, and Yin Yaming. Revisiting Amdahl’s Law in the Hierarchical Chip Multicore Processors[J]. Journal of Computer Research and Development, 2012, 49(1): 83-92.
    [6]Mu Chengpo, Huang Houkuan, Tian Shengfeng. Hierarchical Online Risk Assessment for Intrusion Scenarios[J]. Journal of Computer Research and Development, 2010, 47(10): 1724-1732.
    [7]Zhang Gang, Liu Yue, Guo Jiafeng, and Cheng Xueqi. A Hierarchical Search Result Clustering Method[J]. Journal of Computer Research and Development, 2008, 45(3): 542-547.
    [8]Zhang Hanwen, Zhang Yujun, Tian Ye, Xiao Wenshu, Li Zhongcheng. Hierarchical Access Authentication Method in Mobile IPv6 Networks[J]. Journal of Computer Research and Development, 2007, 44(1): 51-57.
    [9]Yu Manquan, Luo Weihua, Xu Hongbo, Bai Shuo. Research on Hierarchical Topic Detection in Topic Detection and Tracking[J]. Journal of Computer Research and Development, 2006, 43(3): 489-495.
    [10]Zhuo Jiliang, Li Xianxian, Li Jianxin, and Huai Jinpeng. A New Taxonomy of Attacks on Security Protocols and Their Security Evaluation[J]. Journal of Computer Research and Development, 2005, 42(7): 1100-1107.

Catalog

    Article views (724) PDF downloads (448) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return