Movatterモバイル変換


[0]ホーム

URL:


US20150193503A1 - Retroactive search of objects using k-d tree - Google Patents

Retroactive search of objects using k-d tree
Download PDF

Info

Publication number
US20150193503A1
US20150193503A1US14/663,252US201514663252AUS2015193503A1US 20150193503 A1US20150193503 A1US 20150193503A1US 201514663252 AUS201514663252 AUS 201514663252AUS 2015193503 A1US2015193503 A1US 2015193503A1
Authority
US
United States
Prior art keywords
content
content objects
image
images
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/663,252
Inventor
Vikram Chandrasekhar
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Meta Platforms Inc
Original Assignee
Facebook Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Facebook IncfiledCriticalFacebook Inc
Priority to US14/663,252priorityCriticalpatent/US20150193503A1/en
Publication of US20150193503A1publicationCriticalpatent/US20150193503A1/en
Assigned to META PLATFORMS, INC.reassignmentMETA PLATFORMS, INC.CHANGE OF NAME (SEE DOCUMENT FOR DETAILS).Assignors: FACEBOOK, INC.
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

In one embodiment, a method includes receiving a set of one or more content objects to be blacklisted; retrieving a set of currently blacklisted content objects; and determining a delta set of content objects that includes the content objects in the set of content objects to be blacklisted that are not included in the set of currently blacklisted content objects. Each of the content objects of the delta set is represented as a vector that includes a number of first elements. The method also includes retrieving, for each content object of a third set of content objects, a representation of the content object as a vector that includes a number of second elements; and identifying each content object in the third set whose content substantially matches at least one content object of the delta set.

Description

Claims (20)

What is claimed is:
1. A method comprising:
by a computing device, receiving a set of one or more content objects to be blacklisted;
by the computing device, retrieving a set of currently blacklisted content objects;
by the computing device, determining a delta set of content objects comprising the content objects in the set of content objects to be blacklisted that are not included in the set of currently blacklisted content objects, wherein each of the content objects of the delta set is represented as a vector comprising a plurality of first elements;
by the computing device, retrieving, for each content object of a third set of content objects, a representation of the content object as a vector comprising a plurality of second elements;
by the computing device, identifying each content object in the third set whose content substantially matches at least one content object of the delta set based on a determination as to whether calculated differences between the first elements and the corresponding second elements is less than a pre-determined threshold.
2. The method ofclaim 1, wherein the set of currently blacklisted content objects comprises one or more of categories, and wherein the identification corresponds to a comparison of one or more of stored images to one or more of the categories.
3. The method ofclaim 1, wherein the content objects are images and the identification is performed using an image-matching algorithm.
4. The method ofclaim 3, wherein the image-matching algorithm is a discrete waveform transformation, singular value decomposition, or feature point based image hashing.
5. The method ofclaim 1, wherein the set of content objects to be blacklisted comprise an updated blacklist.
6. The method ofclaim 1, wherein the plurality of first elements represents content of the currently blacklisted content objects or the content objects to be blacklisted, and wherein the plurality of second elements represents content of content objects stored on a social-networking system.
7. The method ofclaim 1, wherein the third set of content objects is stored in a k-dimensional tree.
8. The method ofclaim 7, wherein:
the k-dimensional tree comprises a root node and a plurality of sub-trees connected to the root node; and
the plurality of sub-trees comprises a plurality of nodes.
9. The method ofclaim 8, wherein identifying each content object comprises identifying one of the sub-trees for a subsequent comparison based at least in part on a difference between a first element corresponding to a current node of the k-dimensional tree and a second element corresponding to the current node.
10. The method ofclaim 9, wherein identifying each content object further comprises eliminating content objects of one or more unidentified sub-trees from the identification based at least in part on the difference between the first element corresponding to the current node of the k-dimensional tree and the second element corresponding to the current node being more than the pre-determined threshold.
11. The method ofclaim 10, further comprising discarding a sub-tree of k-dimensional tree that corresponds to eliminated content objects.
12. The method ofclaim 8, wherein identifying each content object comprises:
calculating a difference between a first element corresponding to the root node and a second element corresponding to the root node; and
calculating a difference between a first element corresponding to a child node of the root node a second element corresponding to the child node, wherein the child node is identified based on the calculated difference of the root node.
13. The method ofclaim 7, wherein each node of the k-dimensional tree stores the vector representing content of one of the content objects of the third set.
14. The method ofclaim 7, wherein:
each second element corresponds to a level of the k-dimensional tree; and
each content object of the third set is sorted within the k-dimensional tree based on a value of each second element.
15. One or more computer-readable non-transitory storage media embodying software that is operable when executed to:
receive a set of one or more content objects to be blacklisted;
retrieve a set of currently blacklisted content objects;
determine a delta set of content objects comprising the content objects in the set of content objects to be blacklisted that are not included in the set of currently blacklisted content objects, wherein each of the content objects of the delta set is represented as a vector comprising a plurality of first elements;
retrieve, for each content object of a third set of content objects, a representation of the content object as a vector comprising a plurality of second elements;
identify each content object in the third set whose content substantially matches at least one content object of the delta set based on a determination as to whether calculated differences between the first elements and the corresponding second elements is less than a pre-determined threshold.
16. The media ofclaim 15, wherein the third set of content objects is stored in a k-dimensional tree.
17. The media ofclaim 16, wherein:
the k-dimensional tree comprises a root node and a plurality of sub-trees connected to the root node; and
the plurality of sub-trees comprises a plurality of nodes.
18. A system comprising:
one or more processors; and
a memory coupled to the processors comprising instructions executable by the processors, the processors operable when executing the instructions to:
receive a set of one or more content objects to be blacklisted;
retrieve a set of currently blacklisted content objects;
determine a delta set of content objects comprising the content objects in the set of content objects to be blacklisted that are not included in the set of currently blacklisted content objects, wherein each of the content objects of the delta set is represented as a vector comprising a plurality of first elements;
retrieve, for each content object of a third set of content objects, a representation of the content object as a vector comprising a plurality of second elements;
identify each content object in the third set whose content substantially matches at least one content object of the delta set based on a determination as to whether calculated differences between the first elements and the corresponding second elements is less than a pre-determined threshold.
19. The system ofclaim 18, wherein the third set of content objects is stored in a k-dimensional tree.
20. The system ofclaim 19, wherein:
the k-dimensional tree comprises a root node and a plurality of sub-trees connected to the root node; and
the plurality of sub-trees comprises a plurality of nodes.
US14/663,2522012-08-302015-03-19Retroactive search of objects using k-d treeAbandonedUS20150193503A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US14/663,252US20150193503A1 (en)2012-08-302015-03-19Retroactive search of objects using k-d tree

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
US13/599,162US9053191B2 (en)2012-08-302012-08-30Retroactive search of objects using k-d tree
US14/663,252US20150193503A1 (en)2012-08-302015-03-19Retroactive search of objects using k-d tree

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US13/599,162ContinuationUS9053191B2 (en)2012-08-302012-08-30Retroactive search of objects using k-d tree

Publications (1)

Publication NumberPublication Date
US20150193503A1true US20150193503A1 (en)2015-07-09

Family

ID=50188907

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US13/599,162Active2033-08-09US9053191B2 (en)2012-08-302012-08-30Retroactive search of objects using k-d tree
US14/663,252AbandonedUS20150193503A1 (en)2012-08-302015-03-19Retroactive search of objects using k-d tree

Family Applications Before (1)

Application NumberTitlePriority DateFiling Date
US13/599,162Active2033-08-09US9053191B2 (en)2012-08-302012-08-30Retroactive search of objects using k-d tree

Country Status (1)

CountryLink
US (2)US9053191B2 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9367938B2 (en)*2013-02-282016-06-14Nokia Technologies OyMethod and apparatus for automated real-time detection of overlapping painted markup elements
IL226219A (en)2013-05-072016-10-31Picscout (Israel) LtdEfficient image matching for large sets of images
US9734179B2 (en)2014-05-072017-08-15Sas Institute Inc.Contingency table generation

Citations (18)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5933212A (en)*1995-12-281999-08-03Sony CorporationDelineating method employing electron ray beam
US20060123083A1 (en)*2004-12-032006-06-08Xerox CorporationAdaptive spam message detector
US20060217826A1 (en)*2005-03-232006-09-28Canon Kabushiki KaishaImage processing apparatus and a method therefor
US7333963B2 (en)*2004-10-072008-02-19Bernard WidrowCognitive memory and auto-associative neural network based search engine for computer and network located images and photographs
US20100002771A1 (en)*2008-07-042010-01-07Huang Shih-ChiaSeamless Wireless Video Transmission For Multimedia Applications
US20100100548A1 (en)*2008-10-162010-04-22Curators Of The University Of MissouriStoring change features detected from high-resolution, remotely sensed imagery
US20100205541A1 (en)*2009-02-112010-08-12Jeffrey A. Rapaport social network driven indexing system for instantly clustering people with concurrent focus on same topic into on-topic chat rooms and/or for generating on-topic search results tailored to user preferences regarding topic
US7886000B1 (en)*2006-06-272011-02-08Confluence Commons, Inc.Aggregation system for social network sites
US7936872B2 (en)*2003-05-192011-05-03Microsoft CorporationClient proximity detection method and system
US20120240236A1 (en)*2008-10-212012-09-20Lookout, Inc.Crawling multiple markets and correlating
US8315849B1 (en)*2010-04-092012-11-20Wal-Mart Stores, Inc.Selecting terms in a document
US8428367B2 (en)*2007-10-262013-04-23International Business Machines CorporationSystem and method for electronic document classification
US20130117848A1 (en)*2011-11-032013-05-09Ali GolshanSystems and Methods for Virtualization and Emulation Assisted Malware Detection
US20130188875A1 (en)*2012-01-232013-07-25Microsoft CorporationVector Graphics Classification Engine
US8549627B2 (en)*2009-06-132013-10-01Microsoft CorporationDetection of objectionable videos
US20130259302A1 (en)*2012-04-032013-10-03Chung Hua UniversityMethod of tracking objects
US8925087B1 (en)*2009-06-192014-12-30Trend Micro IncorporatedApparatus and methods for in-the-cloud identification of spam and/or malware
US9445110B2 (en)*2007-09-282016-09-13Dolby Laboratories Licensing CorporationVideo compression and transmission techniques

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5963956A (en)1997-02-271999-10-05TelcontarSystem and method of optimizing database queries in two or more dimensions
US6256712B1 (en)1997-08-012001-07-03International Business Machines CorporationScaleable method for maintaining and making consistent updates to caches
US6026189A (en)*1997-11-132000-02-15National Research Council Of CanadaMethod of recognizing objects within two-dimensional and three-dimensional images
US7542036B2 (en)*2003-02-192009-06-02California Institute Of TechnologyLevel set surface editing operators
US7783135B2 (en)*2005-05-092010-08-24Like.ComSystem and method for providing objectified image renderings using recognition information from images
US20080192051A1 (en)2007-02-142008-08-14David Keith FowlerExpanding Empty Nodes in an Acceleration Data Structure
CN101388842B (en)2008-10-302012-04-04华为技术有限公司Storage method and apparatus
US8914418B2 (en)2008-11-302014-12-16Red Hat, Inc.Forests of dimension trees
US8417708B2 (en)*2009-02-092013-04-09Xerox CorporationAverage case analysis for efficient spatial data structures
US20100235208A1 (en)2009-03-122010-09-16Naim ValensiSystem and methods for balancing binary trees
US8488883B2 (en)*2009-12-282013-07-16Picscout (Israel) Ltd.Robust and efficient image identification
CN107103639B (en)*2010-06-302021-05-18巴里·林恩·詹金斯Method and system for determining a set of mesh polygons or segments of mesh polygons
US8706711B2 (en)*2011-06-222014-04-22Qualcomm IncorporatedDescriptor storage and searches of k-dimensional trees

Patent Citations (18)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5933212A (en)*1995-12-281999-08-03Sony CorporationDelineating method employing electron ray beam
US7936872B2 (en)*2003-05-192011-05-03Microsoft CorporationClient proximity detection method and system
US7333963B2 (en)*2004-10-072008-02-19Bernard WidrowCognitive memory and auto-associative neural network based search engine for computer and network located images and photographs
US20060123083A1 (en)*2004-12-032006-06-08Xerox CorporationAdaptive spam message detector
US20060217826A1 (en)*2005-03-232006-09-28Canon Kabushiki KaishaImage processing apparatus and a method therefor
US7886000B1 (en)*2006-06-272011-02-08Confluence Commons, Inc.Aggregation system for social network sites
US9445110B2 (en)*2007-09-282016-09-13Dolby Laboratories Licensing CorporationVideo compression and transmission techniques
US8428367B2 (en)*2007-10-262013-04-23International Business Machines CorporationSystem and method for electronic document classification
US20100002771A1 (en)*2008-07-042010-01-07Huang Shih-ChiaSeamless Wireless Video Transmission For Multimedia Applications
US20100100548A1 (en)*2008-10-162010-04-22Curators Of The University Of MissouriStoring change features detected from high-resolution, remotely sensed imagery
US20120240236A1 (en)*2008-10-212012-09-20Lookout, Inc.Crawling multiple markets and correlating
US20100205541A1 (en)*2009-02-112010-08-12Jeffrey A. Rapaport social network driven indexing system for instantly clustering people with concurrent focus on same topic into on-topic chat rooms and/or for generating on-topic search results tailored to user preferences regarding topic
US8549627B2 (en)*2009-06-132013-10-01Microsoft CorporationDetection of objectionable videos
US8925087B1 (en)*2009-06-192014-12-30Trend Micro IncorporatedApparatus and methods for in-the-cloud identification of spam and/or malware
US8315849B1 (en)*2010-04-092012-11-20Wal-Mart Stores, Inc.Selecting terms in a document
US20130117848A1 (en)*2011-11-032013-05-09Ali GolshanSystems and Methods for Virtualization and Emulation Assisted Malware Detection
US20130188875A1 (en)*2012-01-232013-07-25Microsoft CorporationVector Graphics Classification Engine
US20130259302A1 (en)*2012-04-032013-10-03Chung Hua UniversityMethod of tracking objects

Also Published As

Publication numberPublication date
US20140067806A1 (en)2014-03-06
US9053191B2 (en)2015-06-09

Similar Documents

PublicationPublication DateTitle
US10120889B2 (en)Prospective search of objects using k-d forest
US10061846B2 (en)Extract operator
AU2017324850A1 (en)Similarity search using polysemous codes
US10318652B2 (en)Short-term hashes
US10032047B2 (en)User search based on private information
AU2018203101B2 (en)Vertical-based query optionalizing
US20150193503A1 (en)Retroactive search of objects using k-d tree
US10042926B1 (en)User search based on family connections
AU2016204563B2 (en)Extract operator
AU2015258295B2 (en)Extract operator

Legal Events

DateCodeTitleDescription
STPPInformation on status: patent application and granting procedure in general

Free format text:FINAL REJECTION MAILED

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

ASAssignment

Owner name:META PLATFORMS, INC., CALIFORNIA

Free format text:CHANGE OF NAME;ASSIGNOR:FACEBOOK, INC.;REEL/FRAME:058553/0802

Effective date:20211028


[8]ページ先頭

©2009-2025 Movatter.jp