Department of Computer Science
Div. of Web Science and Technology
Korea Advanced Institute of Science and Technology (KAIST)
CS688/WST665: Web-Scale Image Retrieval (Fall 2014)
CS688/WST665: Web-Scale Image Retrieval (Fall 2014)
- When and where: 4:00-5:15pm on Tue. and Thur. at Room 3445
in the CS building
- First class: Sep-2 (Important announce for the first class)
-
- Textbook:
In-class handouts and
ongoing draft
on image search
- Board: Noah board
- Previous Board(Fall 2012): Noah board(2012)
- Question Page: Question Submission
- Paper Submission Page: Paper Summary Submission
Outline
Course overview
We extract feature points between two similar images and match them, followed by overlaying them together based on the matched points in the bottom row.
Thanks to rapid advances of digital camera and various image processing tools,
we can easily create new pictures, images, and videos for various purposes. This in
turn results in a huge amount of images in the internet and even in personal
computers. For example, flickr, an image hosting website, contains more than
five billion images and flickr members update more than three thousands image
every minute.
These huge image databases pose numerous technical challenges in terms of image
processing, searching, storing, etc.
In this class we will discuss various scalable techniques for web-scale image/video databases and novel applications that can utilize such data.
In summary, what you will get at the end of the course:
What you will do:
Lecture schedule (subject to change)
# of lecture, date |
Topics and slides |
Related material(s) |
Sep-2 (T)
| Overview on the course and course policy |
Important announcement on the first class |
Sep-4 (Th)
Sep-11 (Th)
| Keypoint localization Scale Invariant Region Selection |
Code of Harris detector Code of Blob Laplacian |
Sep-16 (T)
Sep-18 (Th)
| Descriptor Intro to Object Recognition |
Programming Assignment1 |
Sep-23 (T)
Sep-25 (Th)
| Bag-of-Words(BoW) Models |
Programming Assignment2 PA2 datasetStudent Presentation Guidance |
Sep-30 (T)
Oct-2 (Th)
| Recent Image Retrieval Techniques |
|
Oct-7 (T)
| Invited Talk on Geometric Computing |
|
Oct-14 (T)
Oct-16 (Th)
| Hashing Techniques Web-Scale Image Databases and Their Applications |
Project Guidelines |
Oct-21 (T)
Oct-23 (Th)
|
|
Oct-28 (T)
| ����� ������ ������
|
Oct-30 (Th)
| �躴�� ���ο� ������
|
Nov-4 (T)
| ���¿� �赿�� ������ ������
|
Nov-6 (Th)
| ���¿� ����ö �̿���
|
Nov-11 (T)
| �ǿ뼱 ������ �̰���
|
Nov-13 (Th)
| ����� ������ ���
|
Nov-18 (T)
| Mid-project presentation: 1.������,�̿��� 2.������,�躴�� 3.����ö,���¿�,�ǿ뼱 4.�赿��,���¿�
|
Nov-20 (Th)
| Mid-project presentation: 1.������,�̰��� 2.������,������,����� 3.��â��,���ο� 4.������,������,�����
|
Nov-25 (T)
| ������ ������ �ǿ뼱
|
Nov-27 (Th)
| ������ ����� �赿��
|
Dec-2 (T)
| �̿��� �̰��� �躴�� ������
|
Dec-4 (Th)
| ���ο� ������ ���¿�
|
Dec-9 (T)
| ������ ������ ����ö
|
Dec-11 (Th)
| ��â�� ���¿� �����
|
Dec-16 (T)
| Final-project presentation: 1.�赿��,���¿� 2.������,�̰��� a> 3.������,�̿��� 4.������,�躴�� 5.��â��,���ο� 6.����ö,���¿�,�ǿ뼱 7.������,������,����� 8.������,������,�����
|
Dec-18 (Th)
|
|
|
Student presentations and reports
For your presentations, please use the this powerpoint template; paper presentation guideline is available.
For your final report, please use the this latex template
Additional reference materials and links
Computer vision resources (papers, code, datasets, etc.):
Paper search:
Acknowledgements:
The course materials are based on those of Prof. Fei-Fei Li, Stanford.
Thank you so much!
Copyright 2012.
Personal use of this material is permitted. However, permission to
reprint/republish this material for advertising or promotional purposes
or for creating new collective works for resale or redistribution to servers or
lists, or to reuse any copyrighted component of this work in other works
must be obtained from the author.
This material is presented to ensure timely dissemination of scholarly
and technical work. Copyright and all rights therein are retained by authors or
by other copyright holders. All persons copying this information are
expected to adhere to the terms and constraints invoked by each author's
copyright. In most cases, these works may not be reposted without the
explicit permission of the copyright holder.