Cover Trees for Nearest Neighbor

Total Page:16

File Type:pdf, Size:1020Kb

Cover Trees for Nearest Neighbor Cover Trees for Nearest Neighbor Alina Beygelzimer [email protected] IBM Thomas J. Watson Research Center, Hawthorne, NY 10532 Sham Kakade [email protected] TTI-Chicago, 1427 E 60th Street, Chicago, IL 60637 John Langford [email protected] TTI-Chicago, 1427 E 60th Street, Chicago, IL 60637 Abstract The basic nearest neighbor problem is as follows: We present a tree data structure for fast Given a set S of n points in some metric space (X, d), nearest neighbor operations in general n- the problem is to preprocess S so that given a query point p X, one can efficiently find a point q S point metric spaces (where the data set con- ∈ ∈ sists of n points). The data structure re- which minimizes d(p, q). quires O(n) space regardless of the met- ric’s structure yet maintains all performance Context. For general metrics, finding (or even ap- properties of a navigating net [KL04a]. If proximating) the nearest neighbor of a point requires the point set has a bounded expansion con- Ω(n) time. The classical example is a uniform met- stant c, which is a measure of the intrinsic ric where every pair of points is near the same dis- dimensionality (as defined in [KR02]), the tance, so there is no structure to take advantage of. cover tree data structure can be constructed However, the metrics of practical interest typically do in O c6n log n time. Furthermore, nearest have some structure which can be exploited to yield neighbor queries require time only logarith- significant computational speedups. Motivated by ! " mic in n, in particular O c12 log n time. this observation, several notions of metric structure Our experimental results show speedups and algorithms exploiting this structure have been ! " over the brute force search varying between proposed [Cla99, KR02, KL04a]. one and several orders of magnitude on nat- Denote the closed ball of radius r around p in S X ⊂ ural machine learning datasets. by BS(p, r)= q S : d(p, q) r . When clear from the context, we{ drop∈ the subscript≤ } S. Karger and Ruhl [KR02] considered the following notion of di- 1. Introduction mension based on point expansion, and described a randomized algorithm for metrics in which this Problem. Nearest neighbor search is a basic com- dimension is small. The expansion constant of S putational tool that is particularly relevant to ma- is defined as the smallest value c 2 such that chine learning, where it is often believed that high- B (p, 2r) c B (p, r) for every p ≥X and r>0. dimensional datasets have low-dimensional intrinsic S S If| S is arranged|≤ | uniformly| on some∈ surface of di- structure. Here we study how one can exploit po- mension d, then c 2d, which suggests defining the tential structure in the dataset to speed up nearest expansion dimension∼ of S (also referred to as KR- neighbor computations. Such speedups could ben- dimension) as dim (S) = log c. However, as previ- efit a number of machine learning algorithms, in- KR ously observed in [KR02, KL04a], some metrics that cluding dimensionality reduction algorithms (which should intuitively be considered low-dimensional turn are inherently based on this belief of low-dimensional out to have large growth constants. For example, structure) and classification algorithms that rely on adding a single point in a Euclidean space may make nearest neighbor operations (for example, [LMS05]). the KR-dimension grow arbitrarily (though such ex- Appearing in Proceedings of the 23 rd International Con- amples may be pathological in practice). ference on Machine Learning, Pittsburgh, PA, 2006. Copy- right 2006 by the author(s)/owner(s). A more robust alternative is given by the doubling Cover Trees for Nearest Neighbor constant [Cla99, KL04a], which is the minimum value In our analysis, we focus primarily on the expansion c such that every ball in X can be covered by c balls constant, because this permits results on exact near- in X of half the radius. The doubling dimension of est neighbor queries. If c is the expansion constant S is then defined as dimKL(S) = log c. This notion of S, we can state the dependence on c explicitly: is strictly more general than the KR-dimension, as Cover Tree Nav. Net [KR02] shown in [GKL03]. A drawback (so far) of working Constr. Space O(n) cO(1)n cO(1)n ln n with the doubling dimension is that only weaker re- Constr. Time O(c6n ln n) cO(1)n ln n cO(1)n ln n sults have been provable, and even those apply only Insert/Remove O(c6 ln n) cO(1) ln n cO(1) ln n to approximate nearest neighbors. Query O(c12 ln n) cO(1) ln n cO(1) ln n The aforementioned algorithms have query time guarantees which are only logarithmic in n (while be- It is important to note that the algorithms here (as in ing exponential in their respective notion of intrinsic [KL04a] but not in [KR02]) work without knowledge dimensionality). Unfortunately, in machine learning of the structure; only the analysis is done with respect applications, most of these theoretically appealing al- to the assumptions. Comparison of time complexity gorithms are still not used in practice. When the in terms of c can be subtle (see the discussion in Sec- Euclidean dimension is small, one typical approach tion 4). Also, such a comparison is somewhat unfair is to use KD-trees (see [FBL77]). If the metric is since past work did not explicitly try to optimize the non-Euclidean, or the Euclidean dimension is large, c dependence. ball trees [Uhl91, Omo87] provide compelling perfor- The algorithms easily extend to approximate nearest mance in many practical applications [GM00]. These neighbor queries for sets with a bounded doubling methods currently have only trivial query time guar- dimension, as in [KL04a]. The algorithm of [KL04a] antees of O(n), although improved performance may depends on the aspect ratio ∆defined as the ratio of be provable given some form of structure. the largest to the smallest interpoint distance.1 The The focus of this paper is to make these theoreti- query times of our algorithm are the same as those O(1) cally appealing algorithms more practically applica- in [KL04a], namely O(log ∆) + (1/!) , where ! is ble. One significant drawback of these algorithms the approximation parameter. (based on intrinsic dimensionality notions) is that In an extended version [BKL06], we provide several their space requirements are exponential in the di- algorithms of practical interest. These include a lazy mension. As we observe experimentally (see Sec- construction (which amortizes the construction cost tion 5), it is common for the dimension to grow with over queries), a batch construction (which is empiri- the dataset size, so space consumption is a reasonable cally superior to a sequence of single point insertions), concern. This drawback is precisely what the cover and a batch query (which amortizes the query time tree addresses. over multiple queries). New Results. We propose a simple data struc- Organization. The rest of the paper is organized as ture, a cover tree, for exact and approximate nearest follows. Sections 2 and 3 specify the algorithms and neighbor operations. The data structure improves prove their correctness, with no assumptions about over other results [KR02, KL04a, Cla99, HM04] by any structure present in the data set. Section 4 pro- making the space requirement linear in the dataset vides the runtime analysis in terms of dimensionality. size, independent of any dimensionality assumptions. Section 5 presents experimental results. The cover tree is simple since the data structure be- ing manipulated is a tree; in fact, a cover tree (as a graph) can be viewed as a subgraph of a navigat- 2. The Cover Tree Datastructure ing net [KL04a]. The cover tree throws away most A cover tree T on a data set S is a leveled tree where of the edges of the navigating net while maintaining each level is a “cover” for the level beneath it. Each all dimension-dependent guarantees. The algorithms level is indexed by an integer scale i which decreases and proofs needed for this structure are inherently different because (for example) a greedy traversal of 1The results in [Cla99] also depend on this ratio and the tree is not guaranteed to answer a query correctly. rely on some additional stronger assumptions about the distribution of queries. The algorithms in [KL04b] and We also provide experiments (see Section 5) and pub- [HM04] eliminate the dependence on the aspect ratio but lic code, suggesting this approach is competitive with do not achieve linear space. current practical approaches. Cover Trees for Nearest Neighbor as the tree is descended. Every node in the tree is Algorithm 1 Find-Nearest (cover tree T , query associated with a point in S. Each point in S may be point p) associated with multiple nodes in the tree; however, 1. Set Q = C , where C is the root level of T . ∞ ∞ ∞ we require that any point appears at most once in 2. for i from down to every level. Let Ci denote the set of points in S ∞ −∞ (a) Set Q = Children(q): q Qi . associated with the nodes at level i. The cover tree { ∈ } (b) Form cover set Qi 1 = q Q : d(p, q) − { ∈ ≤ obeys the following invariants for all i: d(p, Q) + 2i . } 1. (Nesting) Ci Ci 1. This implies that once a 3. return arg minq Q d(p, q). ⊂ − ∈ −∞ point p S appears in Ci then every lower level in the tree∈ has a node associated with p.
Recommended publications
  • Lecture 04 Linear Structures Sort
    Algorithmics (6EAP) MTAT.03.238 Linear structures, sorting, searching, etc Jaak Vilo 2018 Fall Jaak Vilo 1 Big-Oh notation classes Class Informal Intuition Analogy f(n) ∈ ο ( g(n) ) f is dominated by g Strictly below < f(n) ∈ O( g(n) ) Bounded from above Upper bound ≤ f(n) ∈ Θ( g(n) ) Bounded from “equal to” = above and below f(n) ∈ Ω( g(n) ) Bounded from below Lower bound ≥ f(n) ∈ ω( g(n) ) f dominates g Strictly above > Conclusions • Algorithm complexity deals with the behavior in the long-term – worst case -- typical – average case -- quite hard – best case -- bogus, cheating • In practice, long-term sometimes not necessary – E.g. for sorting 20 elements, you dont need fancy algorithms… Linear, sequential, ordered, list … Memory, disk, tape etc – is an ordered sequentially addressed media. Physical ordered list ~ array • Memory /address/ – Garbage collection • Files (character/byte list/lines in text file,…) • Disk – Disk fragmentation Linear data structures: Arrays • Array • Hashed array tree • Bidirectional map • Heightmap • Bit array • Lookup table • Bit field • Matrix • Bitboard • Parallel array • Bitmap • Sorted array • Circular buffer • Sparse array • Control table • Sparse matrix • Image • Iliffe vector • Dynamic array • Variable-length array • Gap buffer Linear data structures: Lists • Doubly linked list • Array list • Xor linked list • Linked list • Zipper • Self-organizing list • Doubly connected edge • Skip list list • Unrolled linked list • Difference list • VList Lists: Array 0 1 size MAX_SIZE-1 3 6 7 5 2 L = int[MAX_SIZE]
    [Show full text]
  • Cover Trees for Nearest Neighbor
    Cover Trees for Nearest Neighbor Alina Beygelzimer [email protected] IBM Thomas J. Watson Research Center, Hawthorne, NY 10532 Sham Kakade [email protected] TTI-Chicago, 1427 E 60th Street, Chicago, IL 60637 John Langford [email protected] TTI-Chicago, 1427 E 60th Street, Chicago, IL 60637 Abstract The basic nearest neighbor problem is as follows: We present a tree data structure for fast Given a set S of n points in some metric space (X, d), nearest neighbor operations in general n- the problem is to preprocess S so that given a query point metric spaces (where the data set con- point p ∈ X, one can efficiently find a point q ∈ S sists of n points). The data structure re- which minimizes d(p, q). quires O(n) space regardless of the met- ric’s structure yet maintains all performance Context. For general metrics, finding (or even ap- properties of a navigating net [KL04a]. If proximating) the nearest neighbor of a point requires the point set has a bounded expansion con- Ω(n) time. The classical example is a uniform met- stant c, which is a measure of the intrinsic ric where every pair of points is near the same dis- dimensionality (as defined in [KR02]), the tance, so there is no structure to take advantage of. cover tree data structure can be constructed However, the metrics of practical interest typically do in O c6n log n time. Furthermore, nearest have some structure which can be exploited to yield neighbor queries require time only logarith- significant computational speedups.
    [Show full text]
  • Faster Cover Trees
    Faster Cover Trees Mike Izbicki [email protected] Christian Shelton [email protected] University of California Riverside, 900 University Ave, Riverside, CA 92521 Abstract est neighbor of p in X is defined as The cover tree data structure speeds up exact pnn = argmin d(p;q) nearest neighbor queries over arbitrary metric q2X−fpg spaces (Beygelzimer et al., 2006). This paper makes cover trees even faster. In particular, we The naive method for computing pnn involves a linear scan provide of all the data points and takes time q(n), but many data structures have been created to speed up this process. The 1. A simpler definition of the cover tree that kd-tree (Friedman et al., 1977) is probably the most fa- reduces the number of nodes from O(n) to mous. It is simple and effective in practice, but it can only exactly n, be used on Euclidean spaces. We must turn to other data 2. An additional invariant that makes queries structures when given an arbitrary metric space. The sim- faster in practice, plest and oldest of these structures is the ball tree (Omo- 3. Algorithms for constructing and querying hundro, 1989). Although attractive for its simplicity, it pro- the tree in parallel on multiprocessor sys- vides only the trivial runtime guarantee that queries will tems, and take time O(n). Subsequent research focused on provid- 4. A more cache efficient memory layout. ing stronger guarantees, producing more complicated data structures like the metric skip list (Karger & Ruhl, 2002) On standard benchmark datasets, we reduce the and the navigating net (Krauthgamer & Lee, 2004).
    [Show full text]
  • Canopy – Fast Sampling Using Cover Trees
    Canopy { Fast Sampling using Cover Trees Canopy { Fast Sampling using Cover Trees Manzil Zaheer Abstract Background. The amount of unorganized and unlabeled data, specifically images, is growing. To extract knowledge or insights from the data, exploratory data analysis tools such as searching and clustering have become the norm. The ability to search and cluster the data semantically facilitates tasks like user browsing, studying medical images, content recommendation, and com- putational advertisements among others. However, large image collections are plagued by lack of a good representation in a relevant metric space, thus making organization and navigation difficult. Moreover, the existing methods do not scale for basic operations like searching and clustering. Aim. To develop a fast and scalable search and clustering framework to enable discovery and exploration of extremely large scale data, in particular images. Data. To demonstrate the proposed method, we use two datasets of different nature. The first dataset comprises of satellite images of seven urban areas from around the world of size 200GB. The second dataset comprises of 100M images of size 40TB from Flickr, consisting of variety of photographs from day to day life without any labels or sometimes with noisy tags (∼1% of data). Methods. The excellent ability of deep networks in learning general representation is exploited to extract features from the images. An efficient hierarchical space partitioning data structure, called cover trees, is utilized so as to reduce search and reuse computations. Results. Using the visual search-by-example on satellite images runs in real-time on a single machine and the task of clustering into 64k classes converges in a single day using just 16 com- modity machines.
    [Show full text]
  • SURVEY on VARIOUS-WIDTH CLUSTERING for EFFICIENT K-NEAREST NEIGHBOR SEARCH
    Vol-3 Issue-2 2017 IJARIIE-ISSN(O)-2395-4396 SURVEY ON VARIOUS-WIDTH CLUSTERING FOR EFFICIENT k-NEAREST NEIGHBOR SEARCH Sneha N. Aware1, Prof. Dr. Varsha H. Patil2 1 PG Student, Department of Computer Engineering,Matoshri College of Engineering & Research Centre,Nashik ,Maharashtra, India. 2 Head of Department of Computer Engineering, Matoshri College of Engineering & Research Centre, Nashik, Maharashtra, India. ABSTRACT Over recent decades, database sizes have grown large. Due to the large sizes it create new challenges, because many machine learning algorithms are not able to process such a large volume of information. The k-nearest neighbor (k- NN) is widely used in many machines learning problem. k-NN approach incurs a large computational cost. In this research a k-NN approach based on various-width clustering is presented. The k-NN search technique is based on VWC is used to efficiently find k-NNs for a query object from a given data set and create clusters with various widths. This reduces clustering time in addition to balancing the number of produced clusters and their respective sizes. Keyword: - clustering,k-Nearest Neighbor, various-width clustering, high dimensional, etc. 1. INTRODUCTION:- The k-nearest neighbor approach (k-NN) has been extensively used as a powerful non-parametric technique in many scientific and engineering applications. To find the closest result a k-NN technique is widely used in much application area. This approach incurs a large computational area. General k-NN problem states that, suppose we have n number of objects and a Q query object, then distance from the query object to all training object need to be calculated in order to find k closest objects to Q.
    [Show full text]
  • An Empirical Comparison of Exact Nearest Neighbour Algorithms
    An Empirical Comparison of Exact Nearest Neighbour Algorithms Ashraf M. Kibriya and Eibe Frank Department of Computer Science University of Waikato Hamilton, New Zealand {amk14, eibe}@cs.waikato.ac.nz Abstract. Nearest neighbour search (NNS) is an old problem that is of practical importance in a number of fields. It involves finding, for a given point q, called the query, one or more points from a given set of points that are nearest to the query q. Since the initial inception of the problem a great number of algorithms and techniques have been proposed for its solution. However, it remains the case that many of the proposed algorithms have not been compared against each other on a wide variety of datasets. This research attempts to fill this gap to some extent by presenting a detailed empirical comparison of three prominent data structures for exact NNS: KD-Trees, Metric Trees, and Cover Trees. Our results suggest that there is generally little gain in using Metric Trees or Cover Trees instead of KD-Trees for the standard NNS problem. 1 Introduction The problem of nearest neighbour search (NNS) is old [1] and comes up in many fields of practical interest. It has been extensively studied and a large number of data structures, algorithms and techniques have been proposed for its solution. Although nearest neighbour search is the most dominant term used, it is also known as the best-match, closest-match, closest-point and the post office problem. The term similarity search is also often used in the information retrieval field and the database community.
    [Show full text]
  • COVER TREES for NEAREST NEIGHBOR Nearest Neighbor
    COVER TREES FOR NEAREST NEIGHBOR ALINA BEYGELZIMER, SHAM KAKADE, AND JOHN LANGFORD ABSTRACT. We present a tree data structure for fast nearest neighbor operations in general Ò-point metric ´Òµ spaces. The data structure requires Ç space regardless of the metric’s structure. If the point set has an ¾ expansion constant in the sense of Karger and Ruhl [KR02], the data structure can be constructed ¡ ¡ ½¾ Ò ÐÓ Ò Ç ÐÓ Ò in Ç time. Nearest neighbor queries obeying the expansion bound require time. ½ ´Òµ Ç ´ Òµ In addition, the nearest neighbor of Ç points can be queried in time. We experimentally test the algorithm showing speedups over the brute force search varying between 1 and 2000 on natural machine learning datasets. 1. INTRODUCTION Nearest neighbor search is a fundamental problem with a number of applications in peer-to-peer networks, lossy data compression, vision, dimensionality reduction, computational biology, machine learning, and Ò physical simulation. The standard setting is as follows: Given a set Ë of points in some metric space µ Ë Ô ¾ ´ , the problem is to preprocess so that given a query point , one can efficiently find a point ¾ Ë ´Ô Õ µ Õ which minimizes . For general metrics, finding (or even approximating) the nearest neighbor Òµ of a point requires ª´ time. However, the metrics and datasets of practical interest typically have some structure which may be exploited to yield significant computational speedups. Most research has focused on the special case when the metric is Euclidean. Although many strong theoretical guarantees have been made here, this case is quite limiting in a variety of settings when the data do not naturally lie in a Euclidean space or when the data is embedded in a high dimensional space, but has a low dimensional intrinsic structure [TSL00, RS00] (as is common in many machine learning problems).
    [Show full text]
  • All-Near-Neighbor Search Among High-Dimensional Data Via Hierarchical Sparse Graph Code Filtering
    All-Near-Neighbor Search Among High-Dimensional Data via Hierarchical Sparse Graph Code Filtering by Alexandros-Stavros Iliopoulos Department of Computer Science Duke University Date: Approved: Xiaobai Sun, Advisor Pankaj K. Agarwal Nikos Pitsianis Carlo Tomasi Dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Department of Computer Science in the Graduate School of Duke University 2020 Abstract All-Near-Neighbor Search Among High-Dimensional Data via Hierarchical Sparse Graph Code Filtering by Alexandros-Stavros Iliopoulos Department of Computer Science Duke University Date: Approved: Xiaobai Sun, Advisor Pankaj K. Agarwal Nikos Pitsianis Carlo Tomasi An abstract of a dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Department of Computer Science in the Graduate School of Duke University 2020 Copyright c 2020 by Alexandros-Stavros Iliopoulos All rights reserved except○ the rights granted by the Creative Commons Attribution-Noncommercial Licence Abstract This thesis addresses the problem of all-to-all near-neighbor (all-NN) search among a large dataset of discrete points in a high-dimensional feature space endowed with a distance metric. Near-neighbor search is fundamental to numerous computational tasks arising in modern data analysis, modeling, and knowledge discovery. The ac- curacy and efficiency of near-neighbor search depends on the underlying structure of the dataset. In emerging data-driven analysis applications, the dataset is not necessarily stationary, the structure is not necessarily built once for all queries, and search is not necessarily limited to a few query points. To facilitate accurate and efficient near-neighbor search in a stationary or dynamic dataset, we makeasys- tematic investigation of all-NN search at multiple resolution levels, with attention to several standing or previously overlooked issues associated with high-dimensional feature spaces.
    [Show full text]
  • Improving Dual-Tree Algorithms
    IMPROVING DUAL-TREE ALGORITHMS A Dissertation Presented to The Academic Faculty By Ryan R. Curtin In Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy in Electrical and Computer Engineering School of Electrical and Computer Engineering Georgia Institute of Technology December 2015 Copyright © 2015 by Ryan R. Curtin IMPROVING DUAL-TREE ALGORITHMS Approved by: Dr. David V. Anderson, Committee Chair Dr. Mark A. Clements Associate Professor, School of Electrical and Associate Professor, School of Electrical and Computer Engineering Computer Engineering Georgia Institute of Technology Georgia Institute of Technology Dr. Charles L. Isbell, Jr., Advisor Dr. Polo Chau Professor, School of Interactive Computing Assistant Professor, School of Computational Georgia Institute of Technology Science and Engineering Georgia Institute of Technology Dr. Richard W. Vuduc Associate Professor, School of Computational Science and Engineering Georgia Institute of Technology Date Approved: August 18, 2015 This document is dedicated solely to my cats, who do not and will not ever have the capacity to understand even the title of this manuscript, and who, thanks to domestication, are actually entirely incapable of leading any sort of autonomous lifestyle and thus are mortally dependent on my completion of simple maintenance tasks. TABLE OF CONTENTS LIST OF TABLES ................................... vii LIST OF FIGURES .................................. ix CHAPTER 1 THE POINT ............................. 1 CHAPTER 2 INTRODUCTION .......................... 3 2.1 An abridged history of statistical computing . .3 2.2 A less abridged history of the development of trees . .4 2.3 The explosion of single-tree algorithms . 10 2.4 A smorgasboard of trees . 12 2.5 The fast multipole method and query amortization .
    [Show full text]
  • Non-Rigid Surface Registration Using Cover Tree Based Clustering and Nearest Neighbor Search
    Non-rigid Surface Registration using Cover Tree based Clustering and Nearest Neighbor Search Manal H. Alassaf 1, 2, Yeny Yim3 and James K. Hahn1 1Department of Computer Science, George Washington University, Washington DC, U.S.A. 2Department of computer science, Taif University, Taif, Saudi Arabia 3Samsung Electronics, Suwon, Geonggi-Do, Republic of Korea Keywords: Non-rigid Registration, Iterative Closest Point Algorithm, ICP, Cover Tree, Clustering, Nearest Neighbor Search. Abstract: We propose a novel non-rigid registration method that computes the correspondences of two deformable surfaces using the cover tree. The aim is to find the correct correspondences without landmark selection and to reduce the computational complexity. The source surface S is initially aligned to the target surface T to generate a cover tree from the densely distributed surface points. The cover tree is constructed by taking into account the positions and normal vectors of the points and used for hierarchical clustering and nearest neighbor search. The cover tree based clustering divides the two surfaces into several clusters based on the geometric features, and each cluster on the source surface is transformed to its corresponding cluster on the target. The nearest neighbor search from the cover tree reduces the search space for correspondence computation, and the source surface is deformed to the target by optimizing the point pairs. The correct correspondence of a given source point is determined by choosing one target point with the best correspondence measure from the k nearest neighbors. The proposed energy function with Jacobian penalty allows deforming the surface accurately and with less deformation folding. 1 INTRODUCTION it is quite efficient especially for low dimensional data.
    [Show full text]
  • Introduction to Cover Tree
    Introduction to Cover Tree Javen Qinfeng Shi SML of NICTA RSISE of ANU 2006 Oct. 15 Outline Goal Related works Cover tree definition Optimized Implement in C++ Complexity Further work Outline Goal Related works Cover tree definition Efficiently Implement in C++ Advantages and disadvantages Further work Goal Speed up Nearest-neighbour search[John Langford etc. 2006] ZPreprocess a dataset S of n points in some metric space X so that given a query point p ∈ X , a point q ∈ S which minimises d(p,q) can be efficiently found Also Kmeans Outline Goal Related works Cover tree definition Example Optimized Implement in C++ Advantages and disadvantages Further work Relevant works Kd tree [Friedman, Bentley & Finkel 1977] Ball tree family: ZBall tree [Omohundro,1991] ZMetric tree [Uhlmann, 1991] ZAnchors metric tree [Moore 2000] Z(Improved) Anchors metric tree [Charles2003] Navigating net [R.Krauthgamer, J.Lee 2004] ? Lots of discussions and proofs on its computational bound Kd tree Univariate axis-aligned splits Split on widest dimension O(N log N) to build, O(N) space Kd tree Kd tree y x (axis) Ball tree/metric tree A set of points in R2 [Uhlmann 1991], [Omohundro 1991] A ball-tree: level 1 [Uhlmann 1991], [Omohundro 1991] A ball-tree: level 2 A ball-tree: level 3 A ball-tree: level 4 A ball-tree: level 5 Outline Goal Related works Cover tree definition ZBasic definition ZHow to build a cover tree ZQuery a point/points Optimized Implement in C Advantages and disadvantages Further work Basic definition A cover tree
    [Show full text]
  • Plug-And-Play Dual-Tree Algorithm Runtime Analysis
    Journal of Machine Learning Research 16 (2015) 3269-3297 Submitted 1/15; Published 12/15 Plug-and-Play Dual-Tree Algorithm Runtime Analysis Ryan R. Curtin [email protected] School of Computational Science and Engineering Georgia Institute of Technology Atlanta, GA 30332-0250, USA Dongryeol Lee [email protected] Yahoo Labs Sunnyvale, CA 94089 William B. March [email protected] Institute for Computational Engineering and Sciences University of Texas, Austin Austin, TX 78712-1229 Parikshit Ram [email protected] Skytree, Inc. Atlanta, GA 30332 Editor: Nando de Freitas Abstract Numerous machine learning algorithms contain pairwise statistical problems at their core| that is, tasks that require computations over all pairs of input points if implemented naively. Often, tree structures are used to solve these problems efficiently. Dual-tree algorithms can efficiently solve or approximate many of these problems. Using cover trees, rigorous worst- case runtime guarantees have been proven for some of these algorithms. In this paper, we present a problem-independent runtime guarantee for any dual-tree algorithm using the cover tree, separating out the problem-dependent and the problem-independent elements. This allows us to just plug in bounds for the problem-dependent elements to get runtime guarantees for dual-tree algorithms for any pairwise statistical problem without re-deriving the entire proof. We demonstrate this plug-and-play procedure for nearest-neighbor search and approximate kernel density estimation to get improved runtime guarantees. Under mild assumptions, we also present the first linear runtime guarantee for dual-tree based range search. Keywords: dual-tree algorithms, adaptive runtime analysis, cover tree, expansion con- stant, nearest neighbor search, kernel density estimation, range search 1.
    [Show full text]