## Are you sure?

This action might not be possible to undo. Are you sure you want to continue?

Andrei Broder IBM Research abroder@us.ibm.com

Fingerprinting (discussed last week)

**• Fingerprints are short tags for larger objects. • Notations
**

Ω = The set of all objects k = The lenght of the fingerprint k f : Ω → {0,1} A fingerprinting function • Properties

f ( A) ≠ f ( B ) ⇒ A ≠ B

1 Pr ( f ( A) = f ( B ) A ≠ B ) ≈ k 2

A. Broder – Algorithms for near-duplicate documents February 18, 2005 2

**Fingerprinting schemes • Fingerprints vs hashing
**

u u

For hashing I want good distribution so bins will be equally filled For fingerprints I don’t want any collisions = much longer hashes but the distribution does not matter!

• Cryptographically

u u

secure:

MD2, MD4, MD5, SHS, etc relatively slow Based on polynomial arithmetic Very fast (1 table lookup + 1 xor + 1 shift) /byte Nice extra-properties

• Rabin’s scheme

u u u

A. Broder – Algorithms for near-duplicate documents February 18, 2005

3

Rabin’s scheme

[Rabin ’81], [B ‘93] • View each string A as a polynomial over Z2:

A = 1 0 0 1 1 ⇒

A(x) = x4 + x + 1

**• Let P(t) be an irreducible polynomial of
**

degree k chosen uar • The fingerprint of A is

f(A) = A(t) mod P(t)

**• The probability of collision among n strings of
**

average length t is about

4

n^2 t / 2^k

A. Broder – Algorithms for near-duplicate documents February 18, 2005

Nice extra properties

**• Let ♦ = catenation. Then
**

f(a ♦ b) = f(f(a) ♦ b)

• Can compute extensions of strings easily. • Can compute fprs of sliding windows.

A. Broder – Algorithms for near-duplicate documents February 18, 2005

5

1995 – AltaVista was born at Digital SRC

**• First large scale web search engine
**

u u

“Complete web” then = 30 million documents!!! Current estimate = 11.5 B docs [Gullio & Signorini 05]

**• First web annoyance: duplication of
**

documents was immediately visible

A. Broder – Algorithms for near-duplicate documents February 18, 2005

6

**Background on web indexing
**

• Web search engines (Google, MSN, Yahoo, etc…)

u

Crawler – starts from a set of seed URLs, fetches pages, parses, and repeats. Indexer -- builds the index. Search interface -- talks to users. Explored ~ 2-3 B URL -> global ranking Processed ~ 1B pages -> filtering Indexed fully ~ 650 M pages > 5 TB of text

7

u u

**• AltaVista (Nov 2001)
**

u u u

A. Broder – Algorithms for near-duplicate documents February 18, 2005

**Reasons for duplicate filtering
**

•

Proliferation of almost but not quite equal documents on the Web:

u u

Legitimate: Mirrors, local copies, updates, etc. Malicious: Spammers, spider traps, dynamic URLs, “cookie crumbs” Mistaken: Spider errors

u

• • •

Costs:

u u

RAM and disks Unhappy users

Approximately 30% of the pages on the web are (near) duplicates. [B,Glassman,Manasse & Zweig ‘97, Shivakumar &

Garcia-Molina ’98]

**In enterprise search even larger amount of duplication.
**

8

A. Broder – Algorithms for near-duplicate documents February 18, 2005

**Cookie crumbs • Some sites create some session and/or user id
**

that becomes part of the URL = “cookie crumb”

**• Real cookies are stored in user space and
**

persistent across sessions.

**• Crawler comes many times to the same page with
**

a different cookie crumb

**• Page is slightly modified between different visits. • Example
**

u u

http://www.crutchfield.com/S-fXyiE5bZS43/ http://www.crutchfield.com/S-LcNLKgc7bMg/

A. Broder – Algorithms for near-duplicate documents February 18, 2005

9

Cookie crumbs

Cookie crumbs

A. Broder – Algorithms for near-duplicate documents February 18, 2005

10

Observations

• Must filter both duplicate and near-duplicate

documents

**• Computing pair-wise edit distance would take
**

forever

**• Natural approach = sampling substrings (letters,
**

words, sentences, etc.)

… but sampling twice even from the same document will not produce identical samples. (Birthday paradox in reverse – need sqrt(n) samples before a collision)

A. Broder – Algorithms for near-duplicate documents February 18, 2005

11

Desiderata

• • • • •

Store only small sketches for each document. On-line processing. (Once sketch is done, source is unavailable) Good mathematics. (Small biases might have large impact.) At most n log n time for n documents. Ridiculous rule of thumb: At web size you can not do anything that is not linear in n except sorting

A. Broder – Algorithms for near-duplicate documents February 18, 2005

12

**The basics of our solution
**

[B ‘97], [B, Glassman, Manasse, & Zweig ‘97], [B ‘00] 1. Reduce the problem to a set intersection problem 2. Estimate intersections by sampling minima

A. Broder – Algorithms for near-duplicate documents February 18, 2005

13

**Shingling • Shingle = Fixed size sequence of w contiguous
**

words (q-gram)

a rose is a rose is rose is is a a a a a rose is a rose rose rose is rose is a rose is a rose

D

Shingling

Set of shingles

Fingerprint

Set of 64 bit fingerprints

A. Broder – Algorithms for near-duplicate documents February 18, 2005

14

**Trees, rain, & shingles (joke!)
**

ROOT

**CS Tree CS Shingles CS Rain
**

A. Broder – Algorithms for near-duplicate documents February 18, 2005 15

Defining resemblance

D1 D2

S1

S2

| S1 ∩ S 2 | resemblance = | S1 ∪ S 2 |

a.k.a. Jaccard distance

A. Broder – Algorithms for near-duplicate documents February 18, 2005 16

**Impact of shingle size
**

• Long shingles ⇒ small random changes have

large impact.

**• Short shingles ⇒ unrelated documents
**

too much commonality.

can have

**• Good sizes: 3 --10 • See also results about
**

distance [Ukkonen ‘91]

q-gram distance vs. edit

**• See also discussion in Schleimer & al.,
**

“Winnowing: Local Algorithms for Document Fingerprinting” SIGMOD 2003

A. Broder – Algorithms for near-duplicate documents February 18, 2005 17

Sampling minima

• Apply a random permutation σ to the set [0..264] • Crucial fact α = σ −1 (min(σ ( S1 ))) β = σ −1 (min(σ ( S 2 ))) Let

| S1 ∩ S 2 | Pr(α = β ) = | S1 ∪ S 2 |

S1

S2

**• More generally, we look at the k smallest elements in
**

S1 U S2 and check how many are in common.

18 A. Broder – Algorithms for near-duplicate documents February 18, 2005

Observations

**• Min Hash = example of locally sensitive
**

hash [Indyk & Motwani ’99] (week 5)

u

Hashing such that two items are more likely to collide if they are close under certain metric. Can be proven directly (painful …) Follows from general properties of LSH [Charikar ’02]

**• 1 – Res(A,B) obeys the triangle inequality
**

u u

A. Broder – Algorithms for near-duplicate documents February 18, 2005

19

**Can it be done differently?
**

Any family of functions { f } such that f ( S ) ∈ S that satisfies

| S1 ∩ S 2 | Pr( f ( S1 ) = f ( S 2 )) = | S1 ∪ S 2 |

is such that every f is defined by

f ( S ) = π (min(π f ( S )))}

−1 f

A. Broder – Algorithms for near-duplicate documents February 18, 2005

[B & Mitzenmacher 99]

20

Implementation

• Choose a random permutations of π(U). • For each document keep a sketch S(D)

consisting of t minimal elements of π(D). common minimal elements within the first t elements of π(A U B).

• Estimate resemblance of A and B by counting

• Details in [B ‘97]

A. Broder – Algorithms for near-duplicate documents February 18, 2005

21

Alternative implementation

• Choose a random permutations of π(U). • For each document keep a sketch S(D)

consisting of all elements of π(D) that are 0 mod m. common elements.

**• Estimate resemblance of A and B by counting • Disadvantage: proportional to the length of
**

original document.

A. Broder – Algorithms for near-duplicate documents February 18, 2005

22

**Clustering the Web
**

[B, Glassman, Manasse, & Zweig ‘97]

**• We took the 30 million documents found by
**

AltaVista in April 1996

• We found all clusters of similar documents.

A. Broder – Algorithms for near-duplicate documents February 18, 2005

23

Cluster formation

Doc 1 (shingle-ID) ... (shingle-ID) Doc 2 (shingle-ID) ... (shingle-ID) Doc 3 (shingle-ID) ... (shingle-ID)

...

**Doc N (shingle-ID) ... (shingle-ID)
**

Sketch, sorted on shingle.

(shingle-ID) ... (shingle-ID)

(ID-ID Count) (ID-ID Count) ... ... (ID-ID Count) (ID-ID Count) (ID-ID Count) ... (ID-ID Count) (ID-ID Count) ... (ID-ID Count) Clusters

24

Merge-sort.

(ID-ID Count) (ID-ID Count) ... ... (ID-ID Count) (ID-ID Count)

Sort on ID-ID.

Merge-sort.

Union-Find.

A. Broder – Algorithms for near-duplicate documents February 18, 2005

**Still, not very easy ... • On a farm of Alphas (in `97)
**

u u u u u

Sketching: 4.6 alpha-days Exact Duplicate Elimination: 0.3 Shingle Merging: 1.7 ID-ID Pair Formation: 0.7 ID-ID Merging: 2.6 Cluster Formation: 0.5 mips-days

**• On a large memory MIPS machine
**

u

• TOTAL: ~10 alpha-days (~ 150KB/sec)

A. Broder – Algorithms for near-duplicate documents February 18, 2005

25

**What did we learn in ‘97? • Most documents were unique but also there were
**

lots of duplicates.

u

18 million unique documents (roughly 60%) ~70% of the clusters had 2 documents ~3.4 documents/cluster 3 clusters had between 10000 and 40000 documents

**• Most clusters were small
**

u

**• The average cluster was small
**

u

**• A few clusters were big
**

u

**• This distribution of cluster sizes was still roughly
**

correct in 2001 (based on AV data from 2001)

A. Broder – Algorithms for near-duplicate documents February 18, 2005 26

Filtering

• In many cases value of resemblance not

needed.

**• Check only if the resemblance is above a certain
**

(high) threshold, e.g. 90%

• Might have false positive and false negatives

A. Broder – Algorithms for near-duplicate documents February 18, 2005

27

**New approach – Use multiple perms
**

• [B ‘98] • Advantages

u

Simpler math ⇒ better understanding. Better for filtering

u

• Disadvantage

u

Time consuming

**• Similar approach independently proposed
**

[Indyk & Motwani ‘99]

A. Broder – Algorithms for near-duplicate documents February 18, 2005 28

by

Sketch construction

• Choose a set of t random permutations of U • For each document keep a sketch S(D) consisting of t

minima = samples

**• Estimate resemblance of A and B by counting
**

common samples

**• Need to worry about quality of randomness • The permutations should be from a min-wise
**

independent family of permutations.

A. Broder – Algorithms for near-duplicate documents February 18, 2005

29

**Min-wise independent permutations
**

• A truly random permutation on 264 elements is undoable. • Need an easy-to-represent polynomial size family of

permutations such that For every set X every element x in X has an equal chance to become the minimum

**• See [B, Charikar, Frieze, & Mitzenmacher ‘97].
**

A. Broder – Algorithms for near-duplicate documents February 18, 2005

30

**MWI Issues • Size of MWI families • How good are easy-to-implement families? (e.g.
**

linear transformation)

A. Broder – Algorithms for near-duplicate documents February 18, 2005

31

**Minimum size of MWI families P = 1/ X • Exact case
**

u

exponential UB = LB = lcm(1, 2, …,n)

Ł Ł

LB [BCFM ‘98], UB [Takei, Itoh, & Shinozaki] See also [Norin ‘02]

• Approximate case

u u

P = (1 ± ε ) / X

polynomial (non-constructive) O(n1/ε) [Indyk ‘98, Saks & al. ‘99]

**• “Application”: Derandomization of the
**

Rajagopalan-Vazirani approximate parallel set cover [B, Charikar, & Mitzenmacher ‘98]

A. Broder – Algorithms for near-duplicate documents February 18, 2005

32

Quality of MWI families

**• Linear transformation are not good in the
**

worst case but work reasonable well in practice.

u

See [BCFM ‘97], [Bohman, Cooper, & Frieze ’00] [B & Feige ‘00]

• Matrix transformations

u

• Some code available from

http://www.icsi.berkeley.edu/~zhao/minwise/ [Zhao ’05]

A. Broder – Algorithms for near-duplicate documents February 18, 2005

33

The filtering mechanism

Sketch 1: Sketch 2:

• Divide into k groups of s elements. (t = k * s) • Fingerprint each group => feature • Two documents are fungible if they have more than r

common features.

A. Broder – Algorithms for near-duplicate documents February 18, 2005

34

Real implementation

**• ρ = 90%. In a 1000 word page with shingle
**

length = 8 this corresponds to

Delete a paragraph of about 50-60 words. Ł Change 5-6 random words.

Ł

**• Sketch size t = 84, divided into k = 6 groups of
**

s = 14 samples

**• 8 bytes fingerprints → store 6 x 8= 48
**

bytes/document

**• Threshold r = 2 • Variant: 200 samples, divided into 8 groups of
**

25. Threshold r = 1.

A. Broder – Algorithms for near-duplicate documents February 18, 2005 35

**Probability that two documents are deemed fungible
**

Two documents with resemblance ρ

• Using the full sketch k ⋅s k ⋅ s i k ⋅s −i P = ∑ ρ (1 − ρ ) i =t i • Using features k k s⋅i s k −i P = ρ (1 − ρ ) i =r i • The second polynomial approximates the first

∑

A. Broder – Algorithms for near-duplicate documents February 18, 2005

36

**Features vs. full sketch
**

Probability that two pages are deemed fungible

Prob

Using full sketch Using features

Resemblance

A. Broder – Algorithms for near-duplicate documents February 18, 2005 37

Prob of acceptance - LOG scale

Using full sketch Using features

A. Broder – Algorithms for near-duplicate documents February 18, 2005

38

Prob of rejection - LOG scale

Using full sketch Using features

A. Broder – Algorithms for near-duplicate documents February 18, 2005

39

Timing

[B, Burrows, & Manasse 98]

**• 85M documents • 1000 word/doc • 300 MHz machines
**

Using many math and programming tricks plus DCPI tuning we got it down to 1.5 µsec/word !! 1 µsec/word ~ 1 CPU day

**• Speed ~ 3 MB/sec (20 X vs full sketch)
**

u

**Speed by 2001 ~ 10-20 MB/sec
**

40

A. Broder – Algorithms for near-duplicate documents February 18, 2005

One trick based on left-to-right minima [B, Burrows, Manasse]

**• For each shingle instead of a permutation
**

p(s) compute an injection h(s) • The injection h(s) consists of 1 byte + 8 bytes = p(s) • Given s compute the lead byte for 8 permutations in parallel via a random linear transformation • Compute the remaining 8 bytes only if needed • No theory, but it works! J

A. Broder – Algorithms for near-duplicate documents February 18, 2005 41

How often do we have to compute (or store) the tail ?

**• Eventually first byte = 0 so 1/256 of the
**

time.

• Up until the time this happens,

roughly the expected number of left to right minima in a permutation with 256 elements, H256 = 6.1243… (Because of repetitions, actual number is 7.1204…)

A. Broder – Algorithms for near-duplicate documents February 18, 2005

42

Small scale problems …

**• Most duplicates are within the same host
**

u

Aliasing

Unix ln –s is a big culprit!

u

Cookie crumbs problem

A. Broder – Algorithms for near-duplicate documents February 18, 2005

43

8 bytes are enough!

**• Same idea with a few twists, threshold = 3
**

common bytes out of 8.

u

Works only on small scale (say less than 50K documents)

**• On a large scale we can use 7 out of 8
**

bytes

u u

Why 7 common bytes is a good idea? Filter is not so sharp

A. Broder – Algorithms for near-duplicate documents February 18, 2005

44

Open problems

• Practical efficient min-wise permutations • Better filtering polynomials • Weighted sampling methods • Document representation as text (using

semantics) • Extensions beyond text: images, sounds, etc. (Must reduce problem to set intersection) • Extraction of grammar from cookie crumbs URLs (variants are NP-hard)

A. Broder – Algorithms for near-duplicate documents February 18, 2005 45

**Conclusions • Resemblance of documents can be estimated via
**

u u

Translation into set intersection problem Sampling minima

**• Filtering is easier than estimating resemblance. • 30-50 bytes/document is enough for a billion
**

documents, 8 bytes enough for small sets and/or less sharp filters

• Mixing theory & practice is a lot of fun

A. Broder – Algorithms for near-duplicate documents February 18, 2005

46

**Further applications & papers
**

• • • • • • • •

Chen & al, Selectively estimation for Boolean queries, PODS 2000 Cohen & al, Finding Interesting Associations, ICDE 2000 Haveliwala & al, Scalable Techniques for Clustering the Web, WebDB 2000 Chen & al, Counting Twig Matches in a Tree, ICDE 2001 Gionis & al, Efficient and tunable similar set retrieval, SIGMOD 2001 Charikar, Similarity Estimation Techniques from Rounding Algorithms, STOC 2002 Fogaras & Racz, Scaling link based similarity search, WWW 2005 (to appear) A bunch of math papers on “Min-Wise Independent Groups”

A. Broder – Algorithms for near-duplicate documents February 18, 2005

47

- LSH Banding for Large-Scale Retrieval With Memory and Recall Constraints (2009)
- 07www-Duplicates Main Paper for My Project
- Kernelized Locality-Sensitive Hasing for Scalable Image Search (2009)
- LSH Presentation
- nearduplicates2006
- Locality Sensitive Hash Functions
- Similarity Search in High Dimensions via Hashing (Original LSH With Hamming Distance)
- Scalable Techniques for Clustering the Web (2003)
- LSH Forest- Self-Tuning Indexes for Similarity Search (2005)
- Locality Sensitive Hashing- A Comparison of Hash Function Types and Querying Mechanism (2010)
- A Locality-Sensitive Hash for Real Vectors
- Syntactic Clustering of the Web
- Similarity Search and Locality Sensitive Hashing Using Ternary Content Address Able Memories (2010)
- Near-Optimal Hashing Algorithms for Near Neighbor Problem in High Dimensions
- Principles of Hash-based Text Retrieval.
- Efficient Clustering of Web-Derived Data Sets
- Min-Wise Independent Permutations (1998, 2000)
- Similarity Join Algorithms - An Introduction - SEBD08
- Approximate Nearest Neighbors - Towards Removing the Curse of Dimensionality
- Efficient Similarity Joins for Near Duplicate Detection
- Identifying and Filtering Near-Duplicate Documents (1998, 2000)
- Review Document Clustering
- Scaling Clustering Algorithms for Massive Data Sets Using Data Streams
- Detecting Near-Duplicates for Web Crawling (2007)
- Near Duplicate Document Detection for Google Enterprise Search (2008)
- 07www Duplicates
- Efficient Near Duplicate Document Detection for Specialized Corpora (2008)
- Achieving Both High Precision and High Recall in Near-duplicate Detection
- Similarity Estimation Techniques From Rounding Algorithms (2002)
- On the Resemblance and Containment of Documents (1997)

- IEvolve CPNI Policy 3 1 12
- Hulu Privacy Litigation
- Exhibits 1 18
- Kirch v. Embarq Management CO, 10th Cir. (2012)
- 2015 FCC CPNI Certification2.pdf
- Hulu Privacy
- SENATE HEARING, 109TH CONGRESS - SPYWARE
- Tracking Protection in Firefox For Privacy and Performance
- Online Advertising & Hidden Hazards to Consumer Security & Date Privacy
- Online Privacy Policy
- IEvolve CPNI policy 3 1 16.docx
- Google Browser Settlement
- Facebook Wiretap Act Complaint Copy
- Circ Report Publisher's Statement 9:30:24
- Nickelodeon Privacy Litigation
- Facebook Red-Lined Changes Version Of Data Use Policy
- Hulu Facebook Sharing Decision
- Google Cookie-Blocking Circumvention Appellate Ruling
- Google Inc. Cookie Placement Consumer Private Litigation
- Hulu Knowingly
- Changing cookie settings to enable Disqus commenting on thestate.com
- philly circ 9-25-11
- Internet Privacy and Self-Regulation
- The Methbot Operation
- Nickelodeon Consumer Privacy Litigation - VPPA privacy 3rd Circuit.pdf
- Hulu-SJ Order 2015
- Island Rail May 2010
- Facebook Plaintiffs Amend $15B Lawsuit on Day of Facebook IPO
- Comtel CPNI policy 2 26 2016.docx
- IEvolve CPNI policy 3 1 15.pdf

- Differences in Skin Properties of Korean Women at the Initial Aging Phase
- BabelNet- Building a Very Large Multilingual Semantic Network
- Generic and Scalable Framework for Automated Time-series Anomaly Detection (2015)
- Depixelizing Pixel Art
- Cuckoo Filter - Practically Better Than Bloom (2014)
- Miscellaneous Symbols and Pictographs Range
- Thoughworks Technology Radar Jan 2014 En
- Bayesian Filtering - Beyond Binary Classification
- Campbell PRS v1.1
- Everything You Always Wanted to Know About Synchronization but Were Afraid to Ask
- Rick
- Algorithmic Improvements for Fast Concurrent Cuckoo Hashing (2014)
- Distinct Counting With a Self-Learning Bitmap (2009)
- Optimizing Periodization and Program Design Muscle Performance Adaptations
- Barbell Brigade BAL Program
- Out of the Tar Pit
- SipHash
- HIERARCHICAL TEMPORAL MEMORY including HTM Cortical Learning Algorithms
- Julia Language Documentation
- Bacon Pancakes (FIXED)
- Cuisianart Convection Microwave Oven Receipes With Grill
- An Empirical Evaluation of Thompson Sampling (2011)
- ECMA-404
- In Search of an Understandable Consensus Algorithm (Raft, 2013)
- Terra
- Untangling the Web
- Hacking Lightbulbs
- The Lightning Memory-Mapped Database (LMDB)
- Analysis of the Go Runtime Scheduler
- How to Make More Shots

Sign up to vote on this title

UsefulNot usefulClose Dialog## Are you sure?

This action might not be possible to undo. Are you sure you want to continue?

Close Dialog## This title now requires a credit

Use one of your book credits to continue reading from where you left off, or restart the preview.

Loading