{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T21:26:44Z","timestamp":1772141204802,"version":"3.50.1"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319557526","type":"print"},{"value":"9783319557533","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-55753-3_38","type":"book-chapter","created":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T03:38:10Z","timestamp":1490067490000},"page":"607-622","source":"Crossref","is-referenced-by-count":13,"title":["Recovering Missing Values from Corrupted Spatio-Temporal Sensory Data via Robust Low-Rank Tensor Completion"],"prefix":"10.1007","author":[{"given":"Wenjie","family":"Ruan","sequence":"first","affiliation":[]},{"given":"Peipei","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Quan Z.","family":"Sheng","sequence":"additional","affiliation":[]},{"given":"Nickolas J. G.","family":"Falkner","sequence":"additional","affiliation":[]},{"given":"Xue","family":"Li","sequence":"additional","affiliation":[]},{"given":"Wei Emma","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,22]]},"reference":[{"issue":"1","key":"38_CR1","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1016\/j.chemolab.2010.08.004","volume":"106","author":"E Acar","year":"2011","unstructured":"Acar, E., Dunlavy, D.M., Kolda, T.G., M\u00f8rup, M.: Scalable tensor factorizations for incomplete data. Chemometr. Intell. Lab. Syst. 106(1), 41\u201356 (2011)","journal-title":"Chemometr. Intell. Lab. Syst."},{"issue":"1","key":"38_CR2","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1137\/080716542","volume":"2","author":"A Beck","year":"2009","unstructured":"Beck, A., Teboulle, M.: A fast iterative shrinkage-thresholding algorithm for linear inverse problems. SIAM J. Imaging Sci. 2(1), 183\u2013202 (2009)","journal-title":"SIAM J. Imaging Sci."},{"issue":"4","key":"38_CR3","doi-asserted-by":"crossref","first-page":"1956","DOI":"10.1137\/080738970","volume":"20","author":"JF Cai","year":"2010","unstructured":"Cai, J.F., Cand\u00e8s, E.J., Shen, Z.: A singular value thresholding algorithm for matrix completion. SIAM J. Optim. 20(4), 1956\u20131982 (2010)","journal-title":"SIAM J. Optim."},{"issue":"3","key":"38_CR4","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1145\/1970392.1970395","volume":"58","author":"EJ Cand\u00e8s","year":"2011","unstructured":"Cand\u00e8s, E.J., Li, X., Ma, Y., Wright, J.: Robust principal component analysis? J. ACM (JACM) 58(3), 11 (2011)","journal-title":"J. ACM (JACM)"},{"issue":"6","key":"38_CR5","doi-asserted-by":"crossref","first-page":"717","DOI":"10.1007\/s10208-009-9045-5","volume":"9","author":"EJ Cand\u00e8s","year":"2009","unstructured":"Cand\u00e8s, E.J., Recht, B.: Exact matrix completion via convex optimization. Found. Comput. Math. 9(6), 717\u2013772 (2009)","journal-title":"Found. Comput. Math."},{"issue":"7","key":"38_CR6","doi-asserted-by":"crossref","first-page":"4324","DOI":"10.1109\/TIT.2013.2249572","volume":"59","author":"Y Chen","year":"2013","unstructured":"Chen, Y., Jalali, A., Sanghavi, S., Caramanis, C.: Low-rank matrix recovery from errors and erasures. IEEE Trans. Info. Theor. 59(7), 4324\u20134337 (2013)","journal-title":"IEEE Trans. Info. Theor."},{"key":"38_CR7","unstructured":"Chen, Y., Xu, H., Caramanis, C., Sanghavi, S.: Robust matrix completion with corrupted columns. arXiv preprint (2011). arXiv:1102.2254"},{"key":"38_CR8","doi-asserted-by":"crossref","unstructured":"Da Silva, C., Herrmann, F.J.: Hierarchical tucker tensor optimization-applications to tensor completion. In: Proceedings of 10th International Conference on Sampling Theory and Applications (2013)","DOI":"10.3997\/2214-4609.20130390"},{"issue":"4","key":"38_CR9","doi-asserted-by":"crossref","first-page":"2233","DOI":"10.1109\/TII.2014.2300753","volume":"10","author":"L Xu Da","year":"2014","unstructured":"Da Xu, L., He, W., Li, S.: Internet of things in industries: a survey. IEEE Trans. Industr. Inf. 10(4), 2233\u20132243 (2014)","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"2","key":"38_CR10","doi-asserted-by":"crossref","first-page":"025010","DOI":"10.1088\/0266-5611\/27\/2\/025010","volume":"27","author":"S Gandy","year":"2011","unstructured":"Gandy, S., Recht, B., Yamada, I.: Tensor completion and low-n-rank tensor recovery via convex optimization. Inverse Prob. 27(2), 025010 (2011)","journal-title":"Inverse Prob."},{"issue":"1","key":"38_CR11","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1137\/130905010","volume":"35","author":"D Goldfarb","year":"2014","unstructured":"Goldfarb, D., Qin, Z.: Robust low-rank tensor recovery: models and algorithms. SIAM J. Matrix Anal. Appl. 35(1), 225\u2013253 (2014)","journal-title":"SIAM J. Matrix Anal. Appl."},{"key":"38_CR12","volume-title":"Kalman Filtering","author":"MS Grewal","year":"2011","unstructured":"Grewal, M.S.: Kalman Filtering. Springer, Heidelberg (2011)"},{"key":"38_CR13","doi-asserted-by":"crossref","unstructured":"Hazan, T., Polak, S., Shashua, A.: Sparse image coding using a 3D non-negative tensor factorization. In: Tenth IEEE International Conference on Computer Vision, ICCV 2005, vol. 1, pp. 50\u201357. IEEE (2005)","DOI":"10.1109\/ICCV.2005.228"},{"key":"38_CR14","doi-asserted-by":"crossref","unstructured":"Hsieh, H.P., Lin, S.D., Zheng, Y.: Inferring air quality for station location recommendation based on urban big data. In: Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 437\u2013446 (2015)","DOI":"10.1145\/2783258.2783344"},{"issue":"4","key":"38_CR15","doi-asserted-by":"crossref","first-page":"1122","DOI":"10.1137\/100817206","volume":"4","author":"H Ji","year":"2011","unstructured":"Ji, H., Huang, S., Shen, Z., Xu, Y.: Robust video restoration by joint sparse and low rank matrix approximation. SIAM J. Imaging Sci. 4(4), 1122\u20131142 (2011)","journal-title":"SIAM J. Imaging Sci."},{"issue":"3","key":"38_CR16","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1137\/07070111X","volume":"51","author":"TG Kolda","year":"2009","unstructured":"Kolda, T.G., Bader, B.W.: Tensor decompositions and applications. SIAM Rev. 51(3), 455\u2013500 (2009)","journal-title":"SIAM Rev."},{"issue":"6","key":"38_CR17","doi-asserted-by":"crossref","first-page":"V273","DOI":"10.1190\/geo2013-0022.1","volume":"78","author":"N Kreimer","year":"2013","unstructured":"Kreimer, N., Stanton, A., Sacchi, M.D.: Tensor completion based on nuclear norm minimization for 5D seismic data reconstruction. Geophysics 78(6), V273\u2013V284 (2013)","journal-title":"Geophysics"},{"issue":"2","key":"38_CR18","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1007\/s10543-013-0455-z","volume":"54","author":"D Kressner","year":"2014","unstructured":"Kressner, D., Steinlechner, M., Vandereycken, B.: Low-rank tensor completion by Riemannian optimization. BIT Numer. Math. 54(2), 447\u2013468 (2014)","journal-title":"BIT Numer. Math."},{"key":"38_CR19","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1017\/S0021900200104693","volume":"14","author":"A Lawrance","year":"1977","unstructured":"Lawrance, A., Lewis, P.: An exponential moving-average sequence and point process. J. Appl. Probab. 14, 98\u2013113 (1977)","journal-title":"J. Appl. Probab."},{"key":"38_CR20","unstructured":"Lin, Z., Chen, M., Ma, Y.: The augmented lagrange multiplier method for exact recovery of corrupted low-rank matrices. arXiv preprint (2010). arXiv:1009.5055"},{"key":"38_CR21","doi-asserted-by":"crossref","unstructured":"Liu, J., Musialski, P., Wonka, P., Ye, J.: Tensor completion for estimating missing values in visual data. In: 2009 IEEE 12th International Conference on Computer Vision, pp. 2114\u20132121. IEEE (2009)","DOI":"10.1109\/ICCV.2009.5459463"},{"issue":"4","key":"38_CR22","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MEMB.1985.5006224","volume":"4","author":"AM Norcia","year":"1985","unstructured":"Norcia, A.M., Clarke, M., Tyler, C.W.: Digital filtering and robust regression techniques for estimating sensory thresholds from the evoked potential. IEEE Eng. Med. Biol. Mag. 4(4), 26\u201332 (1985)","journal-title":"IEEE Eng. Med. Biol. Mag."},{"key":"38_CR23","doi-asserted-by":"crossref","unstructured":"Ruan, W., Sheng, Q.Z., Yao, L., Gu, T., Ruta, M., Shangguan, L.: Device-free indoor localization and tracking through human-object interactions. In: 2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1\u20139. IEEE (2016)","DOI":"10.1109\/WoWMoM.2016.7523524"},{"key":"38_CR24","doi-asserted-by":"crossref","unstructured":"Ruan, W., Xu, P., Sheng, Q.Z., Tran, N.K., Falkner, N.J., Li, X., Zhang, W.E.: When sensor meets tensor: filling missing sensor values through a tensor approach. In: Proceedings of the 25th ACM International on Conference on Information and Knowledge Management, pp. 2025\u20132028. ACM (2016)","DOI":"10.1145\/2983323.2983900"},{"key":"38_CR25","doi-asserted-by":"crossref","unstructured":"Ruan, W., Yao, L., Sheng, Q.Z., Falkner, N., Li, X., Gu, T.: TagFall: towards unobstructive fine-grained fall detection based on UHF passive RFID tags. In: Proceedings of the 12th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, pp. 140\u2013149 (2015)","DOI":"10.4108\/eai.22-7-2015.2260072"},{"key":"38_CR26","doi-asserted-by":"crossref","unstructured":"Sakurai, Y., Matsubara, Y., Faloutsos, C.: Mining and forecasting of big time-series data. In: Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, pp. 919\u2013922. ACM (2015)","DOI":"10.1145\/2723372.2731081"},{"key":"38_CR27","unstructured":"Signoretto, M., De Lathauwer, L., Suykens, J.A.: Nuclear norms for tensors and their use for convex multilinear estimation. Linear Algebra Appl. 43 (2010)"},{"key":"38_CR28","doi-asserted-by":"crossref","unstructured":"Sun, J., Tao, D., Faloutsos, C.: Beyond streams and graphs: dynamic tensor analysis. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 374\u2013383. ACM (2006)","DOI":"10.1145\/1150402.1150445"},{"issue":"615\u2013640","key":"38_CR29","first-page":"15","volume":"6","author":"KC Toh","year":"2010","unstructured":"Toh, K.C., Yun, S.: An accelerated proximal gradient algorithm for nuclear norm regularized linear least squares problems. Pac. J. Optim. 6(615\u2013640), 15 (2010)","journal-title":"Pac. J. Optim."},{"key":"38_CR30","unstructured":"Tomioka, R., Hayashi, K., Kashima, H.: Estimation of low-rank tensors via convex optimization. arXiv preprint (2010). arXiv:1010.0789"},{"key":"38_CR31","unstructured":"Wright, J., Ganesh, A., Rao, S., Peng, Y., Ma, Y.: Robust principal component analysis: exact recovery of corrupted low-rank matrices via convex optimization. In: Advances in Neural Information Processing Systems, pp. 2080\u20132088 (2009)"},{"key":"38_CR32","unstructured":"Xiuwen Yi, Y., Zheng, J.: ST-MVL: filling missing values in geo-sensory time series data. In: IJCAI 2016 (2016)"},{"key":"38_CR33","doi-asserted-by":"crossref","unstructured":"Yao, L., Ruan, W., Sheng, Q.Z., Li, X., Falkner, N.J.: Exploring tag-free RFID-based passive localization and tracking via learning-based probabilistic approaches. In: Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, pp. 1799\u20131802. ACM (2014)","DOI":"10.1145\/2661829.2661873"}],"container-title":["Lecture Notes in Computer Science","Database Systems for Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-55753-3_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,20]],"date-time":"2019-09-20T00:47:42Z","timestamp":1568940462000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-55753-3_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319557526","9783319557533"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-55753-3_38","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}