{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T14:48:49Z","timestamp":1777128529123,"version":"3.51.4"},"publisher-location":"Singapore","reference-count":54,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811555763","type":"print"},{"value":"9789811555770","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-5577-0_53","type":"book-chapter","created":{"date-parts":[[2020,5,25]],"date-time":"2020-05-25T13:02:46Z","timestamp":1590411766000},"page":"662-677","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Imputation Methods Used in Missing Traffic Data: A Literature Review"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1860-2777","authenticated-orcid":false,"given":"Pan","family":"Wu","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lunhui","family":"Xu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zilin","family":"Huang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,5,26]]},"reference":[{"key":"53_CR1","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.trc.2012.12.007","volume":"28","author":"H Tan","year":"2013","unstructured":"Tan, H., Feng, G., Feng, J., et al.: A tensor-based method for missing traffic data completion. Transp. Res. Part C Emerg. Technol. 28, 15\u201327 (2013)","journal-title":"Transp. Res. Part C Emerg. Technol."},{"key":"53_CR2","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/j.trc.2018.11.003","volume":"98","author":"X Chen","year":"2019","unstructured":"Chen, X., He, Z., Sun, L.: A Bayesian tensor decomposition approach for spatiotemporal traffic data imputation. Transp. Res. Part C Emerg. Technol. 98, 73\u201384 (2019). \nhttps:\/\/doi.org\/10.1016\/j.trc.2018.11.003","journal-title":"Transp. Res. Part C Emerg. Technol."},{"issue":"4","key":"53_CR3","doi-asserted-by":"publisher","first-page":"1624","DOI":"10.1109\/TITS.2011.2158001","volume":"12","author":"J Zhang","year":"2011","unstructured":"Zhang, J., Wang, F.Y., Wang, K., et al.: Data-driven intelligent transportation systems: a survey. IEEE Trans. Intell. Transp. Syst. 12(4), 1624\u20131639 (2011). \nhttps:\/\/doi.org\/10.1109\/TITS.2011.2158001","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"53_CR4","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/j.trc.2011.12.006","volume":"22","author":"C Chen","year":"2012","unstructured":"Chen, C., Wang, Y., Li, L., Hu, J., Zhang, Z.: The retrieval of intra-day trend and its influence on traffic prediction. Transp. Res. Part C Emerg. Technol. 22, 103\u2013118 (2012). \nhttps:\/\/doi.org\/10.1016\/j.trc.2011.12.006","journal-title":"Transp. Res. Part C Emerg. Technol."},{"key":"53_CR5","doi-asserted-by":"publisher","first-page":"116","DOI":"10.3141\/1867-14","volume":"1867","author":"HM Al-Deek","year":"2004","unstructured":"Al-Deek, H.M., Venkata, C., Chandra, S.R.: New algorithms for filtering and imputation of real-time and archived dual-loop detector data in I-4 data warehouse. Transp. Res. Rec. J. Transp. Res. Board 1867, 116\u2013126 (2004). \nhttps:\/\/doi.org\/10.3141\/1867-14","journal-title":"Transp. Res. Rec. J. Transp. Res. Board"},{"issue":"3","key":"53_CR6","doi-asserted-by":"publisher","first-page":"512","DOI":"10.1109\/TITS.2009.2026312","volume":"10","author":"L Qu","year":"2009","unstructured":"Qu, L., Li, L., Zhang, Y., Hu, J.: PPCA-based missing data imputation for traffic flow volume: a systematical approach. IEEE Trans. Intell. Transp. Syst. 10(3), 512\u2013522 (2009). \nhttps:\/\/doi.org\/10.1109\/TITS.2009.2026312","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"9","key":"53_CR7","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1016\/j.trc.2013.05.008","volume":"34","author":"L Li","year":"2013","unstructured":"Li, L., Li, Y., Li, Z.: Efficient missing data imputing for traffic flow by considering temporal and spatial dependence. Transp. Res. Part C Emerg. Technol. 34(9), 108\u2013120 (2013). \nhttps:\/\/doi.org\/10.1016\/j.trc.2013.05.008","journal-title":"Transp. Res. Part C Emerg. Technol."},{"key":"53_CR8","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.trc.2014.01.005","volume":"43","author":"EI Vlahogianni","year":"2014","unstructured":"Vlahogianni, E.I., Karlaftis, M.G., Golias, J.C.: Short-term traffic forecasting: where we are and where we\u2019re going. Transp. Res. Part C Emerg. Technol. 43, 3\u201319 (2014)","journal-title":"Transp. Res. Part C Emerg. Technol."},{"key":"53_CR9","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821862","volume-title":"Analysis of Incomplete Multivariate Data","author":"JL Schafer","year":"1997","unstructured":"Schafer, J.L.: Analysis of Incomplete Multivariate Data. CRC Press, Boca Raton (1997)"},{"key":"53_CR10","doi-asserted-by":"publisher","DOI":"10.1201\/b11826","volume-title":"Flexible Imputation of Missing Data","author":"SV Buuren","year":"2012","unstructured":"Buuren, S.V.: Flexible Imputation of Missing Data. CRC Press, Boca Raton (2012)"},{"issue":"8\u201310","key":"53_CR11","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1002\/cem.750","volume":"16","author":"F Arteaga","year":"2002","unstructured":"Arteaga, F., Ferrer, A.: Dealing with missing data in MSPC: several methods, different interpretations, some examples. J. Chemom. 16(8\u201310), 408\u2013418 (2002)","journal-title":"J. Chemom."},{"issue":"2","key":"53_CR12","doi-asserted-by":"publisher","first-page":"151","DOI":"10.5194\/npg-13-151-2006","volume":"13","author":"D Kondrashov","year":"2006","unstructured":"Kondrashov, D., Ghil, M.: Spatio-temporal filling of missing points in geophysical data sets. Nonlinear Process. Geophys. 13(2), 151\u2013159 (2006)","journal-title":"Nonlinear Process. Geophys."},{"issue":"9","key":"53_CR13","doi-asserted-by":"publisher","first-page":"990","DOI":"10.1016\/j.pmrj.2015.07.011","volume":"7","author":"KL Sainani","year":"2015","unstructured":"Sainani, K.L.: Dealing with missing data. PM&R 7(9), 990\u2013994 (2015)","journal-title":"PM&R"},{"issue":"2","key":"53_CR14","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/s00521-009-0295-6","volume":"19","author":"PJ Garc\u00eda-Laencina","year":"2010","unstructured":"Garc\u00eda-Laencina, P.J., et al.: Pattern classification with missing data: a review. Neural Comput. Appl. 19(2), 263\u2013282 (2010). \nhttps:\/\/doi.org\/10.1007\/s00521-009-0295-6","journal-title":"Neural Comput. Appl."},{"issue":"1","key":"53_CR15","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1049\/iet-its.2013.0052","volume":"8","author":"L Li","year":"2014","unstructured":"Li, L., Li, Y., Li, Z.: Missing traffic data: comparison of imputation methods. IET Intell. Transp. Syst. 8(1), 51\u201357 (2014). \nhttps:\/\/doi.org\/10.1049\/iet-its.2013.0052","journal-title":"IET Intell. Transp. Syst."},{"issue":"6","key":"53_CR16","doi-asserted-by":"publisher","first-page":"1762","DOI":"10.1109\/TITS.2016.2530312","volume":"17","author":"S Tak","year":"2016","unstructured":"Tak, S., Woo, S., Yeo, H.: Data-driven imputation method for traffic data in sectional units of road links. IEEE Trans. Intell. Transp. Syst. 17(6), 1762\u20131771 (2016). \nhttps:\/\/doi.org\/10.1109\/TITS.2016.2530312","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"53_CR17","doi-asserted-by":"crossref","unstructured":"Sun, B., Ma, L., et al.: An improved k-nearest neighbours method for traffic time series imputation. In: 2017 Chinese Automation Congress (CAC), pp. 7346\u20137351. IEEE (2017)","DOI":"10.1109\/CAC.2017.8244105"},{"key":"53_CR18","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/j.measurement.2017.10.066","volume":"116","author":"MM Zefreh","year":"2018","unstructured":"Zefreh, M.M., Torok, A.: Single loop detector data validation and imputation of missing data. Measurement 116, 193\u2013198 (2018). \nhttps:\/\/doi.org\/10.1016\/j.measurement.2017.10.066","journal-title":"Measurement"},{"key":"53_CR19","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1080\/13658816.2011.609488","volume":"26","author":"H Zou","year":"2012","unstructured":"Zou, H., Yue, Y., Li, Q., Yeh, A.G.O.: An improved distance metric for the interpolation of link-based traffic data using kriging: a case study of a large-scale urban road network. Int. J. Geogr. Inf. Sci. 26, 667\u2013689 (2012)","journal-title":"Int. J. Geogr. Inf. Sci."},{"key":"53_CR20","doi-asserted-by":"publisher","first-page":"04014022","DOI":"10.1061\/(ASCE)CP.1943-5487.0000281","volume":"29","author":"B Shamo","year":"2015","unstructured":"Shamo, B., Asa, E., Membah, J.: Linear spatial interpolation and analysis of annual average daily traffic data. J. Comput. Civil Eng. 29, 04014022 (2015)","journal-title":"J. Comput. Civil Eng."},{"issue":"1","key":"53_CR21","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1109\/TPAMI.2012.39","volume":"35","author":"J Liu","year":"2013","unstructured":"Liu, J., Musialski, P., Wonka, P., Ye, J.: Tensor completion for estimating missing values in visual data. EEE Trans. Pattern Anal. Mach. Intell. 35(1), 208\u2013220 (2013)","journal-title":"EEE Trans. Pattern Anal. Mach. Intell."},{"issue":"7","key":"53_CR22","doi-asserted-by":"publisher","first-page":"1816","DOI":"10.1109\/TITS.2015.2507259","volume":"17","author":"MT Asif","year":"2016","unstructured":"Asif, M.T., Mitrovic, N., Dauwels, J., Jaillet, P.: Matrix and tensor based methods for missing data estimation in large traffic networks. IEEE Trans. Intell. Transp. Syst. 17(7), 1816\u20131825 (2016). \nhttps:\/\/doi.org\/10.1109\/TITS.2015.2507259","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"53_CR23","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1016\/j.physa.2015.09.105","volume":"446","author":"B Ran","year":"2016","unstructured":"Ran, B., Tan, H., Wu, Y., Jin, P.J.: Tensor based missing traffic data completion with spatial-temporal correlation. Phys. Stat. Mech. Appl. 446, 54\u201363 (2016)","journal-title":"Phys. Stat. Mech. Appl."},{"key":"53_CR24","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1016\/j.trc.2017.09.011","volume":"85","author":"JHM Goulart","year":"2017","unstructured":"Goulart, J.H.M., Kibangou, A.Y., Favier, G.: Traffic data imputation via tensor completion based on soft thresholding of Tucker core. Transp. Res. Part C Emerg. Technol. 85, 348\u2013362 (2017). \nhttps:\/\/doi.org\/10.1016\/j.trc.2017.09.011","journal-title":"Transp. Res. Part C Emerg. Technol."},{"key":"53_CR25","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.trc.2017.10.023","volume":"86","author":"X Chen","year":"2018","unstructured":"Chen, X., He, Z., Wang, J.: Spatial-temporal traffic speed patterns discovery and incomplete data recovery via SVD-combined tensor decomposition. Transp. Res. Part C Emerg. Technol. 86, 59\u201377 (2018). \nhttps:\/\/doi.org\/10.1016\/j.trc.2017.10.023","journal-title":"Transp. Res. Part C Emerg. Technol."},{"key":"53_CR26","unstructured":"Payne, H.J., Helfenbein, E.D., Knobel, H.C.: Development and testing of incident detection algorithms, volume 2: research methodology and detailed results. Federal Highway Administration, Washington, D.C. (1976)"},{"key":"53_CR27","unstructured":"Jacobson, L.N., Nihan, N.L., Bender, J.D.: Detecting erroneous loop detector data in a freeway traffic management system. Transp. Res. Rec. (1287), 151\u2013166 (1990)"},{"key":"53_CR28","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1093\/biomet\/63.3.581","volume":"63","author":"DB Rubin","year":"1976","unstructured":"Rubin, D.B.: Inference and missing data. Biometrika 63, 581\u2013592 (1976)","journal-title":"Biometrika"},{"key":"53_CR29","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.trc.2014.11.003","volume":"51","author":"J Tang","year":"2015","unstructured":"Tang, J., Zhang, G., Wang, Y., Wang, H., Liu, F.: A hybrid approach to integrate fuzzy C-means based imputation method with genetic algorithm for missing traffic volume data estimation. Transp. Res. Part C Emerg. Technol. 51, 29\u201340 (2015)","journal-title":"Transp. Res. Part C Emerg. Technol."},{"key":"53_CR30","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1016\/j.trc.2016.09.015","volume":"72","author":"Y Duan","year":"2016","unstructured":"Duan, Y., Lv, Y., Liu, Y.L., Wang, F.Y.: An efficient realization of deep learning for traffic data imputation. Transp. Res. Part C Emerg. Technol. 72, 168\u2013181 (2016)","journal-title":"Transp. Res. Part C Emerg. Technol."},{"issue":"4","key":"53_CR31","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1076\/edre.7.4.353.8937","volume":"7","author":"TD Pigott","year":"2001","unstructured":"Pigott, T.D.: A review of methods for missing data. Educ. Res. Eval. 7(4), 353\u2013383 (2001). \nhttps:\/\/doi.org\/10.1076\/edre.7.4.353.8937","journal-title":"Educ. Res. Eval."},{"issue":"3","key":"53_CR32","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1080\/15472450.2012.694788","volume":"16","author":"W Yin","year":"2012","unstructured":"Yin, W., Murray-Tuite, P., Rakha, H.: Imputing erroneous data of single-station loop detectors for nonincident conditions: comparison between temporal and spatial methods. J. Intell. Transp. Syst. 16(3), 159\u2013176 (2012)","journal-title":"J. Intell. Transp. Syst."},{"key":"53_CR33","first-page":"1117","volume":"30","author":"JR Xu","year":"2010","unstructured":"Xu, J.R., Li, X.Y., Shi, H.J.: Short-term traffic flow forecasting model under missing data. J. Comput. Appl. 30, 1117\u20131120 (2010)","journal-title":"J. Comput. Appl."},{"key":"53_CR34","doi-asserted-by":"publisher","first-page":"179","DOI":"10.3141\/1678-22","volume":"1678","author":"S Lee","year":"1999","unstructured":"Lee, S., Fambro, D.B.: Application of subset autoregressive integrated moving average model for short-term freeway traffic volume forecasting. Transp. Res. Rec. J. Transp. Res. Board 1678, 179\u2013188 (1999)","journal-title":"Transp. Res. Rec. J. Transp. Res. Board"},{"key":"53_CR35","doi-asserted-by":"publisher","first-page":"6164","DOI":"10.1016\/j.eswa.2008.07.069","volume":"36","author":"M Castro-Neto","year":"2009","unstructured":"Castro-Neto, M., Jeong, Y.S., Jeong, M.K., et al.: Online-SVR for short-term traffic flow prediction under typical and atypical traffic conditions. Expert Syst. Appl. 36, 6164\u20136173 (2009). \nhttps:\/\/doi.org\/10.1016\/j.eswa.2008.07.069","journal-title":"Expert Syst. Appl."},{"issue":"2","key":"53_CR36","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1080\/21680566.2014.892847","volume":"2","author":"JM Chiou","year":"2014","unstructured":"Chiou, J.M., Zhang, Y.C., Chen, W.H., et al.: A functional data approach to missing value imputation and outlier detection for traffic flow data. Transp. B Transp. Dyn. 2(2), 106\u2013129 (2014). \nhttps:\/\/doi.org\/10.1080\/21680566.2014.892847","journal-title":"Transp. B Transp. Dyn."},{"key":"53_CR37","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/157597","author":"H Tan","year":"2014","unstructured":"Tan, H., Feng, J., Chen, Z., et al.: Low multilinear rank approximation of tensors and application in missing traffic data. Adv. Mech. Eng (2014). \nhttps:\/\/doi.org\/10.1155\/2014\/157597","journal-title":"Adv. Mech. Eng"},{"key":"53_CR38","first-page":"2773","volume":"15","author":"A Anandkumar","year":"2014","unstructured":"Anandkumar, A., Ge, R., Hsu, D., Kakade, S.M., Telgarsky, M.: Tensor decompositions for learning latent variable models. J. Mach. Learn. Res. 15, 2773\u20132832 (2014)","journal-title":"J. Mach. Learn. Res."},{"key":"53_CR39","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1002\/sapm192761164","volume":"6","author":"FL Hitchcock","year":"1927","unstructured":"Hitchcock, F.L.: The expression of a tensor or a polyadic as a sum of products. J. Math. Phys. 6, 164\u2013189 (1927). \nhttps:\/\/doi.org\/10.1002\/sapm192761164","journal-title":"J. Math. Phys."},{"issue":"3","key":"53_CR40","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/BF02289464","volume":"31","author":"L Tucker","year":"1966","unstructured":"Tucker, L.: Some mathematical notes on three-mode factor analysis. Psychometrika 31(3), 279\u2013311 (1966)","journal-title":"Psychometrika"},{"key":"53_CR41","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/BF02310791","volume":"35","author":"JD Carroll","year":"1970","unstructured":"Carroll, J.D., Chang, J.J.: Analysis of individual differences in multidimensional scaling via an N-way generalization of \u201cEckart-Young\u201d decomposition. Psychometrika 35, 283\u2013319 (1970)","journal-title":"Psychometrika"},{"issue":"3","key":"53_CR42","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1137\/07070111X","volume":"51","author":"TG Kolda","year":"2009","unstructured":"Kolda, T.G., Bader, B.W.: Tensor decompositions and applications. SIAM Rev. 51(3), 455\u2013500 (2009). \nhttps:\/\/doi.org\/10.1137\/07070111X","journal-title":"SIAM Rev."},{"issue":"2","key":"53_CR43","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/2532169","volume":"8","author":"C Schifanella","year":"2014","unstructured":"Schifanella, C., Candan, K.S., Sapino, M.L.: Multiresolution tensor decompositions with mode hierarchies. ACM Trans. Knowl. Discov. Data 8(2), 10 (2014)","journal-title":"ACM Trans. Knowl. Discov. Data"},{"issue":"1","key":"53_CR44","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.chemolab.2010.08.004","volume":"106","author":"E Acar","year":"2011","unstructured":"Acar, E., Dunlavy, D.M., Kolda, T.G., M\u00f8rup, M.: Scalable tensor factorizations for incomplete data. Chemom. Intell. Lab. Syst. 106(1), 41\u201356 (2011)","journal-title":"Chemom. Intell. Lab. Syst."},{"issue":"9","key":"53_CR45","doi-asserted-by":"publisher","first-page":"1751","DOI":"10.1109\/TPAMI.2015.2392756","volume":"37","author":"Q Zhao","year":"2015","unstructured":"Zhao, Q., Zhang, L., Cichocki, A.: Bayesian CP factorization of incomplete tensors with automatic rank determination. IEEE Trans. Pattern Anal. Mach. Intell. 37(9), 1751\u20131763 (2015). \nhttps:\/\/doi.org\/10.1109\/TPAMI.2015.2392756","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"53_CR46","doi-asserted-by":"crossref","unstructured":"Wang, Y., Zheng, Y., Xue, Y.: Travel time estimation of a path using sparse trajectories. In: Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2014, pp. 374\u2013383 ACM (2014)","DOI":"10.1145\/2623330.2623656"},{"key":"53_CR47","doi-asserted-by":"publisher","unstructured":"Salakhutdinov, R., Mnih, A.: Bayesian probabilistic matrix factorization using Markov chain Monte Carlo. In: Proceedings of the 25th International Conference on Machine Learning (ICML) (2008). \nhttps:\/\/doi.org\/10.1145\/1390156.1390267","DOI":"10.1145\/1390156.1390267"},{"key":"53_CR48","doi-asserted-by":"publisher","unstructured":"Xiong, L., Chen, X., Huang, T.K., Schneider, J., Carbonell, J.G.: Temporal collaborative filtering with Bayesian probabilistic tensor factorization. In: SIAM International Conference on Data Mining, pp. 211\u2013222 (2010). \nhttps:\/\/doi.org\/10.1137\/1.9781611972801.19","DOI":"10.1137\/1.9781611972801.19"},{"key":"53_CR49","unstructured":"Rai, P., Wang, Y., Guo, S., Chen, G., Dunson, D., Carin, L.: Scalable Bayesian low-rank decomposition of incomplete multiway tensors. In: Proceedings of the 31st International Conference on Machine Learning (ICML), vol. 32, pp. 1800\u20131808 (2014)"},{"issue":"8","key":"53_CR50","doi-asserted-by":"publisher","first-page":"2123","DOI":"10.1109\/TITS.2015.2513411","volume":"17","author":"H Tan","year":"2016","unstructured":"Tan, H., Wu, Y., Shen, B., Jin, P.J., Ran, B.: Short-term traffic prediction based on dynamic tensor completion. IEEE Trans. Intell. Transp. Syst. 17(8), 2123\u20132133 (2016)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"4","key":"53_CR51","doi-asserted-by":"publisher","first-page":"1253","DOI":"10.1137\/S0895479896305696","volume":"21","author":"L De Lathauwer","year":"2000","unstructured":"De Lathauwer, L., De Moor, B., Vandewalle, J.: A multilinear singular value decomposition. SIAM J. Matrix Anal. Appl. 21(4), 1253\u20131278 (2000)","journal-title":"SIAM J. Matrix Anal. Appl."},{"issue":"6","key":"53_CR52","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1007\/s10208-009-9045-5","volume":"9","author":"EJ Cand\u00e8s","year":"2009","unstructured":"Cand\u00e8s, E.J., Recht, B.: Exact matrix completion via convex optimization. Found. Comput. Math. 9(6), 717\u2013772 (2009). \nhttps:\/\/doi.org\/10.1007\/s10208-009-9045-5","journal-title":"Found. Comput. Math."},{"issue":"4","key":"53_CR53","doi-asserted-by":"publisher","first-page":"1956","DOI":"10.1137\/080738970","volume":"20","author":"JF Cai","year":"2010","unstructured":"Cai, J.F., Cand\u00e8s, E.J., Shen, Z.: A singular value thresholding algorithm for matrix completion. SIAM J. Optim. 20(4), 1956\u20131982 (2010). \nhttps:\/\/doi.org\/10.1137\/080738970","journal-title":"SIAM J. Optim."},{"issue":"2","key":"53_CR54","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1088\/0266-5611\/27\/2\/025010","volume":"27","author":"S Gandy","year":"2011","unstructured":"Gandy, S., Recht, B., Yamada, I.: Tensor completion and low-n-rank tensor recovery via convex optimization. Inverse Probl. 27(2), 1\u201320 (2011). \nhttps:\/\/doi.org\/10.1088\/0266-5611\/27\/2\/025010","journal-title":"Inverse Probl."}],"container-title":["Communications in Computer and Information Science","Artificial Intelligence Algorithms and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-5577-0_53","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,25]],"date-time":"2020-05-25T13:09:50Z","timestamp":1590412190000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-5577-0_53"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811555763","9789811555770"],"references-count":54,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-5577-0_53","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"26 May 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISICA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Intelligence Computation and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 November 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 November 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isica2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/gdstinfo.cn\/isica2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"112","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"45","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}