{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:24:53Z","timestamp":1740122693227,"version":"3.37.3"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2016,4,22]],"date-time":"2016-04-22T00:00:00Z","timestamp":1461283200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Wireless Inf Networks"],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1007\/s10776-016-0308-1","type":"journal-article","created":{"date-parts":[[2016,4,22]],"date-time":"2016-04-22T09:33:47Z","timestamp":1461317627000},"page":"97-111","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["In-Network Principal Component Analysis with Diffusion Strategies"],"prefix":"10.1007","volume":"23","author":[{"given":"Nisrine","family":"Ghadban","sequence":"first","affiliation":[]},{"given":"Paul","family":"Honeine","sequence":"additional","affiliation":[]},{"given":"Farah","family":"Mourad-Chehade","sequence":"additional","affiliation":[]},{"given":"Clovis","family":"Francis","sequence":"additional","affiliation":[]},{"given":"Joumana","family":"Farah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,4,22]]},"reference":[{"issue":"4","key":"308_CR1","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1002\/wics.101","volume":"2","author":"H Abdi","year":"2010","unstructured":"Abdi, H., Williams, L.J.: Principal component analysis. Wiley Interdisciplinary Reviews: Computational Statistics 2(4), 433\u2013459 (2010). doi: 10.1002\/wics.101","journal-title":"Wiley Interdisciplinary Reviews: Computational Statistics"},{"issue":"9","key":"308_CR2","doi-asserted-by":"crossref","first-page":"1814","DOI":"10.1109\/TPAMI.2011.270","volume":"34","author":"P Honeine","year":"2012","unstructured":"Honeine, P.: Online kernel principal component analysis: a reduced-order model. IEEE Transactions on Pattern Analysis and Machine Intelligence 34(9), 1814\u20131826 (2012)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"308_CR3","doi-asserted-by":"crossref","unstructured":"Chitradevi, N., Baskaran, K., Palanisamy, V., Aswini, D.: Designingan efficient PCA based data model for wireless sensor networks. In: Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief. ACWR \u201911, pp. 147\u2013154. ACM, New York, NY, USA (2011)","DOI":"10.1145\/2185216.2185262"},{"key":"308_CR4","doi-asserted-by":"crossref","unstructured":"Chen, F., Wen, F., Jia, H.: Algorithm of data compression based on multiple principal component analysis over the wsn. In: 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM), pp. 1\u20134 (2010)","DOI":"10.1109\/WICOM.2010.5601180"},{"key":"308_CR5","doi-asserted-by":"crossref","unstructured":"Rooshenas, A., Rabiee, H., Movaghar, A., Naderi, M.: Reducing the data transmission in wireless sensor networks using the principal component analysis. In: Sixth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), pp. 133\u2013138 (2010). doi: 10.1109\/ISSNIP.2010.5706781","DOI":"10.1109\/ISSNIP.2010.5706781"},{"key":"308_CR6","doi-asserted-by":"crossref","unstructured":"Ahmadi Livani, M., Abadi, M.: A PCA-based distributed approach for intrusion detection in wireless sensor networks. In: 2011 International Symposium on Computer Networks and Distributed Systems (CNDS), pp. 55\u201360 (2011)","DOI":"10.1109\/CNDS.2011.5764585"},{"key":"308_CR7","first-page":"617","volume-title":"In-network PCA and anomaly detection","author":"L Huang","year":"2006","unstructured":"Huang, L., Nguyen, X., Garofalakis, M., Jordan, M., Joseph, A., Taft, N.: In-network PCA and anomaly detection, 19th edn., pp. 617\u2013624. MIT Press, Cambridge, MA (2006)","edition":"19"},{"key":"308_CR8","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/BF01397471","volume":"31","author":"JR Bunch","year":"1978","unstructured":"Bunch, J.R., Nielsen, C.P.: Updating the singular value decomposition. Numerische Mathematik 31, 111\u2013129 (1978)","journal-title":"Numerische Mathematik"},{"issue":"9","key":"308_CR9","doi-asserted-by":"crossref","first-page":"1042","DOI":"10.1109\/34.877525","volume":"22","author":"PM Hall","year":"2000","unstructured":"Hall, P.M., Marshall, A.D., Martin, R.R.: Merging and splitting eigenspace models. IEEE Trans. Pattern Anal. Mach. Intell. 22(9), 1042\u20131049 (2000)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"308_CR10","doi-asserted-by":"crossref","unstructured":"Kargupta, H., Huang, W., Sivakumar, K., Park, B.H., Wang, S.: Collective principal component analysis from distributed, heterogeneous data. In: Proceedings of the 4th European Conference on Principles of Data Mining and Knowledge Discovery, pp. 452\u2013457. Springer-Verlag, London, UK, UK (2000)","DOI":"10.1007\/3-540-45372-5_50"},{"issue":"8","key":"308_CR11","doi-asserted-by":"crossref","first-page":"4821","DOI":"10.3390\/s8084821","volume":"8","author":"YA Borgne Le","year":"2008","unstructured":"Le\u00a0Borgne, Y.A., Raybaud, S., Bontempi, G.: Distributed principal component analysis for wireless sensor networks. Sensors 8(8), 4821\u20134850 (2008). doi: 10.3390\/s8084821","journal-title":"Sensors"},{"key":"308_CR12","doi-asserted-by":"crossref","unstructured":"Ahmadi Livani, M., Abadi, M.: A PCA-based distributed approach for intrusion detection in wireless sensor networks. In: 2011 International Symposium on Computer Networks and Distributed Systems (CNDS), pp. 55\u201360 (2011). doi: 10.1109\/CNDS.2011.5764585","DOI":"10.1109\/CNDS.2011.5764585"},{"key":"308_CR13","unstructured":"Fellus, J., Picard, D., Gosselin, P.: Dimensionality reduction in decentralized networks by gossip aggregation of principal components analyzers. In: European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning, Bruges, Belgique, pp. 171\u2013176 (2014)"},{"issue":"6","key":"308_CR14","doi-asserted-by":"crossref","first-page":"2508","DOI":"10.1109\/TIT.2006.874516","volume":"52","author":"S Boyd","year":"2006","unstructured":"Boyd, S., Ghosh, A., Prabhakar, B., Shah, D.: Randomized gossip algorithms. Information Theory, IEEE Transactions on 52(6), 2508\u20132530 (2006). doi: 10.1109\/TIT.2006.874516","journal-title":"IEEE Transactions on Information Theory"},{"key":"308_CR15","unstructured":"Asensio-Marco, C., Beferull-Lozano, B.: Fast average gossiping under asymmetric links in wsns. In: 2014 Proceedings of the 22nd European Signal Processing Conference (EUSIPCO), pp. 131\u2013135 (2014)"},{"issue":"3","key":"308_CR16","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1007\/BF00275687","volume":"15","author":"E Oja","year":"1982","unstructured":"Oja, E.: Simplified neuron model as a principal component analyzer. Journal of Mathematical Biology 15(3), 267\u2013273 (1982)","journal-title":"Journal of Mathematical Biology"},{"issue":"3","key":"308_CR17","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1109\/MSP.2012.2231991","volume":"30","author":"AH Sayed","year":"2013","unstructured":"Sayed, A.H., Tu, S.Y., Chen, J., Zhao, X., Towfic, Z.J.: Diffusion strategies for adaptation and learning over networks: an examination of distributed strategies and network behavior. Signal Processing Magazine, IEEE 30(3), 155\u2013171 (2013). doi: 10.1109\/MSP.2012.2231991","journal-title":"IEEE Signal Processing Magazine"},{"issue":"2","key":"308_CR18","doi-asserted-by":"crossref","first-page":"288","DOI":"10.1109\/5.364461","volume":"83","author":"RD Dony","year":"1995","unstructured":"Dony, R.D., Haykin, S.: Neural network approaches to image compression. Proceedings of the IEEE 83(2), 288\u2013303 (1995). doi: 10.1109\/5.364461","journal-title":"Proceedings of the IEEE"},{"issue":"345","key":"308_CR19","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1080\/01621459.1974.10480137","volume":"69","author":"MH Degroot","year":"1974","unstructured":"Degroot, M.H.: Reaching a Consensus. Journal of the American Statistical Association 69(345), 118\u2013121 (1974)","journal-title":"Journal of the American Statistical Association"},{"issue":"12","key":"308_CR20","doi-asserted-by":"crossref","first-page":"6217","DOI":"10.1109\/TSP.2012.2217338","volume":"60","author":"SY Tu","year":"2012","unstructured":"Tu, S.Y., Sayed, A.H.: Diffusion strategies outperform consensus strategies for distributed estimation over adaptive networks. Signal Processing, IEEE Transactions on 60(12), 6217\u20136234 (2012). doi: 10.1109\/TSP.2012.2217338","journal-title":"IEEE Transactions on Signal Processing"},{"key":"308_CR21","doi-asserted-by":"crossref","unstructured":"Nedic, A., Ozdaglar., A.: Cooperative distributed multi-agent optimization. In: D.P. Palomar, Y.C. Eldar (eds.) Convex Optimization in Signal Processing and Communications, pp. 340\u2013386 (2009). Cambridge Books Online http:\/\/dx.doi.org\/10.1017\/CBO9780511804458.011 .","DOI":"10.1017\/CBO9780511804458.011"},{"key":"308_CR22","unstructured":"Yuan, K., Ling, Q., Yin, W.: On the convergence of decentralized gradient descent. ArXiv arXiv:1310.7063 (2013)"},{"key":"308_CR23","doi-asserted-by":"crossref","unstructured":"Ghadban, N., Honeine, P., Mourad-Chehade, F., Francis, C., Farah, J.: Diffusion strategies for in-network principal component analysis. In: 2014 IEEE International Workshop on Machine Learning for Signal Processing (MLSP), pp. 1\u20136 (2014). doi: 10.1109\/MLSP.2014.6958849","DOI":"10.1109\/MLSP.2014.6958849"},{"issue":"13\u201315","key":"308_CR24","doi-asserted-by":"crossref","first-page":"1582","DOI":"10.1016\/j.neucom.2005.06.016","volume":"69","author":"R M\u00f6ller","year":"2006","unstructured":"M\u00f6ller, R.: First-order approximation of gram-schmidt orthonormalization beats deflation in coupled pca learning rules. Neurocomput. 69(13-15), 1582\u20131590 (2006)","journal-title":"Neurocomput."},{"issue":"35","key":"308_CR25","doi-asserted-by":"crossref","first-page":"6219","DOI":"10.1088\/0305-4470\/33\/35\/310","volume":"33","author":"V Srivastava","year":"2000","unstructured":"Srivastava, V.: A unified view of the orthogonalization methods. Journal of Physics A: Mathematical and General 33(35), 6219 (2000)","journal-title":"Journal of Physics A: Mathematical and General"},{"key":"308_CR26","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1016\/0893-6080(89)90044-0","volume":"2","author":"TD Sanger","year":"1989","unstructured":"Sanger, T.D.: Optimal unsupervised learning in a single-layer linear feedforward neural network. Neural Networks 2, 459\u2013473 (1989)","journal-title":"Neural Networks"},{"key":"308_CR27","unstructured":"Sanger, T.D.: Two iterative algorithms for computing the singular value decomposition from input\/output samples. In: Cowan, J.D., Tesauro, G., Alspector, J. (eds.) Advances in Neural Information Processing Systems 6, pp. 144\u2013151 (1994)"},{"issue":"5","key":"308_CR28","doi-asserted-by":"crossref","first-page":"1255","DOI":"10.1109\/72.410369","volume":"6","author":"LH Chen","year":"1995","unstructured":"Chen, L.H., Chang, S.: An adaptive learning algorithm for principal component analysis. IEEE Transactions on Neural Networks 6(5), 1255\u20131263 (1995)","journal-title":"IEEE Transactions on Neural Networks"},{"key":"308_CR29","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1109\/MCOM.2002.1024422","volume":"40","author":"IF Akyildiz","year":"2002","unstructured":"Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Communications Magazine 40, 102\u2013114 (2002)","journal-title":"IEEE Communications Magazine"},{"issue":"5","key":"308_CR30","doi-asserted-by":"crossref","first-page":"995","DOI":"10.1016\/S0005-1098(96)00259-2","volume":"33","author":"V Chellaboina","year":"1997","unstructured":"Chellaboina, V., Haddad, W.M.: Structured matrix norms for real and complex block-structured uncertainty. Automatica 33(5), 995\u2013997 (1997)","journal-title":"Automatica"},{"key":"308_CR31","unstructured":"Lancaster, P., Tismenetsky, M.: The Theory of Matrices: With Applications. Computer Science and Scientific Computing Series (1985). https:\/\/books.google.fr\/books?id=m8z6Xh1A3t8C"},{"key":"308_CR32","doi-asserted-by":"crossref","unstructured":"Gazi, V., Passino, K.M.: Swarm Stability and Optimization, 1st edn. Springer (2011)","DOI":"10.1007\/978-3-642-18041-5"}],"container-title":["International Journal of Wireless Information Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10776-016-0308-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10776-016-0308-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10776-016-0308-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,6]],"date-time":"2019-09-06T19:31:57Z","timestamp":1567798317000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10776-016-0308-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4,22]]},"references-count":32,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016,6]]}},"alternative-id":["308"],"URL":"https:\/\/doi.org\/10.1007\/s10776-016-0308-1","relation":{},"ISSN":["1068-9605","1572-8129"],"issn-type":[{"type":"print","value":"1068-9605"},{"type":"electronic","value":"1572-8129"}],"subject":[],"published":{"date-parts":[[2016,4,22]]}}}